[1. Andemichael, Berhanykun, and John Mathiason. Eliminating Weapons of Mass Destruction: Prospects for Effective International Verification. London and New York: Palgrave Macmillan, 2005.10.1057/9780230005549]Search in Google Scholar
[2. Applegate, Scott D. “Cybermilitias and Political Hackers – Use of Irregular Forces in Cyber Warfare.” Security & Privacy 9 (2011): 16-22.10.1109/MSP.2011.46]Search in Google Scholar
[3. Applegate, Scott D. “The Dawn of Kinetic Cyber”: 163-178. In: Karlis Podins, Jan Stinissen, and Markus Maybaum, eds. Proceedings of the 5th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2013.]Search in Google Scholar
[4. Arimatsu, Louise. “A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations”: 91-110. In: Christian Czosseck, Rain Ottis, and Katharina Ziolkowski, eds. Proceedings of the 2012 4th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2012.]Search in Google Scholar
[5. Arms Control Association. “Chemical and Biological Weapons Status at a Glance” (February 2014) // https://www.armscontrol.org/factsheets/cbwprolif.]Search in Google Scholar
[6. Baglione, Lisa. To Agree or Not to Agree: Leadership, Bargaining, and Arms Control. University of Michigan Press, 1999.10.3998/mpub.23149]Search in Google Scholar
[7. Baylis, John. “The Control of Weapons of Mass Destruction”: 212-230. In: John Baylis, J.J. Wirtz, and Colin S. Gray, eds. Strategy in the Contemporary World. Oxford and New York: Oxford University Press, 2016.]Search in Google Scholar
[8. Blacker, Coit D., and Gloria Duffy. International Arms Control: Issues and Agreements. Stanford: Stanford University Press, 1984.]Search in Google Scholar
[9. Boulanin, Vincent. “Cybersecurity and the Arms Industry”: 218-226. In: SIPRI Yearbook 2013: Armaments, Disarmament and International Security. Oxford and New York: Oxford University Press, 2013.]Search in Google Scholar
[10. Brunée, Jutta. “Compliance Control”: 373-390. In: Geir Ulfstein, ed. Making Treaties Work: Human Rights, Environment and Arms Control. Cambridge and New York: Cambridge University Press, 2007.10.1017/CBO9780511494345.017]Search in Google Scholar
[11. Charron, Andrea. UN Sanctions and Conflict: Responding to Peace and Security Threats. London and New York: Routledge, 2011.10.4324/9780203807569]Search in Google Scholar
[12. Claessen, Eva. “Reshaping the Internet – the Impact of the Securitisation of Internet Infrastructure on Approaches to Internet Governance: The Case of Russia and the EU.” Journal of Cyber Policy (2020) // DOI: 10.1080/23738871.2020.1728356.10.1080/23738871.2020.1728356]Search in Google Scholar
[13. Cutts, Andrew. “Warfare and the Continuum of Cyber Risks: A Policy Perspective”: 66-76. In: Christian Czosseck and Kenneth Geers, eds. The Virtual Battlefield: Perspectives on Cyber Warfare. Amsterdam: IOS Press 2009.]Search in Google Scholar
[14. Dahlitz, Julie. “The Role of Customary Law in Arms Limitation”: 157-178. In: Julie Dahlitz and Detlev Dicke, eds., The International Law of Arms Control and Disarmament.UN 1991.]Search in Google Scholar
[15. Den Dekker, Guido. “The Effectiveness of International Supervision in Arms Control Law.” Journal of Conflict and Security Law 9 (2004): 315-330.10.1093/jcsl/9.3.315]Search in Google Scholar
[16. Dunn Cavelty, Myriam. “The Militarisation of Cyberspace: Why Less May Be Better”: 141-154. In: Christian Czosseck, Rain Ottis, and Katharina Ziolkowski, eds. Proceedings of the 2012 4th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2012.]Search in Google Scholar
[17. Eggenschwiller, Jacqueline, and Jantje Silomon. “Challenges and Opportunities in Cyber Weapon Norm Construction.” Computer Fraud & Security 12 (2018): 11-18.10.1016/S1361-3723(18)30120-9]Search in Google Scholar
[18. Eilstrup-Sangiovanni, Mette. “Why the World Needs an International Cyberwar Convention.” Philosophy & Technology 31 (2018): 379-407.10.1007/s13347-017-0271-5]Search in Google Scholar
[19. Elsig, Manfred. “Who is in Love with Multilateralism? Treaty Commitment in the Post-Cold War Era.” European Union Politics 12 (2011): 529-550.10.1177/1465116511419869]Search in Google Scholar
[20. Enia, Jason, and Geffrey Fields. “The Relative Efficacy of the Biological and Chemical Weapons Regimes.” The Nonproliferation Review 21 (2014): 43-6410.1080/10736700.2014.880560]Search in Google Scholar
[21. Franklin, Alexi. “An International Cyber Warfare Treaty: Historical Analysis and Future Prospects.” Journal of Law and Cyber Warfare 7 (2018): 379-407.]Search in Google Scholar
[22. Geers, Kenneth. Strategic Cyber Security. Tallinn: NATO CCD COE Publications 2011.]Search in Google Scholar
[23. Goldblat, Jozef. Arms Control: The New Guide to Negotiations and Agreements. London and Thousand Oaks: SAGE Publications, 2002.10.4135/9781446214947]Search in Google Scholar
[24. Hare, Forrest. “Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?”: 88-105. In: Christian Czosseck and Kenneth Geers, eds. The Virtual Battlefield: Perspectives on Cyber Warfare. Amsterdam: IOS Press 2009.]Search in Google Scholar
[25. Hatch, Benjamin B. “Defining a Class of Cyber Weapons as WMD: An Examination of the Merits.” Journal of Strategic Security 11 (2018): 43-61.10.5038/1944-0472.11.1.1657]Search in Google Scholar
[26. Jensen, Eric Talbot. “Cyber Warfare and Precautions against the Effects of Attacks.” Texas Law Review 88 (2010): 1533-1569.]Search in Google Scholar
[27. Jeutner, Valentin. “The Digital Geneva Convention.” Journal of International Humanitarian Legal Studies 10 (2019): 158-170.10.1163/18781527-01001009]Search in Google Scholar
[28. Joyner, Daniel H. “Jus ad Bellum in the age of WMD Proliferation.” George Washington International Law Review 40 (2008): 233-288.]Search in Google Scholar
[29. Kirsch, Cassandra M. “Science Fiction No More: Cyber Warfare and the United States.” Denver Journal of International Law & Policy 40 (2012): 620-647.]Search in Google Scholar
[30. Knake, Robert K. Internet Governance in an Age of Cyber Insecurity. New York: Council on Foreign Relations 2010.]Search in Google Scholar
[31. Levi, Michael A., and Michael E. O’Hanlon. The Future of Arms Control. Baltimore: The Brookings Institution Press, 2005.]Search in Google Scholar
[32. Leuprecht, Christian, Joseph Szeman, and David B. Skillcorn. “The Damoclean Sword of Offensive Cyber: Policy Uncertainty and Collective Insecurity.” Contemporary Security Policy 40 (2019): 382-407.10.1080/13523260.2019.1590960]Search in Google Scholar
[33. Lynn III, William J. “Defending a New Domain: The Pentagon’s Cyberstrategy.” Foreign Affairs 89 (2010): 97-108.]Search in Google Scholar
[34. Manley, Ron G. “Restricting Non-State Actors’ Access to Chemical Weapons and Related Materials: Implications of UNSCR 1540”: 73-85. In: Olivia Bosch and Peter van Ham, eds. Global Non-Proliferation and Arms Control: The Impact of UNSCR 1540. Baltimore: The Brookings Institution Press, 2007.]Search in Google Scholar
[35. Marauhn, Thilo. “Dispute Resolution, Compliance Control and Enforcement of International Arms Control Law”: 243-272. In: Geir Ulfstein, ed. Making Treaties Work: Human Rights, Environment and Arms Control. Cambridge and New York: Cambridge University Press, 2007.10.1017/CBO9780511494345.012]Search in Google Scholar
[36. O’Connell, Mary Ellen. “Cyber Security without Cyber War,” Journal of Conflict and Security Law 17 (2012): 187-209.10.1093/jcsl/krs017]Search in Google Scholar
[37. Meyer, Paul. “Cyber Security through Arms Control: An Approach to International Co-operation.” The RUSI Journal 156 (2011): 22-27.10.1080/03071847.2011.576471]Search in Google Scholar
[38. Ophardt, Jonathan A. “Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield.” Duke Law & Technology Review 9 (2010): 1-28.]Search in Google Scholar
[39. Posner, Eric A., and Alan O. Sykes. Economic Foundations of International Law. Cambridge (MA): Harvard University Press, 2013.10.2307/j.ctt2jbtsp]Search in Google Scholar
[40. Rid, Thomas, and Peter McBurney. “Cyber-Weapons.” The RUSI Journal 157 (2012): 6-13.10.1080/03071847.2012.664354]Search in Google Scholar
[41. Roscini, Marco. “World Wide Warfare – Jus ad Bellum and the Use of Cyber Force.” Max Planck Yearbook of International Law 14 (2010): 85-130.10.1163/18757413-90000050]Search in Google Scholar
[42. Schaap, Arie J. “Cyber Warfare Operations: Development and Use under International Law.” Air Force Law Review 64 (2009): 121-174.]Search in Google Scholar
[43. Schmitt, Michael N., ed. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge and New York: Cambridge University Press, 2013.10.1017/CBO9781139169288]Search in Google Scholar
[44. Sheldon, John B. “The Rise of Cyberpower”: 303-320. In: John Baylis, James J Wirtz, and Colin S Gray, eds. Strategy in Contemporary World. Oxford and New York: Oxford University Press, 2013.]Search in Google Scholar
[45. Sitaraman, Srini. State Participation in International Treaty Regimes. London and New York: Routledge 2009.]Search in Google Scholar
[46. Smeets, Max. “A Matter of Time: On the Transitory Nature of Cyberweapons.” Journal of Strategic Studies 41 (2018): 6-32.10.1080/01402390.2017.1288107]Search in Google Scholar
[47. Stevens, Tim. “Cyberweapons: An Emerging Global Governance Architecture.” Palgrave Communications 3 (2017): 1-6.10.1057/palcomms.2016.102]Search in Google Scholar
[48. Tabassi, Lisa. “The Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction (Chemical Weapons Convention)”: 273-300. In: Geir Ulftein, ed. Making Treaties Work: Human Rights, Environment and Arms Control. Cambridge and New York: Cambridge University Press, 2007.10.1017/CBO9780511494345.013]Search in Google Scholar
[49. Taddeo, Mariarosaria. “An Analysis for a Just Cyber Warfare”: 209-218. In: Christian Czosseck, Rain Ottis, and Katharina Ziolkowski, eds. Proceedings of the 2012 4th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2012.]Search in Google Scholar
[50. Thakur, Ramesh. “Chemical Weapons and the Challenge of Weapons of Mass Destruction”: 1-14. In: Ramesh Thakur and Ere Haru, eds. Chemical Weapons Convention: Implementation, Challenges and Opportunities. Tokyo: United Nations University Press, 2006.]Search in Google Scholar
[51. United States Department of Defense. “The National Military Strategy for Cyberspace Operations” (December 2006) // http://www.dod.mil/pubs/foi/joint_staff/jointStaff_jointOperations/07-F-2105doc1.pdf]Search in Google Scholar
[52. Vagts, Detlev F. “The Hague Convention and Arms Control.” American Journal of International Law 94 (2000): 31-41.10.2307/2555229]Search in Google Scholar
[53. Von Heinegg, Heintschel Wolff. “Legal Implications of Territorial Sovereignty in Cyberspace”: 7-20. In: Christian Czosseck, Rain Ottis, and Katharina Ziolkowski, eds. Proceedings of the 2012 4th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2012.]Search in Google Scholar
[54. Yihdego, Zeray. The Arms Trade and International Law. Portland: Hart Publishing, 2007.10.4337/mllwr.2008.02.26]Search in Google Scholar
[55. Zhifeng, Jiang. “Regulating the Use and Conduct of Cyber Operations through International Law: Challenges and Fact-Finding Body Proposal.” LSE Law Review 5 (2020): 59-88.10.61315/lselr.42]Search in Google Scholar
[1. Charter of the United Nations (Signed 26 June 1945). 1 UNTS XVI.]Search in Google Scholar
[2. Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May be Deemed to be Excessively Injurious or to Have Indiscriminate Effects (and Protocols) (As Amended on 21 December 2001). 10 October 1980, 1342 UNTS 137.]Search in Google Scholar
[3. Corfu Channel Case (UK v Albania). (Merits) [1949] ICJ Rep 4.]Search in Google Scholar
[4. eDate Advertising GmbH v X and Olivier Martinez and Robert Martinez v MGN Limited. Joined Cases C-509/09 and C-161/10 [2011] OJ C370/9, Opinion of AG.]Search in Google Scholar
[5. Hague Convention (II) with Respect to the Laws and Customs of War on Land and Its Annex: Regulation Concerning the Laws and Customs of War on Land (Adopted 29 July 1899, entered into force 4 September 1900). (1899) 187 CTS 429.]Search in Google Scholar
[6. Military and Paramilitary Activities (Nicaragua v United States). (Merits) [1986] ICJ Rep 14.]Search in Google Scholar
[7. Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflict (Protocol I) (Entered into force 7 December 1978). 1125 UNTS 3.]Search in Google Scholar
[8. Tadic Case (Judgment). ICTY-94-1-A (15 July 1999).10.1108/eb018841]Search in Google Scholar
[9. The Legality of the Threat or Use of Nuclear Weapons (Advisory Opinion). 1996 ICJ Rep 226.]Search in Google Scholar
[10. UNGA Res 56/83 (28 January 2002). UN Doc A/RES/56/83.10.1006/jmva.2001.2038]Search in Google Scholar
[11. UNSC Res 1540 (28 April 2004). UN Doc S/RES/1540]Search in Google Scholar