[
1. Andress, J., and Winterfeld, S., 2014. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (2nd Edition). Waltham: Elsevier.
]Search in Google Scholar
[
2. Brantly, A., and Smeets, M., 2020. Military Cyber Operations. In A. McD Sookermany, Handbook of Military Sciences (pp 1-13). Cham: Springer.
]Search in Google Scholar
[
3. Brikše, I., 2006. The information environment: theoretical approaches and explanations, Informācijas vide Latvijā: 21. gadsimta sākums.: 2006. Retrieved from University of Latvia: https://www.szf.lu.lv/fileadmin/user_upload/szf_faili/Petnieciba/sppi/mediji/intabrikse_anglu.pdf, 10 February 2022.
]Search in Google Scholar
[
4. Burgess, M., 2022, 24 March. A mysterious satellite hack has victims far beyond Ukraine. Retrieved from Wired: https://www.wired.com/story/viasat-internet-hack-ukraine-russia/, 24 March 2022.
]Search in Google Scholar
[
5. Burgess, M., 2022 A, 27 February. Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory. Retrieved from Wired: https://www.wired.com/story/ukraine-it-army-russia-war-cyberattacks-ddos/, 2 March 2022.
]Search in Google Scholar
[
6. Cerulus, L., 2022, 10 March. Kyiv’s hackers seize their wartime moment. Retrieved from Politico: https://www.politico.eu/article/kyiv-cyber-firm-state-backed-hacking-group/, 10 March 2022.
]Search in Google Scholar
[
7. Chivvis, C. S., 2017. Understanding Russian »Hybrid Warfare« and What Can be Done About It. Santa Monica: RAND.
]Search in Google Scholar
[
8. Cigler, M., 2016. Hibridna varnost in M. Malešič, Konvencionalna in hibridna varnost: vzorci (dis)kontiuitete (pp 75-95). Ljubljana: Fakulteta za družbene vede.
]Search in Google Scholar
[
9. Clark, D., 2010. Characterizing cyberspace: past, present and future. ECIR Working Paper, Massachusetts Institute of Technology. Massachusetts: Cambridge.
]Search in Google Scholar
[
10. Clausewitz, V. C., 1989. On War. New Yersey: Princeton.
]Search in Google Scholar
[
11. Deibert, R. J., Rohozinski, R., Crete-Nishihata, M., 2012, February. Cyclones in Cyberspace: Information Shaping and Denial in the 2008 Russia-Georgia War. Security Dialogue Vol. 43, No. 1, pp 3-24.
]Search in Google Scholar
[
12. European External Action Service, 2018. A Europe That Protects: Countering Hybrid Threats. Brussels: European External Action Service.
]Search in Google Scholar
[
13. Fendorf, K., and Miller, J., 2022, 24 March. Tracking Cyber Operations and Actors in the Russia-Ukraine War. Retrieved from Council on Foreign Affairs: https://www.cfr.org/blog/tracking-cyber-operations-and-actors-russia-ukraine-war, 26 March 2022.
]Search in Google Scholar
[
14. Funakoshi, M., Lawson, H., Deka, K., 2022, 28 March. Tracking sanctions against Russia. Retrieved from Reuters: https://graphics.reuters.com/UKRAINE-CRISIS/SANCTIONS/byvrjenzmve/, 30 March 2022.
]Search in Google Scholar
[
15. Galeotti, M., 2018, 5 March. I’m Sorry for Creating the ‘Gerasimov Doctrine’. Retrieved from Foreign Policy: https://foreignpolicy.com/2018/03/05/im-sorry-for-creating-thegerasimov-doctrine/, 10 March 2022.
]Search in Google Scholar
[
16. Geneva Internet Platform Digiwatch, 2022, 27 March. Ukraine conflict: Digital and cyber aspects. Retrieved from Geneva Internet Platform Digiwatch: https://dig.watch/trends/ukraine-conflict-digital-and-cyber-aspects, 29 March 2022.
]Search in Google Scholar
[
17. Giles, A., 2020. Valery Gerasimov’s Doctrine: From Soviet armor officer to strategic mastermind? Potsdam: Universität Potsdam.
]Search in Google Scholar
[
18. Giles, K., 2015. Russia and its Neighbours: Old attitudes, New capabilities. In K. Geers, Beyond ‘Cyber War’: Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine (pp 67-77). Tallin: CCDCOE.
]Search in Google Scholar
[
19. Github, 2022, 27 March. Ukraine-Cyber-Operations. Retrieved from Github: https://github.com/curated-intel/Ukraine-Cyber-Operations, 20 March 2022.
]Search in Google Scholar
[
20. Gray, C. S., 2013. Making strategic sense of cyber power: Why the sky is not falling. Carlisle: Strategic Studies Institute and U.S. Army War College Press, Army War College.
]Search in Google Scholar
[
21. Grizold, A., and Bučar, B., 2011. Knjižna zbirka Teorija in praksa: Izzivi sodobne varnosti: od nacionalne in mednarodne do človekove varnosti. Teorija in praksa, 827-851.
]Search in Google Scholar
[
22. Harknett, J. R., and Smeets, M., 2020, 4 March. Cyber campaigns and strategic outcomes. Journal of Strategic Studies, pp 1-34.
]Search in Google Scholar
[
23. Hoffman, G. F., 2007. Conflict in the 21st century: The rise of Hybrid wars. Arlington: Potomac Institute for Policy Studies Arlington.
]Search in Google Scholar
[
24. Indian Foreign Affairs, 2022, 6 March. Hybrid Warfare : A New Face of Warfare. Retrieved from Indian Foreign Affairs: https://indianforeignaffairs.com/hybrid-warfare-anew-face-of-war-in-the-modern-world/, 10 March 2022.
]Search in Google Scholar
[
25. Joint Chief of Staff, 2014. Joint Publication 3-13: Information Operations. Chairman of the Joint Chief of Staff.
]Search in Google Scholar
[
26. Kaitseliit., 2022, 20 March. Estonian Defence League. Retrieved from Kaitseliit: https://www.kaitseliit.ee/en/edl, 20 March 2022.
]Search in Google Scholar
[
27. Kallberg, J., Spring 2016. Strategic Cyberwar Theory - A Foundation for Designing Decisive Strategic Cyber. The Cyber Defense Review, Vol. 1, No. 1, 113-128.
]Search in Google Scholar
[
28. Kello, L., 2013. The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security, Vol. 38, No. 2, pp 4-40.
]Search in Google Scholar
[
29. Krepinevich, F., A., 2012. Cyber Warfare A »Nuclear Option ˮ?. Washington: Center for Strategic and Budgetary Assessments.
]Search in Google Scholar
[
30. Kuehl, T. D., 2009. From Cyberspace to Cyberpower: Defining the Problem. In D. F. Kramer, H. S. Starr, and K. l. Wentz, Cyberpower and National Security (pp 3-24). Washington DC: National Defense University Press.
]Search in Google Scholar
[
31. Libicki, C. M., 2009. Cyberdeterrence and Cyberwar. Santa Monica: RAND.
]Search in Google Scholar
[
32. Liebetrau, T., 2022. Cyber conflict short of war: a European strategic vacuum. European Security, 1-21.
]Search in Google Scholar
[
33. Madnick, S., 2022, 7 March. What Russia’s Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare. Retrieved from Harvard Business Review: https://hbr.org/2022/03/what-russias-ongoing-cyberattacks-in-ukraine-suggest-about-the-future-ofcyber-warfare, 8 March 2022.
]Search in Google Scholar
[
34. Maschmeyer, L., & Kostyuk, N., 2022, 8 February. There Is No Cyber ‘Shock And Awe’: Plausible Threats In The Ukrainian Conflict. Retrieved from War on the rocks: https://warontherocks.com/2022/02/there-is-no-cyber-shock-and-awe-plausible-threats-in-the-ukrainian-conflict/, 13 March 2022.
]Search in Google Scholar
[
35. McKew, K. M., 2017, 5 September. The Gerasimov Doctrine. Retrieved from Politico: https://www.politico.com/magazine/story/2017/09/05/gerasimov-doctrine-russia-foreign-policy-215538/, 20 March 2022.
]Search in Google Scholar
[
36. Milmo, D., 2022, 27 February. Anonymous: the hacker collective that has declared cyberwar on Russia. Retrieved from The Guardian: https://www.theguardian.com/world/2022/feb/27/anonymous-the-hacker-collective-that-has-declared-cyberwar-on-russia, 4 March 2022.
]Search in Google Scholar
[
37. Ministry of Defence Shrivenham, July 2016. Cyber Primer, (2nd Edition). Ministry of Defence Shrivenham.
]Search in Google Scholar
[
38. MoD France, September 2019. International Law Applied to Operations in Cyberspace. MoD France.
]Search in Google Scholar
[
39. Murphy, M., 2016. Understanding Russia’s Concept for Total War in Europe. Washington DC: The heritage Fundation.
]Search in Google Scholar
[
40. Ophardt, A. J., 2010. Cyber warfare and the crime of aggression: The need for individual accountability on tomorrow´s battlefield. Duke Law & Technology Review, No. 3, 1-27.
]Search in Google Scholar
[
41. Orye, E., and Maennel, M. O., 2019. Recommendations for Enhancing the Results of Cyber Effects. 11th International Conference on Cyber Conflict: Silent Battle (pp 1-19). Tallinn: CCDCOE.
]Search in Google Scholar
[
42. Porche III, R. I., 2016. Emerging Cyber Threats and Implications. Santa Monica: RAND.
]Search in Google Scholar
[
43. Probert, E., 2021, 25 August. Organisational Structures & Incident Management for Cybersecurity in the America. Retrieved from ITU: SlideShare: https://www.slideshare.net/DrDavidProbert/saltaworkshop1v12, 10 March 2022.
]Search in Google Scholar
[
44. Rácz, A., 2015. Russia’s Hybrid War in Ukraine: Breaking the Enemy’s Ability to Resist, FIIA Report 43. Helsinki: The Finnish Institute of International Affairs.
]Search in Google Scholar
[
45. Rid, T., 2013. Cyber War Will Not Take Place. New York: Oxford.
]Search in Google Scholar
[
46. Rumer, E., 2019, 5 June. The Primakov (Not Gerasimov) Doctrine in Action. Carnegie Endowment for International Peace, 1-30. Retrieved from Carnegie Endowment for International Peace: https://carnegieendowment.org/2019/06/05/primakov-notgerasimov-doctrine-in-action-pub-79254, 10 March 2022.
]Search in Google Scholar
[
47. Sārts, J., 2022, 8 March. #StratComPodcast/S2E2:#StratCom and Modern Warfare. Retrieved from NATO Strategic Communications Centre of Excellenc: https://open.spotify.com/episode/54w6pDaUemFp6je4iPJehr, 10 March 2022.
]Search in Google Scholar
[
48. Schmitt, N. M., 2017. Tallinn manual 2.0 on the international law applicable to cyber operations, Second edition. Cambridge: Cambridge.
]Search in Google Scholar
[
49. Sherman, J., 2022, 24 February. Russia’s Cyber Threat to Ukraine Is Vast—and Underestimated. Retrieved from Wired: https://www.wired.com/story/russias-cyber-threat-to-ukraine-is-vast-and-underestimated/, 20 March 2022.
]Search in Google Scholar
[
50. SOC Radar, 2022, 28 February. What You Need to Know About Russian Cyber Escalation in Ukraine. Retrieved from SOC Radar: https://socradar.io/what-you-need-to-know-about-russian-cyber-escalation-in-ukraine/, 20 March 2022.
]Search in Google Scholar
[
51. The Conversation, 2022, 24 February. Russia is using an onslaught of cyber attacks to undermine Ukraine’s defence capabilities. Retrieved from The Conversation: https://theconversation.com/russia-is-using-an-onslaught-of-cyber-attacks-to-undermine-ukraines-defence-capabilities-177638, 20 March 2022.
]Search in Google Scholar
[
52. UN General Assembly (A/RES/70/237), 2015. Developments in the field of information and telecommunications in the context of international security. United Nations General Assembly.
]Search in Google Scholar
[
53. UN General Assembly (A/RES/73/266), 2019. Group of Governmental Experts on Advancing responsible State behaviour in cyberspace in the context of international security. UN General Assembly.
]Search in Google Scholar
[
54. UN General Assembly (A/RES/73/27), 2018. Developments in the field of information and telecommunications in the context of international security. UN General Assembly.
]Search in Google Scholar
[
55. UN General Assembly, 1974, 14 December. United Nations General Assembly Resolution 3314 (XXIX), A/RES/3314. UN General Assembly. Retrieved from United Nations: https://documents-dds-ny.un.org/doc/RESOLUTION/GEN/NR0/739/16/IMG/NR073916.pdf?OpenElement.
]Search in Google Scholar
[
56. UN GGE (A/70/174), 2015. Report of the Group of Governmental Experts on Report of the Group of Governmental Experts on Telecommunications in the Context of International Security. United Nations General Assebly.
]Search in Google Scholar
[
57. UN GGE (A/76/135), 2021. Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security. UN General Assembly.
]Search in Google Scholar
[
58. UN OEWG (A/AC.290/2021/CRP.2), 2021. Open-ended working group on developments in the field of information and telecommunications in the context of international security. UN General Assembly.
]Search in Google Scholar
[
59. United Nations, 1945, 27 March. United Nations Charter. United Nations. Retrieved from United Nations: https://www.un.org/en/about-us/un-charter/full-text, 22 March 2022.
]Search in Google Scholar
[
60. Weedon, J., 2015. Beyond ‘Cyber War’: Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine. In K. Geers, Beyond ‘Cyber War’: Russia’s Use of Strategic Cyber Espionage and Information Operations in Ukraine (pp 67-77). Tallin: CCDCOE.
]Search in Google Scholar
[
61. Wolff, J., 2022, 2 March. Why Russia Hasn’t Launched Major Cyber Attacks Since the Invasion of Ukraine. Retrieved from Time: https://time.com/6153902/russia-major-cyber-attacks-invasion-ukraine/, 25 March 2022.
]Search in Google Scholar