Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 18 results:
RTF
EndNote XML
Filters:
Author
is
Michael N. Schmitt
[Clear All Filters]
2017
Schmitt, Michael N.
, and
Liis Vihul
.
"
International Law Applicable to Cyber Operations
."
Tallinn Manual
2 (2017).
Google Scholar
RTF
EndNote XML
Schmitt, Michael N.
.
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
. Second edition. Cambridge, UK: Cambridge University Press, 2017.
Google Scholar
RTF
EndNote XML
2015
Schmitt, Michael N.
.
"
The Law of Cyber Targeting
."
Tallinn Paper No. 7
(2015).
Google Scholar
RTF
EndNote XML
2014
Schmitt, Michael N.
.
"
Below the Threshold’ Cyber Operations: The Countermeasures Response Option and International Law
."
Virginia Journal of International Law
(2014): 697-732.
Google Scholar
RTF
EndNote XML
Schmitt, Michael N.
, and
Liis Vihul
.
"
The Nature of International Law Cyber Norms
."
Tallinn Paper
5 (2014).
Google Scholar
RTF
EndNote XML
2013
Schmitt, Michael N.
.
Tallinn Manual on the International Law Applicable to Cyber Warfare
. New York: Cambridge University Press, 2013.
Google Scholar
RTF
EndNote XML
Schmitt, Michael N.
.
Tallinn Manual on the International Law Applicable to Cyber Warfare
. Cambridge: Cambridge University Press, 2013.
Google Scholar
RTF
EndNote XML
2011
Schmitt, Michael N.
.
"
Cyber Operations and the Jus Ad Bellum Revisited
."
Villanova Law Review
56, no. 3 (2011): 569-605.
Google Scholar
RTF
EndNote XML
Schmitt, Michael N.
.
"
Cyber operations and the Jus Ad Bellum revisited
."
Villanova Law Review
3 (2011): 569-605.
Google Scholar
RTF
EndNote XML
2008
Schmitt, Michael N.
.
"
The Principle of Distinction and Weapon Systems on the Contemporary Battlefield
."
Connections: The Quarterly Journal
7, no. 1 (2008): 46-56.
DOI
Google Scholar
RTF
EndNote XML
2007
Schmitt, Michael N.
.
"
21st Century Conflict: Can the Law Survive?
"
Melbourne Journal of International Law
8, no. 2 (2007).
Google Scholar
RTF
EndNote XML
Schmitt, Michael N.
.
"
Asymmetrical Warfare and International Humanitarian Law
." In
International Humanitarian Law Facing New Challenges
. Berlin: Springer Verlag, 2007.
Google Scholar
RTF
EndNote XML
2006
Schmitt, Michael N.
,
Charles H. B. Garraway
, and
Yoram Dinstein
.
The San Remo Manual on the Law of Non-International Armed Conflict: With Commentary
. San Remo: International Institute of Humanitarian Law, 2006.
Google Scholar
RTF
EndNote XML
2005
Schmitt, Michael N.
.
"
Humanitarian Law and Direct Participation in Hostilities by Private Contractors or Civilian Employees
."
Chicago Journal of International Law
5 (2005): 511-46.
Google Scholar
RTF
EndNote XML
2004
Schmitt, Michael N.
.
"
International Law and the Use of Force: The Jus Ad Bellum
."
Connections: The Quarterly Journal
2, no. 3 (2004): 89-97.
DOI
Google Scholar
RTF
EndNote XML
2003
Schmitt, Michael N.
.
"
Conduct of Hostilities During Operation Iraqi Freedom: An International Humanitarian Law Assessment
." In
Yearbook of International Humanitarian Law
. Vol. 6., 2003.
Google Scholar
RTF
EndNote XML
2002
Schmitt, Michael N.
.
"
Wired Warfare: Computer Network Attack and International Law
."
International Review of the Red Cross
84, no. 846 (2002): 365-99.
Google Scholar
RTF
EndNote XML
1999
Schmitt, Michael N.
.
"
Computer Network Attack and the Use of Force in International Law: Thought on a Normative Framework
."
Columbia Journal of International Law
37, no. 3 (1999): 893.
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance