<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>23</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">International Law Applicable to Cyber Operations</style></title><secondary-title><style face="normal" font="default" size="100%">Tallinn Manual </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><pub-location><style face="normal" font="default" size="100%">New York</style></pub-location><volume><style face="normal" font="default" size="100%">2</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2017</style></year></dates><edition><style face="normal" font="default" size="100%">Second edition</style></edition><publisher><style face="normal" font="default" size="100%">Cambridge University Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Cambridge, UK</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>23</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Law of Cyber Targeting</style></title><secondary-title><style face="normal" font="default" size="100%">Tallinn Paper No. 7 </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://ccdcoe.org/uploads/ 2018/10/TP_07_2015.pdf.</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Tallinn</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Below the Threshold’ Cyber Operations: The Countermeasures Response Option and International Law</style></title><secondary-title><style face="normal" font="default" size="100%">Virginia Journal of International Law</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><pages><style face="normal" font="default" size="100%">697-732</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>23</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Nature of International Law Cyber Norms</style></title><secondary-title><style face="normal" font="default" size="100%">Tallinn Paper </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://ccdcoe.org/uploads/2018/10/Tallinn-Paper-No-5-Schmitt-and-Vihul.pdf.</style></url></web-urls></urls><pub-location><style face="normal" font="default" size="100%">Tallinn</style></pub-location><volume><style face="normal" font="default" size="100%">5</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael N. Schmitt</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Tallinn Manual on the International Law Applicable to Cyber Warfare</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><publisher><style face="normal" font="default" size="100%">Cambridge University Press</style></publisher><pub-location><style face="normal" font="default" size="100%">Cambridge</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Tallinn Manual on the International Law Applicable to Cyber Warfare </style></title></titles><dates><year><style  face="normal" font="default" size="100%">2013</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://www.knowledgecommons.in/wp-content/uploads/2014/03/Tallinn-Manual-on-the-International-Law-Applicable-to-Cyber-Warfare-Draft-.pdf</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Cambridge University Press</style></publisher><pub-location><style face="normal" font="default" size="100%">New York</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber operations and the Jus Ad Bellum revisited</style></title><secondary-title><style face="normal" font="default" size="100%">Villanova Law Review</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">569–605</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Operations and the Jus Ad Bellum Revisited</style></title><secondary-title><style face="normal" font="default" size="100%">Villanova Law Review </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><volume><style face="normal" font="default" size="100%">56</style></volume><pages><style face="normal" font="default" size="100%">569-605</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">The Principle of Distinction and Weapon Systems on the Contemporary Battlefield</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2008</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">7</style></volume><pages><style face="normal" font="default" size="100%">46-56</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael N. Schmitt</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">21st Century Conflict: Can the Law Survive?</style></title><secondary-title><style face="normal" font="default" size="100%">Melbourne Journal of International Law</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><volume><style face="normal" font="default" size="100%">8</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael N. Schmitt</style></author></authors><tertiary-authors><author><style face="normal" font="default" size="100%">Wolff Heintschel von Heinegg</style></author><author><style face="normal" font="default" size="100%">Volker Epping</style></author></tertiary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Asymmetrical Warfare and International Humanitarian Law</style></title><secondary-title><style face="normal" font="default" size="100%">International Humanitarian Law Facing New Challenges</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year></dates><publisher><style face="normal" font="default" size="100%">Berlin: Springer Verlag</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>6</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael N. Schmitt</style></author><author><style face="normal" font="default" size="100%">Charles H.B Garraway</style></author><author><style face="normal" font="default" size="100%">Yoram Dinstein</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The San Remo Manual on the Law of Non-International Armed Conflict: With Commentary </style></title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year></dates><publisher><style face="normal" font="default" size="100%">San Remo: International Institute of Humanitarian Law</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael N. Schmitt</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Humanitarian Law and Direct Participation in Hostilities by Private Contractors or Civilian Employees</style></title><secondary-title><style face="normal" font="default" size="100%">Chicago Journal of International Law </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">511–46</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">International Law and the Use of Force: The Jus Ad Bellum</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year><pub-dates><date><style  face="normal" font="default" size="100%">September 2003</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">2</style></volume><pages><style face="normal" font="default" size="100%">89-97</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael N. Schmitt</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Conduct of Hostilities During Operation Iraqi Freedom: An International Humanitarian Law Assessment</style></title><secondary-title><style face="normal" font="default" size="100%">Yearbook of International Humanitarian Law</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><volume><style face="normal" font="default" size="100%">6</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael N. Schmitt</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Wired Warfare: Computer Network Attack and International Law</style></title><secondary-title><style face="normal" font="default" size="100%">International Review of the Red Cross</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year><pub-dates><date><style  face="normal" font="default" size="100%">June 2002</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">84</style></volume><pages><style face="normal" font="default" size="100%">365–99</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">846</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael N. Schmitt</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Computer Network Attack and the Use of Force in International Law: Thought on a Normative Framework</style></title><secondary-title><style face="normal" font="default" size="100%">Columbia Journal of International Law </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year><pub-dates><date><style  face="normal" font="default" size="100%">1999</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">37</style></volume><pages><style face="normal" font="default" size="100%">893</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record></records></xml>