[
Amazon. (2023). Amazon’s cybersecurity assistance for Ukraine. Amazon. Available at: https://www.aboutamazon.com/news/community/amazons-cybersecurity-assistance-for-ukraine.
]Search in Google Scholar
[
Conti, G., & Raymond, D. (2011). Leadership of Cyber Warriors: Enduring Principles and New Directions. Small Wars Journal. Available at: https://smallwarsjournal.com/blog/journal/docs-temp/811-contiraymond.pdf.
]Search in Google Scholar
[
Davydiuk, A, & Zubok, V. (2023). Analytical Review of the Resilience of Ukraine’s Critical Energy Infrastructure to Cyber Threats in Times of War. 15th International Conference on Cyber Conflict: Meeting Reality, 121–140. DOI:10.23919/CyCon58705.2023.10181813.
]Search in Google Scholar
[
European Commission. (2020). The EU’s Cybersecurity Strategy for the Digital Decade. European Commission. Available at: https://digital-strategy.ec.europa.eu/en/library/eus-cybersecurity-strategy-digital-decade-0.
]Search in Google Scholar
[
European Commission. (2023). The EU Cyber Solidarity Act. European Commission. Available at: https://digital-strategy.ec.europa.eu/en/policies/cyber-solidarity.
]Search in Google Scholar
[
European Commission. (2023). The DIGITAL Europe Programme – Work Programmes. European Commission. Available at: https://digital-strategy.ec.europa.eu/en/activities/work-programmes-digital.
]Search in Google Scholar
[
European Commission. (2024). Shaping Europe’s digital future. European Commission. Available at: https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-policies.
]Search in Google Scholar
[
European Cybersecurity Competence Centre. (2024). The European Cybersecurity Competence Centre. ECCC. Available at: https://cybersecurity-centre.europa.eu/index_en.
]Search in Google Scholar
[
European Parliament and the Council. (2019). Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013. European Parliament and the Council. Available at: https://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX%3A32019R0881.
]Search in Google Scholar
[
European Parliament and the Council. (2022). Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148. European Parliament and the Council. Available at: https://eur-lex.europa.eu/eli/dir/2022/2555.
]Search in Google Scholar
[
European Union External Action. (2022). A Strategic Compass for Security and Defence. European Union External Action. Available at: https://www.eeas.europa.eu/eeas/strategic-compass-security-and-defence-0_en.
]Search in Google Scholar
[
European Union. (2023). Cybersecurity Skills Academy: a coordinated approach to boost the EU cyber workforce. European Union. Available at: https://digital-skills-jobs.europa.eu/en/cybersecurity-skills-academy.
]Search in Google Scholar
[
Fabian, S. (2019). The Russian hybrid warfare strategy – neither Russian nor strategy. Defense & Security Analysis, Vol. 35, Issue 3, 308–325. DOI: 10.1080/14751798.2019.1640424.
]Search in Google Scholar
[
Fleming, J. (2022). RUSI Annual Security Lecture 2022. GCHQ. Available at: https://www.gchq.gov.uk/speech/rusi-asl.
]Search in Google Scholar
[
Giles, K. (2023). Russian cyber and information warfare in practice. London: Chatham House. ISBN: 978 1 78413 589 8. DOI: 10.55317/9781784135898.
]Search in Google Scholar
[
Google. (2023, February 24). Updates on our support for Ukraine. Google. Available at: https://blog.google/outreach-initiatives/public-policy/updates-google-support-for-ukraine/.
]Search in Google Scholar
[
Joint Cyber Advisory. (2022, April 20). Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure. U.S. Department of Defense. Available at: https://media.defense.gov/2022/Apr/20/2002980529/-1/-1/1/JOINT_CSA_RUSSIAN_STATE-SPONSORED_AND_CRIMINAL_CYBER_THREATS_TO_CRITICAL_INFRASTRUCTURE_20220420.PDF.
]Search in Google Scholar
[
Joyce, R. (2023, April 23). State of the Hack 2023. RSA Conference 2023. Available at: https://www.rsaconference.com/library/presentation/usa/2023/state%20of%20the%20hack%202023%20%20nsas%20perspective.
]Search in Google Scholar
[
Kaushik, A. (2023). Ukraine’s cyber defence: Insights on private sector contributions since the Russian invasion. GlobSec. Available at: https://www.globsec.org/what-wedo/publications/ukraines-cyber-defence-insights-private-sector-contributions-russian.
]Search in Google Scholar
[
Schmitt, M.N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press. ISBN: ISBN 978-1-107-17722-2.
]Search in Google Scholar
[
Schmuki, Y. (2023). The Law of Neutrality and the Sharing of Cyber-Enabled Data During International Armed Conflict. In T. Jančárková, D. Giovannelli, K. Podiņš & I. Winther (Eds.), 15th International Conference on Cyber Conflict: Meeting Reality, 25–38. CCDCOE Publications. ISBN: 978-9916-9789-3-1
]Search in Google Scholar
[
Smith, B. (2022, June 22). Defending Ukraine: Early Lessons from the Cyber War. Microsoft. Available at: https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/.
]Search in Google Scholar
[
Sosento, S. (2022). The IT Army of Ukraine. Structure, Tasking, and Eco-System. Center for Security Studies (CSS), ETH Zürich. DOI: 10.3929/ethz-b-000552293.
]Search in Google Scholar