References
- BANKS, William. Cyber Attribution and State Responsibility. International Law Studies, 2021, vol. 97, pp. 1039–1072.
- BANNELIER, Karine. and CHRISTAKIS, Theodore. Cyber-Attacks: Preventions-Reactions: The Role of States and Private Actors. 1st ed. Paris: Les Cahiers de la Revue Défense Nationale, 2017, 88 p.
- CRAWFORD, James. The International Law Commission’s Articles on State Responsibility: Introduction, Text and Commentaries. Cambridge: Cambridge University Press, 2002, 428 p.
- DEDERER, Hans-Georg and SINGER, Tassilo. Adverse Cyber Operations: Causality, Attribution, Evidence, and Due Diligence. International Law Studies, 2019, vol. 95, pp. 430–466.
- DINSTEIN, Yoram. Computer Network Attacks and Self-Defence. In: SCHMITT, Michael, N. and O’DONNELL, Brian, T. (eds.). Computer Network Attack & International Law. Newport: Naval War College, 2002, pp. 99–119.
- FAIX, Martin and BRUNER, Tomáš. Problém přičitatelnosti jako nástroj lawfare. Defence & Strategy, 2018, vol. 18, no. 2, pp. 79–94.
- GOEL, Sanjay and NUSSBAUM, Brian. Attribution Across Cyber Attack Types: Network Intrusions and Information Operations. Journal of the Communications Society, 2021, vol. 2, no. 1, pp. 1082–1093.
- HANDLER, Stephenie, Gosnell. The New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare. Stanford Journal of International Law, 2012, vol. 48, no. 1, pp. 209–237.
- MUELLER Milton et al. Cyber Attribution: Can a New Institution Achieve Transnational Credibility?. The Cyber Defense Review, 2019, vol. 4, no. 1, pp. 107–122.
- NGUYEN, Reese. Navigating Jus Ad Bellum in the Age of Cyber Warfare, California Law Review, 2013, vol. 101, no. 4, pp. 1079–1129.
- OSULA, Anna-Maria, KASPER, Agnes and KAJANDER, Aleksi. EU Common Position on International Law and Cyberspace. Masaryk University Journal of Law and Technology, 2022, vol. 16, no. 1, pp. 89–123.
- PAYNE, Christian and FINLAY, Lorraine. Addressing Obstacles to Cyber-Attribution: A Model Based on State Response to Cyber-Attack. George Washington International Law Review, 2017, vol. 49, no. 3, pp. 202–206.
- PRECIADO, Michael. If You Wish Cyber Peace, Prepare for Cyber War: The Need for the Federal Government to Protect Critical Infrastructure from Cyber Warfare. Journal of Law & Cyber Warfare, 2012, vol. 1, no. 1, pp. 99–154.
- RID, Thomas and BUCHANAN, Ben. Attributing Cyber Attacks. The Journal of Strategic Studies, 2015, vol. 38, no. 1–2, pp. 4–37.
- ROSCINI, Marco. Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations. Texas International Law Journal, 2015, vol. 50, pp. 233–275.
- SAALBACH, Klaus-Peter. Attribution of Cyber Attacks. In: REUTER, C. (ed.). Information Technology for Peace and Security. Springer Vieweg Wiesbaden, 2019.
- SHANY, Yuval and SCHMITT, Michael, N. An International Attribution Mechanism for Hostile Cyber Operations?. Hebrew University of Jerusalem Legal Studies Research Paper Series No. 20–16, 2020.
- SCHMITT Michael, N. “Below the Threshold” Cyber Operations: The Countermeasures Response Option and International Law. Virginia Journal of International Law, 2015, vol. 54, no. 1, pp. 697–732.
- SCHMITT, Michael, N. et al. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. 2nd ed. Cambridge: Cambridge University Press, 2017, 638 p.
- SCHMITT, Michael, N. Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: an Analytical Vade Mecum. Harvard National Security Journal, 2017, vol. 8, no. 2, pp. 239–280.
- SCHMITT, Michael, N. Terminological Precision and International Cyber Law. [online]. Available at: <https://lieber.westpoint.edu/terminological-precision-international-cyber-law/> Accessed: 24. 3. 2024.
- SCHÖNDORF, Roy. Israel’s Perspective on Key Legal and Practical Issues Concerning the Application of International Law to Cyber Operations. International Law Studies, 2021, vol. 97, no. 1, pp. 395–406.
- SILVER, Daniel, B. Computer Network Attack as a Use of Force Under Article 2(4) of the United Nations Charter. In: SCHMITT, Michael, N. and O’DONNELL, Brian, T. (eds.). Computer Network Attack & International Law. Newport: Naval War College, 2002, pp. 73–97.
- SINGER, Peter, W. and FRIEDMAN, Allan. Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press, 2014, 320 p.
- SKOPIK, Florian and PAHI, Timea. Under false flag: using technical artifacts for cyber attack attribution. Cybersecurity, 2020, vol. 3, pp. 1–20.
- SPÁČIL, Jakub. Countermeasures against Cyber Operations: Moving forward?. International and Comparative Law Review, 2023, vol. 23, no. 2, pp. 86–110.
- SPÁČIL, Jakub. Plea of Necessity: Legal Key to Protection against Unattributable Cyber Operations. Masaryk University Journal of Law and Technology, 2022, vol. 16, no. 2, pp. 215–239.
- SVAČEK, Ondřej. Srebrenica: Nicaragua nebo Tadic? K subjektivnímu prvku mezinárodně protiprávního jednání. In. Olomouc: Vydavatelství Univerzity Palackého, 2007.
- TSAGOURIAS, Nicholas and FARRELL, Michael. Cyber Attribution: Technical and Legal Approaches and Challenges. European Journal of International Law, 2020, vol. 31, no. 3, pp. 941–967.
- VALUCH, Jozef and HAMUĽÁK, Ondrej. Use of Force in Cyberspace. International and Comparative Law Review, 2020, vol. 20, no. 2, pp. 174–191.
- van der MEER, S. State-level responses to massive cyber-attacks: a policy toolbox. Clingendael: Netherlands Institute of International Relations, 2018, 8 p.