1. Backstrom, A. & Henderson, I. (2012). New capabilities in warfare: An overview of contemporary technological developments and the associated legal and engineering issues in Article 36 weapons reviews. International Review of the Red Cross, 94(886), 483–514.
2. Bothe, M., Partsch, K. J. & Solf, W. A. (1982). New rules for victims of armed conflicts: Commentary to the two 1977 protocols additional to the Geneva Conventions of 1949. Martinus Nijhoff Publishers.
3. Brown, G. D. (2011). Why Iran didn’t admit Stuxnet was an attack. Joint Force Quarterly, 63, 70–73.
4. Buchan, R. (2012). Cyber attacks: Unlawful uses of force or prohibited interventions? Journal of Conflict and Security Law, 17(2), 211–227.
5. Danel’yan, A. A. (2020). Mezhdunarodno-pravovoe regulirovanie kiberprostranstava [International legal regulation of cyberspace]. Obrazovanie i Pravo, 1, 261–269.