الف) فارسی
. 1. بیگزاده، ابراهیم؛ حقوق سازما نهای بینالمللی، چاپ دوم، انتشارات مجد، 1391
ب) لاتین
2. A/RES/65/41 of the General Assembly of the United Nations, 8 December 2010,
"Developments in the field of information and telecommunications in the
context of international security".
3. Agreement between the Governments of the Member States of the Shanghai Cooperation
Organization on Cooperation in the Field of International Information Security, (2008),
61ST Plenary Meeting.
4. Antolin-Jenkins, Vida, (2008), Defining the Parameters of Cyber war
Operations: Looking for Law in All the Wrong Places, 51 NAVAL L. REV.
132, 140.
5. Cartwright, Gen. James E., (2011), Memorandum for Chiefs of the Military
Services, Commanders of the Combatant Commands, Dirs. of the Joint Staff
Directories on Joint Terminology for Cyberspace Operations 5.
6. Chairman of the Joint Chiefs of Staff, Joint Doctrine for Information operations,
Available at: www. dtic. mil/ doctrine/ new-pubs/jp3-13.pdf.
7. Clarke, Richard A. & Knake, Robert K, (2010), Cyber War: The Next Threat TO
National Security and What to Do about It, 6.
8. Commentary on the HPCR, (2009), p 1. Available at:
http://ihlresearch.org/amw/Commentary%20on%20the%20HPCR%20Manual.pd
f.
9. Cooperative Cyber Defense Centre of Excellence (CCDCOE), (2008), Cyber
Attacks against Georgia: Legal Lessons Identified, PP.7-8. Available at: <
www. carlisle. army. mil /DIME/ documents/ Georgia %201%200. pdf.>
10. Duncan B. Hollis, (2007), Why States Need an International Law for
Information Operations, 11 LEWIS & CLARK L. REV. 1023, 1042.
11. Gellman, Barton, (2002),Cyber Attacks by Al Qaeda Feared; Terrorists at
Threshold of Using Internet as Tool of Bloodshed: Experts Say, WASH.
POST, June 27, at A01.
12. Gentile, Sal, (2011), Gadhafi Regime “Turns Off the Tap” on Libya’s Internet, Live
Blog: Libya Revolts, PBS, Available at: http://www.pbs.org/wnet/need-to-know/the-dailyneed/
libya-revolts-a-live-blog/7679/.
فصلنامه تحقیقات حقوقی شماره 71 بررسی تطبیقی و تحلیل تعریف حمله سایبری از منظر ...
277
13. Gjelten, Tom, (2010), Extending the Law of War to Cyberspace, NAT’L PUB.
RADIO. Available at:
http://www.npr.org/templates/story/story.php?storyId=130023318 (last visited
Apr. 18, 2012).
14. Gjelten, Tom, Seeing the Internet as an ‘Information Weapon,’ NAT’L PUB. RADIO.
Available at: http://www.npr.org/templates/story/story.php?storyId=130052701.
15. Hughes, Rex B., (2011), NATO and Cyber Defense: Mission Accomplished?,
ATLANTISCH PERSPECTIEF. Available at:
http://www.atlcom.nl/site/english/nieuws/wp-content/Hughes.pdf.
16. Jeffrey Carr, (2011), Inside Cyber Warfare, 2nd Edition, O’Reilly Media, Inc,
Sebastopol, CA, 2011.
17. Kuehl, D.T, (2001), Information Operations, Information Warfare, and
Computer Network Attack-Their Relationship to National Security in the
Information Age, in: Schmitt/O'Donnell (eds), Computer Network Attack and
International Law, 2001, pp 44-45.
18. Libicki, Martin, (1996), What is Information Warfare?,Center for Advanced
Concepts and Technology Institute for National Strategic Studies, Third Edition, p
77.
19. Resolution 20 November 2000, A/RES/55/29 of the General Assembly of the
United Nations, "Role of science and technology in the context of international
security and disarmament".
20. Resolution 21 December 2009, A/RES/64/211 of the General Assembly of the
United Nations, "Creation of a global culture of cyber security and taking
stock of national efforts to protect critical information infrastructures".
21. Richtel, Matt, (2011), Egypt Halts Most Internet and Cell Service, and Scale of
Shutdown Surprises Experts, N.Y. TIME, at A13.
22. Russia’s Draft Convention on International Information Security – A Commentary, (2012),
Published by Conflict Studies Research Centre and Institute of Information Security Issues
Moscow State University.
23. Schmitt, M.N, (1998-1999), Computer Network Attack and the Use of Force
in International Law: Thoughts on a Normative Framework, Colum. J.
Transnat'l L.37 PP 890-891.
24. Silver, D.B, (2001), Computer Network Attack as a use of Force Under
Article 2(4) of the United Nations Charter, in: Schmitt/O'Donnell (eds),
Computer Network Attack and International Law, P 76.
25. Tadić, (1995), Decision on the Defense Motion for Interlocutory Appeal, 2
October, Paras. 120 & 124 (regarding chemical weapons).
فصلنامه تحقیقات حقوقی شماره 71 بررسی تطبیقی و تحلیل تعریف حمله سایبری از منظر ...
278
26. TALLINN MANUAL ON THE INTERNATIONAL LAW APPLICABLE
TO CYBER WARFARE, (2013), Prepared by the International Group of
Experts at the Invitation of The NATO Cooperative Cyber Defence Centre of
Excellence, Cambridge University Press.
27. United States Department of Defense (DoD), (2006)The National Military
Strategy for Cyberspace Operations. Available at:
<www.dod.gov/pubs/foi/ojcs/07-F- 2105doc1.pdf. last accessed 17 July 2009.
28. Watts, S., (2010), Combatant Status and Computer Network Attack, Va.J.Int'l
L.50 P 400.