[BASILICO, Nicola, DE NITTIS, Giuseppe, GATTI, Nicola. A Security Game Model for Environment Protection in the Presence of an Alarm System. In KHOUZANI, MHR, et.al. (eds). Decision and Game Theory for Security: 6th International Conference, GameSec 2015, London, UK, November 4–5, 2015, Proceedings, Cham: Springer International Publishing, 2015), pp.192–207;10.1007/978-3-319-25594-1_11]Search in Google Scholar
[BIGELOW, Brad. Mission Assurance: Shifting the Focus of Cyber Defence. IN RÕIGAS, Henry et. al. 9thInternational Conference on Cyber Conflict: Defending the Core, Proceedings, 2017, CCDCOE, IEEE, Tallinn.]Search in Google Scholar
[BREENE, Keith. Who are the cyberwar superpowers? World Economic Forum, 04.05.2016. Available https://www.weforum.org/agenda/2016/05/who-are-the-cyberwar-super-powers/ (accessed 13.09.2019)]Search in Google Scholar
[CARBERRY, Sean D. Why the private sector is key to cybersecurity? FCW: The Business of Federal Technology, 01.03.2017. Available https://fcw.com/articles/2017/03/01/whythe-private-sector-is-key-to-cybersecurity.aspx (accessed 13.09.2019)]Search in Google Scholar
[CASEY, William. et al. Cyber Security via Signaling Games: Toward a Science of Cyber Security. In NATARAJAN, R.(eds) Distributed Computing and Internet Technology. ICDCIT 2014. Lecture Notes in Computer Science, vol 8337. Springer, Cham pp. 34–42.10.1007/978-3-319-04483-5_4]Search in Google Scholar
[EDWARDS, Benjamin Edwards, FURNAS, Alexander, FORREST, Stephanie, AXELROD, Robert. Strategic Aspects of Cyberattack, Attribution, and Blame. Proceedings of the National Academy of Sciences 114, no. 11 (March 14, 2017) pp. 2825–30.10.1073/pnas.1700442114]Search in Google Scholar
[EMMOTT, Robin. NATO mulls ‘offensive defense’ with cyber warfare rules. Available https://www.reuters.com/article/us-nato-cyber/nato-mulls-offensive-defense-with-cyber-warfare-rules-idUSKBN1DU1G4 (accessed 13.09.2019)]Search in Google Scholar
[ESPÍNOLA-ARREDONDO, Ana, MUÑOZ-GARCÍA, Félix. Free-Riding in International Environmental Agreements: A Signaling Approach to Non-Enforceable Treaties. Journal of Theoretical Politics, 2011, vol. 23, no. 1, pp. 111–34.10.1177/0951629810391073]Search in Google Scholar
[EU Commission, High Level Group of Scientific Advisors, Scientific Opinion No. 2/2017. Cybersecurity in the European Digital Single Market, DG for Research and Innovation, Brussels, 24 March 2017. Available https://ec.europa.eu/research/sam/pdf/sam_cybersecurity_report.pdf (accessed 13.09.2019)]Search in Google Scholar
[HEITZENRATER, Chad, TAYLOR, Greg, SIMPSON, Andrew. When the Winning Move Is Not to Play: Games of Deterrence in Cyber Security. In KHOUZANI, MHR, et.al. (eds). Decision and Game Theory for Security: 6th International Conference, GameSec 2015, London, UK, November 4–5, 2015, Proceedings, Cham: Springer International Publishing, 2015, pp. 250–69.]Search in Google Scholar
[HENRIKSEN, Anders. The end of the road for the UN GGE process: The future regulation of cyberspace. Journal of Cybersecurity, 2019, vol 5, no. 1.10.1093/cybsec/tyy009]Search in Google Scholar
[JAKOB, Michael, LESSMANN, Kai. Signaling in International Environmental Agreements: The Case of Early and Delayed Action. International Environmental Agreements: Politics, Law and Economics, 2012, vol. 12, no. 4, pp. 309–25.]Search in Google Scholar
[JASON, The MITRE Corporation, Science of Cyber-Security, Technical Report, JSR-10-102, November 2010, Available https://fas.org/irp/agency/dod/jason/cyber.pdf (accessed 13.09.2019)]Search in Google Scholar
[KÄGI, Wolfgang. Economics of Climate Change: The Contribution of Forestry Projects Springer, 2000.10.1007/978-94-015-9600-8]Search in Google Scholar
[KERIKMÄE, Tanel, RULL, Addi (Eds). The Future of Law and eTechnologies, 2016, Springer-Verlag Heidelberg.10.1007/978-3-319-26896-5]Search in Google Scholar
[KERIKMÄE, Tanel, SÄRAV, Sandra. Legal Impediments in the EU to New Technologies in the Example of E-Residency. Baltic Journal of Law ---amp--- Politics, 2016, vol. 8., no. 2, pp. 71−90.10.1515/bjlp-2015-0019]Search in Google Scholar
[KORZAK, Elaine. UN GGE on Cybersecurity: The end of an Era?, The Diplomat, 31.07.2017. Available https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe/ (accessed 13.09.2019)]Search in Google Scholar
[KUJAWSKI, Edouard. A Probabilistic Game-Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems: Deterrence and Defense Benefits of Security Systems. Systems Engineering, 2016, vol. 19, no. 6, pp. 549–566.10.1002/sys.21376]Search in Google Scholar
[MARAUHN, Thilo. Customary Rules of Environmental Law. In ZIOLKOWSKI, Katharina (ed). Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy, NATO Cooperative Cyber Defence Centre of Excellence, 2013.]Search in Google Scholar
[MICHAEL, Barnett, DUVALL, Raymond. Power in International Politics. International Organization, 2005, vol. 59, no. 1, pp. 39–75. JSTOR, www.jstor.org/stable/3877878.10.1017/S0020818305050010]Search in Google Scholar
[MITCHELL, Ronald B. Problem structure, institutional design, and the relative effectiveness of international environmental agreements. Global Environmental Politics 2006, vol. 6, no. 3, pp. 72–89.10.1162/glep.2006.6.3.72]Search in Google Scholar
[MOORE, Tyler, FRIEDMAN, Allan, PROCACCIA, Ariel, D. Would A’cyber Warrior’protect Us: Exploring Trade-Offs between Attack and Defense of Information Systems. In Proceedings of the 2010 Workshop on New Security Paradigms (ACM, 2010), pp. 85–94.10.1145/1900546.1900559]Search in Google Scholar
[PARSON, Edward, A. The Montreal Protocol: The First Adaptive Global Environmental Regime? In PRESTRE et al. (eds.) Protecting the Ozone Layer: Lessons, Models, and Prospects, Kluwer Academic Publishers, 1998.]Search in Google Scholar
[POLAŃSKI, Paul Przemysław. Cyberspace: A New Branch of International Customary Law? Computer Law ---amp--- Security Review, 2017, vol. 33, no. 3, pp. 371–381.10.1016/j.clsr.2017.03.007]Search in Google Scholar
[RATTRAY, Gregory, J. An Environmental Approach to Understanding Cyberpower. In KRAMER, Franklin, D. et. al. (eds). Cyberpower and National Security, Potomac Books, 2009.]Search in Google Scholar
[RID, Thomas, BUCHANAN, Ben. Attributing Cyber Attacks. Journal of Strategic Studies, 2015, vol. 38, no. 1–2, pp. 4–37.10.1080/01402390.2014.977382]Search in Google Scholar
[RODRIGUES, António. A Game Theoretical Model of Deforestation in Human–environment Relationships. Journal of Theoretical Biology, 2009, vol. 258, no. 1, pp. 127–34.10.1016/j.jtbi.2009.01.005]Search in Google Scholar
[SABBAH, Cedric. Pressing Pause: A New Approach for International Cybersecurity Norm Development. In MINARIK, T. et al. (eds). Proceedings of 10thInternational Conference on Cyber Conflict – Cycon X: Maximising Effects, NATO CCDCOE, 2018, pp. 263–282.]Search in Google Scholar
[SINHA, Arunesh et al. From Physical Security to Cybersecurity. Journal of Cybersecurity, November 17, 2015.10.1093/cybsec/tyv007]Search in Google Scholar
[SUNSTEIN, Cass, R. Of Montreal and Kyoto: A Tale of Two Protocols. Harward Environmental Law Review, 2007, vol. 31.]Search in Google Scholar
[TAKACS, David. Deep Equity, Zero-sum environmentalism, and a sustainable planet. IN: BAKER, Shalanda, Helen, et.al. Beyond Zero-Sum Environmentalism (May 8, 2017). Environmental Law Reporter, Vol. 47, No. 4, 2017. Available at SSRN: https://ssrn.com/abstract=2945666 (accessed 13.09.2019)]Search in Google Scholar
[THEILER, Olaf. The New threats: the cyber dimension. NATO Review, Available https://www.nato.int/docu/review/2011/11-september/cyber-threads/en/index.htm (accessed 13.09.2019)]Search in Google Scholar
[UNDERDAL, Arild. One Question, Two Answers. In MILES, Edward, L, et.al. (eds.) Environmental Regime Effectiveness: Confronting Theory with Evidence, MIT Press, 2002, pp. 3–45.]Search in Google Scholar
[UNDERDAL, Arild. One Question, Two Answers. In MILES, Edward, L, et.al. (eds.) Environmental Regime Effectiveness: Confronting Theory with Evidence, MIT Press, 2002, pp. 3–45.]Search in Google Scholar
[VELDERS, Guus, JM, et al. The Importance of the Montreal Protocol in Protecting Climate. Proceedings of the National Academy of Sciences, 2007, vol. 104, no. 12, pp. 4814–4819.10.1073/pnas.0610328104]Search in Google Scholar
[VALUCH, Jozef, GÁBRIŠ, Tomáš, HAMUĽÁK, Ondrej. Cyber Attacks, Information Attacks and Posstmodern Warfare. Baltic Journal of Law ---amp--- Politics 2017, vol. 10, no. 1, pp. 63–89.10.1515/bjlp-2017-0003]Search in Google Scholar
[YOUNG, Oran, R. Effectiveness of International Environmental Regimes: Existing Knowledge, Cutting-Edge Themes, and Research Strategies. Proceedings of the National Academy of Sciences 108, no. 50, pp. 19853–60.10.1073/pnas.1111690108]Search in Google Scholar