<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://fullcirclesecurity.org/projects/</loc><lastmod>2025-10-31T09:37:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://fullcirclesecurity.org/academic/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2025/08/msccourse.png</image:loc><image:title>MSCCourse</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/10/screenshot-2023-10-08-at-12.17.02.png</image:loc><image:title>Screenshot 2023-10-08 at 12.17.02</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/01/infosec2020-e1579459318297.png</image:loc><image:title>Information Security Lectures (2020)</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2019/03/screen-shot-2019-03-25-at-10.44.57.png</image:loc><image:title>Concept Map</image:title></image:image><lastmod>2025-09-04T09:42:35+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://fullcirclesecurity.org/services/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2025/09/mycourse_2-2.png</image:loc><image:title>MyCourse_2</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2025/09/mycourse_2-1.png</image:loc><image:title>MyCourse_2</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2025/09/mycourse_2.png</image:loc><image:title>MyCourse_2</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/11/canvas_1.png</image:loc><image:title>Canvas_1</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/11/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/10/screenshot-2024-10-13-at-10.54.17.png</image:loc><image:title>Screenshot 2024-10-13 at 10.54.17</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/10/sampleinfoseccalendar.png</image:loc><image:title>SampleInfoSecCalendar</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/10/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/07/screenshot-2023-07-01-at-15.22.35.png</image:loc><image:title>Screenshot 2023-07-01 at 15.22.35</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/05/inpragueforconference.jpg</image:loc><image:title>InPragueForConference</image:title></image:image><lastmod>2025-09-04T09:32:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://fullcirclesecurity.org/2025/05/15/the-critical-domain-of-llm-cybersecurity/</loc><lastmod>2025-05-15T17:44:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2025/04/21/5-key-metrics-to-enhance-cybersecurity-posture/</loc><lastmod>2025-05-15T17:19:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2025/03/16/digital-deception-the-rise-of-ai-voice-cloning-scams/</loc><lastmod>2025-03-16T20:04:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/presentations/</loc><lastmod>2025-03-16T19:05:44+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://fullcirclesecurity.org/2025/02/12/the-modern-security-engineers-toolkit/</loc><lastmod>2025-02-12T17:28:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2024/11/26/nist-announces-the-end-of-rsa-and-ecdsa/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/11/image-4.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/11/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/11/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-11-26T21:48:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/publications/</loc><lastmod>2024-11-19T14:12:26+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://fullcirclesecurity.org/2024/11/09/security-framework-for-modern-enterprises/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-11-16T08:09:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2024/10/13/understanding-stream-ciphers-with-lfsrs/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/10/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/10/generate-an-image-of-someone-teaching-applied-cryptography-and-the-2.png</image:loc><image:title>generate-an-image-of-someone-teaching-applied-cryptography-and-the</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/10/generate-an-image-of-someone-teaching-applied-cryptography-and-the-1.png</image:loc><image:title>generate-an-image-of-someone-teaching-applied-cryptography-and-the</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/10/generate-an-image-of-someone-teaching-applied-cryptography-and-the.png</image:loc><image:title>generate-an-image-of-someone-teaching-applied-cryptography-and-the</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/10/generate-an-image-of-someone-teaching-cryptography-and-the-topic.png</image:loc><image:title>generate-an-image-of-someone-teaching-cryptography-and-the-topic</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/10/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/10/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-10-13T13:26:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2024/04/21/cybersecurity-compliance-frameworks/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/04/pexels-photo-19813740.jpeg</image:loc><image:title>the word security spelled out in scrabble letters</image:title><image:caption>Photo by Markus Winkler on &lt;a href="https://www.pexels.com/photo/the-word-security-spelled-out-in-scrabble-letters-19813740/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2024-04-19T07:27:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2024/04/01/researchrabbit-unveiling-scholarly-connections-with-ai/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/04/screenshot-2024-04-01-at-17.34.02-1.png</image:loc><image:title>screenshot-2024-04-01-at-17.34.02-1</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2024/04/screenshot-2024-04-01-at-17.34.02.png</image:loc><image:title>screenshot-2024-04-01-at-17.34.02</image:title></image:image><lastmod>2024-04-01T16:00:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/contact/</loc><lastmod>2024-04-01T12:19:23+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://fullcirclesecurity.org/about/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/05/screenshot-2023-05-09-at-14.09.47.png</image:loc><image:title>screenshot-2023-05-09-at-14.09.47</image:title></image:image><lastmod>2024-04-01T10:10:44+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://fullcirclesecurity.org/2023/11/30/delving-into-the-rsa-cryptosystem-and-beyond/</loc><lastmod>2023-11-30T06:36:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/09/30/safeguarding-the-future-my-iot-security-lecture-at-lund-university/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/09/pexels-photo-279810.jpeg</image:loc><image:title>door handle key keyhole</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/door-handle-key-keyhole-279810/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/09/pexels-photo-1714208.jpeg</image:loc><image:title>black flat screen computer monitor</image:title><image:caption>Photo by Josh Sorenson on &lt;a href="https://www.pexels.com/photo/black-flat-screen-computer-monitor-1714208/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-09-30T14:08:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/09/27/my-first-lecture-at-the-university-of-malta/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/09/cb850759-6cc6-40f2-ae43-dde1299f9c66.jpg</image:loc><image:title>cb850759-6cc6-40f2-ae43-dde1299f9c66</image:title></image:image><lastmod>2023-09-26T22:24:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/08/20/the-evolution-of-cybersecurity-nist-cybersecurity-framework-2-0/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/08/pexels-photo-5380642.jpeg</image:loc><image:title>close up view of system hacking</image:title><image:caption>Photo by Tima Miroshnichenko on &lt;a href="https://www.pexels.com/photo/close-up-view-of-system-hacking-5380642/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-08-17T20:19:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/08/17/data-security-and-privacy-in-the-era-of-floating-homes/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/08/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-08-17T18:45:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/07/29/tips-for-excelling-in-your-ph-d-defense/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/07/pexels-photo-652348.jpeg</image:loc><image:title>men s black blazer</image:title><image:caption>Photo by Lukas on &lt;a href="https://www.pexels.com/photo/men-s-black-blazer-652348/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/07/pexels-photo-6456225.jpeg</image:loc><image:title>strong ethnic fighter showing punching technique during training</image:title><image:caption>Photo by Julia Larson on &lt;a href="https://www.pexels.com/photo/strong-ethnic-fighter-showing-punching-technique-during-training-6456225/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-07-18T18:56:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/07/22/the-diamond-model-of-intrusion-analysis/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/07/pexels-photo-5774953.jpeg</image:loc><image:title>diamond ring up in air</image:title><image:caption>Photo by Michael Morse on &lt;a href="https://www.pexels.com/photo/diamond-ring-up-in-air-5774953/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-07-18T16:01:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/07/15/realizing-the-potential-of-machine-learning-with-python-libraries/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/07/pexels-photo-265087.jpeg</image:loc><image:title>business charts commerce computer</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/business-charts-commerce-computer-265087/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-07-06T07:34:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/07/08/essential-skills-for-effective-threat-hunting/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/07/pexels-photo-3536235.jpeg</image:loc><image:title>man wearing jacket carrying a gun</image:title><image:caption>Photo by Harrison Haines on &lt;a href="https://www.pexels.com/photo/man-wearing-jacket-carrying-a-gun-3536235/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-07-05T10:55:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/07/01/security-risks-of-using-chatgpt-for-code-generation/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/06/pexels-photo-270557.jpeg</image:loc><image:title>blur business close up code</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/blur-business-close-up-code-270557/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-07-01T09:13:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/05/10/eu-data-initiatives-developments-to-watch-in-2024-and-beyond/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/05/pexels-photo-113885.jpeg</image:loc><image:title>blue and yellow round star print textile</image:title><image:caption>Photo by freestocks.org on &lt;a href="https://www.pexels.com/photo/blue-and-yellow-round-star-print-textile-113885/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-05-10T14:51:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/04/25/exploring-the-frontier-of-green-intelligent-homes-my-presentation-in-prague/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/04/pexels-photo-974400.jpeg</image:loc><image:title>green leaf plans in closeup photography</image:title><image:caption>Photo by Capricious Wayfarer (Saptarshi) on &lt;a href="https://www.pexels.com/photo/green-leaf-plans-in-closeup-photography-974400/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-04-25T21:28:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/04/14/securing-the-university-my-information-security-awareness-session/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2023/04/pexels-photo-3861958.jpeg</image:loc><image:title>woman coding on computer</image:title><image:caption>Photo by ThisIsEngineering on &lt;a href="https://www.pexels.com/photo/woman-coding-on-computer-3861958/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2023-04-14T14:45:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/01/15/navigating-the-risks-and-rewards-of-drone-technology/</loc><lastmod>2023-01-14T17:48:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/01/13/exploring-some-misconceptions-and-complexities-of-artificial-intelligence/</loc><lastmod>2023-01-08T20:06:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/12/31/__trashed/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/12/pexels-photo-1071249.jpeg</image:loc><image:title>close up photography of person holding crystal ball</image:title><image:caption>Photo by FOX on &lt;a href="https://www.pexels.com/photo/close-up-photography-of-person-holding-crystal-ball-1071249/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-12-31T11:42:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/01/08/understanding-cyber-warfare-through-frameworks/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/12/pexels-photo-5578367.jpeg</image:loc><image:title>close up photo of blue weaponry</image:title><image:caption>Photo by Joseph Fuller on &lt;a href="https://www.pexels.com/photo/close-up-photo-of-blue-weaponry-5578367/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-12-30T14:15:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2023/01/06/advantages-and-concerns-of-using-machine-learning-in-security-systems/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/12/pexels-photo-247819.jpeg</image:loc><image:title>letter blocks</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/letter-blocks-247819/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-12-30T09:23:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/12/18/the-matter-smart-home-standard/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/12/pexels-photo-1072851.jpeg</image:loc><image:title>round grey speaker on brown board</image:title><image:caption>Photo by John Tekeridis on &lt;a href="https://www.pexels.com/photo/round-grey-speaker-on-brown-board-1072851/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-12-19T08:31:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/12/30/exploring-the-interdependencies-between-ai-and-cybersecurity/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/12/pexels-photo-373543.jpeg</image:loc><image:title>blue bright lights</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/blue-bright-lights-373543/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-12-18T10:50:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/12/16/8-rules-for-good-research-practice/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/12/pexels-photo-669610.jpeg</image:loc><image:title>person holding blue ballpoint pen on white notebook</image:title><image:caption>Photo by Lukas on &lt;a href="https://www.pexels.com/photo/person-holding-blue-ballpoint-pen-on-white-notebook-669610/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-12-17T19:04:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/12/25/explore-the-future-of-smart-home-technology-with-amazons-dream-home/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/12/pexels-photo-1666315.jpeg</image:loc><image:title>white bluetooth speaker on silver laptop computer</image:title><image:caption>Photo by Jessica Lewis Creative on &lt;a href="https://www.pexels.com/photo/white-bluetooth-speaker-on-silver-laptop-computer-1666315/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-12-14T15:33:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/12/23/understanding-the-benefits-of-academic-freedom/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/12/pexels-photo-247851.jpeg</image:loc><image:title>low section of man against sky</image:title><image:caption>Photo by Pixabay on &lt;a href="https://www.pexels.com/photo/low-section-of-man-against-sky-247851/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-12-12T13:51:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/12/09/courses-needed-for-a-phd-exploring-the-requirements-at-a-swedish-university/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/12/pexels-photo-5940836.jpeg</image:loc><image:title>multiethnic students and teacher listening report of student</image:title><image:caption>Photo by Kampus Production on &lt;a href="https://www.pexels.com/photo/multiethnic-students-and-teacher-listening-report-of-student-5940836/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-12-02T14:02:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/11/28/the-importance-of-combining-research-and-teaching/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/11/pexels-photo-6334575.jpeg</image:loc><image:title>man in gray suit jacket holding white paper</image:title><image:caption>Photo by cottonbro studio on &lt;a href="https://www.pexels.com/photo/man-in-gray-suit-jacket-holding-white-paper-6334575/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-11-28T07:47:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/12/02/how-to-choose-a-conference-to-publish-your-paper/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/11/pexels-photo-2774556.jpeg</image:loc><image:title>people sitting on gang chairs</image:title><image:caption>Photo by Luis Quintero on &lt;a href="https://www.pexels.com/photo/people-sitting-on-gang-chairs-2774556/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-11-27T22:43:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/11/23/iot-security-a-guest-lecture-at-malmo-university/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/11/screen-shot-2022-11-23-at-16.03.09-1.png</image:loc><image:title>screen-shot-2022-11-23-at-16.03.09-1</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/11/screen-shot-2022-11-23-at-16.03.09.png</image:loc><image:title>screen-shot-2022-11-23-at-16.03.09</image:title></image:image><lastmod>2022-11-23T15:46:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/11/21/the-importance-of-trustworthiness-in-the-age-of-the-iot-my-first-article-on-medium/</loc><lastmod>2022-11-21T12:46:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/10/29/i-had-a-great-time-at-the-webist-2022-conference/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-10-29T10:16:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/10/18/how-to-make-the-most-of-your-career-journey-my-panel-participation/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/10/img_3467.png</image:loc><image:title>img_3467</image:title></image:image><lastmod>2022-10-11T17:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/10/11/a-great-resource-to-help-you-learn-about-cybersecurity/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/10/screen-shot-2022-10-07-at-17.46.20.png</image:loc><image:title>screen-shot-2022-10-07-at-17.46.20</image:title></image:image><lastmod>2022-10-11T16:34:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/10/16/the-benefits-of-industry-experience-for-academics/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/10/pexels-photo-3153201.jpeg</image:loc><image:title>man in black crew neck t shirt sitting beside woman in gray crew neck t shirt</image:title><image:caption>Photo by Canva Studio on &lt;a href="https://www.pexels.com/photo/man-in-black-crew-neck-t-shirt-sitting-beside-woman-in-gray-crew-neck-t-shirt-3153201/" rel="nofollow"&gt;Pexels.com&lt;/a&gt;</image:caption></image:image><lastmod>2022-10-10T11:39:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/10/02/the-different-types-of-privacy-preserving-schemes/</loc><lastmod>2022-09-30T22:50:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/09/30/cybersecurity-and-the-iot-a-guest-lecture-at-lund-university/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/09/screen-shot-2022-09-30-at-16.22.49.png</image:loc><image:title>screen-shot-2022-09-30-at-16.22.49</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/09/target.png</image:loc><image:title>target</image:title></image:image><lastmod>2022-09-30T14:37:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/09/03/how-to-achieve-flow-when-writing-a-research-paper/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/08/scott-graham-oqmzwnd3thu-unsplash-2.jpg</image:loc><image:title>scott-graham-oqmzwnd3thu-unsplash-2</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/08/scott-graham-oqmzwnd3thu-unsplash-1.jpg</image:loc><image:title>scott-graham-oqmzwnd3thu-unsplash-1</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/08/scott-graham-oqmzwnd3thu-unsplash.jpg</image:loc><image:title>scott-graham-oqmzwnd3thu-unsplash</image:title></image:image><lastmod>2022-09-03T08:26:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/08/24/teacher-training-in-blekinge/</loc><lastmod>2022-08-20T10:31:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/08/20/the-future-of-luxury-living-is-here-and-it-is-floating/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/08/screen-shot-2022-08-18-at-13.55.01.png</image:loc><image:title>screen-shot-2022-08-18-at-13.55.01</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/08/screen-shot-2022-08-18-at-13.50.57.png</image:loc><image:title>screen-shot-2022-08-18-at-13.50.57</image:title></image:image><lastmod>2022-08-18T12:27:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/08/17/the-ftc-wants-to-crack-down-on-mass-surveillance/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/08/photo-by-lianhao-qu-on-unsplash.jpg</image:loc><image:title>photo-by-lianhao-qu-on-unsplash</image:title></image:image><lastmod>2022-08-16T13:21:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/08/01/popular-smart-home-brands-may-be-allowing-the-police-to-conduct-warrantless-home-surveillance/</loc><lastmod>2022-08-01T12:45:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/07/17/do-you-need-to-wait-for-perfect-results-before-publishing/</loc><lastmod>2022-07-17T09:15:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/07/04/is-your-home-giving-away-your-secrets/</loc><lastmod>2022-07-03T09:57:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/07/02/iot-cybersecurity-two-new-documents-published-by-nist/</loc><lastmod>2022-07-01T11:52:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/06/29/the-cnils-privacy-research-day/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/06/privacy.png</image:loc><image:title>privacy</image:title></image:image><lastmod>2022-06-29T11:38:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/06/05/never-underestimate-the-power-of-networking-tips-for-connecting-with-people-at-conferences/</loc><lastmod>2022-06-05T19:06:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/06/03/threat-modeling-some-of-the-best-methods/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2022/06/threatmodeling.png</image:loc><image:title>threatmodeling</image:title></image:image><lastmod>2022-06-03T08:43:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/04/08/panel-discussion-on-the-topic-of-designing-iot-systems/</loc><lastmod>2022-04-08T17:21:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/02/17/corporate-security-standards-best-practices-and-frameworks/</loc><lastmod>2022-02-17T19:50:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/02/10/the-ultimate-osint-collection/</loc><lastmod>2022-02-10T14:09:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/01/27/cyber-threat-maps/</loc><lastmod>2022-01-27T08:10:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/01/09/where-are-we-today-with-iot-security-standards/</loc><lastmod>2022-01-01T19:47:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/01/05/the-benefits-and-drawbacks-of-doing-a-ph-d-at-different-times-in-your-life/</loc><lastmod>2022-01-01T18:29:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2022/01/02/the-internet-of-things-and-security/</loc><lastmod>2021-12-27T16:00:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/12/29/how-to-find-a-good-research-topic/</loc><lastmod>2021-12-27T10:06:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/12/26/the-importance-of-information-ethics-in-the-digital-age/</loc><lastmod>2021-12-22T13:47:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/12/22/the-right-way-to-review-a-scholarly-manuscript-for-a-journal/</loc><lastmod>2021-12-18T20:15:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/12/16/my-lecture-about-the-iot-and-data-privacy/</loc><lastmod>2021-12-16T09:16:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/12/08/my-fosad-experience-and-ph-d-security-courses/</loc><lastmod>2021-12-06T16:36:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/12/05/life-as-a-postdoc/</loc><lastmod>2021-12-05T16:45:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/10/19/the-ph-d-thesis-of-the-year-award/</loc><lastmod>2021-10-19T17:59:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/10/14/the-honourable-doctoral-speech/</loc><lastmod>2021-10-14T16:58:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/09/28/lecture-about-iot-security/</loc><lastmod>2021-09-28T17:57:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/07/02/a-research-proposal-about-poisoning-attacks/</loc><lastmod>2021-07-02T08:21:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/06/25/security-engineering-and-machine-learning/</loc><lastmod>2021-06-25T07:31:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/06/02/swedens-cyber-range-and-cyber-security/</loc><lastmod>2021-06-02T19:26:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/05/21/special-issue-on-privacy-and-trust/</loc><lastmod>2021-05-21T18:44:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/05/07/keeping-your-smart-home-secure/</loc><lastmod>2021-05-07T14:08:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/04/24/interactive-event-on-digital-ethics/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2021/04/screen-shot-2021-04-23-at-12.45.44-2.png</image:loc><image:title>Screen Shot 2021-04-23 at 12.45.44</image:title></image:image><lastmod>2021-04-24T14:40:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/03/28/two-minute-elevator-pitch-to-swedish-companies/</loc><lastmod>2021-03-28T13:38:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/02/28/some-initiatives-to-help-secure-smart-home-devices/</loc><lastmod>2021-02-28T19:53:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/02/22/initiatives-being-brewed-by-governments-to-strengthen-the-iot-privacy-and-security/</loc><lastmod>2021-02-22T11:41:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/02/13/successfully-defended-my-phd-dissertation/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2021/02/screen-shot-2021-02-13-at-17.58.21.png</image:loc><image:title>Book Cover</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2021/02/img_8230.jpg</image:loc><image:title>IMG_8230</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2021/02/img_6146-1.jpg</image:loc><image:title>IMG_6146</image:title></image:image><lastmod>2021-02-13T17:25:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/01/25/open-source-smart-home-simulators/</loc><lastmod>2021-01-25T10:11:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2021/01/23/hosting-virtual-classes-using-zoom-and-discord/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2021/01/screen-shot-2021-01-23-at-20.02.32.png</image:loc><image:title>Sharing the Whiteboard on Zoom</image:title></image:image><lastmod>2021-01-23T20:23:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/11/25/lecturing-about-security-and-blockchain-in-a-masters-course/</loc><lastmod>2020-11-25T21:25:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/10/25/inside-the-dolls-house/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/10/873e76c5-cbd9-435f-8483-b93b7e0e06a1.jpg</image:loc><image:title>Fund raising event.</image:title></image:image><lastmod>2020-10-25T16:48:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/10/14/memories-of-a-good-seminar/</loc><lastmod>2020-10-14T13:01:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/10/09/is-your-home-becoming-a-spy/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/10/iot2020.jpg</image:loc><image:title>My Presentation Slot at IoT2020.</image:title></image:image><lastmod>2020-10-14T08:22:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/10/04/online-lecture-about-iot-security/</loc><lastmod>2020-10-04T17:40:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/09/30/my-final-seminar/</loc><lastmod>2020-09-30T08:19:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/07/18/that-is-a-wrap-on-computing-2020/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/07/screen-shot-2020-07-17-at-15.16.31.png</image:loc><image:title>Vint Cerf keynote</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/07/screen-shot-2020-07-17-at-14.59.57.png</image:loc><image:title>My Presentation</image:title></image:image><lastmod>2020-07-18T08:54:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/07/06/talking-about-dos-attacks-at-the-computing-conference/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/07/screen-shot-2020-07-05-at-11.09.53.png</image:loc><image:title>Dos Attacks targeting the smart connected home.</image:title><image:caption>Dos Attacks targeting the smart connected home.</image:caption></image:image><lastmod>2020-07-06T15:48:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/03/04/presenting-my-research-project-at-lth/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/03/mepresentingatlth.jpg</image:loc><image:title>My presentation at LTH</image:title><image:caption>My presentation at LTH
</image:caption></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/03/img_6735-2.png</image:loc><image:title>Photo of me presenting</image:title><image:caption>Photo of me presenting</image:caption></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/03/img_4899-e1583336532890.jpg</image:loc><image:title>IMG_4899</image:title></image:image><lastmod>2020-07-05T08:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/05/07/my-take-on-internships-summer-schools-and-exchanges/</loc><lastmod>2020-05-07T16:24:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/04/10/using-mindmaps-to-organize-my-writing/</loc><lastmod>2020-04-10T17:29:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/04/09/interesting-book-showed-up-in-my-mailbox/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/04/book.png</image:loc><image:title>Book</image:title></image:image><lastmod>2020-04-10T08:10:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/03/28/investigating-privacy-threats-in-smart-homes/</loc><lastmod>2020-03-28T10:25:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/03/12/the-current-state-of-iot-security-and-a-glimpse-into-the-future/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/03/img_4933.jpg</image:loc><image:title>IMG_4933</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/03/img_4926.jpg</image:loc><image:title>IMG_4926</image:title></image:image><lastmod>2020-03-12T17:17:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/03/04/strengthen-your-academic-writing-skills-with-this-resource/</loc><lastmod>2020-03-04T09:01:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/01/23/featured-on-linkedin-and-facebook/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/01/file.jpeg</image:loc><image:title>file</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/01/screen-shot-2020-01-23-at-10.53.35.png</image:loc><image:title>Screen Shot 2020-01-23 at 10.53.35</image:title></image:image><lastmod>2020-01-23T12:33:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/01/20/2020-kickoff/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/01/8bf5d46a-9c3e-4715-8b46-e73db9e9c990.jpg</image:loc><image:title>Getting ready</image:title><image:caption>Getting ready</image:caption></image:image><lastmod>2020-01-20T15:13:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/01/16/learning-swedish-is-beneficial/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2020/01/img_4585-1.jpg</image:loc><image:title>Swedish language certificate</image:title><image:caption>Swedish language certificate</image:caption></image:image><lastmod>2020-01-16T21:05:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/01/16/tip-keep-tabs-while-waiting-for-your-acceptance-notification/</loc><lastmod>2020-01-16T19:31:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2019/08/23/my-presentation-at-fhnw/</loc><lastmod>2020-01-13T20:08:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2020/01/13/human-centered-ai-course/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2019/12/img_4070.jpg</image:loc><image:title>Human-centered AI</image:title><image:caption>Human-centered AI</image:caption></image:image><lastmod>2020-01-13T19:58:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2019/10/03/lecturing-iot-security-at-lund-university/</loc><lastmod>2019-10-03T20:43:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2019/09/26/presenting-at-the-science-day-in-angelholm/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2019/09/2926a2e9-3eba-48f2-adae-d5832b9ba790.jpg</image:loc><image:title>2926A2E9-3EBA-48F2-ADAE-D5832B9BA790</image:title></image:image><lastmod>2019-09-26T08:07:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2019/08/16/how-to-create-an-effective-scientific-presentation-in-little-time/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2019/08/presentation-1454403_640.png</image:loc><image:title>Creating an effective presentation</image:title><image:caption>Creating an effective presentation</image:caption></image:image><lastmod>2019-08-16T07:57:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2019/06/19/common-attacks-in-the-iot/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2019/06/skitch.png</image:loc><image:title>skitch</image:title></image:image><lastmod>2019-06-19T11:31:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2019/06/03/smart-home-datasets-and-a-realtime-internet-connected-home/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2019/06/screen-shot-2019-06-03-at-14.26.55.png</image:loc><image:title>An Internet-connected home in the Netherlands</image:title></image:image><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2019/05/binary-2728121_960_720.jpg</image:loc><image:title>binary-2728121_960_720</image:title></image:image><lastmod>2019-06-03T16:28:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2019/05/20/organizing-research-articles/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2019/05/mendeley.png</image:loc><image:title>mendeley</image:title></image:image><lastmod>2019-05-20T13:30:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2019/03/25/my-talk-in-japan/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2019/03/9639aad1-6318-4aa0-ae7b-f43fd1a3cd15.jpg</image:loc><image:title>9639aad1-6318-4aa0-ae7b-f43fd1a3cd15</image:title></image:image><lastmod>2019-03-25T06:48:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2019/02/05/using-stride-to-uncover-threats-in-an-information-system/</loc><lastmod>2019-02-05T10:40:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2019/01/24/information-security-kick-off-lecture/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2019/01/ed6a47d0-6d51-4445-87c4-dd2b859dcb21-1-1.jpg</image:loc><image:title>ed6a47d0-6d51-4445-87c4-dd2b859dcb21 (1)</image:title><image:caption>Lecture at the "Faculty of Odontology" part of Malmö University. </image:caption></image:image><lastmod>2019-04-20T00:47:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/11/25/meeting-with-e-on/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2018/11/screen-shot-2018-11-25-at-17-32-09.png</image:loc><image:title>Screen Shot 2018-11-25 at 17.32.09</image:title></image:image><lastmod>2018-11-25T16:42:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/10/27/keynote-that-made-me-reflect/</loc><lastmod>2018-10-27T07:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/09/21/weak-risk-awareness-of-our-connected-homes/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2018/09/man-65049_1920.jpg</image:loc><image:title>man-65049_1920</image:title></image:image><lastmod>2018-09-23T19:04:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/09/12/thesis-hardcopies/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2018/09/img_3391.jpg</image:loc><image:title>Licentiate Thesis - Printed Copies</image:title></image:image><lastmod>2018-09-23T18:59:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/09/12/talk-about-my-research-topics-at-vetenskapens-dag/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2018/09/screen-shot-2018-09-12-at-13-26-53.png</image:loc><image:title>Smart Connected Homes: Concepts and Risks</image:title></image:image><lastmod>2018-09-23T18:58:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/08/28/my-licentiate-seminar/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2018/08/screen-shot-2018-08-28-at-21-03-441.png</image:loc><image:title>Screen Shot 2018-08-28 at 21.03.44</image:title></image:image><lastmod>2018-08-28T19:21:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/07/04/data-collected-by-smart-home-devices/</loc><lastmod>2018-07-04T13:47:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/06/26/on-the-future-of-cybercrime/</loc><lastmod>2019-03-18T06:45:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/04/07/efficient-way-to-convert-multiple-pdfs-to-plaintext-format/</loc><lastmod>2018-04-07T13:50:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/04/05/creating-a-hierarchical-taxonomy-through-latex/</loc><lastmod>2018-04-05T15:42:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/03/23/password-reuse-in-different-smart-home-products/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2018/03/smart_home_2.jpg</image:loc><image:title>smart_home_2</image:title></image:image><lastmod>2018-03-23T15:31:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2018/01/23/risks-to-consider-before-buying-a-smart-home-device/</loc><lastmod>2018-01-23T17:10:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org/2017/07/14/information-assets-an-essential-ingredient-of-threat-modelling/</loc><image:image><image:loc>https://fullcirclesecurity.org/wp-content/uploads/2017/07/assets.jpg</image:loc><image:title>assets</image:title></image:image><lastmod>2017-07-15T13:48:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://fullcirclesecurity.org</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-10-31T09:37:18+00:00</lastmod></url></urlset>
