6209884
7E3WF4LA
1
chicago-author-date
50
creator
asc
719
https://legalreviewportal.org/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3Afalse%2C%22meta%22%3A%7B%22request_last%22%3A0%2C%22request_next%22%3A0%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%22ELG9F6K6%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Biller%20and%20Schmitt%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBiller%2C%20Jeffrey%2C%20and%20Michael%20Schmitt.%202019.%20%26%23x201C%3BClassification%20of%20Cyber%20Capabilities%20and%20Operations%20as%20Weapons%2C%20Means%2C%20or%20Methods%20of%20Warfare.%26%23x201D%3B%20%26lt%3Bi%26gt%3BInternational%20Law%20Studies%26lt%3B%5C%2Fi%26gt%3B%2095%3A%20179%26%23x2013%3B225.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdigital-commons.usnwc.edu%5C%2Fils%5C%2Fvol95%5C%2Fiss1%5C%2F6%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdigital-commons.usnwc.edu%5C%2Fils%5C%2Fvol95%5C%2Fiss1%5C%2F6%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Classification%20of%20Cyber%20Capabilities%20and%20Operations%20as%20Weapons%2C%20Means%2C%20or%20Methods%20of%20Warfare%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jeffrey%22%2C%22lastName%22%3A%22Biller%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22Schmitt%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222019%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%222375-2831%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdigital-commons.usnwc.edu%5C%2Fils%5C%2Fvol95%5C%2Fiss1%5C%2F6%22%2C%22collections%22%3A%5B%227E3WF4LA%22%2C%22PHLANGU9%22%5D%2C%22dateModified%22%3A%222025-09-30T23%3A49%3A29Z%22%7D%7D%2C%7B%22key%22%3A%226EBV36CL%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Blount%22%2C%22parsedDate%22%3A%222012%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBlount%2C%20P.%20J.%202012.%20%26%23x201C%3BThe%20Preoperational%20Legal%20Review%20of%20Cyber%20Capabilities%3A%20Ensuring%20the%20Legality%20of%20Cyber%20Weapons.%26%23x201D%3B%20%26lt%3Bi%26gt%3BNorthern%20Kentucky%20Law%20Review%26lt%3B%5C%2Fi%26gt%3B%2039%3A%20211%26%23x2013%3B20.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttp%3A%5C%2F%5C%2Fchaselaw.nku.edu%5C%2Fcontent%5C%2Fdam%5C%2Fchaselaw%5C%2Fdocs%5C%2Facademics%5C%2Flawreview%5C%2Fv39%5C%2Fnklr_v39n2.pdf%26%23039%3B%26gt%3Bhttp%3A%5C%2F%5C%2Fchaselaw.nku.edu%5C%2Fcontent%5C%2Fdam%5C%2Fchaselaw%5C%2Fdocs%5C%2Facademics%5C%2Flawreview%5C%2Fv39%5C%2Fnklr_v39n2.pdf%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20Preoperational%20Legal%20Review%20of%20Cyber%20Capabilities%3A%20Ensuring%20the%20Legality%20of%20Cyber%20Weapons%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22P.%20J.%22%2C%22lastName%22%3A%22Blount%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222012%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fchaselaw.nku.edu%5C%2Fcontent%5C%2Fdam%5C%2Fchaselaw%5C%2Fdocs%5C%2Facademics%5C%2Flawreview%5C%2Fv39%5C%2Fnklr_v39n2.pdf%22%2C%22collections%22%3A%5B%227E3WF4LA%22%5D%2C%22dateModified%22%3A%222025-10-02T06%3A05%3A13Z%22%7D%7D%2C%7B%22key%22%3A%229RBADTLP%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Boothby%22%2C%22parsedDate%22%3A%222013%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBoothby%2C%20William%20H.%202013.%20%26%23x201C%3BMethods%20and%20Means%20of%20Cyber%20Warfare.%26%23x201D%3B%20%26lt%3Bi%26gt%3BInternational%20Law%20Studies%26lt%3B%5C%2Fi%26gt%3B%2089%3A%20387%26%23x2013%3B405.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdigital-commons.usnwc.edu%5C%2Fils%5C%2Fvol89%5C%2Fiss1%5C%2F8%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdigital-commons.usnwc.edu%5C%2Fils%5C%2Fvol89%5C%2Fiss1%5C%2F8%5C%2F%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Methods%20and%20Means%20of%20Cyber%20Warfare%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22William%20H.%22%2C%22lastName%22%3A%22Boothby%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222013%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdigital-commons.usnwc.edu%5C%2Fils%5C%2Fvol89%5C%2Fiss1%5C%2F8%5C%2F%22%2C%22collections%22%3A%5B%227E3WF4LA%22%2C%22PHLANGU9%22%2C%223HUVHPXM%22%5D%2C%22dateModified%22%3A%222025-09-28T03%3A57%3A38Z%22%7D%7D%2C%7B%22key%22%3A%22HT4E57TG%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Brown%20and%20Metcalf%22%2C%22parsedDate%22%3A%222014%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBrown%2C%20Gary%20D.%2C%20and%20Andrew%20O.%20Metcalf.%202014.%20%26%23x201C%3BEasier%20Said%20Than%20Done%3A%20Legal%20Reviews%20of%20Cyber%20Weapons.%26%23x201D%3B%20%26lt%3Bi%26gt%3BJournal%20of%20National%20Security%20Law%20%26amp%3B%20Policy%26lt%3B%5C%2Fi%26gt%3B%207%3A%20115%26%23x2013%3B38.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttp%3A%5C%2F%5C%2Fjnslp.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2FEasier-Said-than-Done.pdf%26%23039%3B%26gt%3Bhttp%3A%5C%2F%5C%2Fjnslp.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2FEasier-Said-than-Done.pdf%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Easier%20Said%20Than%20Done%3A%20Legal%20Reviews%20of%20Cyber%20Weapons%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gary%20D.%22%2C%22lastName%22%3A%22Brown%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Andrew%20O.%22%2C%22lastName%22%3A%22Metcalf%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222014%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjnslp.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2014%5C%2F02%5C%2FEasier-Said-than-Done.pdf%22%2C%22collections%22%3A%5B%227E3WF4LA%22%5D%2C%22dateModified%22%3A%222025-09-28T03%3A57%3A38Z%22%7D%7D%2C%7B%22key%22%3A%22L77P75Y2%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Jevglevskaja%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BJevglevskaja%2C%20Natalia.%202021.%20%26%23x201C%3BChallenges%20to%20Article%2036%20Reviews%20Posed%20by%20%28Autonomous%29%20Cyber%20Capabilities.%26%23x201D%3B%20In%20%26lt%3Bi%26gt%3BInternational%20Law%20and%20Weapons%20Review%3A%20Emerging%20Military%20Technology%20under%20the%20Law%20of%20Armed%20Conflict%26lt%3B%5C%2Fi%26gt%3B.%20Cambridge%20University%20Press.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1017%5C%2F9781108946391.010%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1017%5C%2F9781108946391.010%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Challenges%20to%20Article%2036%20Reviews%20Posed%20by%20%28Autonomous%29%20Cyber%20Capabilities%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Natalia%22%2C%22lastName%22%3A%22Jevglevskaja%22%7D%5D%2C%22abstractNote%22%3A%22Chapter%209%20focuses%20on%20an%20Article%2036%20review%20of%20%28autonomous%29%20cyber%20capabilities.%20As%20in%20the%20case%20of%20autonomous%20weapons%20systems%2C%20the%20most%20burning%20questions%20for%20a%20weapons%20review%20in%20the%20cyber%20context%20remain%3A%20How%20to%20meaningfully%20incorporate%20advice%20on%20the%20law%20of%20targeting%20as%20part%20of%20the%20weapons%20review%3F%20How%20to%20determine%20when%20a%20given%20capability%20is%20%5Cu2018new%5Cu2019%20for%20review%20purposes%20and%20when%20to%20initiate%20a%20review%3F%20How%20and%20when%20can%20testing%20and%20evaluation%20processes%20meaningfully%20inform%20the%20review%20outcome%3F%20Furthermore%2C%20some%20challenges%20distinct%20to%20cyber%20capabilities%20also%20exist.%20Most%20importantly%2C%20cyber%20capabilities%20test%20the%20underlying%20assumptions%20of%20the%20law%20of%20armed%20conflict.%20The%20effects%20of%20their%20use%20may%20be%20more%20deleterious%20than%20the%20consequences%20produced%20by%20traditional%20weaponry%2C%20and%20yet%20they%20may%20fall%20outside%20the%20legal%20review%20requirement%20because%20the%20effects%20produced%20do%20not%20constitute%20an%20%5Cu2018attack%5Cu2019%20in%20its%20conventional%20interpretation.%20%5B142%20words%5D%22%2C%22bookTitle%22%3A%22International%20Law%20and%20Weapons%20Review%3A%20Emerging%20Military%20Technology%20under%20the%20Law%20of%20Armed%20Conflict%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22978-1-108-83755-2%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1017%5C%2F9781108946391.010%22%2C%22collections%22%3A%5B%227E3WF4LA%22%5D%2C%22dateModified%22%3A%222025-09-28T04%3A30%3A40Z%22%7D%7D%2C%7B%22key%22%3A%2295I9LF5P%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kudl%5Cu00e1%5Cu010dkov%5Cu00e1%20et%20al.%22%2C%22parsedDate%22%3A%222020%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKudl%26%23xE1%3B%26%23x10D%3Bkov%26%23xE1%3B%2C%20Ivana%2C%20David%20Wallace%2C%20and%20Jakub%20Hara%26%23x161%3Bta.%202020.%20%26%23x201C%3BCyber%20Weapons%20Review%20in%20Situations%20Below%20the%20Threshold%20of%20Armed%20Conflict.%26%23x201D%3B%20In%20%26lt%3Bi%26gt%3B12th%20International%20Conference%20on%20Cyber%20Conflict%20---%2020%5C%2F20%20Vision%3A%20The%20Next%20Decade%26lt%3B%5C%2Fi%26gt%3B%2C%20edited%20by%20Tatiana%20Jan%26%23x10D%3B%26%23xE1%3Brkov%26%23xE1%3B%2C%20Lauri%20Lindstr%26%23xF6%3Bm%2C%20Massimiliano%20Signoretti%2C%20Ihsan%20Tolga%2C%20and%20G%26%23xE1%3Bbor%20Visky.%20NATO%20CCDCOE.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.23919%5C%2FCyCon49761.2020.9131728%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.23919%5C%2FCyCon49761.2020.9131728%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Cyber%20Weapons%20Review%20in%20Situations%20Below%20the%20Threshold%20of%20Armed%20Conflict%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ivana%22%2C%22lastName%22%3A%22Kudl%5Cu00e1%5Cu010dkov%5Cu00e1%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Wallace%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jakub%22%2C%22lastName%22%3A%22Hara%5Cu0161ta%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22name%22%3A%22Tatiana%20Jan%5Cu010d%5Cu00e1rkov%5Cu00e1%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22name%22%3A%22Lauri%20Lindstr%5Cu00f6m%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22name%22%3A%22Massimiliano%20Signoretti%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22name%22%3A%22Ihsan%20Tolga%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22name%22%3A%22G%5Cu00e1bor%20Visky%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%2212th%20International%20Conference%20on%20Cyber%20Conflict%20---%2020%5C%2F20%20Vision%3A%20The%20Next%20Decade%22%2C%22date%22%3A%222020%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.23919%5C%2FCyCon49761.2020.9131728%22%2C%22collections%22%3A%5B%227E3WF4LA%22%5D%2C%22dateModified%22%3A%222025-09-28T04%3A31%3A17Z%22%7D%7D%2C%7B%22key%22%3A%22VR2FA6PL%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Liivoja%20et%20al.%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BLiivoja%2C%20Rain%2C%20Maarja%20Naagel%2C%20and%20Ann%20V%26%23xE4%3Bljataga.%202019.%20%26lt%3Bi%26gt%3BAutonomous%20Cyber%20Capabilities%20under%20International%20Law%26lt%3B%5C%2Fi%26gt%3B.%20NATO%20CCDCOE.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fccdcoe.org%5C%2Fuploads%5C%2F2019%5C%2F07%5C%2FAutonomy-in-Cyber-Capabilities-under-International-Law_260619-002.pdf%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fccdcoe.org%5C%2Fuploads%5C%2F2019%5C%2F07%5C%2FAutonomy-in-Cyber-Capabilities-under-International-Law_260619-002.pdf%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Autonomous%20Cyber%20Capabilities%20under%20International%20Law%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rain%22%2C%22lastName%22%3A%22Liivoja%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Maarja%22%2C%22lastName%22%3A%22Naagel%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ann%22%2C%22lastName%22%3A%22V%5Cu00e4ljataga%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22NATO%20CCDCOE%22%2C%22date%22%3A%222019%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fccdcoe.org%5C%2Fuploads%5C%2F2019%5C%2F07%5C%2FAutonomy-in-Cyber-Capabilities-under-International-Law_260619-002.pdf%22%2C%22collections%22%3A%5B%227E3WF4LA%22%5D%2C%22dateModified%22%3A%222025-09-28T04%3A33%3A18Z%22%7D%7D%2C%7B%22key%22%3A%222UVD25GZ%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ma%5Cu010d%5Cu00e1k%22%2C%22parsedDate%22%3A%222023-11-13%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BMa%26%23x10D%3B%26%23xE1%3Bk%2C%20Kubo.%202023.%20%26%23x201C%3BScenario%2010%3A%20Legal%20Review%20of%20Cyber%20Weapons.%26%23x201D%3B%20International%20Cyber%20Law%20in%20Practice%3A%20Interactive%20Toolkit%2C%20November%2013.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fcyberlaw.ccdcoe.org%5C%2Fwiki%5C%2FScenario_10%3A_Legal_review_of_cyber_weapons%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fcyberlaw.ccdcoe.org%5C%2Fwiki%5C%2FScenario_10%3A_Legal_review_of_cyber_weapons%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Scenario%2010%3A%20Legal%20Review%20of%20Cyber%20Weapons%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kubo%22%2C%22lastName%22%3A%22Ma%5Cu010d%5Cu00e1k%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%2213%20Nov%202023%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fcyberlaw.ccdcoe.org%5C%2Fwiki%5C%2FScenario_10%3A_Legal_review_of_cyber_weapons%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227E3WF4LA%22%5D%2C%22dateModified%22%3A%222025-09-28T04%3A33%3A21Z%22%7D%7D%2C%7B%22key%22%3A%228EFX2BLY%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Schmitt%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSchmitt%2C%20Michael%20N%2C%20ed.%202017.%20%26%23x201C%3BRule%20110.%20Weapons%20Review.%26%23x201D%3B%20In%20%26lt%3Bi%26gt%3BTallinn%20Manual%202.0%20on%20the%20International%20Law%20Applicable%20to%20Cyber%20Operations%26lt%3B%5C%2Fi%26gt%3B.%20Cambridge%20University%20Press.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1017%5C%2F9781316822524.023%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1017%5C%2F9781316822524.023%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Rule%20110.%20Weapons%20review%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Michael%20N%22%2C%22lastName%22%3A%22Schmitt%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22Tallinn%20Manual%202.0%20on%20the%20International%20Law%20Applicable%20to%20Cyber%20Operations%22%2C%22date%22%3A%222017%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1017%5C%2F9781316822524.023%22%2C%22collections%22%3A%5B%227E3WF4LA%22%5D%2C%22dateModified%22%3A%222025-10-02T05%3A43%3A17Z%22%7D%7D%2C%7B%22key%22%3A%22TW7GRJM9%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Schmitt%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSchmitt%2C%20Michael%20N%2C%20ed.%202017.%20%26%23x201C%3BRule%20103.%20Definitions%20of%20Means%20and%20Methods%20of%20Warfare.%26%23x201D%3B%20In%20%26lt%3Bi%26gt%3BTallinn%20Manual%202.0%20on%20the%20International%20Law%20Applicable%20to%20Cyber%20Operations%26lt%3B%5C%2Fi%26gt%3B.%20Cambridge%20University%20Press.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1017%5C%2F9781316822524.023%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1017%5C%2F9781316822524.023%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Rule%20103.%20Definitions%20of%20means%20and%20methods%20of%20warfare%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Michael%20N%22%2C%22lastName%22%3A%22Schmitt%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22Tallinn%20Manual%202.0%20on%20the%20International%20Law%20Applicable%20to%20Cyber%20Operations%22%2C%22date%22%3A%222017%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1017%5C%2F9781316822524.023%22%2C%22collections%22%3A%5B%227E3WF4LA%22%2C%223HUVHPXM%22%5D%2C%22dateModified%22%3A%222025-10-02T05%3A42%3A39Z%22%7D%7D%2C%7B%22key%22%3A%22S8D4V9RA%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Tattersall%20and%20Copeland%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BTattersall%2C%20Alec%2C%20and%20Damian%20Copeland.%202021.%20%26%23x201C%3BReviewing%20Autonomous%20Cyber%20Capabilities.%26%23x201D%3B%20In%20%26lt%3Bi%26gt%3BAutonomous%20Cyber%20Capabilities%20under%20International%20Law%26lt%3B%5C%2Fi%26gt%3B%2C%20edited%20by%20Rain%20Liivoja%20and%20Ann%20V%26%23xE4%3Bljataga.%20NATO%20CCDCOE%20Publications.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fccdcoe.org%5C%2Flibrary%5C%2Fpublications%5C%2Fautonomous-cyber-capabilities-under-international-law-2%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fccdcoe.org%5C%2Flibrary%5C%2Fpublications%5C%2Fautonomous-cyber-capabilities-under-international-law-2%5C%2F%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Reviewing%20Autonomous%20Cyber%20Capabilities%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alec%22%2C%22lastName%22%3A%22Tattersall%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Damian%22%2C%22lastName%22%3A%22Copeland%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Rain%22%2C%22lastName%22%3A%22Liivoja%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Ann%22%2C%22lastName%22%3A%22V%5Cu00e4ljataga%22%7D%5D%2C%22abstractNote%22%3A%22The%20law%20of%20armed%20conflict%20%28%5Cu2018LOAC%5Cu2019%29%20rests%20on%20a%20premise%20that%2C%20%5Cu2018%5Bi%5Dn%20any%20armed%20conflict%2C%20the%20right%20of%20the%20Parties%20to%20the%20conflict%20to%20choose%20methods%20or%20means%20of%20warfare%20is%20not%20unlimited%5Cu2019.2%20A%20key%20obligation%20giving%20effect%20to%20this%20premise%20is%20the%20duty%20of%20States%20Parties%20to%20Additional%20Protocol%20I%20to%20the%20Geneva%20Conventions%20%28%5Cu2018AP%20I%5Cu2019%29%20to%20determine%20whether%20the%20employment%20of%20a%20new%20weapon%2C%20means%20or%20method%20of%20warfare%20would%20comply%20with%20the%20protocol%20and%20other%20applicable%20international%20law.3%20States%20not%20Party%20to%20AP%20I%20are%20arguably%20under%20a%20more%20general%20obligation%20to%20ensure%20the%20compliance%20of%20new%20weapons%20and%20means%20of%20warfare%20with%20LOAC%20and%20other%20relevant%20rules%20of%20international%20law.4%20We%20refer%20to%20the%20relevant%20processes%20as%20%5Cu2018weapons%20reviews%5Cu2019%2C%20which%20we%20prefer%20over%20the%20alternative%20term%20%5Cu2018legal%20reviews%5Cu2019%20because%20they%20involves%20matters%20of%20both%20legal%20obligation%20and%20State%20policy.%20Autonomous%20cyber%20capabilities%20%28%5Cu2018ACC%5Cu2019%29%20encompass%20software%20%28and%2C%20where%20relevant%2C%20the%20necessary%20accompanying%20hardware%29%20that%20operates%20on%20or%20against%20computers%20or%20computer%20networks%20by%20algorithmically%20executing%20actions%20within%20pre-determined%20%28albeit%20potentially%20broad%29%20parameters%2C%20without%20human%20intervention.%20Where%20the%20ACC%20are%20designed%20or%20expected%20to%20cause%20damage%20or%20destruction%20in%20armed%20conflict%2C%20they%20create%20novel%20capabilities%20that%20will%20challenge%20traditional%20weapons%20review%20practices.%20This%20chapter%20will%20examine%20the%20constituent%20elements%20of%20a%20weapons%20review%20and%20address%20some%20potential%20tensions%20that%20the%20unique%20nature%20of%20ACC%20may%20cause%20for%20conventional%20weapons%20review%20practice.%22%2C%22bookTitle%22%3A%22Autonomous%20Cyber%20Capabilities%20under%20International%20Law%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22eng%22%2C%22ISBN%22%3A%22978-9916-9565-2-6%20978-9916-9565-3-3%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fccdcoe.org%5C%2Flibrary%5C%2Fpublications%5C%2Fautonomous-cyber-capabilities-under-international-law-2%5C%2F%22%2C%22collections%22%3A%5B%227E3WF4LA%22%5D%2C%22dateModified%22%3A%222025-09-28T04%3A19%3A30Z%22%7D%7D%2C%7B%22key%22%3A%224NGMWDRX%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Tsagourias%20et%20al.%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BTsagourias%2C%20Nicholas%2C%20Giacomo%20Biggio%2C%20Eric%20Myjer%2C%20and%20Thilo%20Marauhn.%202022.%20%26%23x201C%3BThe%20Regulation%20of%20Cyber%20Weapons.%26%23x201D%3B%20In%20%26lt%3Bi%26gt%3BResearch%20Handbook%20on%20International%20Arms%20Control%20Law%26lt%3B%5C%2Fi%26gt%3B.%20Edward%20Elgar.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.4337%5C%2F9781788111904.000%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.4337%5C%2F9781788111904.000%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22The%20Regulation%20of%20Cyber%20Weapons%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicholas%22%2C%22lastName%22%3A%22Tsagourias%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Giacomo%22%2C%22lastName%22%3A%22Biggio%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Eric%22%2C%22lastName%22%3A%22Myjer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Thilo%22%2C%22lastName%22%3A%22Marauhn%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22Research%20Handbook%20on%20International%20Arms%20Control%20Law%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.4337%5C%2F9781788111904.000%22%2C%22collections%22%3A%5B%227E3WF4LA%22%5D%2C%22dateModified%22%3A%222025-09-28T04%3A33%3A50Z%22%7D%7D%2C%7B%22key%22%3A%22EBUHHUW8%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Wallace%22%2C%22parsedDate%22%3A%222018%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BWallace%2C%20David.%202018.%20%26lt%3Bi%26gt%3BCyber%20Weapon%20Reviews%20under%20International%20Humanitarian%20Law%3A%20A%20Critical%20Analysis%26lt%3B%5C%2Fi%26gt%3B.%20Tallinn%20Paper%20No%2011.%20NATO%20CCDCOE.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fccdcoe.org%5C%2Flibrary%5C%2Fpublications%5C%2Fcyber-weapon-reviews-under-international-humanitarian-law-a-critical-analysis%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fccdcoe.org%5C%2Flibrary%5C%2Fpublications%5C%2Fcyber-weapon-reviews-under-international-humanitarian-law-a-critical-analysis%5C%2F%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Cyber%20Weapon%20Reviews%20under%20International%20Humanitarian%20Law%3A%20A%20Critical%20Analysis%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22Wallace%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22NATO%20CCDCOE%22%2C%22date%22%3A%222018%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fccdcoe.org%5C%2Flibrary%5C%2Fpublications%5C%2Fcyber-weapon-reviews-under-international-humanitarian-law-a-critical-analysis%5C%2F%22%2C%22collections%22%3A%5B%227E3WF4LA%22%5D%2C%22dateModified%22%3A%222025-09-28T04%3A34%3A16Z%22%7D%7D%5D%7D
Biller, Jeffrey, and Michael Schmitt. 2019. “Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare.” International Law Studies 95: 179–225. https://digital-commons.usnwc.edu/ils/vol95/iss1/6.
Blount, P. J. 2012. “The Preoperational Legal Review of Cyber Capabilities: Ensuring the Legality of Cyber Weapons.” Northern Kentucky Law Review 39: 211–20. http://chaselaw.nku.edu/content/dam/chaselaw/docs/academics/lawreview/v39/nklr_v39n2.pdf.
Boothby, William H. 2013. “Methods and Means of Cyber Warfare.” International Law Studies 89: 387–405. https://digital-commons.usnwc.edu/ils/vol89/iss1/8/.
Brown, Gary D., and Andrew O. Metcalf. 2014. “Easier Said Than Done: Legal Reviews of Cyber Weapons.” Journal of National Security Law & Policy 7: 115–38. http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf.
Jevglevskaja, Natalia. 2021. “Challenges to Article 36 Reviews Posed by (Autonomous) Cyber Capabilities.” In International Law and Weapons Review: Emerging Military Technology under the Law of Armed Conflict. Cambridge University Press. https://doi.org/10.1017/9781108946391.010.
Kudláčková, Ivana, David Wallace, and Jakub Harašta. 2020. “Cyber Weapons Review in Situations Below the Threshold of Armed Conflict.” In 12th International Conference on Cyber Conflict --- 20/20 Vision: The Next Decade, edited by Tatiana Jančárková, Lauri Lindström, Massimiliano Signoretti, Ihsan Tolga, and Gábor Visky. NATO CCDCOE. https://doi.org/10.23919/CyCon49761.2020.9131728.
Liivoja, Rain, Maarja Naagel, and Ann Väljataga. 2019. Autonomous Cyber Capabilities under International Law. NATO CCDCOE. https://ccdcoe.org/uploads/2019/07/Autonomy-in-Cyber-Capabilities-under-International-Law_260619-002.pdf.
Mačák, Kubo. 2023. “Scenario 10: Legal Review of Cyber Weapons.” International Cyber Law in Practice: Interactive Toolkit, November 13. https://cyberlaw.ccdcoe.org/wiki/Scenario_10:_Legal_review_of_cyber_weapons.
Schmitt, Michael N, ed. 2017. “Rule 110. Weapons Review.” In Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press. https://doi.org/10.1017/9781316822524.023.
Schmitt, Michael N, ed. 2017. “Rule 103. Definitions of Means and Methods of Warfare.” In Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press. https://doi.org/10.1017/9781316822524.023.
Tattersall, Alec, and Damian Copeland. 2021. “Reviewing Autonomous Cyber Capabilities.” In Autonomous Cyber Capabilities under International Law, edited by Rain Liivoja and Ann Väljataga. NATO CCDCOE Publications. https://ccdcoe.org/library/publications/autonomous-cyber-capabilities-under-international-law-2/.
Tsagourias, Nicholas, Giacomo Biggio, Eric Myjer, and Thilo Marauhn. 2022. “The Regulation of Cyber Weapons.” In Research Handbook on International Arms Control Law. Edward Elgar. https://doi.org/10.4337/9781788111904.000.
Wallace, David. 2018. Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis. Tallinn Paper No 11. NATO CCDCOE. https://ccdcoe.org/library/publications/cyber-weapon-reviews-under-international-humanitarian-law-a-critical-analysis/.