Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Glazier, David W.
2008.
If I Could Turn Back Time: Re-Lawyering the 'War on Terror'.
SSRN Electronic Journal,
Droege, Cordula
2012.
Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians.
International Review of the Red Cross,
Vol. 94,
Issue. 886,
p.
533.
Jansen van Vuuren, Joey
Leenen, Louise
Phahlamohlaka, Jackie
and
Zaaiman, Jannie
2012.
An Approach to Governance of CyberSecurity in South Africa.
International Journal of Cyber Warfare and Terrorism,
Vol. 2,
Issue. 4,
p.
13.
Dipert, Randall R.
2013.
OTHER-THAN-INTERNET (OTI) CYBERWARFARE: CHALLENGES FOR ETHICS, LAW, AND POLICY.
Journal of Military Ethics,
Vol. 12,
Issue. 1,
p.
34.
Radziwill, Yaroslav
2013.
What Lawyers Want.
International Journal of Cyber Warfare and Terrorism,
Vol. 3,
Issue. 4,
p.
52.
Kiravuo, Timo
Sarela, Mikko
and
Manner, Jukka
2013.
Weapons against Cyber-Physical Targets.
p.
321.
Herr, Trey
2013.
PrEP: A Framework for Malware and Cyber Weapons.
SSRN Electronic Journal,
Ducheine, Paul
and
van Haaster, Jelle
2014.
Fighting power, targeting and cyber operations.
p.
303.
Chengeta, Thompson
2014.
Are Autonomous Weapon Systems the Subject of Article 36 of Additional Protocol I to the Geneva Conventions?.
SSRN Electronic Journal ,
von Heinegg, Wolff Heintschel
2014.
Yearbook of International Humanitarian Law Volume 15, 2012.
p.
3.
Mehmetcik, Hakan
2014.
Cyberspace and International Relations.
p.
125.
Zeadally, Sherali
and
Flowers, Angelyn
2014.
Cyberwar: The What, When, Why, and How [Commentary].
IEEE Technology and Society Magazine,
Vol. 33,
Issue. 3,
p.
14.
Watney, Murdoch
2014.
Digital Forensics and Cyber Crime.
Vol. 132,
Issue. ,
p.
130.
2014.
Judges, Law and War.
p.
82.
DVORŠAK, ADRIJANA
2014.
THE NORMATIVE ROLE OF THE ALLIANCE
IN NON-CONVENTIONAL SECURITY THREATS – CYBER DEFENCE OF MEMBER STATES.
CONTEMPORARY MILITARY CHALLENGES,
p.
97.
Jansen van Vuuren, Joey
Leenen, Louise
Phahlamohlaka, Jackie
and
Zaaiman, Jannie
2014.
Cyber Behavior.
p.
1583.
Krotofil, Marina
2014.
Cyber Can Kill and Destroy Too.
International Journal of Cyber Warfare and Terrorism,
Vol. 4,
Issue. 3,
p.
27.
Schmitt, Michael N.
2014.
Rewired warfare: rethinking the law of cyber attack.
International Review of the Red Cross,
Vol. 96,
Issue. 893,
p.
189.
Watney, Murdoch
2014.
ISSE 2014 Securing Electronic Business Processes.
p.
134.
2014.
International Law.
p.
712.