.

Document Type : Research Paper

Author

Kharazmi University

Abstract

.

روسو، ش. 1369. حقوق مخاصمات مسلحانه. ترجمه سیدعلی هنجنی، جلد اول، تهران: دفتر خدمات حقوقی بین‌المللی.
شاو، م.1374. حقوق بین‌الملل. ترجمه محمدحسین وقار، تهران: انتشارات اطلاعات، 1374.
شفیعی، م. 1375. «بررسی مشروعیت دخالت‌های نظامی بشر دوستانه از دیدگاه حقوق بین‌الملل»، مجله حقوقی، شماره 20، 1375.
ضیائی بیگدلی، م. 1373. حقوق جنگ، تهران: انتشارات دانشگاه علامه طباطبایی.
فلسفی، ه. 1379. حقوق بین‌الملل معاهدات، تهران: فرهنگ نشر نو.
گریفیتس، م. 1388. دانشنامه روابط بین‌الملل و سیاست جهان، ترجمه علیرضا طیب، تهران نشر نی.
مستقیمی، ب. و طارم‌سری، ب. 1377. مسئولیت بین‌المللی دولت، زیرنظر دکتر جمشید ممتاز، مرکز مطالعات بین‌المللی دانشکده حقوق دانشگاه تهران.
مصفا، ن. و دیگران .1365. مفهوم تجاوز در حقوق بین‌الملل، تهران: دانشگاه تهران، 1365.
Brownlie, I. 1963. International Law and the Use of Force by States. Oxford: Oxford University Press.
Bunker,  R. 2014. “Is Virtual Reality Changing the Nature of War?” forISN MONDAY, available at:  worldview.stratfor.com/the-hub/virtual-reality-changing-nature-war#axzz38BcIZKVM (23 June, 2014).
Charter of the United Nations available at: www.un.org/en/charter-united-nations/
Chien, E. 2010. “Stuxnet: A Breakthrough”, available at: https://www.symantec.com/ connect/blogs/stuxnet-breakthrough, (12 Nov 2010)
CLARKE, R. A. 2010. CYBER WAR Reprinted in CNA AND INTERNATIONAL LAW.
Coll, A. R. 1995. “Unconventional Warfare, Liberal Democracies, and International Order”, in LEGAL AND MORAL CONSTRAINTS ON LOW-INTENSITY CONFLICT, in Coll, A. R. Ord, J. S. & Rose S. A. eds. 1995. US Naval War College International Law Studies.Vol. 67.
Dinstein, Y. 1988. War, Aggression and Self-Defence, Grotious Pablications Limted.
Documents of the United Nations Conference on International Organization. 1945. Sun Francisco, Vol. 6.
Goldsmith, J. 2010. “The New Vulnerability, NEW REPUBLIC”, (24 June 2010)
Higgins, R. 1963. The Development of International Low through the Political Organs of the United Nations, Oxford: Oxford University Press.
ILC Reports. 1966.
Kailobad, K. H. 1992. “Self-Defence, Enforcement Action and the Gullf Wars 1980-1988 and 1990-91”, British Yearbook of International Law.
Kaplan M. and Katzenhach, N. 1966. “Resort to force: War and Neutrality” in Falk, R. and Mendlovitz , S., eds., International Law, New York: World Law Fund.
Mrazek, J. 1989.  “Prohibitions of the Use and Threat of Force: Self-Defence and Self-Help in International Law” in Canadian Yearbook of International Law, 1989.
Nakashima, E. 2010. Defense Official Discloses Cyber attack, WASHINGTON POST, (24Aug., 2010)
Nanda, V. 1987. “United Stated Interventions in Nicaragua”, University of Hawaii Law Review, Vol.9.
Owens, W. A.; Dam, K. W. &. Lin, H. S. eds.   2009. TECHNOLOGY, POLICY, LAW, AND ETHICS REGARDING U.S. ACQUISITION AND USE OFCYBERATTACKCAPABILITIES.
Randeizhofer, A. 2002. “Use of Force” in Encyclopedia of Public Internationals Law, Vol. 4.
Riesman, W. M. 1984.“Coercion and Self-Determination: Construing Charter Article 2(4)”, American Journal of International Law.
Rostow, E. V. 1991. “Until What? Collective Self-Defence or Enforcement Measures?” American Journal of International Law., Vol. 85, No. 3.
Schechter, O. 1982. “General Course in Public International Law”, Recueil des Course, 1982, Vol. 178.
Schechter, O. 1984. “The Legality of Pro-Democratic Invasion”, American Journal of International Law, 78.
Schmitt, Michael N. 1999 Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, COLUMBIA JOURNAL OF TRANSNATIONAL LAW.37.
Secretary of State of the U.S 1945. Report to the President on the Results of the Sun Francisco Conference. Washington, DC: (26 June, 1945).
Stone, J. 1977. Conflict through Consensus: United Nations, Approaches to Aggression. N. M. Tripathi Pvt. Ltd.
Turner, R. F. 2016. State Sovereignty, International Law, and the Use of Force in Countering Low-Intensity Aggression in the Modern World.
UN Yearbook. 1969.
Wallace, R. 1986. International Law, London: Sweet and Maxwell.
“War in the fifth domain, Are the mouse and keyboard the new weapons of conflict?”, 2010. Economist. (1 July 2010)
Winkler, I. 2005 “Guard against Titan Rain hackers”, available at: computerworld.com. (20 Oct. 2005)
Zetter, K. 2010. “NSA Director: Countries Spewing Cyber Attacks Should Be Held Responsible”, WIRED.COM (July 29, 2010), available at: http://www.wired.com/threatlevel/2010/07/ hayden-at-blackhat/