Премини към основното съдържание
ИТ в сигурността
Екип
Изследователи
Сътрудници
Специалисти
Докторанти
Проекти
Текущи
Предстоящи
Завършени
Курсове
Отбранителна политика
Изследвания на сигурността
Киберсигурност
Администрация
Мениджмънт
Икономика
Иновации
Теми
виж всички
Ресурси
Публикации
Доклади
Позиции на ЦМСО
Презентации
Книги
Събития
Партньори
Контакти
Biblio
Export 18 results:
RTF
EndNote XML
Filters:
Автор
is
Michael N. Schmitt
[Clear All Filters]
2017
"
International Law Applicable to Cyber Operations
."
Tallinn Manual
2 (2017).
Google Scholar
(link is external)
RTF
EndNote XML
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
. Second edition. Cambridge, UK: Cambridge University Press, 2017.
Google Scholar
(link is external)
RTF
EndNote XML
2015
"
The Law of Cyber Targeting
(link is external)
."
Tallinn Paper No. 7
(2015).
Google Scholar
(link is external)
RTF
EndNote XML
2014
"
Below the Threshold’ Cyber Operations: The Countermeasures Response Option and International Law
."
Virginia Journal of International Law
(2014): 697-732.
Google Scholar
(link is external)
RTF
EndNote XML
"
The Nature of International Law Cyber Norms
(link is external)
."
Tallinn Paper
5 (2014).
Google Scholar
(link is external)
RTF
EndNote XML
2013
Schmitt, Michael N.
.
Tallinn Manual on the International Law Applicable to Cyber Warfare
. Cambridge: Cambridge University Press, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
Tallinn Manual on the International Law Applicable to Cyber Warfare
(link is external)
. New York: Cambridge University Press, 2013.
Google Scholar
(link is external)
RTF
EndNote XML
2011
"
Cyber Operations and the Jus Ad Bellum Revisited
."
Villanova Law Review
56, no. 3 (2011): 569-605.
Google Scholar
(link is external)
RTF
EndNote XML
"
Cyber operations and the Jus Ad Bellum revisited
."
Villanova Law Review
3 (2011): 569-605.
Google Scholar
(link is external)
RTF
EndNote XML
2008
"
The Principle of Distinction and Weapon Systems on the Contemporary Battlefield
."
Connections: The Quarterly Journal
7, no. 1 (2008): 46-56.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
2007
Schmitt, Michael N.
.
"
21st Century Conflict: Can the Law Survive?
(link is external)
"
Melbourne Journal of International Law
8, no. 2 (2007).
Google Scholar
(link is external)
RTF
EndNote XML
Schmitt, Michael N.
.
"
Asymmetrical Warfare and International Humanitarian Law
(link is external)
." In
International Humanitarian Law Facing New Challenges
. Berlin: Springer Verlag, 2007.
Google Scholar
(link is external)
RTF
EndNote XML
2006
Schmitt, Michael N.
,
Charles H. B. Garraway
, and
Yoram Dinstein
.
The San Remo Manual on the Law of Non-International Armed Conflict: With Commentary
(link is external)
. San Remo: International Institute of Humanitarian Law, 2006.
Google Scholar
(link is external)
RTF
EndNote XML
2005
Schmitt, Michael N.
.
"
Humanitarian Law and Direct Participation in Hostilities by Private Contractors or Civilian Employees
(link is external)
."
Chicago Journal of International Law
5 (2005): 511-46.
Google Scholar
(link is external)
RTF
EndNote XML
2004
"
International Law and the Use of Force: The Jus Ad Bellum
."
Connections: The Quarterly Journal
2, no. 3 (2004): 89-97.
DOI
(link is external)
Google Scholar
(link is external)
RTF
EndNote XML
2003
Schmitt, Michael N.
.
"
Conduct of Hostilities During Operation Iraqi Freedom: An International Humanitarian Law Assessment
(link is external)
." In
Yearbook of International Humanitarian Law
. Vol. 6., 2003.
Google Scholar
(link is external)
RTF
EndNote XML
2002
Schmitt, Michael N.
.
"
Wired Warfare: Computer Network Attack and International Law
(link is external)
."
International Review of the Red Cross
84, no. 846 (2002): 365-99.
Google Scholar
(link is external)
RTF
EndNote XML
1999
Schmitt, Michael N.
.
"
Computer Network Attack and the Use of Force in International Law: Thought on a Normative Framework
."
Columbia Journal of International Law
37, no. 3 (1999): 893.
Google Scholar
(link is external)
RTF
EndNote XML
English
Български
Форма за търсене
Търси
Resources
Политика за сигурност
Киберсигурност
Разузнаване
Вътрешен ред и сигурност
Terrorism
Операции
Технологии и индустрия
Управление на човешките ресурси
Управление на аквизицията
Стратегия
Концепции и доктрини
Мениджмънт
Икономика на отбраната
Финансов мениджмънт
Мениджмът на информация и знание
Симулации и подготовка
Управление на промяната
Взимане на решение
Добро управление
Back to top