<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Conflict Fact Book: Effect-Creating State-on-State Cyber Operations</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year></dates><publisher><style face="normal" font="default" size="100%">Cyber Policy Institute</style></publisher><pub-location><style face="normal" font="default" size="100%">Jyväskylä</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Strategically Normative. Norms and Principles in National Cybersecurity Strategies</style></title><secondary-title><style face="normal" font="default" size="100%">EU Cyber Direct</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2019</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 13, 2019</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://eucyberdirect.eu/content_research/a-normative-analysis-of-national-cybersecurity-strategies/</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Eneken Tikk</style></author><author><style face="normal" font="default" size="100%">Kadri Kaska</style></author><author><style face="normal" font="default" size="100%">Liis Vihul</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">International Cyber Incidents: Legal Considerations</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2010</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">Cooperative Cyber Defence Center of Excellence</style></publisher><pub-location><style face="normal" font="default" size="100%">Tallinn, Estonia</style></pub-location><pages><style face="normal" font="default" size="100%">18–25</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Eneken Tikk</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Attacks Against Georgia: Legal Lessons Identified</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2008</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.carlisle.army.mil/DIME/documents/Georgia%201%200.pdf</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Cooperative Cyber Defense Center of Excellence</style></publisher><pub-location><style face="normal" font="default" size="100%">Tallinn, Estonia </style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>