<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/sitemap_generator/default/sitemap.xsl"?>
<!--Generated by the Simple XML Sitemap Drupal module: https://drupal.org/project/simple_sitemap.-->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://cybersecurity.gmu.edu/program/test-program</loc>
  <lastmod>2023-06-22T10:06:04-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/home</loc>
  <lastmod>2026-03-13T14:20:41-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/test</loc>
  <lastmod>2021-02-04T14:08:03-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/about</loc>
  <lastmod>2026-01-29T11:32:57-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/academics</loc>
  <lastmod>2025-09-29T13:38:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/connections</loc>
  <lastmod>2023-01-23T15:03:17-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/people</loc>
  <lastmod>2026-01-29T13:16:52-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/research</loc>
  <lastmod>2026-01-29T11:04:01-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/why-study-here</loc>
  <lastmod>2025-11-20T14:18:16-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/academics/student-resources</loc>
  <lastmod>2026-02-18T16:04:53-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-03/taking-it-streets-commonwealth-cyber-initiative-funds-research-autonomous-cars</loc>
  <lastmod>2024-07-01T11:21:21-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2020-11/mason-lead-regional-hub-national-cybersecurity-advanced-manufacturing-innovation</loc>
  <lastmod>2021-12-13T11:29:13-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-02/university-researchers-receive-grants-commonwealth-cyber-initiative-cyber-and-arts-and</loc>
  <lastmod>2022-03-02T09:41:23-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2020-12/mason-engineering-cybersecurity-expert-receives-prestigious-award-his-research</loc>
  <lastmod>2021-05-06T14:31:24-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2020-11/cybersecurity-researchers-developing-toolkit-protect-open-source-software-cyberattacks</loc>
  <lastmod>2021-05-06T14:39:28-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2020-11/mason-engineering-professor-receives-funding-national-science-foundation-cyber</loc>
  <lastmod>2024-02-29T11:32:51-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2020-02/graduate-students-will-solve-theoretical-cyber-crisis-competition</loc>
  <lastmod>2023-07-17T11:54:22-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2020-10/cybersecurity-expert-creates-app-help-voters-locate-ballot-drop-boxes</loc>
  <lastmod>2021-05-06T14:54:21-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2020-07/commonwealth-cyber-initiative-cci-nova-node-announces-winners-cyber-advanced</loc>
  <lastmod>2021-05-06T14:51:06-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-04/secure-manufacturing-saves-energy-and-protects-businesses</loc>
  <lastmod>2022-10-06T17:02:25-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-05/systems-engineering-and-cyber-security-engineering-represent-mason-andrew-sage</loc>
  <lastmod>2021-05-05T08:41:12-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-04/college-engineering-and-computing-academic-advisors-recognized</loc>
  <lastmod>2021-05-06T15:11:10-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-05/graduating-senior-mitchell-martinez-overcame-challenges-reach-new-heights</loc>
  <lastmod>2021-07-15T20:26:06-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-04/doreen-joseph</loc>
  <lastmod>2021-12-28T11:21:02-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-08/cybersecurity-manufacturing-innovation-institute-receives-national-recognition-white</loc>
  <lastmod>2022-01-05T15:56:50-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-09/mason-welcomes-new-eminent-scholar-cybersecurity</loc>
  <lastmod>2022-03-02T09:26:36-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2022-02/cybersecurity-faculty-participate-multidisciplinary-projects</loc>
  <lastmod>2023-04-17T16:52:54-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2022-03/mason-wins-vmi-cyber-fusion-event</loc>
  <lastmod>2022-03-02T10:24:29-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2022-04/george-mason-university-professor-duminda-wijesekera-wins-cci-impact-award</loc>
  <lastmod>2022-04-11T16:42:17-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2022-05/mason-students-build-drones-part-commonwealth-cyber-initiative</loc>
  <lastmod>2023-04-26T12:59:56-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-04/mason-competitive-cyber-heads-national-competition-first-time</loc>
  <lastmod>2022-08-15T20:27:17-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-01/mason-engineering-bs-cyber-security-engineering-earns-abet-accreditation</loc>
  <lastmod>2022-08-15T20:27:37-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-10/cyber-security-engineering-major-competes-deloitte-cci-cyber-camp</loc>
  <lastmod>2022-08-15T20:33:20-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-04/cybersecurity-engineering-design-team-protects-critical-infrastructure</loc>
  <lastmod>2022-08-15T20:33:48-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2021-02/researchers-receive-over-15-million-darpa-optimize-security-and-energy-tradeoff</loc>
  <lastmod>2024-10-16T14:21:24-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2022-10/firefighters-get-assist-5g-equipped-drones-developed-mason</loc>
  <lastmod>2024-02-28T09:24:43-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2023-01/cyberslam-2023-introduces-area-high-schoolers-cyber-career-opportunities</loc>
  <lastmod>2023-01-30T11:45:54-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2023-01/virginia-cyberslam-students-learn-about-careers-cybersecurity</loc>
  <lastmod>2023-01-13T14:51:49-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2023-05/groundbreaking-educator-peggy-brouse-receives-2023-david-j-king-award</loc>
  <lastmod>2023-05-03T08:21:28-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2023-05/george-mason-university-cybersecurity-teams-master-multiple-major-hackathons</loc>
  <lastmod>2023-05-03T09:07:22-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2024-02/vijay-shah-joins-2m-ntia-funded-project-5g-cybersecurity</loc>
  <lastmod>2024-03-11T15:43:53-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2023-12/mason-faculty-part-17-million-ntia-wireless-innovation-fund-project-using-ai-test-o</loc>
  <lastmod>2024-06-03T15:24:35-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2024-02/mason-competitive-cyber-scores-multiple-wins-cyberforge-2024</loc>
  <lastmod>2024-06-03T15:21:29-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2022-11/novus-security-inc-cofounders-win-50000-web3-cybersecurity-app</loc>
  <lastmod>2024-02-13T10:22:41-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2024-05/mason-professors-are-researching-hacker-psychology-defend-against-cyberattacks</loc>
  <lastmod>2024-12-19T09:41:25-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2024-10/george-mason-law-school-grad-has-no-paws-about-teaching-cec</loc>
  <lastmod>2024-10-04T12:57:39-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2024-10/cybersecurity-faculty-teams-pitch-startup-ideas-commonwealth-cyber-initiative</loc>
  <lastmod>2024-10-16T14:25:53-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2024-10/military-5g-gets-security-boost-anti-jamming-research</loc>
  <lastmod>2024-10-31T09:46:07-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2023-03/future-fuse-cyber-security-engineering</loc>
  <lastmod>2024-10-23T15:46:55-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2024-10/five-ways-stay-cyber-smart</loc>
  <lastmod>2024-10-24T09:54:01-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2024-11/student-team-wins-first-place-60k-cyber-warfare-challenge</loc>
  <lastmod>2024-11-01T15:41:29-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2024-11/george-mason-university-welcomes-new-cybersecurity-research-faculty</loc>
  <lastmod>2024-11-04T08:51:07-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2024-12/cyber-savant-hacks-his-way-international-team</loc>
  <lastmod>2024-12-12T10:53:23-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-01/unlocking-privacy-encrypted-ingenuity-security-expert-receives-nsf-career-award</loc>
  <lastmod>2025-02-03T15:16:40-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-01/cybersecurity-students-prepare-inaugural-districtcon-hacker-conference</loc>
  <lastmod>2025-01-28T06:52:04-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-01/professor-explores-cybersecurity-potential-and-risks-generative-ai</loc>
  <lastmod>2025-02-07T09:05:36-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-02/39m-grant-fund-cybersecurity-scholarships-george-mason</loc>
  <lastmod>2025-02-06T15:25:16-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-02/building-blocks-cyber-success</loc>
  <lastmod>2025-02-19T21:54:59-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-02/keeping-data-safe-keeping-it-separate</loc>
  <lastmod>2025-03-05T14:46:05-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-03/peggy-brouse-outstanding-cybersecurity-educator</loc>
  <lastmod>2025-03-07T15:29:00-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-03/nearly-500-high-schoolers-get-expert-advice-virginia-cyberslam-2025</loc>
  <lastmod>2025-03-24T14:20:44-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-03/cyber-sweep-george-mason-students-take-top-three-spots-national-transportation</loc>
  <lastmod>2025-04-03T10:29:41-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-05/sit-stay-buzz</loc>
  <lastmod>2025-07-18T09:25:18-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-06/innovation-awards-recognize-george-mason-researchers</loc>
  <lastmod>2025-07-14T13:22:09-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-07/five-george-mason-cybersecurity-students-hack-their-way-boston</loc>
  <lastmod>2025-08-06T16:16:43-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-08/cybersecurity-student-hopes-use-his-powers-good</loc>
  <lastmod>2025-09-29T16:50:30-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-09/george-mason-university-students-ran-big-dogs-defense-hackathon</loc>
  <lastmod>2025-11-12T16:41:45-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-09/cyber-scholar-security-specialist</loc>
  <lastmod>2025-10-17T10:30:54-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-10/one-woman-team-puts-many-eyes-skies</loc>
  <lastmod>2025-10-15T11:26:23-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-10/cyber-security-engineering-student-excels-his-internship-second-time</loc>
  <lastmod>2025-10-20T12:47:05-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-10/digital-drive-protecting-future-transportation</loc>
  <lastmod>2025-10-21T15:08:45-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-11/george-mason-cyber-security-engineering-joins-nvtc-cyber-summit</loc>
  <lastmod>2025-11-04T10:03:58-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2025-11/xi-marks-spot-aspiring-professional-engineers</loc>
  <lastmod>2025-11-14T14:03:08-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2026-02/george-mason-scholarship-service-students-commit-americas-cyber-defense</loc>
  <lastmod>2026-02-24T10:42:44-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2026-02/mason-korea-partners-defense-organizations-advance-military-technology</loc>
  <lastmod>2026-02-24T06:50:50-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2026-02/protecting-production-through-physics-powered-detection</loc>
  <lastmod>2026-02-24T15:27:04-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2026-02/george-mason-team-wins-virginia-cyber-cup-competition-commonwealth-cyber-fusion-event</loc>
  <lastmod>2026-03-11T17:26:44-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/news/2026-03/staying-ahead-current</loc>
  <lastmod>2026-03-19T10:32:38-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/about/accreditation</loc>
  <lastmod>2025-09-29T14:26:09-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/about/news</loc>
  <lastmod>2025-09-25T11:40:01-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/about/contact-us</loc>
  <lastmod>2026-02-19T11:46:43-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/academics/senior-design-capstone</loc>
  <lastmod>2025-04-18T14:52:10-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/people/staff</loc>
  <lastmod>2026-02-19T09:29:42-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/people/faculty</loc>
  <lastmod>2025-09-30T12:55:07-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/why-study-here/alumni</loc>
  <lastmod>2024-12-10T13:54:23-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/centers-and-labs</loc>
  <lastmod>2025-01-28T12:42:38-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/academics/bachelor-science-cyber-security-engineering</loc>
  <lastmod>2026-01-29T10:00:23-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/academics/master-science-cyber-security-engineering</loc>
  <lastmod>2026-01-29T10:00:43-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/research/smart-manufacturing-architecture</loc>
  <lastmod>2021-10-28T14:33:23-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/research/control-systems-and-security</loc>
  <lastmod>2023-12-12T10:26:24-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/research/nextg-and-wireless-communications</loc>
  <lastmod>2026-01-29T10:01:26-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/connections/commonwealth-cyber-initiative</loc>
  <lastmod>2021-10-28T12:00:11-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/connections/advisory-board</loc>
  <lastmod>2025-09-29T14:22:55-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/research/research-awards-and-grants</loc>
  <lastmod>2026-01-29T10:49:07-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/why-study-here/undergraduate-opportunities</loc>
  <lastmod>2025-02-17T12:20:28-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/academics/senior-design-capstone/leadership</loc>
  <lastmod>2025-04-21T16:28:02-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/academics/senior-design-capstone/sponsors</loc>
  <lastmod>2025-04-18T12:59:44-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/why-study-here/graduate-teaching-assistantship</loc>
  <lastmod>2025-08-01T12:49:18-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/about/department-chairs-letter</loc>
  <lastmod>2025-09-25T11:47:16-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/pcosta</loc>
  <lastmod>2026-01-21T08:33:56-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/dwijesek</loc>
  <lastmod>2025-12-15T08:33:00-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/kzeng2</loc>
  <lastmod>2025-11-03T11:48:06-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/ldurant2</loc>
  <lastmod>2026-01-22T14:25:22-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/mgebril</loc>
  <lastmod>2025-02-06T15:19:03-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/mwei2</loc>
  <lastmod>2024-03-11T10:46:03-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/bmark</loc>
  <lastmod>2025-03-28T09:39:48-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/jjonesu</loc>
  <lastmod>2025-11-25T16:40:35-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/mamissah</loc>
  <lastmod>2023-03-20T15:52:45-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/jkaps</loc>
  <lastmod>2024-02-12T16:06:52-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/mhossa5</loc>
  <lastmod>2024-10-22T17:26:52-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/spudukot</loc>
  <lastmod>2025-07-21T17:28:21-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/kkhasawn</loc>
  <lastmod>2024-12-18T11:36:38-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/pbrouse-0</loc>
  <lastmod>2025-11-25T09:29:02-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/marafin</loc>
  <lastmod>2023-10-02T17:02:31-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/ateniese</loc>
  <lastmod>2026-01-30T14:55:42-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/bjabbari</loc>
  <lastmod>2023-09-26T11:08:37-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/krusselc</loc>
  <lastmod>2025-12-03T08:37:26-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/malbanes</loc>
  <lastmod>2026-01-29T09:47:23-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/mmorsy</loc>
  <lastmod>2025-02-06T14:40:59-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/abarua8</loc>
  <lastmod>2025-02-06T15:39:33-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/adebarro</loc>
  <lastmod>2024-03-01T16:17:04-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/jfeldens</loc>
  <lastmod>2025-02-06T14:12:50-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/zwang52</loc>
  <lastmod>2025-02-06T15:17:11-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/zzhu24</loc>
  <lastmod>2025-05-13T15:27:54-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/mhieb</loc>
  <lastmod>2025-02-06T15:34:39-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/dbarbara</loc>
  <lastmod>2025-10-28T16:44:00-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/ashehu</loc>
  <lastmod>2026-01-30T14:55:42-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/awmarsh</loc>
  <lastmod>2025-08-18T12:41:26-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/ksun3</loc>
  <lastmod>2025-10-10T12:50:58-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/jpan22</loc>
  <lastmod>2025-10-09T15:11:29-04:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/tkarabiy</loc>
  <lastmod>2026-02-05T16:16:32-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/ukarabiy</loc>
  <lastmod>2026-01-29T14:23:07-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/mjablons</loc>
  <lastmod>2025-11-21T15:46:03-05:00</lastmod>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://cybersecurity.gmu.edu/profiles/byu3</loc>
  <lastmod>2025-10-01T11:35:04-04:00</lastmod>
  <priority>0.5</priority>
 </url>
</urlset>
