AP I, arts. 51(2). art. 51(3)., arts. 51(5)(b) & 57(2)(a)(iii)., art. 57(1)., art. 57., art. 58., art. 56(1). art. 55(1). arts. 51(2) & 54
Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, 1880 (Yves Sandoz, Christophe Swinarski & Bruno Zimmermann, eds., 1987
Geneva Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases,and of Bacteriological Methods of Warfare, June 17, 1925, 26 U.S.T. 571, T.I.A.S. No. 8061
Geoffrey S. Corn, Unarmed but How Dangerous? Civilian Augmentees, the Law of Armed Conflict, and the Search for a More Effective Test for Permissible Civilian Battlefield Functions, 2 J. NAT’L SECURITY L. & POL’Y 257, 261 (2008)
Herbert Lin, Cyber conflict and international humanitarian law, international review of red cross, Volume 94 Number 886 Summer 2012,p517-518
Herbert Lin, Cyber conflict and international humanitarian law, international review of red cross, Volume 94 Number 886 Summer 2012,p525
International Law Department United States Naval War College,Newport, U.S.A. 2012 4th International Conference on Cyber Confl ict,C. Czosseck, R. Ottis, K. Ziolkowski (Eds.),2012 © NATO CCD COE,publications, Tallinn
International Law Department United States Naval War College,Newport, U.S.A. 2012 4th International Conference on Cyber Confl ict,C. Czosseck, R. Ottis, K. Ziolkowski (Eds.),2012 © NATO CCD COE,publications, Tallinn,p284
James D. Fry, Gas Smells Awful: U.N. Forces, Riot-Control Agents, and the Chemical Weapons Convention, 31 MICH. J. INT’L L. 475 (2010);
Jeffrey T.G. Kelsey, Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare, 106 MICH. L. REV. 1431 (2008).
Jeffrey T.G. Kelsey, Hacking into International Humanitarian Law:The Principles of Distinction and Neutrality in the Age of Cyber Warfare, Michigan Law Review ,Vol. 106,p1446-8
Lectures at The Hague Academy of International Law; first published in Receuil des Cours -197211(1973), 136. Leiden, A. W. Sijthoff. mefacts.org/cached.asp?x_id=10943
Lectures at The Hague Academy of International Law; first published in Receuil des Cours -197211(1973), 136. Leiden, A. W. Sijthoff. mefacts.org/cached.asp?x_id=10943
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p45
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p 48
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p 49
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p 45
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p46
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p46
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p 48
Matthew C. Waxman, Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4), THE YALE JOURNAL OF INTERNATIONAL LAW,Vol. 36: 421
Matthew C. Waxman, Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4), YALE JOURNAL OF INTERNATIONAL LAW ,Vol. 36,p428,.
Matthew C. Waxman, Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4), YALE JOURNAL OF INTERNATIONAL LAW ,Vol. 36,p429
Michael N. Schmitt ,“Attack” as a Term of Art in International Law: The Cyber Operations Context”,
Michael N. Schmitt ،“Attack” as a Term of Art in International Law: The Cyber Operations Context,
MICHAEL N. SCHMITT. 1999. “Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework.” Columbia Journal of Transnational Law 37,p6-7
Military objectives are targets that meet two criteria: they serve a military purpose and their incapacitation conveys a definite advantage. Protocol Additional I, supra note 120, art. 52(2).
Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, Julia Spiegel, THE LAW OF CYBER-ATTACK, Forthcoming in the California Law Review, 2012,p7
Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, Julia Spiegel, THE LAW OF CYBER-ATTACK, Forthcoming in the California Law Review, 2012,p10
Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, Julia Spiegel, THE LAW OF CYBER-ATTACK, Forthcoming in the California Law Review, 2012,p10-12
Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, Julia Spiegel , THE LAW OF CYBER-ATTACK, Forthcoming in the California Law Review, 2012,p43
Protection of Victims of International Armed Conflicts (Protocol 1),art. 51(5)(b), 57(2)(a)(iii)
Protocol Additional I, art. 54(2).
Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol 1),art. 48, art. 51(5)(b),art. 85(3)(b).,art. 85(3)(a). arts. 51(5)(b), 54, 57(2)(a)(iii), 52(2)
Yoram Dinstein, Computer Network Attacks and Self-Defense, 76 INT’L L. STUD. 99,114-15 (2002)