<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="6.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Amin Ghafouri</style></author><author><style face="normal" font="default" size="100%">Waseem Abbas</style></author><author><style face="normal" font="default" size="100%">Yevgeniy Vorobeychik</style></author><author><style face="normal" font="default" size="100%">Koutsoukos, Xenofon</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Vulnerability of fixed-time control of signalized intersections to cyber-tampering</style></title><secondary-title><style face="normal" font="default" size="100%">Resilience Week (RWS)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">08/2016</style></date></pub-dates></dates><urls><related-urls><url><style face="normal" font="default" size="100%">https://archive.isis.vanderbilt.edu/sites/default/files/paper_2.pdf</style></url></related-urls></urls><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pub-location><style face="normal" font="default" size="100%">Chicago, IL</style></pub-location></record></records></xml>