Academic literature on the topic 'Self-defense (International law)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Self-defense (International law).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Self-defense (International law)"

1

Schachter, Oscar. "Self-Defense and the Rule of Law." American Journal of International Law 83, no. 2 (April 1989): 259–77. http://dx.doi.org/10.2307/2202738.

Full text
Abstract:
Self-defense on the international level is generally regarded, at least by international lawyers, as a legal right defined and legitimated by international law. Governments, by and large, appear to agree. When they have used force, they have nearly always claimed self-defense as their legal justification. Governments disputing that claim have usually asserted that the legal conditions of self-defense were not met in the particular case. However, despite the apparent agreement that self-defense is governed by law, the meaning and validity of that proposition remain open to question. There are some who challenge the basic idea that the security of a state—its self-preservation—can and should be subjected to international law. Others question whether under present conditions the ideal of a rule of law can be applied on the international level to national security decisions. My aim in this essay is to explore some aspects of the problem raised by these challenges to the applicability of international law to claims of self-defense. It is not my intention, I should add, to consider specific interpretations of self-defense.
APA, Harvard, Vancouver, ISO, and other styles
2

Tesón, Fernando R. "Self-Defense in International Law and Rights of Persons." Ethics & International Affairs 18, no. 1 (March 2004): 87–91. http://dx.doi.org/10.1111/j.1747-7093.2004.tb00455.x.

Full text
Abstract:
In War and Self-Defense David Rodin uncovers many flaws of current thinking about war. Rodin correctly points out that the justification of national self-defense goes beyond the justification of individual self-defense. He accurately rejects the standard notion of moral symmetry—the accepted view that both just and unjust warriors can permissibly kill enemies as long as they observe the laws of war. Rodin vindicates the right view: if a war is unjust, each and every injury caused by the unjust warrior is a criminal act. There are no morally justified killings by those who fight unjust wars. Further, Rodin rightly rejects various holistic theories of self-defense. Last but not least, he correctly denounces what I have called the Hegelian Myth, the idea that tyrannical governments are worth defending against interventions aimed at deposing them because they are protected by the principle of sovereignty.
APA, Harvard, Vancouver, ISO, and other styles
3

Gunawan, Yordan, Aldha Febrila, Carissa Shifa Novendra, and Siti Asdilla Dzakiyyah. "GREECE MILITARIZATION IN AEGEAN ISLAND: AN INTERNATIONAL LAW PERSPECTIVE." Diponegoro Law Review 8, no. 2 (October 31, 2023): 159–74. http://dx.doi.org/10.14710/dilrev.8.2.2023.159-174.

Full text
Abstract:
In June 2022, President Erdogan suspended bilateral contact with Greece, citing their alleged militarization of islands in the eastern Aegean Sea, as a violation of international law. The problem that Turkey and Greece currently dealing with was caused in the first place by Greece's militarization of an island in the Aegean Sea, which was supposed to be demilitarized in the Lausanne Peace Treaty. Greece claimed that the militarization was for self-defense. In the research, the author will examine the demilitarized state of the island from the perspective of international law, and the claim that Greece has the right to act in self-defense and within the framework of world norms, as well as to make recommendations regarding what Turkey needs to do in response. The research method used is normative legal research with a case approach. Greece has indeed violated the terms of the Lausanne Peace Treat and Greece's claims of self-defense are invalid because there were no circumstances that meet the definition of self-defense. Therefore, Turkey could potentially address the matter by bringing it before the International Court of Justice.
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Soud, Moayad. "Justifications for War in Islamic Law: A Comparative Study with Contemporary International Law." Arab German Journal of Sharia and Law Sciences 2, no. 2 (June 2024): 85–104. http://dx.doi.org/10.51344/agjslsv2i24.

Full text
Abstract:
This study aims to identify the reasons that justify the state’s use of military force in self-defense according to Islamic Sharia, in comparison with the justifications in contemporary international law. In this study, we have adopted the inductive method by tracing the particulars related to the topic in their sources, the deductive method in extracting rulings from Sharia and legal texts, and the comparative method in comparing the rulings of Sharia with the law. The study concluded that the justifications for war of various types in Islamic Sharia are limited to two cases: legitimate defense and the achievement of justice. This includes self-defense, repelling injustice, supporting the oppressed who are unable to defend themselves, ensuring freedom of belief, ensuring the safe delivery and dissemination of the Islamic message, cooperating with non-Muslims in fighting a common enemy, and repelling aggression against others. In contrast, international public law limits justifications to cases of legitimate defense and Security Council resolutions, and the use of military force is not justified except in the case of an armed attack. The study also concluded that offensive warfare is considered nothing more than preventive defense.
APA, Harvard, Vancouver, ISO, and other styles
5

Urbina Escobar, Tomás. "Self-Defense Strategies Against Cyber- Attacks by Non-State Actors." Revista de Relaciones Internacionales, Estrategia y Seguridad 18, no. 2 (December 29, 2023): 61–72. http://dx.doi.org/10.18359/ries.6639.

Full text
Abstract:
This article aims to analyze and provide a state-of-the-art conceptualization of the notion of self-defense within international law and the cyber realm. In the first section, the paper explores the concepts of self-defense, attack, and the use of force in international law, followed by their application in the cyberspace. The subsequent section, specifically applies the concept of self-defense in the event of a cyber-attack perpetrated by a non-state actors. The conclusion highlights that the cyber realm context introduces the possibility that aggressions from non-state actors can yield consequences even more severe than traditional kinetic attacks. This article serves as a foundation for future discussions in the defense sector and international law.
APA, Harvard, Vancouver, ISO, and other styles
6

Sato, Hiromi. "The Defense of Superior Orders in International Law: Some Implications for the Codification of International Criminal Law." International Criminal Law Review 9, no. 1 (2009): 117–37. http://dx.doi.org/10.1163/157181209x398844.

Full text
Abstract:
AbstractThe defense of obedience to superior orders has been one of the most controversial issues in international criminal law. Although the Nuremberg Trials put forth the “Nuremberg Principle” on the superior orders defense, the principle has remained unclear on the so-called moral choice test. Basically, the situation has not been changed throughout the subsequent international rule-making process. International society has apparently rejected automatic immunity by the superior orders defense; however, a consensus has not been achieved on the question of conditional immunity, particularly on the grounds of coercion. In tackling these remaining problems, it would be advisable to examine the legal and theoretical characteristics of each component of the relevant discussion. It would also be desirable to consider some essential difficulties incidental to international rule-making. This article, in conclusion, draws attention to the possibility of certain self-constraint with regard to international law, leaving the issue of the coercion defense to the respective national legal system.
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmad, Usama, Hamza Rehman, and Abu Bakar Khan. "Legality of Anticipatory Self-Defense in International Criminal Law: Special Case Studies in Focus." Pakistan Journal of Criminal Justice 3, no. 1 (October 31, 2023): 30–39. http://dx.doi.org/10.62585/pjcj.v3i1.16.

Full text
Abstract:
On February 24, 2022, a significant international event transpired as Russian military forces crossed into Ukraine, initiating a full-scale conflict under the assertion of Anticipatory Self-defense. This development has sparked renewed discussions and inquiries into the legal and practical dimensions of Anticipatory Self-defense as a pretext for military actions. Notably, Anticipatory Self-defense has been invoked in the past, most notably by the Bush administration during the Iraq War and currently by the Israeli government in various contexts. In a similar vein, President Vladimir Putin employed the doctrine of Anticipatory Self-defense to legitimize and provide a legal basis for the Russian military's actions in Ukraine. This research paper seeks to undertake a thorough and systematic exploration of the essentials and legal aspects of Anticipatory Self-defense as a concept, examining its application and relevance in contemporary international relations. The primary objective is to shed light on the justifiability and legality of utilizing Anticipatory Self-defense as a rationale for military intervention, with a specific focus on the recent events in Ukraine. In addition to an overarching discussion on the principles and nuances of Anticipatory Self-defense, this paper will delve into select case studies from recent history, drawing upon experiences and actions taken by various countries, including the United States and Israel. Through a comprehensive analysis that combines legal, historical, and political perspectives, this research endeavor aims to provide a nuanced understanding of Anticipatory Self-defense, its utilization by different nations, and whether it can serve as a valid legal basis for military actions.Top of FormBottom of Form
APA, Harvard, Vancouver, ISO, and other styles
8

Alkharman, Jamal Awwad, and Isyaku Hassan. "Cyberterrorism and Self-Defense in the Framework of International Law." Journal of Law and Sustainable Development 11, no. 8 (September 29, 2023): e1430. http://dx.doi.org/10.55908/sdgs.v11i8.1430.

Full text
Abstract:
Objective: The problem of international electronic terrorism has spread rapidly and affecting nations adversely. However, International Law continues to view the crimes of international terrorism through the Internet and global cyberattacks as ordinary conventional crimes. This perception created an international legal vacuum. Hence, the existence of this legal vacuum in international law to criminalize these acts, which harm the security and sovereignty of states and affect global peace and security, needs to be addressed. Specifically, the study is aimed at answering the following questions: In the event of armed Cyberterrorism, does International law justifies legitimate self-defense? What are the lacunas Regarding Cyberterrorism in International law? Methods: This study used an empirical approach. An analysis is made in determining whether cyberattacks may be regarded as an armed assault legitimizing the victim states' right to self-defense. Relevant legal text and resources were pulled together to achieve the aim of this research. Hence, a qualitative descriptive analysis of related legal texts and other relevant documents has been conducted. Results:The research finds that cyberattack is similar to terrorist attack but the medium of the attack is carried out in cyber is on the computer via the internet while the conventional terrorist attack is physically carried out between or among terrorist members and government troops. However, in the cyberattack, the attacker and his location are not known. The international community has not been able to incorporate cyberattack law into International law because there is no consensus from member states on cyberattacks. Shortly, a coordinated cyberattack carried out through the Internet could cause catastrophic destruction to nations that depend on the Internet, particularly in crucial target areas such as transportation, power supply, and telecommunication infrastructures. Consequently, it has been pointed out that cyber warfare operations can fall under the scope of the international crime of aggression. Conclusion: An existing legal literature on cyberspace terrorism is exposing a conundrum. There are possible avenues for international legal action relating to terrorism. Still, because these attacks have not occurred, states lack opportunities to improve the impact that international law can make proactively. Options, especially enhancing cybersecurity in critical infrastructure, have appeal because they are strategies against cyber intrusions that are 'all hazards.' By comparison, there is a lack of reliable solutions for foreign legal activities related to the terrorist use of the Internet and social media. At the same time, this issue has become a concern, and there are opportunities for governments, businesses, and civil societies to mitigate it. This challenging background, which shows no signs of fading, may increase interest in integrating offensive cyberattacks into counter-cyber-facilitated terrorism strategies.
APA, Harvard, Vancouver, ISO, and other styles
9

Mylonaki, Emmanouela, and Tim Burton. "The Expanded Doctrine of Self-Defence & International Security Assistance - The Case of Afghanistan 2001 – 2020." International Law Research 11, no. 1 (April 30, 2022): 335. http://dx.doi.org/10.5539/ilr.v11n1p335.

Full text
Abstract:
The concept of self-defense in international law has been subject to discussion in recent years particularly in relation to its application on the fight against terrorism. The article re-considers such an application in the light of customary international law and via the use of the case of Afghanistan. More specifically the article aims at demonstrating how the Afghanistan mission informed the development of the classical concept of self-defense in the context of international security assistance. Via a historical presentation of the use of the concept of self-defense the work reveals key developments in the field.
APA, Harvard, Vancouver, ISO, and other styles
10

Sefriani, Sefriani, and Vania Lutfi Safira Erlangga. "The Legality of Israel’s Self-Defense Claim of the Strikes on Hamas." Yustisia Jurnal Hukum 11, no. 3 (December 29, 2022): 197. http://dx.doi.org/10.20961/yustisia.v11i3.61262.

Full text
Abstract:
<div class="WordSection1"><p>The attacks by Israel against Palestine, which took place from 10th to 12th May in the Gaza Strip caused massive losses of civilians. Israel claims that the strikes are forms of self-defense in response to previous attacks by Hamas. This study has two objectives: (1) to analyze the arrangements of self-defense in international law and (2) to find out the legality of Israel’s self-defense claim of the strikes on Hamas on May 10-12, 2021. The study was a juridical-normative legal study with a conceptual, historical, and statutory approaches. The results of the study reveal that (1) self-defense is customary international law contains in Article 51 of the United Nations Charter; (2) Israel’s self-defense claim is invalid since it does not comply with Article 51 of the United Nations Charter and elements contained in International Customary Law, such as necessary, proportionality, immediacy, and imminence.</p></div><em><br clear="all" /></em>
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Self-defense (International law)"

1

Kittrich, Jan. "The Right of Individual Self-Defense in Public International Law /." Berlin : Logos Berlin, 2008. http://d-nb.info/989123898/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bickerstaffe, Emma-Louise McQuilkan. "The use of force in armed conflict and the inherent right of self-defence of state armed forces." Thesis, University of Cambridge, 2016. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.709487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Holmqvist, Skantz Madeline. "The unwilling or unable doctrine : the right to use extraterritorial self-defense against non-state actors." Thesis, Stockholms universitet, Juridiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-145924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Scholz, Michael. "Staatliches Selbstverteidigungsrecht gegen terroristische Gewalt /." Berlin : Duncker & Humblot, 2006. http://www.bsz-bw.de/rekla/show.php?mode=source&eid=UNI_0_256901686inh.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kazinec, Darius. "Issues of cyber warfare in international law." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2011. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110705_132153-12860.

Full text
Abstract:
Cyber has been around for over a decade and yet we are still faces with a situation of a very weak or rather no regulation. This is being heavily influenced by our weak technological development and due to the nature of cyberspace and the Internet. Cyber warfare poses interesting questions for us. It is one of a kind type of warfare, the one we cannot see or feel, but it‘s impacts are instantaneous and potentially devastating. States and scholars agree on that. This thesis attempts to explore possibilities of application of existing international laws to amend this situation and answer the questions if it is adequate or at all possible. While scholars are still arguing about the basics of what cyber warfare and cyberspace actually is, it keeps on evolving. States on the other hand have recognized the potential threat of cyber warfare a long time ago and are attempting to mend the existing legal void, however not successfully. The effects of their efforts are limited only to a small number of States. States who are not willing to give up their cyber capability would also stay clear from such international legislation. International treaties and State practice were analyzed in search of a way to accommodate cyber warfare under the current regime. The findings show that application of existing legal basis to cyber warfare is at best difficult and strained. The reality is that cyber warfare does not fit adequately under any of the legal umbrellas at the moment. Application of... [to full text]
Kibernetinis karas jau egzistuoja daugiau nei dešimtmeti tačiau mes vis dar turime labai silpną šio reiškinio reguliavimą. Tokia situacija yra stipriai įtakota mūsų silpnu techniniu galimybių bei interneto struktūros. Kibernetinis karas yra labai keblus. Tai yra naujoviškas kariavimo būdas kurio mes nematome, bet jo pasekmes gali būti žaibiškos ir niokojančios. Mokslininkai ir pasaulio valstybės tai jau seniai pripažino. Šis darbas bando atskleisti galimybes tarptautines teises reguliavimui kibernetinio karo atžvilgiu, jeigu tai iš viso yra įmanoma. Tačiau mokslininkai vis dar ginčijasi dėl kibernetinio karo ir kibernetines erdvės terminologijos, tuo tarpu kibernetinio karo grėsme tik didėja. Pasaulio valstybes tai suprasdamos bando ištaisyti teisės trukumus, tačiau nesėkmingai. Bet kokie pasiūlymai ir susitarimai galioja tik nedideliam valstybių ratui. O didžiosios valstybės tuo tarpu nenoriai atsisakytu savo kibernetinio pajėgumo. Darbe buvo išanalizuotos tarptautinės sutartys bei valstybių praktika bandant pritaikyti esamus režimus kibernetinio karo reguliacijai. Darytinos išvados, kad esamos tarptautinės teisinės bazės taikymas geriausiu atveju yra sudėtingas ir nenatūralus. Realybė yra tai, kad kibernetiniam karui netinka nei vienas režimas. O toks jo taikymas, deja sukelia daugiau problemų nei buvo prieš tai. Tačiau dar nėra išsemtos visos galimybės ir ateitis gali parodyti teisingą sprendimą. Tuo tarpu valstybes yra pasiruošusios vesti derybas dėl tarptautinės... [toliau žr. visą tekstą]
APA, Harvard, Vancouver, ISO, and other styles
6

Abass, Ademola. "Regional organisations and the development of collective security : beyond Chapter VIII of the UN Charter /." Oxford : Hart Pub, 2004. http://www.myilibrary.com/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tunyavongs, Teera Tony. "Domestic and international law, and transnational terrorism can "reasonable apprehension of physical harm" and "probable cause" elucidate issues concerning imminence and anticipatory self-defense? /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FTunyavongs.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 2007.
Thesis Advisor(s): Moran, Daniel J. "December 2007." Description based on title screen as viewed on January 24, 2008. Includes bibliographical references (p. 53-55). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
8

Wendel, Philipp. "State responsibility for interferences with the freedom of navigation in public international law /." Berlin [u.a.] : Springer, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?id=2991082&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Luongo, Norberto E. 1962. ""Shooting-down laws" : a quest for their validity." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=111616.

Full text
Abstract:
After the terrorist attacks that took place on September 11, 2001, on American soil, a plethora of norms that enable military forces to shoot-down hijacked civil aircraft have been passed in several countries. Although these laws, decrees and executive orders are grounded on security reasons and they are allegedly aimed to protect people and vital interests on ground, this assertion does not emasculate the main difficulty they face in legal terms, which is the existence of an international provision that forbids the use of force against civilian aircraft. This thesis contains a detailed list of such domestic norms and conducts an analysis of their validity from the perspective of Article 3bis of the Chicago Convention and the right of self-defense granted to states by the Charter of the United Nations.
APA, Harvard, Vancouver, ISO, and other styles
10

Rubin, Willa. "Waging Wars in Cyberspace: How International Law On Aggression And Self-Defense Falls Short Of Addressing Cyber Warfare.Could Iran Legally Retaliate For The Stuxnet Attack?" Oberlin College Honors Theses / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1462921585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Self-defense (International law)"

1

Anand, Ruchi. Self-defense in international relations. New York: Palgrave Macmillan, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Anand, Ruchi. Self-defense in international relations. New York: Palgrave Macmillan, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rodin, David. War and self-defense. Oxford: Clarendon Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rodin, David. War and self-defense. Oxford: Clarendon Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rodin, David. War and self-defense. Oxford: Clarendon Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rodin, David. War and self-defense. Oxford: Clarendon Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shah, Niaz A. Self-defense in Islamic and International Law. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230611658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wakamizu, Tsutsui. The changing postwar international legal regime: The role played by Japan. The Hague: Kluwer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kühn, Michael. Unilaterale präventive Gewaltanwendung: Eine Untersuchung zur "präventiven Selbstverteidigung" im Völkerrecht. Frankfurt am Main: P. Lang, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yamada, Kunio. Jieiken no ronten. Tōkyō: Kokuritsu Kokkai Toshokan Chōsa oyobi Rippō Kōsakyoku, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Self-defense (International law)"

1

Anand, Ruchi. "International Relations Theory Meets International Law." In Self-Defense in International Relations, 13–41. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230245747_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shah, Niaz A. "Self-defense in International Law." In Self-defense in Islamic and International Law, 87–119. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230611658_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anand, Ruchi. "International Law Prohibiting the Use of Force." In Self-Defense in International Relations, 42–59. London: Palgrave Macmillan UK, 2009. http://dx.doi.org/10.1057/9780230245747_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shah, Niaz A. "Self-defense in Islamic Law." In Self-defense in Islamic and International Law, 13–45. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230611658_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shah, Niaz A. "Self-defense in Islamic and International Law." In Self-defense in Islamic and International Law, 163–72. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230611658_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Warren, Aiden, and Ingvild Bode. "Self-Defense in International Law: Preemptive/Preventive Requisites." In Governing the Use-of-Force in International Relations, 23–45. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137411440_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shah, Niaz A. "Introduction." In Self-defense in Islamic and International Law, 1–9. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230611658_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shah, Niaz A. "Al-Qaeda, the Koran, and Politics of Terrorism." In Self-defense in Islamic and International Law, 47–83. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230611658_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shah, Niaz A. "Legality of Iraq Invasion." In Self-defense in Islamic and International Law, 121–59. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230611658_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shah, Niaz A. "Conclusion." In Self-defense in Islamic and International Law, 173–78. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230611658_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Self-defense (International law)"

1

Zhu, James, Anoushka Shrivastava, and Aaron M. Johnson. "Grounding Robot Navigation in Self-Defense Law." In 2023 32nd IEEE International Conference on Robot and Human Interactive Communication (RO-MAN). IEEE, 2023. http://dx.doi.org/10.1109/ro-man57019.2023.10309428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Buzdağlı, Özge, Nilgün Bilici, Mine Gerni, and Ömer Selçuk Emsen. "Developments of Defense Industry Competitive Power in Stressful Economies." In International Conference on Eurasian Economies. Eurasian Economists Association, 2018. http://dx.doi.org/10.36880/c10.02138.

Full text
Abstract:
With the increasing globalization, countries’ competitive power on international markets has gained importance. One of the most prevalent methods which is used to determine countries’ comparative advantages on which field and, thereby their international competitive power is “Explained Comparative Advantages” or “Balassa Index” developed by Balassa (1965). If index value that is attained by calculating index is higher than 50, country’s competitive power on that good is high; if the index value is less than 50, competitive power on that good is low. In this study, 4 countries are selected according to their accessibility of the data, for these countries, variance on the competitive power is examined in terms of defense industry with Balassa Index. In the study, counter arguments with globalization logic, that is, especially in defense industry reduction of external dependence when considered even Adam Smith gave approval anti liberal implementations about this subject, in the countries which are exposed to domestic and foreign oppression, searching for detractive precaution on external dependence is more likely high. In the analysis to test this hypothesis, while competition pursuit on defense industry is triggering self-reliance in stressful economies, it is high in economies that have weak military alliance.
APA, Harvard, Vancouver, ISO, and other styles
3

Marcinkiewicz, Victoria, Qiyuan Zhang, and Phillip Morgan. "The Effects of Cyber Readiness and Response on Human Trust in Self Driving Cars." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003719.

Full text
Abstract:
Self driving cars (SDC) are potentially set to revolutionise the automotive industry. Despite the promise of a plethora of purported benefits (e.g. fewer road traffic accidents, better traffic flow; lower emissions), one key concern relates to the potential for SDCs and their connected infrastructure to be cyber attacked. Aside from material losses, an adverse cyber experience is likely to undermine human trust – with trust being a key contributing factor to the uptake and use of automated technology such as SDCs.Many studies have projected the different types of cyber attacks an SDC could fall victim to [1]. Concerns about the consequences of cyber attacks for e.g. users, other road users, manufacturers, legislators, legal experts, and governments have also been raised. Procedural and technical solutions have been proposed to tackle the SDC-cyber security challenge, which includes the proposition of rankings for SDCs GPS system vulnerabilities [2].Nonetheless, it is inevitable that threat actors will compromise an SDC system(s) through either exploited vulnerabilities and/or user error. It is crucial that such an event(s) does not erode trust (e.g. leading to misuse or even disuse) if the long-term benefits of this technology are to be reaped. Therefore, the study explores whether the capability and obligation from a SDC company (who are most likely to be blamed when an attack happens) to manage a cyber attack – with regards to its readiness and response activities – impacts trust in SDC technology.Using a cutting-edge AV Simulation Driving Simulator and simulation software generated animations (SCANeR Studio) embedded into an online survey, participants watch a futuristic driving scenario where the SDC executes a variety of successful driving manoeuvres before the system falls victim to an unspecified cyber-attack. Self-reported trust is measured after each successful manoeuvre as well as following the cyber attack. The experiment follows a 3x2 – 6 condition design – manipulated between participants. In each condition, all participants are shown the same driving scenario. The independent variables (IVs) consist of the information given to the participant before and after watching the scenario: IV1 being the SDCs cyber readiness (low/medium/high) and IV2, the SDCs company’s response to the incident (positive/negative). Before watching the scenario, information about cars status (including its cyber readiness) is provided. After watching the scenario and experiencing the cyber attack, participants are provided with text detailing how the SDC company responded to the cyber attack. The key prediction is that a company with higher cyber maturity (i.e. has a high level of cyber readiness and responds positively to the incident) will be trusted more than a company/companies with lower cyber security considerations. Currently the experiment is in progress and findings and details on the implications will be presented in the paper. Future research will involve exploring the boundary conditions of the effects and extending to physiological as well as subjective measures of trust.References: [1] Phama, M. & Xiongb, K. (2021) A survey on security attacks and defense techniques for connected and autonomous vehicles, Computers & Security, 109(1), 1-29. https://doi.org/10.1016/j.cose.2021.102269[2] Sheehan, B., Murphy, F., Mullins, M., Ryan, C. (2019) Connected and autonomous vehicles: A cyber-risk classification framework. Transportation Research Part A: Policy and Practice. 124(1), 523-536. https://doi.org/10.1016/j.tra.2018.06.033The work is part of a PhD funded project by the EPSRC IDTH in Cyber Security Analytics. It is also part of an ESRC-JST (Economic & Social Research Council - Japan Science & Technology Agency) project grant reference: ES/T007079/1, Prof Morgan is UK PI : Rule of Law in the Age of AI: Principles of Distributive Liability for Multi-Agent Societies.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Qian, Yongqin Xian, Hefei Ling, Jinyuan Zhang, Xiaorui Lin, Ping Li, Jiazhong Chen, and Ning Yu. "Detecting Adversarial Faces Using Only Real Face Self-Perturbations." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/165.

Full text
Abstract:
Adversarial attacks aim to disturb the functionality of a target system by adding specific noise to the input samples, bringing potential threats to security and robustness when applied to facial recognition systems. Although existing defense techniques achieve high accuracy in detecting some specific adversarial faces (adv-faces), new attack methods especially GAN-based attacks with completely different noise patterns circumvent them and reach a higher attack success rate. Even worse, existing techniques require attack data before implementing the defense, making it impractical to defend newly emerging attacks that are unseen to defenders. In this paper, we investigate the intrinsic generality of adv-faces and propose to generate pseudo adv-faces by perturbing real faces with three heuristically designed noise patterns. We are the first to train an adv-face detector using only real faces and their self-perturbations, agnostic to victim facial recognition systems, and agnostic to unseen attacks. By regarding adv-faces as out-of-distribution data, we then naturally introduce a novel cascaded system for adv-face detection, which consists of training data self-perturbations, decision boundary regularization, and a max-pooling-based binary classifier focusing on abnormal local color aberrations. Experiments conducted on LFW and CelebA-HQ datasets with eight gradient-based and two GAN-based attacks validate that our method generalizes to a variety of unseen adversarial attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Adams, Thomas E., Shripad T. Revankar, Darrell S. Cheu, Peter Cabauy, Jesse Grant, and Bret Elkind. "Experimental and Modeling Research on Leading Betavoltaic Technology." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-82475.

Full text
Abstract:
Longevity of sensors and portable devices are severely limited by temperature, chemical instability, and electrolyte leakage issues associated with conventional electrochemical batteries. Batteries undergo self-discharge and permanent loss of capacity at high temperatures, exhibit lower voltage and capacity at low temperatures, and leak electrolyte shortening operating lives, corrosion of nearby electronics, and potential safety hazards in the form of burns and poisoning. Instabilities in lithium types often short resulting explosions, fire, and venting of hazardous gasses. Betavoltaics do not have these problems and can operate in a wide temperature range without permanent degradation and loss of capacity, will not explode, and be made safe. Betavoltaic technology is maturing with advances in radioisotope sources, semiconductor materials, and developments in low-power applications, and has been identified by Department of Defense as a disruptive technology that is needed and should be pursued. This study presents experimental and modeling research on the leading betavoltaic technology, recent developments and proposed advancements. The next generation 100 microwatt betavoltaic is introduced along with projected voltage, current, and power characteristics.
APA, Harvard, Vancouver, ISO, and other styles
6

Munshi, M. Zafar A., and Ayad Ibrahim. "New Dielectric Polymer Film Capacitors for Pulse Power Applications." In ASME 2004 International Mechanical Engineering Congress and Exposition. ASMEDC, 2004. http://dx.doi.org/10.1115/imece2004-60053.

Full text
Abstract:
High voltage pulse power technologies utilized by the Department of Defense applications such as armor/anti-armor, electromagnetic/electrothermal guns, lasers, high power microwave weapons, etc. are usually satisfied today by film capacitor technologies. Commercial applications extend to a.c. motors, lighting, and automotive and implantable and portable defibrillators, among others. Film capacitors based on polypropylene (PP) and polyester (PET) have the ability to operate at very high voltages and with good reliability. They also offer high breakdown voltages, inherent low losses, excellent frequency response, low dissipation factor (DF), and good self-healing abilities. Unlike most other circuit components, existing capacitor technologies now present a barrier to achieving significant packaging (size and weight) reductions and struggling to meet market-driven performance requirements. The energy density of commercial film capacitors is less than 1 J/cc. Polyvinylidene fluoride (PVDF) has a much higher dielectric constant (12) than commercial films such as polypropylene (PP) (2.5) and a practical energy density of about 2.4 J/cc. However, it has a number of drawbacks including non-linearity of the dielectric constant with voltage, very poor insulation resistance, poor clearing or self-healing ability, poor dissipation factor (DF), higher leakage currents, relatively lower breakdown voltages and is very costly. In recent SBIR Programs, Lithium Power Technologies demonstrated that by combining PP with PVDF in a polymer blend, one could obtain a material with a very high dielectric constant as well as other excellent electrical properties. Electrical data on biaxial oriented thin films and capacitors demonstrated very high breakdown voltages of 700 V/μm to over 1050 V/μm. In contrast, PP films and capacitors resulted in breakdown voltages of 220 to 560 V/±m. Preliminary energy density for the new dielectric capacitor was about 12 J/cc compared to less than 0.5 J/cc for PP. The frequency response data with respect to the DF demonstrated an almost negligible loss in dielectric activity at high frequencies. The new polymer dielectric offers a number of key advantages, including improved performance and lower cost per unit of energy. The technology is a promising candidate for the development of a higher energy density, high voltage metallized film capacitor for a large number of applications including, defense, aerospace, defibrillator, automotive, and electric power generation. This paper will discuss the development of this new technology and commercial potential.
APA, Harvard, Vancouver, ISO, and other styles
7

Nakao, Masato, Masataka Ikeyama, and Shinji Abe. "Analytical Condition Inspection and Extension of Time Between Overhaul of F3-30 Engine." In ASME 1991 International Gas Turbine and Aeroengine Congress and Exposition. American Society of Mechanical Engineers, 1991. http://dx.doi.org/10.1115/91-gt-277.

Full text
Abstract:
F3-30 is the low-bypass-ratio turbofan engine developed to power the T-4 intermediate trainer for the Japan Air Self Defense Force (JASDF). The actual field service was started in September, 1988. The program to extend time between overhaul (TBO) of the F3-30 has been running. Analytical condition inspection (ACI) and accelerated mission testing (AMT) were conducted to confirm the sufficient durability to extend TBO. Most deteriorations of parts and performance due to AMT were also found by ACI after field operation with approximately same deterioration rate. On the other hand, some deteriorations were found by ACI only. These results show that ACI after field operation is also necessary to confirm the TBO extension, though AMT simulates the deterioration in the field operation very well. The deteriorations which would be caused by the field operation during one extended-TBO were estimated with the results of ACI and AMT, and it was concluded that the F3-30 has the sufficient durability for TBO extension to the next step.
APA, Harvard, Vancouver, ISO, and other styles
8

Zimmerman, Eric B. "Numerical Modeling of Cylindrically Shaped Propellant Packages for the U.S. Army." In ASME 2000 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/imece2000-1572.

Full text
Abstract:
Abstract The United States Army is in the process of developing the next generation of 155mm self propelled artillery through the Armament Systems Division of United Defense in Minneapolis, Minnesota. This next generation artillery system, called Crusader, is fully automated and can fire up to 10 rounds a minute at distances in excess of 40 km. The weapon system employs a new Modular Artillery Charge System (MACS). MACS consists of a low zone charge, the M231, and a high zone charge, the XM232. Both are rigid combustible cylinders filled with propellant and they are approximately 15 cm in diameter and length. The XM232 is filled with approximately 500 cylindrically shaped propellant grains. The grains are similar in size and shape to that of a typical foam ear plug issued to visitors to high noise areas. A two centimeter thick center core of the cylinder which runs the length of both charges is filled with granular explosive powder which is used to centrally ignite the charges. Between one and six of the 15 cm diameter cylinders are loaded into the gun barrel depending on the distance to the target. It is the goal of this new program to have highly accurate first fire capability for maximum effectiveness on the battlefield. It is imperative to have an accurate prediction of the exit velocity of the artillery projectile at time of firing to achieve this goal. Actual firings of the new gun tube with the XM232 propellant canisters revealed that the exit velocity of the projectile was highly dependent on the temperature of the propellant prior to firing. (The velocity achieved by the M231 is relatively insensitive to temperature.) One avenue under review to provide the propellant temperature prior to firing is to physically measure it. This was easily accomplished in earlier artillery systems as the propellant was granular and stored in cloth sacks. The soldier simply inserted a thermometer through the cloth to obtain a bulk temperature of the propellant inside. The new XM232 does not allow this as the canister walls are impervious and even if a way was found to insert a thermometer into the canister — the obtained temperature would be questionable considering the jumbled nature of the small propellant cylinders inside. Additionally, Crusader’s high rate of fire and automated ammunition handling system does not permit the soldier to manually take the temperature of the charge. During August 1998 a series of test firings of the new gun barrel were conducted with the XM232s. Selected XM232s were instrumented with thermocouples located at different locations within the cylinder as shown in figure 1. The MACS were then soaked for 24 hours at either 50C or −30C. The MACS were then placed on wooden racks in a large thermal chamber maintained at 20C. The temperatures of the thermocouples were then recorded over a period of time as they either warmed or cooled. With this transient experimental data in hand a numerical model could be developed to predict the temperature of the MACS under varying environmental conditions. It was desired to achieve a thermal model in the most simple manner as possible. Thus the first effort was to model the XM232 cylinders as a homogeneous material. If reasonable predictions of the XM232 temperature could be achieved in this mode — more complex efforts could be avoided. Consultations with the propellant manufacturer in Radford, Virginia provided the basic thermal properties of the material. A thermal circuit was then created between the outer surface of the XM232 to the inner core. Thermal energy has to pass through the outer shell material and then through the numerous small propellant cylinders and air voids between them. The material was handled as a homogeneous material and the porous nature of the insides was ignored. It was understood that there would be some thermal stratification of the air inside as shown from the experimental data. But it was hoped that reasonable predictions could be accomplished without considering the bouancy of air trapped between the small cylinders. Series and parallel thermal circuits were developed with either the air and propellant in series or in parallel to get the range of thermal resistances between the two situations. It was expected that the actual thermal resistance would lie somewhere between the two situations. Initial efforts involved superimposing transient solutions to one dimensional problems (infinite cylinder and plane wall) to obtain the multidimensional solution to the short cylinder. While that method provided reasonable comparison to the experimental results after an initial two hour period — there was not a very good comparison prior to that time. The Fluent software package was then used with the ambient air temperature profile in the experiments and the initial temperatures of the XM232s to obtain the predicted three dimensional internal temperatures of the XM232. A three dimensional tetrahedral grid was created with approximately 74,000 nodes. Time steps of 100 seconds were applied for the first 20 minutes with longer time steps being applied as the gradients between the outer surface and the surrounding air decreased. The XM232s were cooled or warmed via natural convection from the surrounding ambient air. At the beginning of each time step the average surface temperature would be obtained from the Fluent software package and then the average convective heat transfer coefficient “h” between the outer surface and surrounding ambient air would be calculated usingreadily available correlations from standard heat transfer books. Comparison of the experimental and numerical predictions at various locations within the XM232 for both the hot to ambient and cold to ambient were very good. The numerical predictions were a bit low on the upper half of the cylinder and a bit high on the lower half of the cylinder. This was expected as we did not consider buoyancy in this analysis. The experimentally measured temperature along the outer edge of the inner core tube matched up very well for both the hot and cold XM232 predictions. This was good news considering that the temperature at this location provided excellent correlation to the exit velocity of the projectile. The result of the above efforts was that a simple three dimension numerical model was developed to predict the temperature near the center of the XM232 for both a warming and cooling situation. The next use of the model is to predict the XM232 average temperature under a variety of transient ambient conditions. It is expected that these studies will facilitate higher first fire accuracy for the new Crusader Artillery System.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Self-defense (International law)"

1

Lewis, Dustin, Naz Modirzadeh, and Gabriella Blum. Quantum of Silence: Inaction and Jus ad Bellum. Harvard Law School Program on International Law and Armed Conflict, 2019. http://dx.doi.org/10.54813/azzk2231.

Full text
Abstract:
In a paper by the Harvard Law School Program on International Law and Armed Conflict (HLS PILAC) titled “Quantum of Silence: Inaction and Jus ad Bellum” (2019), Dustin A. Lewis, Naz K. Modirzadeh, and Gabriella Blum examine the actual and potential roles of silence in the identification and the development of international law, with a focus on the legal regime governing the threat or use of force in international relations. The analysis in the paper is complemented with an annex — to which a team of HLS PILAC research assistants contributed — that contains the most comprehensive catalogue to date of apparent self-defense reports to the Security Council under article 51 of the U.N. Charter. Those contributors were Lindsay Anne Bailey, Emma Broches, Laura Clark, Sonia Chakrabarty, Thejasa Jayachandran, Daniel Levine-Spound, Sarah Libowsky, Samantha Lint, Yang Liu, Carolina Silva-Portero, Shira Shamir, William Ossoff, Tamsin Parzen, and Shanelle Van. The paper and catalogue arose out of the HLS PILAC research project titled “Self-defense, States’ Silence, and the Security Council.”
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography