<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">

<!-- gemaakt met www.xml-sitemaps.nl -->
<!-- aangeboden door www.metatags.nl -->

<url>
    <loc>https://www.cyber-threat-intelligence.com/</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/research/cerber-cnc/</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/research/dos-backscatter/</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/research/fingerprinting-tools/</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/people/</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/education/network-security/</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/education/advanced-network-security/</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/education/applied-security-analysis/</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/blog/</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/cns2018-cerber.pdf</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=yang%3a2018&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=pletinckx%3a2018&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=ghiette%3a2018&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=blenn%3a2017&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=abbink%3a2017&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=prado-romero%3a2017&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=luchs%3a2017&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=aubel%3a2017&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=wieren%3a2016&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=ghiette%3a2016&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2016rq&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2014qo&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2014&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=dantas%3a2014&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=adrichem%3a2014&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2013zr&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2013tw&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2013&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=hernandez%3a2012qf&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2012il&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2012fc&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=blenn%3a2012ve&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=blenn%3a2012ly&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=blenn%3a2012bh&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=tang%3a2011jl&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=mieghem%3a2011zt&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2011&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2010mb&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2010cr&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2010cq&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2009nx&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2009gb&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=sicker%3a2008tg&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2008oq&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2008kl&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2008ij&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2008hc&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2008fv&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2008bs&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=rondeau%3a2007qa&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2007mi&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2007kl&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2007fu&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=christian-doerr%3a2007dz&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=sicker%3a2006pi&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=sheth%3a2006lh&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2006ff&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=neufeld%3a2005fu&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/publications/bibtexbrowser.php?key=doerr%3a2005ye&amp;amp;amp;amp;bib=biblio.bib</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/people/christian</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/people/harm</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/people/vincent</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/education/advanced-network-security/portfolio-single-project.html</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/blog/2018/bitcoin-malwarecoordination</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
<url>
    <loc>https://www.cyber-threat-intelligence.com/pgp.pub</loc>

    <lastmod>2018-08-07</lastmod>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
</url>  
</urlset>