<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//iotac.eu/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://iotac.eu/front-end-access-control-a-new-solution-for-capability-based-access-control/</loc>
		<lastmod>2021-02-09T15:45:18+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/FEAC_nagy-keret_final.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/CBAC-final.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/FEAC2-final.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/the-secure-card-farm/</loc>
		<lastmod>2021-02-09T15:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/Card-Farm.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/Card-Farm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/latest-iot-threat-statistics/</loc>
		<lastmod>2021-02-09T15:46:19+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/Hacking-And-Cyber-Security-129296-pixahive-768x432-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/Hacking-And-Cyber-Security-129296-pixahive-768x432-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/global-cybersecurity-outlook-iot-cybersecurity-law-in-the-usa/</loc>
		<lastmod>2021-02-09T15:46:26+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/IoT-law.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/IoT-law.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/7338-2/</loc>
		<lastmod>2021-02-09T15:46:56+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/12/Council-logo-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/12/Council-logo-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/press-release/</loc>
		<lastmod>2021-02-09T15:47:02+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/connected-home-owners-underestimate-their-vulnerability-to-cyber-threats/</loc>
		<lastmod>2021-02-19T13:45:59+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/smart-home-use-case.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/smart-home-use-case.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/european-iot-certification-activities/</loc>
		<lastmod>2021-04-13T08:16:29+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/Certification.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/Enisa-png.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/Certification-timeline-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/enisa-launches-public-consultation-on-a-new-cybersecurity-certification-scheme/</loc>
		<lastmod>2021-04-13T08:34:43+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/12/Enisa-logo-small.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/12/ENISA-Logo-RGB.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/the-eus-new-cybersecurity-strategy/</loc>
		<lastmod>2021-04-22T15:46:36+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/12/cybersurity.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/12/cybersurity.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/security-is-one-of-the-top-iot-trends-in-2021/</loc>
		<lastmod>2021-06-03T15:02:27+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/IoT-with-hand.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/IoT-with-hand.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/matching-ingenuity-and-discipline-in-software-research-and-development/</loc>
		<lastmod>2021-06-15T12:40:24+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/SW-development.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/D6.1-first-blog.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/the-iotac-software-security-by-design-ssd-platform-concept-and-preliminary-overview/</loc>
		<lastmod>2021-06-15T12:57:39+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/05/SSD-Platforn.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/05/IoTAC-SSD-Platform.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/building-virtualized-honeypots-to-protect-the-internet-of-things/</loc>
		<lastmod>2021-06-15T13:14:30+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/iot-enabled-honeypot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/iot-enabled-honeypot.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/05/Honeypot-figure.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/etsi-security-week-2021/</loc>
		<lastmod>2021-06-18T11:55:22+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/ETSI-logo-2-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/ETSI-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/an-introduction-to-iot-architectures/</loc>
		<lastmod>2021-06-21T20:59:54+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/Arch-cloud-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/ISO-pic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/Microsoft-Azure.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/oneM2M.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/OPC-UA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-threat-report-from-palo-alto-networks/</loc>
		<lastmod>2021-06-21T21:01:09+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/Lock-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/Lock-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-runtime-monitoring-system/</loc>
		<lastmod>2021-06-21T21:06:40+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/RMS-kis-kep-2-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/RMS-Intra.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/enisa-cybersecurity-standardization-conference-takeaways-on-consumer-iot/</loc>
		<lastmod>2021-06-21T21:08:17+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/12/Enisa-logo-small.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/02/ENISA-conf-e1612525688673.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/comprehensive-protection-for-internet-of-things-infrastructure-the-kaspersky-iot-secure-gateway-%ce%b2/</loc>
		<lastmod>2021-06-21T21:09:34+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/02/KSP-blog-kep-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/02/Kasp-1-enhanced.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/02/Kasp-2-enhanced.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/02/Kasp-3-enhanced.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/02/Kasp-4-enhanced.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/security-implementation-phase-software-engineering/</loc>
		<lastmod>2021-06-24T09:50:49+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/Development.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/DevSecOps.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/etsi-standards-iot-testing-specifications/</loc>
		<lastmod>2021-07-01T18:51:21+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/ETSI-logo-2-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/ETSI-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/call-for-papers-eurocybersec2021-workshop-25-26-october-2021-nice-fr/</loc>
		<lastmod>2021-07-14T09:04:35+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/Lock-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/07/EuroCybersec2021-visual-v4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/tripwire-iot-security-survey/</loc>
		<lastmod>2021-07-14T17:21:27+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/security-assessment-model.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/security-assessment-model.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/fdo-the-fido-device-onboard-protocol/</loc>
		<lastmod>2021-07-14T17:26:25+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/Introduction.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/how-remote-work-pushed-iot-malware-attacks-to-new-heights/</loc>
		<lastmod>2021-07-14T17:30:41+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/Hacking-And-Cyber-Security-129296-pixahive-768x432-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/Hacking-And-Cyber-Security-129296-pixahive-768x432-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/penetration-of-smart-homes-in-europe-and-north-america/</loc>
		<lastmod>2021-07-14T17:42:53+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/smart-home-appliances-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/smart-home-appliances.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/testing-phase-methodology/</loc>
		<lastmod>2021-07-14T17:57:48+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/07/SW-testing-New-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/07/DecSecOps.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/demonstrations-first-results/</loc>
		<lastmod>2021-07-19T09:00:24+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/07/first-demos-pic.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/07/first-demos-pic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/release-deploy-phase-methodology/</loc>
		<lastmod>2021-07-23T06:53:17+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/07/release-5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/07/release-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/07/release-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/smart-sdn-management-fog-services-optimize-qos-energy-sensors/</loc>
		<lastmod>2021-07-27T07:46:12+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/nozomi-networks-research-security-camera-vulnerabilities/</loc>
		<lastmod>2021-07-30T08:55:27+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/07/connected-camera.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/07/connected-camera.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/operate-monitor-phase-methodology/</loc>
		<lastmod>2021-08-05T10:50:18+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/Runtime-Monitoring-System.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/08/operate-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/08/operate-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/increasing-attacks-iot-critical-infrastructures/</loc>
		<lastmod>2021-08-13T06:24:49+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/08/IIoT.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/08/IIoT.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-week/</loc>
		<lastmod>2021-08-28T09:41:58+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/08/IoT-Week.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/08/IoT-Week.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/press-release-no-2/</loc>
		<lastmod>2021-09-01T12:51:58+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/zero-trust-identity-driven-security/</loc>
		<lastmod>2021-09-10T07:29:52+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/Zero-Trust-Security-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/Zero-Trust-figure-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/Zero-Trust-figure-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/siavvas-m-kalouptsoglou-i-tsoukalas-d-kehagias-d-2021-a-self-adaptive-approach-for-assessing-the-criticality-of-security-related-static-analysis-alerts-the-21st-international-conference-on-compu/</loc>
		<lastmod>2021-09-15T06:47:16+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/nakip-m-gelenbe-e-2021-mirai-botnet-attack-detection-with-auto-associative-dense-random-neural-network-2021-ieee-global-communications-conference-2021/</loc>
		<lastmod>2021-09-15T06:48:42+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/reinforcement-learning-and-energy-aware-routing/</loc>
		<lastmod>2021-09-15T06:49:52+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/dekany-d-vajta-l-2021-shifting-towards-the-highly-distributed-energy-ecosystem-workshop-on-the-advances-of-information-technology-2021-wait-2021/</loc>
		<lastmod>2021-09-15T06:53:36+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/shahab-s-vajta-l-2021-effects-of-electric-vehicle-charging-stations-on-electricity-grid-challenges-and-possible-solutions-workshop-on-the-advances-of-information-technology-2021-wait-2021/</loc>
		<lastmod>2021-09-15T06:54:47+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-day-2021-roundtable-recording/</loc>
		<lastmod>2021-09-18T18:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/IoT-DAy-kis-kep.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/takeaways-from-the-iot-day-roundtable/</loc>
		<lastmod>2021-09-18T18:27:13+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/IoT-DAy-middle-5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/logok.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/press-release-iotac-project-start/</loc>
		<lastmod>2021-09-18T18:49:23+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/press-release-security-baseline-of-the-iotac-project/</loc>
		<lastmod>2021-09-18T18:57:51+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/white-paper-tailoring-iot-platforms-to-the-requirements-of-specific-use-cases/</loc>
		<lastmod>2021-09-19T17:52:45+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/White-paper-IoT-paltforms-kis-kep.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/szanto-m-vajta-l-2021-enhanced-motion-based-segmentation-of-vision-sensed-environment-of-moving-vehicles-the-1st-israeli-smart-transportation-research-center-istrc-annual-conference/</loc>
		<lastmod>2021-09-22T12:57:15+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/ISTRC-kis-kep.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/joint-cyber-unit/</loc>
		<lastmod>2021-10-03T08:09:01+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/EC-kis-kep.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/6th-gi-acm-i4-0-standardization-workshop-on-industrial-automation-and-control-systems/</loc>
		<lastmod>2021-10-03T08:21:25+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/Fokus-prezi-kis-kep.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/Fokus-prezi-nagy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/registration-for-the-eurocybersec2021-workshop-is-open/</loc>
		<lastmod>2021-10-05T15:37:48+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/EuroCyberSec-kis-kep.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/EuroCyberSec-register-pic-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/1st-iotac-project-review-meeting-successfully-concluded/</loc>
		<lastmod>2021-10-06T14:22:49+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/Review-kis-kep.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/first-review-kep.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-use-case-connected-car/</loc>
		<lastmod>2021-10-16T10:11:27+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/Connected-Car-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/Connected-Car-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/Connected-Car-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/Connected-Car-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/Connected-Car-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-use-case-no-2-prosumer-cell/</loc>
		<lastmod>2021-10-28T12:19:04+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/Prosumer-kis-kep.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/Schematic-of-the-prosumer-cell.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-use-case-no-3-airborne-drone/</loc>
		<lastmod>2021-10-28T12:27:40+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/airborne-use-case.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/Drone-blog-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/Drone-blog-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/eurocybersec2021-workshop-summary/</loc>
		<lastmod>2021-10-29T06:08:47+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/10/EuroCyberSec-kis-kep.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/enisa-threat-landscape-2021-report/</loc>
		<lastmod>2021-11-04T20:41:25+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/12/Enisa-logo-small.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/energy-consumption-by-ict-and-cybersecurity-at-the-time-of-cop26/</loc>
		<lastmod>2021-11-10T08:07:16+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/11/ICT-Emissions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/how-the-zero-trust-approach-helps-reduce-the-cost-of-data-breach/</loc>
		<lastmod>2021-11-18T15:19:36+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/Lock-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-use-case-no-4-smart-home/</loc>
		<lastmod>2021-11-25T13:45:08+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/smart-home-use-case.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/11/Smart-Home-ITI.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/11/Smart-Home-domains.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/11/Smart-Home-dashboard.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/news-iot-day-roundtable/</loc>
		<lastmod>2021-11-26T13:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/IoT-circle.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/logok.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/top-3-attacks-on-iot-devices-in-2021/</loc>
		<lastmod>2021-12-03T18:59:49+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/Hacking-And-Cyber-Security-129296-pixahive-768x432-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/qrs-2021/</loc>
		<lastmod>2021-12-07T17:41:07+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/12/QRS-kicsi-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/12/QRS-2021-logo-nagy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/randomizationschedulingiot/</loc>
		<lastmod>2021-12-10T09:17:12+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/protecting-consumers-of-iot-products-from-cyber-threats-latest-legislation-from-around-the-globe/</loc>
		<lastmod>2021-12-12T16:05:24+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/IoT-law.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/clustering-workshop-future-proofing-and-certifying-supply-chains/</loc>
		<lastmod>2021-12-17T11:42:27+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/12/Cluster-Workshop.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/12/Clustering-Workshop_big-pic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-safe-securing-iot-applications-and-data/</loc>
		<lastmod>2021-12-22T16:10:05+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/12/Iot-Safe.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/12/Iot-safe-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/12/Iot-safe-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/vulnerability-disclosure-policy-of-iot-vendors/</loc>
		<lastmod>2022-01-06T21:17:43+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/01/IOTSF.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-and-zero-trust-are-incompatible-just-the-opposite/</loc>
		<lastmod>2022-01-14T14:48:20+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/01/Zero-Trust.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/towards-smart-home-interoperability-standards/</loc>
		<lastmod>2022-01-21T12:11:02+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/smart-home-use-case.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/call-for-kcyeu2022-workshop-papers-and-work-in-progress-presentations/</loc>
		<lastmod>2022-01-26T10:37:41+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/01/DRCN2022-Workshop.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/01/DRCN2022-Workshop.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/the-iotac-software-security-static-analysis-alerts-assessor/</loc>
		<lastmod>2022-01-28T09:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/01/SACA-kiskep.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/01/SACA-mech.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/renewable-electricity-penetration-will-bring-more-cybersecurity-risks/</loc>
		<lastmod>2022-02-03T15:33:03+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/secure-grid.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/secure-grid.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d9-5-dissemination-and-communication-strategy-and-annual-plan-y2/</loc>
		<lastmod>2022-02-09T17:43:51+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/D9.5.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d6-2-definition-of-the-development-integration-environment-and-kpis/</loc>
		<lastmod>2022-02-09T17:45:15+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/D6.2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d2-4-security-baseline-of-the-iotac-architecture/</loc>
		<lastmod>2022-02-09T17:45:56+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/D2.4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d2-1-conclusions-architecture-analysis/</loc>
		<lastmod>2022-02-09T17:46:30+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/D2_1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d6-1-design-and-development-guidelines-and-methodology/</loc>
		<lastmod>2022-02-09T17:47:17+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/05/D6.1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d1-4-data-management-plan/</loc>
		<lastmod>2022-02-09T17:47:51+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/D1_4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d9-1-dissemination-and-communication-strategy-and-annual-plan/</loc>
		<lastmod>2022-02-09T17:48:34+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/Del-front-page.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/vulnerability-prediction-models/</loc>
		<lastmod>2022-02-09T19:06:21+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/D3.3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/software-security-assessment-indicators-and-models/</loc>
		<lastmod>2022-02-09T19:07:59+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/D3.2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/five-minute-guide-to-artificial-intelligence-in-cybersecurity/</loc>
		<lastmod>2022-02-10T12:49:15+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Atos-guest-blog-cimkep.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Atos-guest-blog.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Atos-guest-blog-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Atos-guest-blog-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Atos-guest-blog-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Atos-guest-blog-5.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Atos-guest-blog-6.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/tsoukalas-d-siavvas-m-mathioudaki-m-kehagias-d-2021-an-ontology-based-approach-for-automatic-specification-verification-and-validation-of-software-security-requirements-preliminary-results-21/</loc>
		<lastmod>2022-02-15T20:21:49+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/gelenbe-e-nakip-m-marek-d-czachorski-t-2021-diffusion-analysis-improves-scalability-of-iot-networks-to-mitigate-the-massive-access-problem-mascots-2021/</loc>
		<lastmod>2022-02-15T20:27:49+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/congratulations-to-professor-erol-gelenbe-for-being-appointed-on-the-advanced-grant-panel-of-the-european-research-council-erc/</loc>
		<lastmod>2022-02-16T17:40:31+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Erol-small-pic-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/Erol-cropped-e1617180145165.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/professor-erol-gelenbe-elected-honorary-fellow-of-the-islamic-world-academy-of-sciences-ias/</loc>
		<lastmod>2022-02-16T17:48:45+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Erol-small-pic-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/Erol-cropped-e1617180145165.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/vulnerability-prediction-based-on-natural-language-processing-techniques/</loc>
		<lastmod>2022-02-25T12:09:45+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Vulnerability-Pred-Model.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Vulnerability-Pred-Model.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Vulnerability-Pred-Model-table.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/roundtable-on-global-iot-day-the-need-for-iot-security-standardization-certification-8-april-2022/</loc>
		<lastmod>2022-03-07T11:53:37+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/IoT-Day-Design-1-Twitter-Post.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/IoT-Day-Design-1-Twitter-Post.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d7-1-demonstration-use-case-specifications-and-kpis/</loc>
		<lastmod>2022-03-09T10:51:18+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/03/D7.1-kis-kep.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d2-3-architecture-design-document/</loc>
		<lastmod>2022-03-09T11:05:27+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/03/D2.3-kis-kep.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/gelenbe-e-sigman-k-2022-iot-traffic-shaping-and-the-massive-access-problem-ieee-icc-2022/</loc>
		<lastmod>2022-03-10T16:10:53+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/auto-associative-dense-random-neural-network-based-attack-detector/</loc>
		<lastmod>2022-03-10T16:12:46+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/03/Demo-Attack-Detector.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2021-an-empirical-evaluation-of-the-usefulness-of-word-embedding-techniques-in-deep-learning-based-vulnerability-prediction-e/</loc>
		<lastmod>2022-03-11T11:00:39+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-newsletter-no-3/</loc>
		<lastmod>2022-03-12T07:09:34+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/03/Newsletter-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-newsletter-no-2/</loc>
		<lastmod>2022-03-12T07:11:14+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/Newsletter-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-newsletter-no-1/</loc>
		<lastmod>2022-03-12T07:12:55+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/Newsletter-1-v2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/zero-trust-building-blocks-ease-implementation/</loc>
		<lastmod>2022-03-19T17:06:13+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/01/Zero-Trust.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/can-we-have-iot-security-without-standards-and-certification-discover-at-the-roundtable-on-the-need-for-iot-security-standards-certification-8-april-2022/</loc>
		<lastmod>2022-03-24T08:01:53+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/03/IoT-Day-Design-March-22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/03/IoT-Day-Design-March-22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/the-iotac-software-security-by-design-platform-concept/</loc>
		<lastmod>2022-03-30T19:44:02+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/kcyeu2022-1st-international-workshop-on-key-challenges-in-global-cybersecurity-efforts-and-trends-in-eu/</loc>
		<lastmod>2022-03-30T19:57:04+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/01/DRCN2022-Workshop.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/press-release-iotac-reference-architecture/</loc>
		<lastmod>2022-04-03T09:14:01+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-brochure/</loc>
		<lastmod>2022-04-11T21:02:14+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/04/brochure-uj-kis-kep.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/bosch-acquired-five-to-accelerate-development-of-autonomous-driving/</loc>
		<lastmod>2022-04-15T20:12:15+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/vehicle-use-case.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/reference-architecture/</loc>
		<lastmod>2022-04-15T20:13:24+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/roundtable-the-need-for-iot-security-standards-and-certifications/</loc>
		<lastmod>2022-04-15T20:15:14+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/04/Roundtable-agenda-pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/04/Roundtable-agenda-pic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/nakip-m-gelenbe-e-2021-botnet-attack-detection-with-incremental-online-learning-eurocybersec2021/</loc>
		<lastmod>2022-04-20T16:37:15+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/fietkau-j-mehak-zahra-s-hartung-m-2021-secure-authentication-for-everyone-enabling-2nd-factor-authentication-under-real-world-constraints-eurocybersec2021/</loc>
		<lastmod>2022-04-20T16:51:44+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/gelenbe-e-nakip-m-marek-d-czachorski-t-2021-mitigating-the-massive-access-problem-in-the-internet-of-things-eurocybersec2021/</loc>
		<lastmod>2022-04-20T17:06:05+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/gelenbe-e-nowak-m-frohlich-p-fiolka-j-checinski-j-2021-energy-qos-and-security-aware-edge-services-eurocybersec2021/</loc>
		<lastmod>2022-04-20T17:59:41+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/fietkau-j-runge-d-seifert-jp-2021-free-by-design-on-the-feasibility-of-free-riding-attacks-against-zero-rated-services-cans2021/</loc>
		<lastmod>2022-04-20T18:32:13+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/barakat-r-catal-f-hackel-s-rennoch-a-schneider-m-2021-towards-a-certification-scheme-for-iot-security-evaluation-6th-gi-acm-i4-0-standardization-workshop-on-industrial-automation-and-control-sy/</loc>
		<lastmod>2022-04-20T19:01:24+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/nowak-m-pecka-p-2022-routing-algorithms-simulation-for-self-aware-sdn-electronics-2022-11-104/</loc>
		<lastmod>2022-04-20T19:21:19+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/aiotis-device-centric-iot-security-risk-spectra-mapping-tool/</loc>
		<lastmod>2022-04-26T19:59:52+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/04/AIOTI-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/sam-more-than-1-billion-iot-attacks-in-2021/</loc>
		<lastmod>2022-05-04T15:10:41+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/04/Lock-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/yettel-iot-live-show-2022/</loc>
		<lastmod>2022-05-16T10:06:10+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/05/Yettel-IoT-Live-Show_promo_v2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/05/Yettel-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-device-security-survey-by-pulse-and-keyfactor/</loc>
		<lastmod>2022-05-24T13:37:40+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/05/Survey.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/cyber-resilience-act-public-consultation/</loc>
		<lastmod>2022-05-24T13:38:45+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/EC-kis-kep.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/integration-of-the-front-end-access-management-system-into-the-pilot-architectures/</loc>
		<lastmod>2022-05-24T13:42:40+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/05/FEAM-pilots.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/05/FEAM-pilots.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-contributions-to-standardization-activities/</loc>
		<lastmod>2022-06-02T14:39:37+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/06/standards.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/integrate-iotac-honeypots-into-your-iot-network/</loc>
		<lastmod>2022-06-07T08:16:36+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/06/honeypot-int-small.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/06/honeypot-integration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-workshop-at-the-iot-week-2022/</loc>
		<lastmod>2022-06-09T07:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/05/IoT-Week-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/05/IoT-Week-logo_light-background-DUBLIN-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-week-2022-iotac-workshop-presentations/</loc>
		<lastmod>2022-06-23T10:32:13+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/05/IoT-Week-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/05/IoT-Week-logo_light-background-DUBLIN-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/report-of-the-first-standardization-achievements-of-the-iotac-project/</loc>
		<lastmod>2022-06-24T15:16:35+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/06/standards.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/massive-access-and-attacks-in-the-iot/</loc>
		<lastmod>2022-07-01T12:19:26+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Fig-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Fig-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Fig-1-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Fig-1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Fig-1-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Fig-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/table-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Fig-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Fig-3-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/9-important-security-requirements-to-consider-for-iot-systems/</loc>
		<lastmod>2022-07-02T12:14:00+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/02/word-cloud-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/02/word-cloud-4-nagyobb_auto_x1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/02/IoT-Secu-factors-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/proceedings-of-the-eurocybersec-2021-workshop/</loc>
		<lastmod>2022-07-05T09:39:51+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Springer-proc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iam-at-the-heart-of-the-zero-trust-approach/</loc>
		<lastmod>2022-07-15T07:31:18+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/01/Zero-Trust.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/the-need-for-improving-remote-access-security/</loc>
		<lastmod>2022-07-21T10:52:12+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/ssd-platform.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-software-security-evaluation-framework/</loc>
		<lastmod>2022-07-29T07:19:29+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Software-Security-Evaluation-Framework.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Software-Security-Evaluation-Framework.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/global-platform-and-ioxt-alliance-memorandum-of-understanding/</loc>
		<lastmod>2022-08-06T07:02:17+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/08/GP-and-ioXt.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/08/GP-and-ioXt.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/disposable-identities-what-are-they/</loc>
		<lastmod>2022-08-12T13:37:05+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/SW-development.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/insufficient-posture-of-industrial-cybersecurity-survey-by-trend-micro/</loc>
		<lastmod>2022-08-19T18:20:19+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/08/Industry.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/call-for-papers-1st-international-workshop-on-secure-management-of-iot-and-edge-systems-smite22/</loc>
		<lastmod>2022-08-22T18:26:57+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/08/CfP-SMITE.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/08/CfP-SMITE.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2022-examining-the-capacity-of-text-mining-and-software-metrics-in-vulnerability-prediction-entropy-2022-24-651/</loc>
		<lastmod>2022-08-23T14:40:55+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/gelenbe-e-nakip-m-2022-g-networks-that-detect-different-types-of-cyberattacks-ieee-mascots-2022/</loc>
		<lastmod>2022-08-23T14:54:58+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/gelenbe-e-nakip-m-czachorski-t-2022-improving-massive-access-to-iot-gateways-performance-evaluation-2022/</loc>
		<lastmod>2022-08-23T18:50:16+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/proceedings-of-the-eurocybersec-2021-workshop-2/</loc>
		<lastmod>2022-08-23T18:56:42+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/07/Springer-proc.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/getting-more-intelligent-about-internet-security/</loc>
		<lastmod>2022-08-29T19:54:23+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/08/seriot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d9-6-dissemination-and-communication-strategy-and-annual-plan-y3/</loc>
		<lastmod>2022-09-01T12:44:29+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/09/D9.6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/czachorski-t-gelenbe-e-kuaban-g-2022-modelling-energy-changes-in-the-energy-harvesting-battery-of-an-iot-device-ieee-mascots-2022/</loc>
		<lastmod>2022-09-01T12:57:16+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/cyber-incident-reporting-around-the-world-part-1/</loc>
		<lastmod>2022-09-04T19:27:25+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/IoT-law.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/time-series-forecasting-of-software-vulnerabilities-using-statistical-and-deep-learning-models-electronics/</loc>
		<lastmod>2022-09-09T13:24:48+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-newsletter-no-5/</loc>
		<lastmod>2022-09-10T09:21:12+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/09/Newsletter-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-newsletter-no-4/</loc>
		<lastmod>2022-09-10T09:22:14+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/06/Newsletter-4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/cyber-incident-reporting-around-the-world-part-2/</loc>
		<lastmod>2022-09-21T05:52:38+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/IoT-law.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/press-release-no-4/</loc>
		<lastmod>2022-09-22T08:00:45+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-at-the-etsi-iot-week-2022/</loc>
		<lastmod>2022-09-29T12:11:59+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/ETSI-logo-2-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/cyber-incident-reporting-around-the-world-part-3-nis2-directive/</loc>
		<lastmod>2022-10-07T11:27:07+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/IoT-law.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/10/Sectors-covered-by-the-NIS-Directive.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/the-matter-smart-home-standard-has-been-released/</loc>
		<lastmod>2022-10-17T17:20:29+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/10/Matter-logo-2048x1075-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/top-5-cybersecurity-challenges-facing-iot-device-manufacturers/</loc>
		<lastmod>2022-10-21T13:47:51+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/10/IoT-with-hand.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/the-number-of-iot-malware-attacks-grew-by-77/</loc>
		<lastmod>2022-10-28T10:30:55+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/10/SonicWall.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/professor-erol-gelenbe-speaking-at-the-abu-dhabi-ai-summit/</loc>
		<lastmod>2022-11-04T12:33:08+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/11/ADAIS-2022-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/11/Erol-kep.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/software-security-requirements-specification/</loc>
		<lastmod>2022-11-04T17:02:15+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/11/SSW-Sec-Req-Spec-Mechanism.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/11/SSW-Sec-Req-Spec-Mechanism.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/11/Ontology.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-related-threats-in-the-enisa-threat-landscape-2022-report/</loc>
		<lastmod>2022-11-10T21:30:52+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/11/Enisa-logo-with-text-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/11/Enisa-logo-with-text-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/software-security-requirements-verification-and-validation/</loc>
		<lastmod>2022-11-17T20:58:44+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/11/Sec-req-verific-and-valid.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/11/Sec-req-verific-and-valid.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/professor-erol-gelenbe-awarded-the-high-honour-of-the-belgian-commander-of-the-order-of-the-crown/</loc>
		<lastmod>2022-11-25T13:44:13+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/Erol-small-pic-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/03/Erol-cropped-e1617180145165.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/forecasting-the-evolution-of-software-vulnerabilities/</loc>
		<lastmod>2022-12-01T22:21:56+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/12/Milt-blog-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/12/Miltiadis-blog-7-fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/12/Miltiadis-blog-7-fig-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/12/Miltiadis-blog-7-fig-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-newsletter-no-6/</loc>
		<lastmod>2022-12-07T16:56:57+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/12/Newsletter-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/gelenbe-e-nakip-m-2022-traffic-based-sequential-learning-during-botnet-attacks-to-identify-compromised-iot-devices-ieee-access-2022-vol-10/</loc>
		<lastmod>2022-12-13T16:37:56+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-milestones-of-2022/</loc>
		<lastmod>2022-12-22T14:19:15+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/12/MIlestones-2022.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/canada-singapore-and-the-uk-work-together-to-promote-and-support-the-security-of-iot-devices/</loc>
		<lastmod>2023-01-04T14:36:16+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/06/IoT-with-hand.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d3-6-software-security-assessment-indicators-and-models-final/</loc>
		<lastmod>2023-01-07T17:06:44+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/01/D3.6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d3-4-software-security-certification/</loc>
		<lastmod>2023-01-07T17:07:28+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/01/D3.4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d3-7-vulnerability-prediction-models-final/</loc>
		<lastmod>2023-01-07T17:22:23+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/01/D3.7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d5-1-working-prototype-of-the-iotac-architecture-and-the-demonstration-use-cases/</loc>
		<lastmod>2023-01-07T17:35:56+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/01/D5.1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/video-front-end-access-management-transaction-flow/</loc>
		<lastmod>2023-01-07T17:48:40+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/01/FEAM-video-kep.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/simple-coding-mistakes-that-can-lead-to-critical-vulnerabilities/</loc>
		<lastmod>2023-01-13T13:36:24+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/01/Miltiadis-Blog-8-Table-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/01/Miltiadis-Blog-8-Figure-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/01/Miltiadis-Blog-8-Table-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/could-mobile-communication-devices-be-used-as-secure-storage-of-sensitive-information/</loc>
		<lastmod>2023-01-20T21:22:41+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/01/eSIM-kicsiben.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/press-release-no-5-barcelona-cybersecurity-congress/</loc>
		<lastmod>2023-01-26T22:29:35+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-runtime-monitoring-system-2/</loc>
		<lastmod>2023-02-07T10:16:14+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/RMS-high-level-overview.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/RMS-high-level-overview.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/RMS-impl-data-flow-diagram.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/Elastic-infrastr-flow.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-exhibited-at-the-barcelona-cybersecurity-congress/</loc>
		<lastmod>2023-02-13T19:53:28+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/Day-1-full-stand.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/etsi-technical-committee-mts-plenum-takes-place-at-the-certh-premises-in-thessaloniki/</loc>
		<lastmod>2023-02-16T12:11:52+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/01/ETSI-logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/ETSI-meeting-at-CERTH-Jan-2023.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/nozomi-networks-ot-iot-security-research-report-h2-2022/</loc>
		<lastmod>2023-02-17T13:42:44+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/Nozomi.PNG.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/professor-erol-gelenbe-awarded-the-title-of-fellow-of-aaia-in-2022/</loc>
		<lastmod>2023-02-20T11:58:33+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/Erol-Photo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-security-challenges-and-potential-responses/</loc>
		<lastmod>2023-02-24T12:42:58+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/KSG-blog-pic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/02/KSG-Fig-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-brochure-2/</loc>
		<lastmod>2023-03-03T09:21:45+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/03/Brochure-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/roundtable-compliance-and-beyond-understanding-the-impact-of-the-new-eu-cyber-resilience-act-17-april-2023/</loc>
		<lastmod>2023-03-04T14:56:24+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/03/Pic-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/03/Pic-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/top-8-things-you-should-know-about-the-eu-cyber-resilience-act-cra/</loc>
		<lastmod>2023-03-09T16:55:27+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/03/CRA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/does-the-cyber-resilience-act-protect-consumer-devices-enough/</loc>
		<lastmod>2023-03-21T15:10:51+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/03/BEUC-post.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/the-eu-cyber-resilience-act-brace-for-impact/</loc>
		<lastmod>2023-04-05T10:30:41+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/03/CRA.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/summary-of-the-roundtable-compliance-and-beyond-understanding-the-impact-of-the-new-eu-cyber-resilience-act/</loc>
		<lastmod>2023-04-20T12:27:37+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/04/IoT-Day-2023-video-kezdokep.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/04/IoT-Day-2023-Speakers_v5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-device-security-regulatory-and-standards-activity-drive-2023-device-design/</loc>
		<lastmod>2023-04-27T12:53:05+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/04/IoT-law.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/new-guidance-on-cyber-security-best-practices-for-smart-cities/</loc>
		<lastmod>2023-05-04T10:41:14+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/05/smart-city-small.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/novel-protection-not-only-for-large-scale-iot-systems/</loc>
		<lastmod>2023-05-12T12:03:18+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/Concept.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/ot-and-iot-threat-environment-landscape-analysis-report-2023-by-sectrio/</loc>
		<lastmod>2023-05-19T15:30:30+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/Hacking-And-Cyber-Security-129296-pixahive-768x432-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/state-of-iot-spring-2023-by-iot-analytics/</loc>
		<lastmod>2023-05-25T19:54:27+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/10/IoT-with-hand.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/gelenbe-e-nakip-m-2023-real-time-cyberattack-detection-with-offline-and-online-learning-ieee-lanman-2023/</loc>
		<lastmod>2023-05-26T12:24:20+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/why-security-matters-in-a-prosumer-operation/</loc>
		<lastmod>2023-06-01T19:33:05+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2022/02/secure-grid.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-newsletter-no-7/</loc>
		<lastmod>2023-06-07T07:21:06+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/06/Newsletter-7.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-newsletter-no-8/</loc>
		<lastmod>2023-06-07T07:31:17+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/06/Newsletter-8.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/workshop-on-cybersecurity-standardization-and-supply-chain-security/</loc>
		<lastmod>2023-06-13T17:25:41+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/06/cyrene-workshop.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/06/cyrene-workshop.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/8-attacks-against-a-smart-home-every-24-hours-the-bitdefender-netgear-2023-iot-security-landscape-report/</loc>
		<lastmod>2023-06-22T15:24:42+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/smart-home-use-case.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/securing-identities-is-a-critical-priority/</loc>
		<lastmod>2023-06-22T15:27:03+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/01/Hacking-And-Cyber-Security-129296-pixahive-768x432-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/use-of-the-iotac-platform-in-the-smart-home-pilot/</loc>
		<lastmod>2023-06-23T20:05:47+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/smart-home-use-case.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/06/Smart-home-integration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/nasereddin-m-nakip-m-gelenbe-e-2023-measurement-based-evaluation-and-mitigation-of-flood-attacks-on-a-lan-test-bed-ieee-lcn-2023/</loc>
		<lastmod>2023-06-29T11:14:49+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-security-in-the-us-national-cybersecurity-strategy-implementation-plan/</loc>
		<lastmod>2023-07-13T16:12:53+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/Introduction.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/use-of-the-iotac-platform-in-the-connected-car-pilot/</loc>
		<lastmod>2023-07-21T14:06:55+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/Connected-Car-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/07/Connected-Car-blog-2-pic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iot-malware-attacks-up-by-37-in-the-first-half-of-2023/</loc>
		<lastmod>2023-08-03T11:06:50+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/08/Sonic-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-tangka-j-2023-modelling-of-the-energy-depletion-process-and-battery-depletion-attacks-for-battery-powered-internet-of-things-iot-devices-sensors-2/</loc>
		<lastmod>2023-08-09T14:19:21+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d2-5-security-baseline-of-the-iotac-architecture/</loc>
		<lastmod>2023-08-16T14:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/08/Deliverable-kis-kep-2.5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d8-3-report-of-the-iotac-association/</loc>
		<lastmod>2023-08-16T15:07:18+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/08/Deliverable-kis-kep-8.3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d5-2-working-prototype-of-the-ssd-and-sam-platforms/</loc>
		<lastmod>2023-08-16T15:22:42+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/08/Deliverable-kis-kep-5.2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d8-1-summary-of-the-standardisation-related-activities/</loc>
		<lastmod>2023-08-16T15:32:09+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/08/Deliverable-kis-kep-8.1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/</loc>
		<lastmod>2023-08-21T18:48:29+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/the-roadmap-of-feam-the-front-end-access-management-system/</loc>
		<lastmod>2023-08-24T08:57:29+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/08/FEAM-kep-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/08/FEAM-kep-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/press-release-start-of-the-pilot-operations/</loc>
		<lastmod>2023-08-29T12:30:18+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/press-release-barcelona-cybersecurity-congress/</loc>
		<lastmod>2023-08-29T12:34:44+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/key-aspects-of-the-iotac-project/</loc>
		<lastmod>2023-08-30T20:56:32+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/08/IoTAC-platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/08/Day-1-full-stand.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/gelenbe-e-2023-electricity-consumption-by-ict-facts-trends-and-measurements-acm-ubiquity-volume-2023-issue-august/</loc>
		<lastmod>2023-08-30T21:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/gelenbe-e-nakip-m-2023-iot-network-cybersecurity-assessment-with-the-associated-random-neural-network-ieee-access-2023/</loc>
		<lastmod>2023-08-31T16:56:51+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/szanto-m-hidalgo-c-gonzalez-l-perez-j-asua-e-vajta-l-2023-trajectory-planning-of-automated-vehicles-using-real-time-map-updates-ieee-access-2023/</loc>
		<lastmod>2023-08-31T16:58:10+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/press-release-project-closing/</loc>
		<lastmod>2023-09-01T08:23:16+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/concept-img.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-newsletter-no-9/</loc>
		<lastmod>2023-09-14T04:42:37+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/09/Newsletter-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/front-end-access-control/</loc>
		<lastmod>2026-04-18T22:18:24+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2021/09/FEAC-kis-kep.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/kuaban-g-gelenbe-e-czachorski-t-czekalski-p-2023-modelling-the-energy-performance-of-off-grid-sustainable-green-cellular-base-stations-mascots-2023/</loc>
		<lastmod>2026-04-19T08:02:02+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/deliverable-d7-4-summative-evaluation-and-lessons-learnt/</loc>
		<lastmod>2026-04-19T08:08:50+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/09/D7.4-kis-kep.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://iotac.eu/iotac-project-poster/</loc>
		<lastmod>2026-04-19T08:53:47+00:00</lastmod>
		<image:image>
			<image:loc>https://iotac.eu/wp-content/uploads/2023/03/Brochure-2.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->