1. Military Objectives 2.0: The Case for Interpreting Computer Data as Objects Under International Humanitarian Law;Kubo;Isr. L. Rev.,2015
2. State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0;Banks;Tex. L. Rev.,2017
3. Georgia's Cyber Left Hook;Korns;Parameters,2009
4. Cyberspace: A New Threat to the Sovereignty of the State;Adams;Mgmt. Stud.,2016
5. Rethinking Espionage in the Modern Era;Pun;Chi. J. Int'l L.,2017