[Babinski A. (2015): State Activities in the Securing of Cyberspace. Internal Security 7 (2): 217-236.10.5604/20805268.1212124]Search in Google Scholar
[Bossong, R - Wagner. B. (2017): A typology of cybersecurity and public‑private partnerships in the context of the EU. Crime, Law and Social Change 67 (3): 265-288.10.1007/s10611-016-9653-3]Search in Google Scholar
[Cyber attack temporarily shuts Hungarian government website, „The Independent”, 2 April 2018, available at https://www.independent.ie/world‑news/europe/cyber‑attack‑temporarily‑shuts‑hungarian‑government‑website-34593756.html (20 April 2018).]Search in Google Scholar
[Czyz, A (2007): What is the Future of the Visegrad Group as an Example of Regional Cooperation. Studia Universitatis Babes‑Bolyai. Studia Europaea 52 (2): 131-144.]Search in Google Scholar
[e Silva, K. K. (2018): Vigilantism and cooperative criminal justice: is there a place for cybersecurity vigilantes in cybercrime fighting? International Review of Law, Computers & Technology 32 (1): 21-36.10.1080/13600869.2018.1418142]Search in Google Scholar
[Gerasymchuk, S. (2014): Visegrad group’s solidarity in 2004-2014 tested by Ukrainian crisis. International Issues & Slovak Foreign Policy Affairs 23 (1-2): 42-54.]Search in Google Scholar
[Gorka M. (2016): Freedom or Security? Contribution to the Discussion on the Example of the Law on Anti‑terrorist Operations of 10 June 2016. e‑Politikon 9, 49-79.]Search in Google Scholar
[Gryz, J. (ed.) (2013). Strategia Bezpieczeństwa Narodowego Polski. Varšava: Wydawnictwo Naukowe PWN.]Search in Google Scholar
[Haataja, S. (2017): The 2007 cyber attacks against Estonia and international law on the use of force: an informational approach. Law, Innovation and Technology 9 (2): 159-189.10.1080/17579961.2017.1377914]Search in Google Scholar
[Jones, S. (2014): Russian government behind cyber attacks, says security group. The Financial Times, 28. 10. 2014.10.1016/S1353-4858(14)70114-X]Search in Google Scholar
[Kostyuk N. (2014): International and Domestic Challenges to Comprehensive National Cybersecurity: A Case Study of the Czech Republic. Journal of Strategic Security 7 (1): 68-82.10.5038/1944-0472.7.1.6]Search in Google Scholar
[Kužel, M. (2017): The Investment Development Path: Evidence from Poland and Other Countries of the Visegrad Group. Journal of East‑West Business 23 (1): 1-40.10.1080/10669868.2016.1180659]Search in Google Scholar
[Marušiak, J. (2015): Russia and the Visegrad Group - more than a foreign policy issue. International Issues & Slovak Foreign Policy Affairs 24 (1-2): 28-46.]Search in Google Scholar
[Novaky, N. I. M. (2015): Why so Soft? The European Union in Ukraine. Contemporary Security Policy 36 (2): 244-266.10.1080/13523260.2015.1061767]Search in Google Scholar
[Roštekova, M. - Rouet, G. (2014): The Visegrad Group - a model to follow? Politeja 28 (11): 181-193.10.12797/Politeja.11.2014.28.08]Search in Google Scholar
[Sarvas S. (1999): Professional soldiers and politics: A case of Central and Eastern Europe. Armed Forces and Society 26 (1): 99-118.10.1177/0095327X9902600106]Search in Google Scholar
[Sussex M. (2017): The triumph of Russian national security policy? Russia’s rapid rebound. Australian Journal of International Affairs 71 (5): 499-515.10.1080/10357718.2017.1342761]Search in Google Scholar
[Tait, R. (2017): Czech cyber‑attack: Russia suspected of hacking diplomats’ emails. The Guardian, 31. 1. 2017.]Search in Google Scholar
[Torő, C. - Butler, E. - Gruber, K. (2014): Visegrad: The Evolving Pattern of Coordination and Partnership After EU Enlargement. Europe‑Asia Studies 66 (3): 364-393.10.1080/09668136.2013.855392]Search in Google Scholar