<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-4654</journal-id>
<journal-title><![CDATA[Anuario mexicano de derecho internacional]]></journal-title>
<abbrev-journal-title><![CDATA[Anu. Mex. Der. Inter]]></abbrev-journal-title>
<issn>1870-4654</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Investigaciones Jurídicas]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-46542017000100785</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Los desafíos del uso de la fuerza en el ciberespacio]]></article-title>
<article-title xml:lang="en"><![CDATA[The Challenges of the Use of Force in Cyberspace]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Llorens]]></surname>
<given-names><![CDATA[María Pilar]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,U. Nacional de Córdoba  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Argentina</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2017</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2017</year>
</pub-date>
<volume>17</volume>
<fpage>785</fpage>
<lpage>816</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-46542017000100785&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-46542017000100785&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-46542017000100785&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: La mayor dependencia de los Estados de las tecnologías de la información y de la comunicación y consecuentemente su mayor vulnerabilidad ha provocado que la ciberseguridad se convierta en uno de los principales tópicos de debate de la comunidad internacional. En este aspecto, es de trascendental importancia la determinación del modo en que las normas del ius ad bellum, es decir, el conjunto de normas que regulan la utilización de la fuerza en el contexto internacional, se aplican en el ámbito del ciberespacio. En el presente trabajo se exploran las principales aristas que presenta esta problemática.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Cyber-security has become one of the most important issues for the international community since States&#8217; dependence on information and communication technologies and consequently its vulnerability has increased. Therefore, to determine how the ius ad bellum, this is the norms that regulate the use of force in the international context, is applied to cyberspace is essential. In this work different aspects of this issue are explored.]]></p></abstract>
<abstract abstract-type="short" xml:lang="fr"><p><![CDATA[Résumé: La très grande dépendance des États aux technologies de l&#8217;information et de la communication, et, en conséquence, leur plus grande vulnérabilité, ont fait de la cybersécurité un des thèmes les plus débattus dans la communauté internationale. Aussi est-il extrêmement important de déterminer le mode d&#8217;application des normes propres au jus ad bellum, c&#8217;est-à-dire l&#8217;ensemble des règles appliquées pour une utilisation régulée de la force dans le contexte international, mais ici dans le domaine du cyberespace. Avec ce travail, les principaux problèmes que présente cette problématique sont examinés.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[uso de la fuerza]]></kwd>
<kwd lng="es"><![CDATA[ciberespacio]]></kwd>
<kwd lng="es"><![CDATA[legítima defensa]]></kwd>
<kwd lng="es"><![CDATA[ciberoperaciones]]></kwd>
<kwd lng="es"><![CDATA[Manual de Tallinn]]></kwd>
<kwd lng="en"><![CDATA[use of force]]></kwd>
<kwd lng="en"><![CDATA[cyberspace]]></kwd>
<kwd lng="en"><![CDATA[self-defence]]></kwd>
<kwd lng="en"><![CDATA[cyber-operations]]></kwd>
<kwd lng="en"><![CDATA[Tallin Manual]]></kwd>
<kwd lng="fr"><![CDATA[usage de la force]]></kwd>
<kwd lng="fr"><![CDATA[cyberespace]]></kwd>
<kwd lng="fr"><![CDATA[légitime défense]]></kwd>
<kwd lng="fr"><![CDATA[cyberopérations]]></kwd>
<kwd lng="fr"><![CDATA[Manuel de Tallinn]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Benatar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Use of Cyber Force: Need for Legal Justification?]]></article-title>
<source><![CDATA[Goettingen Journal of International Law]]></source>
<year>2009</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boer]]></surname>
<given-names><![CDATA[L. J. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Restating the Law &#8220;As It Is&#8221;&#8217;: On the Tallin Manual and the Use of Force in Cyberspace]]></article-title>
<source><![CDATA[Amsterdam Law Forum]]></source>
<year>2013</year>
<volume>5</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brownlie]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Law and the Use of Force by States]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Oxford ]]></publisher-loc>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Diez de Velasco y Vallejo]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Instituciones de derecho internacional público]]></source>
<year>2007</year>
<edition>16a.</edition>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Tecnos]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dinstein]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[War, Agression and Self Defence]]></source>
<year>2011</year>
<edition>Fifth</edition>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eichensehr]]></surname>
<given-names><![CDATA[K. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberwar &amp; International Law Step Zero]]></article-title>
<source><![CDATA[Texas International Law Journal]]></source>
<year>2015</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gervais]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Attacks and the Laws of War]]></article-title>
<source><![CDATA[Berkeley Journal of International Law]]></source>
<year>2012</year>
<volume>30</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goldsmith]]></surname>
<given-names><![CDATA[J. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How Cyber Changes the Laws of War]]></article-title>
<source><![CDATA[European Journal of International Law]]></source>
<year>2013</year>
<volume>24</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hollis]]></surname>
<given-names><![CDATA[D. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why States Need an International Law for Information Operations]]></article-title>
<source><![CDATA[Lewis &amp; Clark Law Review]]></source>
<year>2007</year>
<volume>11</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jensen]]></surname>
<given-names><![CDATA[E. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Sovereignty: The Way Ahead]]></article-title>
<source><![CDATA[Texas International Law Journal]]></source>
<year>2015</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jiménez De Aréchaga]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[International Law in the Past Third of a Century]]></article-title>
<source><![CDATA[Recueil des cours]]></source>
<year>1978</year>
<volume>159</volume>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kanuck]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sovereign Discourse on Cyber Conflict Under International Law]]></article-title>
<source><![CDATA[Texas Law Review]]></source>
<year>2010</year>
<volume>88</volume>
<numero>7</numero>
<issue>7</issue>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kessler]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Werner]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Expertise, uncertainty, and international law: a study of the Tallinn Manual on Cyberwarfare]]></article-title>
<source><![CDATA[Leiden Journal of International Law]]></source>
<year>2013</year>
<volume>26</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mccormack]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A non Liquet on Nuclear Weapons. The ICJ Avoids the Application of General Principles of International Humanitarian Law]]></article-title>
<source><![CDATA[International Review of the Red Cross]]></source>
<year></year>
<volume>316</volume>
<numero>1997</numero>
<issue>1997</issue>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ottis]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Lorents]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberspace: Definition and Implications]]></source>
<year></year>
<conf-name><![CDATA[ Proceedings of the 5th International Conference on Information Warfare and Security]]></conf-name>
<conf-loc>Dayton, OH, US </conf-loc>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pagliari]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Curso de derecho internacional público]]></source>
<year>2013</year>
<edition>2a.</edition>
<publisher-loc><![CDATA[Córdoba (Argentina) ]]></publisher-loc>
<publisher-name><![CDATA[Advocatus]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Raboin]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Corresponding Evolution: International Law and the Emergence of Cyber Warfare]]></article-title>
<source><![CDATA[Journal of the National Association of Administrative Law Judiciary]]></source>
<year>2011</year>
<volume>31</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Roscini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber Operations and the Use of Force in International Law]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Oxford ]]></publisher-loc>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Roscini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[World Wide Warfare-Jus ad bellum and the Use of Cyber Force]]></article-title>
<source><![CDATA[Max Planck Yearbook of United Nations Law]]></source>
<year>2010</year>
<volume>14</volume>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Scassa]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Currie]]></surname>
<given-names><![CDATA[R. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New First Principles? Assesing the Internet&#8217;s Challenges to Jurisdiction]]></article-title>
<source><![CDATA[Georgetown Journal of International Law]]></source>
<year>2011</year>
<volume>42</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmitt]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[In Defense of Due Diligence in Cyberspace]]></article-title>
<source><![CDATA[The Yale Law Journal Forum]]></source>
<year>2015</year>
<volume>125</volume>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmitt]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Rewired Warfare: Rethinking the Law of Cyber Attack]]></article-title>
<source><![CDATA[International Review of the Red Cross]]></source>
<year>2014</year>
<volume>96</volume>
<numero>893</numero>
<issue>893</issue>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmitt]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Law of Cyber Warfare: Quo vadis?]]></article-title>
<source><![CDATA[Standford Law &amp; Policy Review]]></source>
<year>2014</year>
<volume>25</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmitt]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Operations and the Jus ad bellum revisited]]></article-title>
<source><![CDATA[Villanova Law Review]]></source>
<year>2011</year>
<volume>56</volume>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmitt]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework]]></article-title>
<source><![CDATA[Columbia Journal of Transnational Law]]></source>
<year>1999</year>
<volume>37</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmitt]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Tallinn Manual on the International Law Applicable to Cyber Warfare]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge Universtity Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmitt]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Vihul]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Proxy Wars in Cyberspace: The Evolving International Law of Attribution]]></article-title>
<source><![CDATA[Fletcher Security Review]]></source>
<year>2014</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shackelford]]></surname>
<given-names><![CDATA[S. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From Nuclear War to Net War: Analogizing Cyber Attacks in International Law]]></article-title>
<source><![CDATA[Berkeley Journal of International Law]]></source>
<year>2009</year>
<volume>27</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shackelford]]></surname>
<given-names><![CDATA[S. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Defining Cybersecurity Due Diligence Under International Law: Lessons from the Private Sector - Research Kelley School of Business Research Paper]]></source>
<year>2015</year>
<numero>15-41</numero>
<issue>15-41</issue>
<publisher-name><![CDATA[Kelley School of Business]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simma]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Charter of the United Nations. A commentary]]></source>
<year>2012</year>
<volume>I</volume>
<edition>Third</edition>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Värk]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Legal Framework of the Use of Armed Force Revisited]]></article-title>
<source><![CDATA[Baltic Security &amp; Defence Review]]></source>
<year>2013</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Von heinegg]]></surname>
<given-names><![CDATA[W. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Territorial Sovereignty and Neutrality in Cyberspace]]></article-title>
<source><![CDATA[International Law Studies]]></source>
<year>2013</year>
<volume>89</volume>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Waldock]]></surname>
<given-names><![CDATA[C. H. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Regulation of the Use of Force by Individual States in International Law]]></article-title>
<source><![CDATA[Recueil des cours]]></source>
<year>1952</year>
<volume>81</volume>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walker]]></surname>
<given-names><![CDATA[P. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Law of the Horse to Law of the Submarine: The Future of State Behavior in Cyberspace]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Maybaum]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Tallin ]]></publisher-loc>
<publisher-name><![CDATA[NATO CCD CDE Publications]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Waxman]]></surname>
<given-names><![CDATA[M. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Self-defensive Force against Cyber Attacks: Legal, Strategic and Political Dimensions]]></article-title>
<source><![CDATA[International Law Studies]]></source>
<year>2013</year>
<volume>89</volume>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yoo]]></surname>
<given-names><![CDATA[C. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Espionage or Cyber War?: International Law, Domestic Law, and Self-Protective Measures]]></article-title>
<source><![CDATA[Penn Law: Legal Scholarship Repository]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zekos]]></surname>
<given-names><![CDATA[G. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[State Cyberspace Jurisdiction and Personal Cyberspace Jurisdiction]]></article-title>
<source><![CDATA[International Journal of Law and Information Technologies]]></source>
<year>2007</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<collab>Comisión de Derecho Internacional</collab>
<source><![CDATA[Anuario de la Comisión de Derecho Internacional]]></source>
<year>2001</year>
<volume>II</volume>
<publisher-name><![CDATA[Naciones Unidas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<collab>International Law Commision</collab>
<source><![CDATA[Yearbook of the International Law Commision]]></source>
<year>1966</year>
<volume>II</volume>
<publisher-name><![CDATA[United Nations]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="">
<collab>Pew Research Center</collab>
<source><![CDATA[Cyber Attacks Likely to Increase]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="">
<source><![CDATA[RFC 791, Internet Protocol - DARPA Internet Program Protocol Specification]]></source>
<year>1981</year>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="book">
<source><![CDATA[Armed Activities on the Territory of the Congo (Democratic Republic of the Congo v. Uganda), Judgment]]></source>
<year>2005</year>
<page-range>168</page-range><publisher-name><![CDATA[I.C.J. Reports]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<source><![CDATA[Corfu Channel case, Judgment of April 9th, 1949]]></source>
<year>1949</year>
<page-range>4</page-range><publisher-name><![CDATA[I.C. J. Reports]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<source><![CDATA[Militarv and Paramilitary Activities in and against Nicaragua (Nicaragua v. United States of America), Merits, Judgment]]></source>
<year>1986</year>
<page-range>14</page-range><publisher-name><![CDATA[I.C.J. Reports]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<source><![CDATA[Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion]]></source>
<year>1996</year>
<page-range>226</page-range><publisher-name><![CDATA[I.C.J. Reports]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="book">
<source><![CDATA[Oil Platforms (Islamic Republic of Iran v. United States of America), Judgment]]></source>
<year>2003</year>
<page-range>161</page-range><publisher-name><![CDATA[I. C. J. Reports]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="">
<collab>ICTY</collab>
<source><![CDATA[Prosecutor vs. Dusko Tadic]]></source>
<year>2001</year>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whitehead]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber attacks threatening national security double in past year, GCHQ reveals]]></article-title>
<source><![CDATA[The Telegraph]]></source>
<year>2015</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
