Difference between revisions of "Cybersecurity Annotated Bibliography"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 1: Line 1:
Barkham, Jason (2001) [[Information Warfare and International Law on the Use of Force]]  
+
Barkham, Jason ''(2001)'' [[Information Warfare and International Law on the Use of Force]]  
  
Beard, Jack M. (2009) [[Law and War in the Virtual Era]]  
+
Beard, Jack M. ''(2009)'' [[Law and War in the Virtual Era]]  
  
Brown, Davis  (2006) [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]  
+
Brown, Davis  ''(2006)'' [[A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict]]  
  
Department of Defense Office of General Counsel (1999) [[An Assessment of International Legal Issues in Information Operations]]  
+
Department of Defense Office of General Counsel ''(1999)'' [[An Assessment of International Legal Issues in Information Operations]]  
  
Dörmann, Knut  (2004) [[Applicability of the Additional Protocols to Computer Network Attacks]]  
+
Dörmann, Knut  ''(2004)'' [[Applicability of the Additional Protocols to Computer Network Attacks]]  
  
Dunlap, Charles J. Jr. (2009) [[Towards a Cyberspace Legal Regime in the Twenty-First Century]]  
+
Dunlap, Charles J. Jr. ''(2009)'' [[Towards a Cyberspace Legal Regime in the Twenty-First Century]]  
  
Hollis, Duncan B. (2007) [[Why States Need an International Law for Information Operations]]  
+
Hollis, Duncan B. ''(2007)'' [[Why States Need an International Law for Information Operations]]  
  
Schmitt, Michael N. (1999) [[Computer Network Attack and the Use of Force in International Law]]  
+
Schmitt, Michael N. ''(1999)'' [[Computer Network Attack and the Use of Force in International Law]]  
  
Schmitt, Michael N. (2002) [[Wired Warfare]]  
+
Schmitt, Michael N. ''(2002)'' [[Wired Warfare]]  
  
Schmit, Michael N., et. al (2004) [[Computers and War]]  
+
Schmit, Michael N., et. al ''(2004)'' [[Computers and War]]  
  
Sklerov, Matthew J. (2009) [[Solving the Dilemma of State Responses to Cyberattacks]]  
+
Sklerov, Matthew J. ''(2009)'' [[Solving the Dilemma of State Responses to Cyberattacks]]  
  
Todd, Graham H. (2009) [[Armed Attack in Cyberspace]]  
+
Todd, Graham H. ''(2009)'' [[Armed Attack in Cyberspace]]  
  
 
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]
 
Watts, Sean (2010) [[Combatant Status and Computer Network Attack]]

Revision as of 14:11, 27 May 2010