No CrossRef data available.
Article contents
The Conduct of Hostilities in and via Cyberspace
Published online by Cambridge University Press: 28 February 2017
Abstract
- Type
- War and Law in Cyberspace
- Information
- Copyright
- Copyright © American Society of International Law 2010
References
1 U.S. Quadrennial Defence Review Report, at 37 (Feb. 2010), available at http://www.defense.gov/qdr/images/QDR_as_of_12FeblO_1000.pdf.
2 Int’l Comm. Red Cross, Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, at 427 (1987).
3 Legality of the Threat or use of Nuclear Weapons, Advisory Opinion, 1996 ICJ Rep. 226.
4 Shulman, Mark R., Discrimination in the Laws of Information Warfare, 37 Colum. J. Transnat’l L. 939, 963-64 (1999)Google Scholar.
5 Schmitt, Michael N., Wired Warfare: Computer Network Attacks and Jus in Bello, 84 Int’l Rev. Red Cross 365, 374 (2002)CrossRefGoogle Scholar.
6 Knut Dörmann, Applicability of the Additional Protocols to Computer Network Attacks at 4 (2004), available at http://www.icrc.org/eng/resources/documents/misc/681g92.htm; Michael Bothe, Karl Josef Partsch & Wal Demar A. Solf, New Rules for Victims of Armed Conflicts: Commentary on the Two 1977 Protocols Additional to the Geneva Conventions of 1949, at 289 (1982).