[
Canada. National Strategy for Critical Infrastructure. [online] p. 2. Available at: < https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/srtg-crtcl-nfrstrctr/srtg-crtcl-nfrstrctr-eng.pdf> Accessed: 22. 10. 2022.10.55535/RMT.2022.3.01
]Search in Google Scholar
[
CARTOON NETWORK STUDIOS. Rick and Morty: The Rickshank Rickdemption. Burbank, USA: Cartoon Network Studios, 2017. Also available on Youtube.com at <https://www.youtube.com/watch?v=mweTc7tDO3I&ab_channel=AlephNull>. Accessed: 22. 10. 2022.
]Search in Google Scholar
[
Commission of the European Communities. Green Paper on a European Programme for Critical Infrastructure Protection. [online] p. 24. Available at: < https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52005DC0576&from=EN> Accessed: 22. 10. 2022.
]Search in Google Scholar
[
Department of Defense of the United States of America. Cyberspace Policy Report. [online] p. 4. Available at: < https://irp.fas.org/eprint/dod-cyber.pdf > Accessed: 22. 10. 2022.
]Search in Google Scholar
[
Department of the Prime Minister and Cabinet, New Zealand. The Application of International Law to State Activity in Cyberspace. [online] p. 1–2. Available at: < https://dpmc.govt.nz/sites/default/files/2020-12/The%20Application%20of%20International%20Law%20to%20State%20Activity%20in%20Cyberspace.pdf > Accessed: 22. 10. 2022.
]Search in Google Scholar
[
FARER, Tom, J. Political and Economic Coercion in Contemporary International Law. American Journal of International Law, 1985, vol. 79, no. 2, pp. 405–413.10.2307/2201710
]Search in Google Scholar
[
Federal Department of Foreign Affairs of Switzerland. Switzerland’s position paper on the application of international law in cyberspace. [online] p. 4. Available at: <https://www.eda.admin.ch/dam/eda/en/documents/aussenpolitik/voelkerrecht/20210527-Schweiz-Annex-UN-GGE-Cybersecurity-2019-2021_EN.pdf> Accessed: 22. 10. 2022.
]Search in Google Scholar
[
FERNICOLA, Gia. Once Upon a Time in Cyberspace: A Grim Reality About the Dangers of Cyberwarfare. International Comparative and Law Review, 2020, vol. 20, no. 1, p. 81.10.2478/iclr-2020-0004
]Search in Google Scholar
[
Foreign, Commonwealth and Development Office of the United Kingdom. Application of international law to states’ conduct in cyberspace: UK statement. [online] Available at: < https://www.gov.uk/government/publications/application-of-international-lawto-states-conduct-in-cyberspace-uk-statement/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement> Accessed: 22. 10. 2022.
]Search in Google Scholar
[
France. International Law Applied to Operations in Cyberspace. [online] p. 5. Available at: < https://documents.unoda.org/wp-content/uploads/2021/12/French-position-on-international-law-applied-to-cyberspace.pdf> Accessed: 22. 10. 2022.
]Search in Google Scholar
[
Government of the Kingdom of the Netherlands. Appendix: International law in cyberspace. [online] pp. 8–9. Available at: <https://www.government.nl/binaries/government/documents/parliamentary-documents/2019/09/26/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace/International+Law+in+the+Cyberdomain+-+Netherlands.pdf> Accessed 22. 10. 2022.
]Search in Google Scholar
[
GRAHAM, David, E. Cyber Threats and the Law of War. Journal of National Security Law and Policy, 2010, vol. 4, no. 1, p. 91.
]Search in Google Scholar
[
HATHAWAY, Oona, CROOTOF, Rebecca, LEVITZ, Philip, NIX, Haley, NOWLAN, Aileen, PERDUE, William, SPIEGEL, Julia. The Law of Cyber-Attack. California Law Review, 2012, vol. 100, no. 4, p. 845.
]Search in Google Scholar
[
Charter of the United Nations.
]Search in Google Scholar
[
Italy. Italian Position Paper on ‘International Law and Cyberspace‘. [online] p. 9. Available at < https://www.esteri.it/mae/resource/doc/2021/11/italian_position_paper_on_international_law_and_cyberspace.pdf> Accessed: 22. 10. 2022.
]Search in Google Scholar
[
KILOVATY, Ido. Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare Towards a Broader Scope of Article 2(4) of the UN Charter. Journal of Law and Cyber Warfare, 2015, vol. 4, no. 3, p. 215.
]Search in Google Scholar
[
LIN, Herbert. Offensive Cyber Operations and the Use of Force. Journal of National Security Law and Policy, 2010, vol. 4, no. 1, p. 74.
]Search in Google Scholar
[
LOTRIONTE, Catherine. Reconsidering the Consequences for State-Sponsored Hostile Cyber Operations Under International Law. The Cyber Defense Review, 2018, vol. 3, no. 2, p. 89.
]Search in Google Scholar
[
NGUYEN, Reese. Navigating Jus Ad Bellum in the Age of Cyber Warfare. California Law Review, 2013, vol. 101, no. 4, p. 1117.
]Search in Google Scholar
[
PRECIADO, Michael. If You Wish Cyber Peace, Prepare for Cyber War: The Need for Federal Government to Protect Critical Infrastructure from Cyber Warfare. Journal of Law and Cyber Warfare, 2012, vol. 1, no. 1, p. 124.
]Search in Google Scholar
[
Protiviti. China’s Cybersecurity Law: Critical Information Infrastructure. [online]. Available at: < https://www.protiviti.com/AU-en/insights/pov-critical-information-infrastructure#:~:text=According%20to%20the%20Cybersecurity%20Law,compromised%20network%2C%20or%20system%20malfunction> Accessed: 22. 10. 2022.
]Search in Google Scholar
[
PURSIAINEN, Christer. Russia’s Critical Infrastructure Policy: What dowe Know About it? European Journal for Security Research, 2021, vol. 6, no. 1, p. 29.10.1007/s41125-020-00070-0
]Search in Google Scholar
[
ROSCINI, Marco. Cyber Operations and the Use of Force in International Law. 1st ed. New York: Oxford University Press, 2016, p. 74.
]Search in Google Scholar
[
SIMMA, Bruno et al. (Eds.) The Charter of the United Nations: A Commentary. 3rd ed. Oxford: Oxford University Press, 2012, p. 208.
]Search in Google Scholar
[
SHARP, Walter, Gary. Cyberspace and the Use of Force. Ageis Research Corp, 1999, pp. 129–133.
]Search in Google Scholar
[
SCHMITT, Michael, BILLER, Jeffrey. The NotPetya Cyber Operation as a Case Study of International Law. [online] Available at: <https://www.ejiltalk.org/the-notpetyacyber-operation-as-a-case-study-of-international-law/> Accessed: 22. 10. 2022.
]Search in Google Scholar
[
SCHMITT, Michael, N. et al. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. 2nd ed. Cambridge: Cambridge University Press, 2017.
]Search in Google Scholar
[
SCHMITT, Michael, N. The Law of Cyber Warfare: Quo Vadis? Stanford Law and Policy Review, 2014, vol. 25, no. 1, p. 283.
]Search in Google Scholar
[
SCHMITT, N. Michael. Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. Columbia Journal of Transnational Law, 1999, vol. 37, pp. 914–915.
]Search in Google Scholar
[
The Federal Government of Germany. On the Application of International Law in Cyberspace. [online] p. 14–15. Available at: <https://www.auswaertiges-amt.de/blob/2446304/32e7b2498e10b74fb17204c54665bdf0/on-the-application-of-international-lawin-cyberspace-data.pdf> Accessed 22. 10. 2022.
]Search in Google Scholar
[
United Nations. Official compendium of voluntary national contributions on the subject of how international law applies to the use of information and communications technologies by States submitted by participating governmental experts in the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security established pursuant to General Assembly resolution 73/266. 13 July 2021, UN Doc. A/76/136 [online] p. 30. Available at: < https://front.un-arm.org/wp-content/uploads/2021/08/A-76-136-EN.pdf> Accessed: 22. 10. 2022.
]Search in Google Scholar
[
VALUCH, Jozef, HAMUĽÁK, Ondrej. Use of Force in Cyberspace. International and Comparative Law Review, 2020, vol. 20, no. 2, p. 182.10.2478/iclr-2020-0023
]Search in Google Scholar
[
WAXMAN, Matthew, C. Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4). The Yale Journal of International Law, 2011, vol. 36, no. 1, p. 436.10.2139/ssrn.1674565
]Search in Google Scholar
[
White House. Presidential Policy Directive – Critical Infrastructure Security and Resilience. [online] Available at: < https://obamawhitehouse.archives.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-andresil> Accessed 22. 10. 2022.
]Search in Google Scholar