<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="6.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Aron Laszka</style></author><author><style face="normal" font="default" size="100%">Bradley Potteiger</style></author><author><style face="normal" font="default" size="100%">Yevgeniy Vorobeychik</style></author><author><style face="normal" font="default" size="100%">Amin, Saurabh</style></author><author><style face="normal" font="default" size="100%">Koutsoukos, Xenofon</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Vulnerability of transportation networks to traffic-signal tampering</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 7th International Conference on Cyber-Physical Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Vienna, Austria</style></pub-location><pages><style face="normal" font="default" size="100%">16</style></pages></record></records></xml>