<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://ellis-research.org/about/</loc><image:image><image:loc>https://ellis-research.org/wp-content/uploads/2023/10/ace_headshot_nologo-1.jpg</image:loc><image:title>ACE_Headshot_nologo</image:title></image:image><image:image><image:loc>https://ellis-research.org/wp-content/uploads/2023/10/ace_headshot_nologo.jpg</image:loc><image:title>ace_headshot_nologo</image:title></image:image><lastmod>2024-03-07T14:18:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ellis-research.org/archive/</loc><lastmod>2023-11-19T19:00:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ellis-research.org/2023/10/04/automating-security-analysis/</loc><image:image><image:loc>https://ellis-research.org/wp-content/uploads/2023/10/robot_hand.jpg</image:loc><image:title>Robot_Hand</image:title></image:image><lastmod>2023-10-10T00:14:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ellis-research.org/2023/10/04/ransomware-strategic-analysis/</loc><image:image><image:loc>https://ellis-research.org/wp-content/uploads/2023/10/cyber_lock.jpg</image:loc><image:title>Cyber_Lock</image:title></image:image><lastmod>2023-10-09T18:33:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://ellis-research.org/projects/</loc><lastmod>2023-10-09T00:31:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://ellis-research.org</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-03-07T14:18:05+00:00</lastmod></url></urlset>
