<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://cyberdiplomacy.net/publication/</loc><image:image><image:loc>https://cyberdiplomacy.net/wp-content/uploads/2020/12/symbole-repi-9.91x9.91-1.jpg</image:loc><image:title>symbole REPI 9.91x9.91</image:title></image:image><lastmod>2025-10-13T10:17:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberdiplomacy.net/teaching-2/</loc><lastmod>2024-03-14T12:22:14+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberdiplomacy.net/2023/05/03/european-cyber-diplomacy-tokyo-stakehoder-conference/</loc><lastmod>2023-05-03T06:35:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberdiplomacy.net/event/</loc><lastmod>2023-05-03T06:28:55+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberdiplomacy.net/2022/11/04/13-14-december-2022-the-great-powers-and-cyber-diplomacy/</loc><lastmod>2022-11-22T11:08:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberdiplomacy.net/2021/11/18/diversifying-cyber-diplomacy/</loc><lastmod>2022-05-31T10:54:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberdiplomacy.net/contact/</loc><lastmod>2021-05-27T07:36:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberdiplomacy.net/2020/12/15/conceptualising-cyber-diplomacy/</loc><lastmod>2021-03-16T12:41:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://cyberdiplomacy.net/team/</loc><image:image><image:loc>https://cyberdiplomacy.net/wp-content/uploads/2020/12/v2.-2.jpg</image:loc><image:title>V2.</image:title></image:image><image:image><image:loc>https://cyberdiplomacy.net/wp-content/uploads/2020/11/waikato-r.jpg</image:loc><image:title>waikato-r</image:title></image:image><image:image><image:loc>https://cyberdiplomacy.net/wp-content/uploads/2020/11/ulb-r.jpg</image:loc><image:title>ULB-R</image:title></image:image><image:image><image:loc>https://cyberdiplomacy.net/wp-content/uploads/2020/11/shutterstock_1074974756-1-converti.jpg</image:loc><image:title>shutterstock_1074974756 (1) [Converti]</image:title></image:image><lastmod>2021-03-04T12:04:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberdiplomacy.net/privacy-policy/</loc><lastmod>2020-11-12T10:37:31+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://cyberdiplomacy.net</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-10-13T10:17:30+00:00</lastmod></url></urlset>
