149 results on '"Schmitt, Michael N."'
Search Results
2. Foreword
3. INTERNATIONAL HUMANITARIAN LAW AND THE TARGETING OF NON-STATE INTELLIGENCE PERSONNEL AND OBJECTS.
4. 21st century conflict : can the law survive?
5. Cybersecurity and International Law
6. SOVEREIGNTY IN CYBERSPACE : LEX LATA VEL NON?
7. Beyond State-Centrism : International Law and Non-state Actors in Cyberspace
8. Protecting the environment in armed conflict: Evaluating the US perspective.
9. ISRAELI TARGETING : A Legal Appraisal
10. THE LAW OF CYBER TARGETING
11. The Vanishing Law of War: Reflections on Law and War in the 21st Century
12. The Principle of Distinction and Weapon Systems on the Contemporary Battlefield
13. The law of cyber warfare: quo vadis?
14. International Law and the Use of Force : The Jus Ad Bellum
15. Armed Conflict and Law in This Century
16. Collective cyber countermeasures?
17. Into Uncharted Waters: The International Criminal Court
18. War and the Environment: Fault Lines in the Prescriptive Landscape
19. The International Court of Justice and the Use of Nuclear Weapons
20. The Use of Cyber Force and International Law
21. Responding to hostile cyber operations: the 'in-kind' option
22. Aegean Angst: The Greek-Turkish Dispute
23. Military necessity and humanity in international humanitarian law: preserving the delicate balance.
24. Deconstructing direct participation in hostilities: the constitutive elements.
25. Normative architecture and applied international humanitarian law.
26. International Humanitarian Law and the Conduct of Cyber Hostilities: Quo Vadis?
27. Responding to transnational terrorism under the jus ad bellum: a normative framework.
28. Lawyers on horseback? Thoughts on judge advocates and civil-military relations.
29. 'Change direction' 2006: Israeli operations in Lebanon and the international law of self-defense.
30. Taming the lawless void: tracking the evolution of international law rules for cyberspace
31. Taming the Lawless Void: Tracking the Evolution of International Law Rules for Cyberspace (Summer 2020)
32. An international attribution mechanism for hostile cyber operations
33. Air Warfare
34. Humanitarian law and direct participation in hostilities by private contractors or civilian employees.
35. The Sixteenth Waldemar A. Solf lecture in international law.
36. Preemptive strategies in international law.
37. Human shields in international humanitarian law.
38. Asymmetrical warfare and international humanitarian law.
39. Law on the Battlefield.
40. Aegean angst: a historical and legal analysis of the Greek-Turkish dispute.
41. The International Court of Justice and the use of nuclear weapons.
42. U.S. security strategies: a legal assessment.
43. 'Enemy controlled battlespace': the contemporary meaning and purpose of additional protocol I’s Article 44(3) exception
44. Cyber Attacks and Cyber (Mis)information Operations During a Pandemic.
45. State opinio juris and international humanitarian law pluralism
46. The tyranny of context: Israeli targeting practices in legal perspective
47. THE NORTH ATLANTIC ALLIANCE AND COLLECTIVE DEFENSE AT 70: CONFESSION AND RESPONSE REVISITED.
48. Wired warfare 3.0: Protecting the civilian population during cyber operations.
49. Land and Maritime Zones of Peace in International Law. Surya P. Subedi
50. Tallinn Manual on the International Law Applicable to Cyber Warfare
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.