<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://cyberseclab.unibs.it/</loc></url><url><loc>https://cyberseclab.unibs.it/master/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/</loc></url><url><loc>https://cyberseclab.unibs.it/colloqui-sulla-cybersecurity/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/</loc></url><url><loc>https://cyberseclab.unibs.it/contatti/</loc></url><url><loc>https://cyberseclab.unibs.it/en/</loc></url><url><loc>https://cyberseclab.unibs.it/en/master/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/</loc></url><url><loc>https://cyberseclab.unibs.it/en/colloquia-on-cybersecurity/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/</loc></url><url><loc>https://cyberseclab.unibs.it/en/contact/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/rapid-trust-calibration-ai-interpretabile/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/classificatori-deep-uncertainty-aware/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/deepproblog-complex-event-processing-audio/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/sound-skwatter-phishing-prevention/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/x-squatter-sound-squatting-multilingua/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/wherever-i-may-roam-roaming-agreements/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/frankenstein-bluetooth-fuzzing/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/integrating-csi-sensing-wireless-networks-privacy-countermeasures/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/communication-and-sensing-wireless-phy-threats-iot/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/supporting-trustworthy-ai-bayesian-argumentation/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/self-aware-identification-response-viral-cyber-threats/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/deepsqa-understanding-sensor-data-via-question-answering/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/augmenting-phishing-squatting-detection-with-gans/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/ai-based-sound-squatting-attack-made-possible/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/handling-epistemic-and-aleatory-uncertainties-in-probabilistic-circuits/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/assessing-robustness-of-intelligence-driven-reinforcement-learning/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/lost-in-translation-cross-language-sound-squatting/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/deepprobcep-adversarial-settings/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/learning-robust-reward-machines-from-noisy-labels/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/neuro-symbolic-fusion-wifi-sensing-passive-radar/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/human-machine-collaboration-intelligence-analysis/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/teamcollab-framework-collaborative-pcca/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/physical-layer-privacy-randomized-beamforming/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/towards-cyber-resilience-against-apts/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/resource-constrained-neuro-symbolic-causal-cep/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/argumentation-guided-causal-evaluation-llms/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/risk-aware-classification-via-uncertainty-quantification/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/foundation-models-online-complex-event-detection-cps-iot/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/narce-mamba-neural-algorithmic-reasoner/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/uncertainty-aware-attack-stage-classification/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/transparent-cyber-threat-intelligence-llm-ontologies/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/ontologx-knowledge-graph-extraction-cybersecurity-logs/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/ontologx-wiley-knowledge-graph-extraction-cybersecurity-logs/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/clausole-tipo-trasferimento-dati-paesi-terzi/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/sistemi-arma-autonomi-diritto-pubblico/</loc></url><url><loc>https://cyberseclab.unibs.it/ricerca/physics-joins-ai-rilevamento-misbehavior-veicolare/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/rapid-trust-calibration-interpretable-ai/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/uncertainty-aware-deep-classifiers/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/deepproblog-complex-event-processing-audio/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/sound-skwatter-phishing-prevention/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/x-squatter-cross-language-sound-squatting/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/wherever-i-may-roam-roaming-agreements/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/frankenstein-bluetooth-fuzzing/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/integrating-csi-sensing-wireless-networks-privacy-countermeasures/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/communication-and-sensing-wireless-phy-threats-iot/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/supporting-trustworthy-ai-bayesian-argumentation/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/self-aware-identification-response-viral-cyber-threats/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/deepsqa-understanding-sensor-data-via-question-answering/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/augmenting-phishing-squatting-detection-with-gans/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/ai-based-sound-squatting-attack-made-possible/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/handling-epistemic-and-aleatory-uncertainties-in-probabilistic-circuits/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/assessing-robustness-of-intelligence-driven-reinforcement-learning/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/lost-in-translation-cross-language-sound-squatting/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/deepprobcep-adversarial-settings/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/learning-robust-reward-machines-from-noisy-labels/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/neuro-symbolic-fusion-wifi-sensing-passive-radar/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/human-machine-collaboration-intelligence-analysis/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/teamcollab-framework-collaborative-pcca/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/physical-layer-privacy-randomized-beamforming/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/towards-cyber-resilience-against-apts/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/resource-constrained-neuro-symbolic-causal-cep/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/argumentation-guided-causal-evaluation-llms/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/risk-aware-classification-via-uncertainty-quantification/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/foundation-models-online-complex-event-detection-cps-iot/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/narce-mamba-neural-algorithmic-reasoner/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/uncertainty-aware-attack-stage-classification/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/transparent-cyber-threat-intelligence-llm-ontologies/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/ontologx-knowledge-graph-extraction-cybersecurity-logs/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/ontologx-wiley-knowledge-graph-extraction-cybersecurity-logs/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/standard-contractual-clauses-third-country-data-transfers/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/autonomous-weapons-public-law/</loc></url><url><loc>https://cyberseclab.unibs.it/en/research/physics-joins-ai-vehicular-misbehavior-detection/</loc></url><url><loc>https://cyberseclab.unibs.it/progetti/acre/</loc></url><url><loc>https://cyberseclab.unibs.it/progetti/hai-pcca/</loc></url><url><loc>https://cyberseclab.unibs.it/progetti/ns-cep/</loc></url><url><loc>https://cyberseclab.unibs.it/progetti/true/</loc></url><url><loc>https://cyberseclab.unibs.it/progetti/neacd/</loc></url><url><loc>https://cyberseclab.unibs.it/progetti/isp5g-plus/</loc></url><url><loc>https://cyberseclab.unibs.it/progetti/scarphase/</loc></url><url><loc>https://cyberseclab.unibs.it/progetti/embrace/</loc></url><url><loc>https://cyberseclab.unibs.it/progetti/csi-future/</loc></url><url><loc>https://cyberseclab.unibs.it/progetti/di-p2sl/</loc></url><url><loc>https://cyberseclab.unibs.it/en/projects/acre/</loc></url><url><loc>https://cyberseclab.unibs.it/en/projects/hai-pcca/</loc></url><url><loc>https://cyberseclab.unibs.it/en/projects/ns-cep/</loc></url><url><loc>https://cyberseclab.unibs.it/en/projects/true/</loc></url><url><loc>https://cyberseclab.unibs.it/en/projects/neacd/</loc></url><url><loc>https://cyberseclab.unibs.it/en/projects/isp5g-plus/</loc></url><url><loc>https://cyberseclab.unibs.it/en/projects/scarphase/</loc></url><url><loc>https://cyberseclab.unibs.it/en/projects/embrace/</loc></url><url><loc>https://cyberseclab.unibs.it/en/projects/csi-future/</loc></url><url><loc>https://cyberseclab.unibs.it/en/projects/di-p2sl/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/cybersecurity-della-conoscenza-operativa/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/giornata-della-trasparenza-2026/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/pubblicazione-ai-security-clusit-2026/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/llm-red-teaming-nist-mitre-atlas-clusit-2026/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/cybersicurezza-protezione-dati-personali-gestione-rischio-enti-pubblici/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/seminario-ai-liceo-copernico-2026/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/cyber-security-arena-2025-moderazione-panel-apertura/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/domani-lavoro-tavola-rotonda-cybersecurity-2025/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/frau-futuro-intelligenza-artificiale-robotica-diritto-2025/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/romecup-2025-sicurezza-ai/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/limiti-giuridici-sviluppi-tecnologici-difesa-2024/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/salone-del-risparmio-ai-responsabile-sicuro-2024/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/frau-artificial-intelligence-political-decision-making-2025/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/frau-lethal-autonomous-weapon-systems-2024/</loc></url><url><loc>https://cyberseclab.unibs.it/eventi/pubblicazione-supply-chain-security-clusit-2023/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/cybersecurity-of-operational-knowledge/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/transparency-day-2026-conscious-use-of-technology/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/clusit-ai-security-report-2026/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/llm-red-teaming-nist-mitre-atlas-clusit-2026/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/cybersecurity-personal-data-protection-risk-management-public-bodies/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/copernico-high-school-ai-seminar-2026/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/cyber-security-arena-2025-opening-panel-moderation/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/domani-lavoro-cybersecurity-professions-roundtable-2025/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/frau-future-ai-robotics-law-2025/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/romecup-2025-ai-security-talk/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/legal-limits-technological-developments-defence-2024/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/salone-del-risparmio-responsible-secure-ai-2024/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/frau-artificial-intelligence-political-decision-making-2025/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/frau-lethal-autonomous-weapon-systems-2024/</loc></url><url><loc>https://cyberseclab.unibs.it/en/events/clusit-supply-chain-security-report-2023/</loc></url><url><loc>https://cyberseclab.unibs.it/colloqui-sulla-cybersecurity/obblighi-legali-framework-cyber-sicurezza/</loc></url><url><loc>https://cyberseclab.unibs.it/colloqui-sulla-cybersecurity/preparazione-sicurezza-informatica-testimonianze-strategie-impresa/</loc></url><url><loc>https://cyberseclab.unibs.it/colloqui-sulla-cybersecurity/cybersecurity-aziendale-compliance-integrata-efficace/</loc></url><url><loc>https://cyberseclab.unibs.it/en/colloquia-on-cybersecurity/legal-obligations-cybersecurity-frameworks/</loc></url><url><loc>https://cyberseclab.unibs.it/en/colloquia-on-cybersecurity/preparing-for-information-security-business-testimonies-and-strategies/</loc></url><url><loc>https://cyberseclab.unibs.it/en/colloquia-on-cybersecurity/corporate-cybersecurity-proactive-integrated-compliance/</loc></url><url><loc>https://cyberseclab.unibs.it/cyberchallenge/2026/</loc></url><url><loc>https://cyberseclab.unibs.it/cyberchallenge/2025/</loc></url><url><loc>https://cyberseclab.unibs.it/cyberchallenge/2024/</loc></url><url><loc>https://cyberseclab.unibs.it/cyberchallenge/2023/</loc></url><url><loc>https://cyberseclab.unibs.it/en/cyberchallenge/2026/</loc></url><url><loc>https://cyberseclab.unibs.it/en/cyberchallenge/2025/</loc></url><url><loc>https://cyberseclab.unibs.it/en/cyberchallenge/2024/</loc></url><url><loc>https://cyberseclab.unibs.it/en/cyberchallenge/2023/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/federico-cerutti/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/francesco-gringoli/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/pietro-baroni/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/devis-bianchini/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/paolo-ferrari/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/alfonso-gerevini/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/massimiliano-giacomin/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/luca-giuzzi/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/giovanni-guida/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/renato-lo-cigno/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/michele-melchiori/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/giorgio-pedrazzi/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/ivan-serina/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/matteo-frau/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/francesca-romanin-jacur/</loc></url><url><loc>https://cyberseclab.unibs.it/persone/alberto-omodei/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/federico-cerutti/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/francesco-gringoli/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/pietro-baroni/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/devis-bianchini/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/paolo-ferrari/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/alfonso-gerevini/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/massimiliano-giacomin/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/luca-giuzzi/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/giovanni-guida/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/renato-lo-cigno/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/michele-melchiori/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/giorgio-pedrazzi/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/ivan-serina/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/matteo-frau/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/francesca-romanin-jacur/</loc></url><url><loc>https://cyberseclab.unibs.it/en/people/alberto-omodei/</loc></url></urlset>