References
- Aradau, C. (2010). Security That Matters: Critical Infrastructure and Objects of Protection. Security Dialogue, 41(5), 491–514. https://www.jstor.org/stable/26301166
- Baezner, M. & Robin, P. (2017). Stuxnet, Zurich: ETH.
- Buchan, R., & Tsagourias, N. (2012). Cyber War and International Law. Journal of Conflict and Security Law, 17(2), 183–186. https://doi.org/10.1093/jcsl/krs016
- Case, D. U. (2016). Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), 388, 1-29.
- Charney, J. I. (2001). The use of force against terrorism and international law. American Journal of International Law, 95(4), 835-839.
- Crawford, E. (2013). Virtual Backgrounds: Direct Participation in Cyber Warfare. ISJLP, 9(1), 1-19.
- Denning, D. E., Blanken, L., Rothstein, H. & Lepore, J. (2015). Assessing cyber war. Assessing War, 266-284.
- Falliere, N., Murchu, L. O. & Chien, E. (2011). W32. stuxnet dossier. White paper, symantec corp., security response, 5(6), 1-69. https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf
- Gisel, L., Rodenhäuser, T. & Dörmann, K., 2020. Twenty years on: International humanitarian law and the protection of civilians against the effects of cyber operations during armed conflicts. International Review of the Red Cross, 102(913), 287-334.
- Hathaway, O. A. et al. (2012). The law of cyber-attack. California law review, 100(817), 817-885.
- Mandiant, A.P.T. (2016). Exposing One of China's Cyber Espionage Units, Alexandria: VA: Mandiant 2013.
- Nations, U. (n.d). Charter of the United Nations, 1945, 1 UNTS XVI. https://www.un.org/en/about-us/un-charter
- Pascucci, P. (2017). Distinction and Proportionality in Cyberwar: Virtual Problems with a Real Solution. Minnesota Journal of International Law, 26, 419- 460. https://scholarship.law.umn.edu/mjil/257
- Rid, T., & Buchanan, B. (2014). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1–2), 4– 37. https://doi.org/10.1080/01402390.2014.977382
- Rowe, N. C. (2007). War Crimes from Cyber- weapons. Journal of Information Warfare, 6(3), 15-25. https://www.jstor.org/stable/26503486
- Schmitt, M. N. (2012). “ Attack†as a term of art in international law: The cyber operations context. Tallinn, NATO CCD COE Publications.
- Schmitt, M. N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. 1st ed. Cambridge: Cambridge University Press.
- Schmitt, M. N. (2017). Tallinn manual 2.0 on the international law applicable to cyber operations. 2017 ed. Cambridge: Cambridge University Press.
- Seemma, P. S., Nandhini, S. & Sowmiya, M. (2018). Overview of cyber security. International Journal of Advanced Research in Computer and Communication Engineering, 7(11), 125-128.
- Aradau, C. (2010). Security That Matters: Critical Infrastructure and Objects of Protection. Security Dialogue, 41(5), 491–514. https://www.jstor.org/stable/26301166
- Baezner, M. & Robin, P. (2017). Stuxnet, Zurich: ETH.
- Buchan, R., & Tsagourias, N. (2012). Cyber War and International Law. Journal of Conflict and Security Law, 17(2), 183–186. https://doi.org/10.1093/jcsl/krs016
- Case, D. U. (2016). Analysis of the cyber attack on the Ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC), 388, 1-29.
- Charney, J. I. (2001). The use of force against terrorism and international law. American Journal of International Law, 95(4), 835-839.
- Crawford, E. (2013). Virtual Backgrounds: Direct Participation in Cyber Warfare. ISJLP, 9(1), 1-19.
- Denning, D. E., Blanken, L., Rothstein, H. & Lepore, J. (2015). Assessing cyber war. Assessing War, 266-284.
- Falliere, N., Murchu, L. O. & Chien, E. (2011). W32. stuxnet dossier. White paper, symantec corp., security response, 5(6), 1-69. https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf
- Gisel, L., Rodenhäuser, T. & Dörmann, K., 2020. Twenty years on: International humanitarian law and the protection of civilians against the effects of cyber operations during armed conflicts. International Review of the Red Cross, 102(913), 287-334.
- Hathaway, O. A. et al. (2012). The law of cyber-attack. California law review, 100(817), 817-885.
- Mandiant, A.P.T. (2016). Exposing One of China's Cyber Espionage Units, Alexandria: VA: Mandiant 2013.
- Nations, U. (n.d). Charter of the United Nations, 1945, 1 UNTS XVI. https://www.un.org/en/about-us/un-charter
- Pascucci, P. (2017). Distinction and Proportionality in Cyberwar: Virtual Problems with a Real Solution. Minnesota Journal of International Law, 26, 419- 460. https://scholarship.law.umn.edu/mjil/257
- Rid, T., & Buchanan, B. (2014). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1–2), 4– 37. https://doi.org/10.1080/01402390.2014.977382
- Rowe, N. C. (2007). War Crimes from Cyber- weapons. Journal of Information Warfare, 6(3), 15-25. https://www.jstor.org/stable/26503486
- Schmitt, M. N. (2012). “ Attack†as a term of art in international law: The cyber operations context. Tallinn, NATO CCD COE Publications.
- Schmitt, M. N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. 1st ed. Cambridge: Cambridge University Press.
- Schmitt, M. N. (2017). Tallinn manual 2.0 on the international law applicable to cyber operations. 2017 ed. Cambridge: Cambridge University Press.
- Seemma, P. S., Nandhini, S. & Sowmiya, M. (2018). Overview of cyber security. International Journal of Advanced Research in Computer and Communication Engineering, 7(11), 125-128.
Cite this article
-
APA : Usman, H., Ahmed, R. I., & Ali, S. S. (2022). Navigating the Gray Area: A Comprehensive Analysis of Cyber Warfare and its Relationship to the Law of Armed Conflict. Global Legal Studies Review, VII(III), 32-36. https://doi.org/10.31703/glsr.2022(VII-III).05
-
CHICAGO : Usman, Hazrat, Raja Ishtiaq Ahmed, and Syed Suliman Ali. 2022. "Navigating the Gray Area: A Comprehensive Analysis of Cyber Warfare and its Relationship to the Law of Armed Conflict." Global Legal Studies Review, VII (III): 32-36 doi: 10.31703/glsr.2022(VII-III).05
-
HARVARD : USMAN, H., AHMED, R. I. & ALI, S. S. 2022. Navigating the Gray Area: A Comprehensive Analysis of Cyber Warfare and its Relationship to the Law of Armed Conflict. Global Legal Studies Review, VII, 32-36.
-
MHRA : Usman, Hazrat, Raja Ishtiaq Ahmed, and Syed Suliman Ali. 2022. "Navigating the Gray Area: A Comprehensive Analysis of Cyber Warfare and its Relationship to the Law of Armed Conflict." Global Legal Studies Review, VII: 32-36
-
MLA : Usman, Hazrat, Raja Ishtiaq Ahmed, and Syed Suliman Ali. "Navigating the Gray Area: A Comprehensive Analysis of Cyber Warfare and its Relationship to the Law of Armed Conflict." Global Legal Studies Review, VII.III (2022): 32-36 Print.
-
OXFORD : Usman, Hazrat, Ahmed, Raja Ishtiaq, and Ali, Syed Suliman (2022), "Navigating the Gray Area: A Comprehensive Analysis of Cyber Warfare and its Relationship to the Law of Armed Conflict", Global Legal Studies Review, VII (III), 32-36
-
TURABIAN : Usman, Hazrat, Raja Ishtiaq Ahmed, and Syed Suliman Ali. "Navigating the Gray Area: A Comprehensive Analysis of Cyber Warfare and its Relationship to the Law of Armed Conflict." Global Legal Studies Review VII, no. III (2022): 32-36. https://doi.org/10.31703/glsr.2022(VII-III).05