[1. Beard, Jack M. “Legal Phantoms in Cyberspace: The Problematic Status of Information as a Weapon and a Target under International Humanitarian Law.” Vanderbilt Journal of Transnational Law 47 (2014): 67–143.]Search in Google Scholar
[2. Bishop, Jonathan. “The effect of de-individuation of the Internet Troller on Criminal Procedure implementation: An interview with a Hater.” International Journal of Cyber Criminology (IJCC) 7 (2013): 28–48.]Search in Google Scholar
[3. Brenner, Susan W., and Leo L. Clarke. “Civilians in Cyberwarfare: Conscriptions.” Vanderbilt Journal of Transnational Law 43 (2010): 1011–1076.]Search in Google Scholar
[4. Brunner, Elgin, Anna Michalkova, Manuel Suter, and Myrian Dunn Cavelty. Focal Report 3: Critical Infrastructure Protection – Cybersecurity – Recent Strategies and Policies: An Analysis, CRN Reports. Zurich: Center for Security Studies, 2009.]Search in Google Scholar
[5. Clapper, James R. “Worldwide Cyber Threats” (September 10, 2015) https://intelligence.house.gov/sites/intelligence.house.gov/files/documents/clapperopening09102015.pdf.]Search in Google Scholar
[6. Firnhaber-Baker, Justine. “From God's Peace to the King's Order: Late Medieval Limitations on Non-Royal Warfare.” Essays in Medieval Studies 23 (2006/7): 19–30.10.1353/ems.2007.0002]Search in Google Scholar
[7. Firnhaber-Baker, Justine. “Introduction: History, historians, and seigneurial war”: 1–23. In: Violence and the State in Languedoc, 1250–1400 (Cambridge: Cambridge University Press, 2014).]Search in Google Scholar
[8. Gaus, Arthur. “Trolling Attacks and the Need for New Approaches to Privacy Torts.” University of San Francisco Law Review 47 (2012-2013): 353–376.]Search in Google Scholar
[9. Geers, Kenneth, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015 // https://ccdcoe.org/multimedia/cyber-war-perspective-russian-aggression-against-ukraine.html.]Search in Google Scholar
[10. Gosnell Handler, Stephanie. “The New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare.” Stanford Journal of International Law 48 (2012): 209–237.]Search in Google Scholar
[11. Grant, John P., and Craig J. Barker. Parry & Grant Encyclopaedic Dictionary of International Law. 3rd ed. Oxford: Oxford University Press, 2009.10.1093/acref/9780195389777.001.0001]Search in Google Scholar
[12. Greenwald, Glenn. “How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations” // https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/.]Search in Google Scholar
[13. Hauser, Michael. “Za hranice postmodernismu” (Beyond the Frontiers of Postmodernism): 223–286. In: Roman Kanda, et al., Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days). Praha: Filosofia, 2016.]Search in Google Scholar
[14. Hiller, Janine S. “Civil Cyberconflict: Microsoft, Cybercrime, and Botnets.” Santa Clara High Technology Law Journal 31 (2015): 163–214.]Search in Google Scholar
[15. Kanda, Roman, et al. Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days). Praha: Filosofia, 2016.]Search in Google Scholar
[16. Kramer, Franklin D., Stuart H. Starr, Larry K. Wentz, and Daniel T. Kuehl. Cyberpower and National Security. Washington: Potomac Books Inc., 2009.]Search in Google Scholar
[17. Lee, Dave. “Top US military Twitter feed ‘hacked by Islamic State’.” (January 12, 2015) // http://www.bbc.co.uk/newsbeat/article/30781377/top-us-military-twitter-feed-hacked-by-islamic-state.]Search in Google Scholar
[18. Lewis, James Andrew. “Compelling Opponents to Our Will: The Role of Cyber Warfare in Ukraine”: 39–47. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015.]Search in Google Scholar
[19. Macková, Veronika. “Cyber War of the States: Stuxnet and Flame Virus Opens New Era of War” // http://cenaa.org/wp-content/uploads/2014/05/Veronika-Mackova-PP-No.-15-2013-Vol.-2.pdf]Search in Google Scholar
[20. Margulies, Peter. “Sovereignty and Cyber Attacks: Technology’s Challenge to the Law of State Responsibility.” Melbourne Journal of International Law 14 (2013): 496–519.]Search in Google Scholar
[21. Masariková, Monika. “Potvrdené. Kyberútoky predmetom článku 5 NATO” (Confirmed. Cyberattacks are subject to Art. 5 NATO) (September 5, 2014) // http://www.cybersec.sk/spravy/politika/potvrdene-kyberutoky-predmetom-clanku-5-nato/.]Search in Google Scholar
[22. Melková, Michaela, and Tomáš Sokol. “Kybernetický priestor ako nová dimenzia národnej bezpečnosti” (Cyber Space as the New Dimension of the National Security): 54–64. In: Bezpečnostné fórum 2015. Banská Bystrica: Belianum, 2015.]Search in Google Scholar
[23. Neff, Stephen C. War and the Law of Nations. A General History. Cambridge: Cambridge University Press, 2005.10.1017/CBO9780511494253]Search in Google Scholar
[24. Nicol, Sarah. “Cyber-bullying and trolling.” Youth Studies Australia 31 (2012): 3–4.]Search in Google Scholar
[25. O’Connell, Mary Ellen. “Cyber Security without Cyber War.” Journal of Conflict & Security Law 17 (2012): 187–209.10.1093/jcsl/krs017]Search in Google Scholar
[26. Reich, Pauline C., Stuart Weinstein, Charles Wild, and Allan S. Cabalong. “Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents – and the Dilemma of Anonymity.” European Journal of Law and Technology, 1 (2010): 1–58.]Search in Google Scholar
[27. Remus, Titiriga. “Cyber-attacks and International law of armed conflict; a ‘jus ad bellum’ perspective.” Journal of International Commercial Law and Technology 8 (2013): 179–189.]Search in Google Scholar
[28. Rid, Thomas. “Cyber War Will Not Take Place.” The Journal of Strategic Studies 35 (2012): 5–32.10.1080/01402390.2011.608939]Search in Google Scholar
[29. Roscini, Marco. Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press, 2014.10.1093/acprof:oso/9780199655014.001.0001]Search in Google Scholar
[30. Schmit, Michael. “Classification of Cyber Conflict.” Journal of Conflict & Security Law 17 (2012): 245–260.10.1093/jcsl/krs018]Open DOISearch in Google Scholar
[31. Schmitt, Michael N. “Computer network attack and the use of force in international law: thought on a normative framework.” Columbia Journal of Transnational Law 37 (1999): 885–937.10.21236/ADA471993]Search in Google Scholar
[32. Shackelford, Scott J. “Estonia Two-and-a-Half Years Later: A Progress Report on Combating Cyber Attacks” // https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1499849.]Search in Google Scholar
[33. Shackelford, Scott J. “From Nuclear War to Net War: Analogizing Cyber Attacks in International Law.” Berkeley Journal of International Law 27 (2009): 192–251.]Search in Google Scholar
[34. Sharp, Walter Gary. Cyberspace and the use of force. Falls Church, Virginia: Aegis Research Corp., 1999.]Search in Google Scholar
[35. Šmigová, Katarína. “Kybernetické útoky a medzinárodné právo” (Cyber Attacks and International Law): 1224–1230. In: Bratislavské právnické fórum 2013 (Bratislava Legal Forum 2013). Bratislava: Univerzita Komenského, Právnická fakulta, 2013.]Search in Google Scholar
[36. Smith, David J. “Russian Cyber Strategy and the War Against Georgia” (January 17, 2014) // http://www.atlanticcouncil.org/blogs/natosource/russian-cyber-policy-and-the-war-against-georgia.]Search in Google Scholar
[37. Smoleňová, Ivana. “Campaign in the Czech Republic and Slovakia: Types of Media Spreading Pro-Russian Propaganda, their Characteristics and Frequently Used Narratives” // http://www.pssi.cz/download/docs/253_is-pro-russian-campaign.pdf.]Search in Google Scholar
[38. Stinissen, Jan. “A Legal Framework for Cyber Operations in Ukraine”: 123–134. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015.]Search in Google Scholar
[39. The Economist. “A Cyber-riot” (May 10, 2007) // http://www.economist.com/node/9163598.]Search in Google Scholar
[40. Valuch, Jozef, Michaela Rišová, and Radoslav Seman. Právo medzinárodných organizácií (The Law of International Organisations). Praha: C. H. Beck, 2011.]Search in Google Scholar
[41. Vršanský, Peter. “The United Nations Charter entered into force 70 years ago (is the twilight of the United Nations near?).” Slovak yearbook of international law 5 (2015): 6–21.]Search in Google Scholar
[42. Vršanský, Peter, Jozef Valuch, et al. Medzinárodné právo verejné. Všeobecná časť (Public International Law. The General Part). Bratislava: Eurokódex, 2012.]Search in Google Scholar
[43. Weber, Max. “Politics as a Vocation” // http://anthropos-lab.net/wp/wp-content/uploads/2011/12/Weber-Politics-as-a-Vocation.pdf.]Search in Google Scholar
[44. Wirtz, James J. “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy”: 29–37. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015.]Search in Google Scholar
[45. Žižek, Slavoj. Welcome to the Desert of the Real! Five Essays on September 11 and Related Dates. London: Verso, 2002.10.1215/9780822385059-013]Search in Google Scholar
[1. An Outline for European Cyber Diplomacy Engagement. 9967/4/14 REV 4, DG D 1C, Brussels, September 2014.]Search in Google Scholar
[2. Australian Government Cyber Security Strategy, 2009 // http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/AG%20Cyber%20Security%20Strategy%20-%20for%20website.pdf.]Search in Google Scholar
[3. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. JOIN(2013) 1 final, Brussels, 2013.]Search in Google Scholar
[4. Declaration of Principles of International Law Concerning Friendly Relations and Cooperation among States in Accordance with the Charter of the United Nations. Resolution adopted by the General Assembly on October 24, 1970, Res. 2625 (XXV).]Search in Google Scholar
[5. ICJ Opinion on Legality of Threat or Use of Nuclear Weapons. July 8, 1996, alinea 39.]Search in Google Scholar
[6. Koncepcia kybernetickej bezpečnosti Slovenskej republiky (Conception of Cyber Security of the Slovak Republic) // https://lt.justice.gov.sk/Attachment/Vlastn%C3%BD%20materi%C3%A1l_docx.pdf?instEID=-1&attEID=75645&docEID=413095&matEID=7996&langEID=1&tStamp=20150218154455240.]Search in Google Scholar
[7. Letter dated January 9, 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations, addressed to the Secretary-General. United Nations, General Assembly, A/69/723, 2015.]Search in Google Scholar
[8. Nicaragua Case (Military and Paramilitary Activities in and against Nicaragua; Nicaragua v. USA). ICJ Reports, 1986, al. 202.]Search in Google Scholar
[9. Nicaragua v. USA. ICJ Judgment of June 27, 1986, al. 195.]Search in Google Scholar
[10. Nové hrozby - kybernetické dimenzie (New risks – cyber dimensions). NATO Review // http://www.nato.int/docu/review/2011/11-september/cyber-Threads/SK/index.htm.]Search in Google Scholar
[11. Report of Independent International Fact-Finding Mission on the Conflict in Georgia. Vol. I., September 2009 // http://echr.coe.int/Documents/HUDOC_38263_08_Annexes_ENG.pdf.]Search in Google Scholar
[12. Report of the Independent Fact-Finding Mission on the Conflict in Georgia. Vol. II, September 2009 // http://www.mpil.de/files/pdf4/IIFFMCG_Volume_II1.pdf.]Search in Google Scholar
[13. Report of the Secretary-General's High-level Panel on Threats, Challenges and Change (2004) // http://www.un.org/en/peacebuilding/pdf/historical/hlp_more_secure_world.pdf.]Search in Google Scholar
[14. Report on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations, General Assembly, Group of Governmental Experts, A/70/174, July 22, 2015 // http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174.]Search in Google Scholar
[15. Report on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations, General Assembly, Group of Governmental Experts (GGE). A/68/98, June 24, 2013.]Search in Google Scholar
[16. Tallinn Manual – Research. CCDCOE (NATO Cooperative Cyber Defence Centre of Excellence) // https://ccdcoe.org/research.html.]Search in Google Scholar
[17. Tallinn Manual on the International Law Applicable to Cyber Warfare, 2012.]Search in Google Scholar