Abstract:
The research paper analyses the extent of enforcement of the rules of international humanitarian law on perpetrators of cyber-attacks by stating the nature of cyber-attacks and identifying the types of cyber-attacks, highlighting international efforts to regulate cyber-attacks under international humanitarian law, deducing the extent of the suitability of the rules of international humanitarian law that govern cyber-attacks, and determining the extent of the jurisdiction of the International Criminal Court to punish perpetrators of cyber-attacks. This study followed the analytical and critical approach by reviewing the rules of international humanitarian law and the extent of their applicability to cyber-attacks. Finally, the study came to a conclusion with a list of results and suggestions. The most important of these is that the way international justice is done needs to change completely so that the International Criminal Court can better handle cybercrimes. This is to ensure that the inclusion of cybercrimes under the jurisdiction of the International Criminal Court aligns with the principles of international humanitarian law, while also highlighting the similarities between cyber weapons and conventional weapons. This is achieved through collaboration between legal and technical experts in addressing the intricacies of cybercrimes, promoting accountability, and bolstering justice in the digital era
References
Abu Issa, Hamzeh, and Abdullah Alkhseilat, 'The Cyber Espionage Crimes in the Jordanian Law', International Journal of Electronic Security and Digital Forensics, 14.2 (2022), 111-123. https://doi.org/10.1504/ijesdf.2022.121203
Abu Issa, Hamzeh, Mahmoud Ismail, and Omar Aamar, 'Unauthorized access crime in Jordanian law (comparative study)', Digital Investigation, 28 (2019), 104-111. https://doi.org/10.1016/j.diin.2019.01.006
Akbariavaz, Khalil, Pardis Moslemzadeh Tehrani, and Johan Shamsuddin bin Haj Sabaruddin. 'Cyberattacks and the Prohibition of the Use of Force under Humanitarian Law with Reference to the Tallinn Manual', In European Conference on Information Warfare and Security, 1 (2020), 451–457. https://doi.org/10.34190/EWS.20.508
Al Makhmari, Mohammed, Ali Al-Hammouri, Tareq Al-Billeh and Abdulaziz Almamari, 'Criminal Liability for Misuse of Social Media in Omani and UAE Legislation', International Journal of Cyber Criminology, 18.2 (2024) 92-106 https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/420/121
Al-Billeh, Tareq, Abdullah Alkhseilat, and Lana AL-Khalaileh, 'Scope of Penalties of Offences in Jordanian Public Office', Pakistan Journal of Criminology, 15.2 (2023), 341-356 https://www.pjcriminology.com/publications/scope-of-penalties-of-offences-in-jordanian-public-office/
Al-Billeh, Tareq, Ali Al-Hammouri, Tawfiq Khashashneh, Mohammed AL Makhmari, and Hamad Al Kalbani, 'Digital Evidence in Human Rights Violations and International Criminal Justice', Journal of Human Rights Culture and Legal System, 4.3 (2024), 842–871 https://doi.org/10.53955/jhcls.v4i3.446
Al-Billeh, Tareq, Ruba Hmaidan, Ali Al-Hammouri, and Mohammed AL Makhmari, 'The Risks of Using Artificial Intelligence on Privacy and Human Rights: Unifying Global Standards', Jurnal Media Hukum, 31.2 (2024), 333–350 https://doi.org/10.18196/jmh.v31i2.23480
AL-Hawamleh, Ahmad, 'Predictions of Cybersecurity Experts on Future Cyber-Attacks and Related Cybersecurity Measures', International Journal of Advanced Computer Science and Applications, 14.2 (2023), 801–809 https://doi.org/10.14569/IJACSA.2023.0140292
Al-Khawajah, Noor, Tareq Al-Billeh, and Majd Manasra, 'Digital Forensic Challenges in Jordanian Cybercrime Law', Pakistan Journal of Criminology, 15.3 (2023), 29-44. https://www.pjcriminology.com/publications/digital-forensic-challenges-in-jordanian-cybercrime-law/
Alkhseilat, Abdullah, Naser Al Ali, and Lujain Edweidar, 'Legal Regulation of Impersonation through Websites', International Journal of Electronic Security and Digital Forensics, 16.5 (2024), 557–576, https://doi.org/10.1504/ijesdf.2024.140748
Alkhseilat, Abdullah, Tareq Al Billeh, Mohammed Albazi, and Naser Al Ali, 'The Authenticity of Digital Evidence in Criminal Courts: A Comparative Study', International Journal of Electronic Security and Digital Forensics, 16.6 (2024), 720–738 https://doi.org/10.1504/ijesdf.2024.142010
Antonio Carlo and Kim Obergfaell, 'Cyber attacks on critical infrastructures and satellite communications', International Journal of Critical Infrastructure Protection, 46 (2024), 100701 https://doi.org/10.1016/j.ijcip.2024.100701
Arnold, Roberta, 'The Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, Edited by Michael N. Schmitt', International Criminal Law Review, 20.1 (2020), 155–159 https://doi.org/10.1163/15718123-02001008
Beatty, Georgia, 'War Crimes in Cyberspace: Prosecuting Disruptive Cyber Operations under Article 8 of the Rome Statute', The Military Law and the Law of War Review, 58.2 (2020), 209–239 https://doi.org/10.4337/mllwr.2020.02.17
Biggio, Giacomo, 'International Humanitarian Law and the Protection of the Civilian Population in Cyberspace: Towards a Human Dignity-Oriented Interpretation of the Notion of Cyber Attack under Article 49 of Additional Protocol I. The Military Law and the Law of War Review', Edward Elgar Publishing, 59.1 (2021), 114–140 https://doi.org/10.4337/mllwr.2021.01.06
Brianna Bace, Yasir Gökce, and Unal Tatar, 'Law in Orbit: International Legal Perspectives on Cyberattacks Targeting Space Systems', Telecommunications Policy, 48.4 (2024), 102739–39, https://doi.org/10.1016/j.telpol.2024.102739
Chang, Chih Hsiang, 'How Does the Tallinn Manual 2.0 Shed Light on the Threat of Cyber Attacks against Taiwan-', In European Conference on Information Warfare and Security, 1 (2023), 649–656 https://doi.org/10.34190/eccws.22.1.1294
Cong, Wanshu, 'Seeking Customary International Human Rights Law in the Cyberspace: A Critique of the Tallinn Manual 2.0.', SSRN Electronic Journal, 1 (2021), 1-20 https://doi.org/10.2139/ssrn.3744924
Daraji, Mohammad Hasan, and Omar Saleh AL-Okour, 'Cyber-Attacks in Accordance With International Humanitarian Law', Dirasat: Shari’a and Law Sciences, 51.1 (2024), 1-12 https://doi.org/10.35516/law.v51i1.786
Drobotov, Serhii, Roman Pertsev, Mariia Hrab, Vasyl Fedytnyk, Svitlana Moroz, and Mariia Kikalishvili, 'Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime', Journal of Information Technology Management, 15.1 (2023), 135–62 https://doi.org/10.22059/jitm.2023.90741
Efrony, Dan, and Yuval Shany, 'A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice', American Journal of International Law, 112.4 (2018), 583–657 https://doi.org/10.1017/ajil.2018.86
Eoyang, Mieke, and Chimène Keitner, 'Cybercrime vs. Cyberwar: Paradigms for Addressing Malicious Cyber Activity', Journal of National Security Law and Policy, 1 (2020), 1-21 http://dx.doi.org/10.2139/ssrn.3599588
Espada, Cesáreo Gutiérrez, 'The Growing Need for Legislation against Cyber Threats, Sources of Serious Transnational Harm', Cuadernos de Derecho Transnacional, 14.2 (2022), 10–14 https://doi.org/10.20318/cdt.2022.7169
Faga, Hemen Philip, 'The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century', Baltic Journal of Law and Politics, 10.1 (2017), 1-34 https://doi.org/10.1515/bjlp-2017-0001
Fahey, Elaine, 'The Evolution of EU–US Cybersecurity Law and Policy: On Drivers of Convergence', Journal of European Integration, 46.7 (2024), 1073–1088 https://doi.org/10.1080/07036337.2024.2411240
Garkusha-Bozhko, Sergei Yu, 'The Definition of Armed Conflict in Cyberspace' Vestnik Sankt-Peterburgskogo Universiteta. Pravo, 14.1 (2023), 194–210 https://doi.org/10.21638/spbu14.2023.112
Garkusha-Bozhko, Sergei Yu, 'The Problem of Cyber Espionage in the International Humanitarian Law', Moscow Journal of International Law, 1 (2021), 70–80 https://doi.org/10.24833/0869-0049-2021-1-70-80
Gervais, Michael, 'Cyber Attacks and the Laws of War', SSRN Electronic Journal, 1 (2012), 1-45 https://doi.org/10.2139/ssrn.1939615
Heinze, Eric A., and Rhiannon Neilsen, 'Limited Force and the Return of Reprisals in the Law of Armed Conflict', Ethics and International Affairs, 34.2 (2020), 175-188 https://doi.org/10.1017/S0892679420000246
Holder, Maxron, 'Cyberspace in a State of Flux: Regulating Cyberspace through International Law', Groningen Journal of International Law, 9.2 (2022), 266–280 https://doi.org/10.21827/grojil.9.2.266-280
Hrushko, M. V., 'Attribution of Cyberattacks as a Prerequisite For Ensuring Responsible Behavior in Cyberspace', Constitutional State, 43 (2021), 195–201 https://doi.org/10.18524/2411-2054.2021.43.241002
Huang, Ke Zhen, Yi Feng Lian, Deng Guo Feng, Hai Xia Zhang, Di Wu, and Xiang Liang Ma, 'Method of Cyber Attack Attribution Based on Graph Model', Ruan Jian Xue Bao/Journal of Software, 33.2, (2022) 683–698. https://doi.org/10.13328/j.cnki.jos.006314
Igakuboon, Adasi Nsanawaji, 'An Appraisal of The Legal Framework for The Protection of Civilians in Cyber-Warfare Under International Humanitarian Law', International Journal of Research and Scientific Innovation, 9.7 (2022), 14–26 https://doi.org/10.51244/ijrsi.2022.9702
Janssens, Pauline Charlotte, and Jan Wouters, 'Informal International Law-Making: A Way around the Deadlock of International Humanitarian Law?', International Review of the Red Cross, 104.920–921 (2022), 2111–2130. https://doi.org/10.1017/S1816383122000467
Johnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott and Nancy Cooke, 'Investigating Cyber Attacker Team Cognition', Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 66.1 (2022), 105–109 https://doi.org/10.1177/1071181322661132
Julia E Sullivan and Dmitriy Kamensky, ‘Putin’s Power Play: Russia’s Attacks on Ukraine’s Electric Power Infrastructure Violate International Law’, The Electricity Journal, 37.2 (2024), 107371–71 https://doi.org/10.1016/j.tej.2024.107371
Kessler, Oliver, and Wouter Werner, 'Expertise, Uncertainty, and International Law: A Study of the Tallinn Manual on Cyberwarfare', Leiden Journal of International Law, 26.4 (2013), 793–810 https://doi.org/10.1017/S0922156513000410031
Khashashneh, Tawfiq, Tareq Al-Billeh, Ali Al-Hammouri, and Roua Belghit, 'The Importance of Digital Technology in Extracting Electronic Evidence: How Can Digital Technology be used at Crime Scenes?', Pakistan Journal of Criminology, 15.4 (2023), 69-85 https://www.pjcriminology.com/publications/the-importance-of-digital-technology-in-extracting-electronic-evidence-how-can-digital-technology-be-used-at-crime-scenes/
Kleemann, Steven, 'Cyber Warfare and the ‘Humanization’ of International Humanitarian Law', International Journal of Cyber Warfare and Terrorism, 11.2 (2021), 1–11. https://doi.org/10.4018/IJCWT.2021040101
Kotenko, Loger, Elena Fedorchenko, Evgenia Novikova and Ashish Jha, 'Cyber Attacker Profiling for Risk Analysis Based on Machine Learning', Sensors, 23.4, (2023) https://doi.org/10.3390/s23042028
Leggat, Helaine, 'Cyber Warfare: An Enquiry into the Applicability of National Law to Cyberspace', International Journal of Cyber Warfare and Terrorism, 10.3 (2020), 28–46 https://doi.org/10.4018/IJCWT.2020070103
Leng, Yaxuan, 'When Can Cyberattack Constitute Use of Force: A Case Study of Cyberattack in the Russia-Ukraine Conflict', Lecture Notes in Education Psychology and Public Media, 17.1 (2023), 201–7 https://doi.org/10.54254/2753-7048/17/20231249
Li, Yuchong, and Qinghui Liu, 'A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments', Energy Reports, 7 (2021), 8176–8186 https://doi.org/10.1016/j.egyr.2021.08.126
Lin, Herbert, 'Cyber Conflict and International Humanitarian Law', International Review of the Red Cross, 94.886 (2013), 515–531 https://doi.org/10.1017/S1816383112000811
Liu, Ian Yuying, 'The Due Diligence Doctrine under Tallinn Manual 2.0.', Computer Law and Security Review, 33.3 (2017), 390–395 https://doi.org/10.1016/j.clsr.2017.03.023
LUOR, Tainyi, Jen Fu WANG, and Hsi-Peng LU, 'Trends in and Contributions to Tallinn Manual Research: An Assessment of the Literature from 1998 to November 2022', Informatica Economica, 27.3 (2023), 45–60 https://doi.org/10.24818/issn14531305/27.3.2023.04
M. R, Amal, and Venkadesh P, 'Hybrid H-DOC: A bait for analyzing cyber attacker behavior', International Journal of Electrical and Computer Engineering Systems, 14.1, (2023), 37–44 https://doi.org/10.32985/ijeces.14.1.5
Maˇc´ak, Kubo, 'INTERNATIONAL LAW AND PRACTICE From Cyber Norms to Cyber Rules: Re-Engaging States as Law-Makers', Leiden Journal of International Law, 30 (2020), 877–899 https://doi.org/10.1017/S0922156517000358
Madubuike-Ekwe, Joseph N., 'Cyberattack and the Use of Force in International Law', Beijing Law Review, 12.2 (2021), 631–49 https://doi.org/10.4236/blr.2021.122034
Mazaraki, Nataliia, and Yulia Goncharova, 'Cyber Dimension of Hybrid Wars: Escaping A ‘Grey Zone’ Of International Law to Adress Economic Damages', Baltic Journal of Economic Studies, 8.2 (2022), 115–120 https://doi.org/10.30525/2256-0742/2022-8-2-115-120
McKenzie, Simon, 'Cyber Operations against Civilian Data', Journal of International Criminal Justice, 19.5 (2022), 1165–1192. https://doi.org/10.1093/jicj/mqab067
Mozid, Ashraful, and Nelufer Yesmen, 'Term Paper on The Nature of Cyber Crime and Cyber Threats: A Criminological Review', Journal of Advanced Forensic Sciences, 1.1 (2020), 1–9 https://doi.org/10.14302/issn.2692-5915.jafs-20-3204
Muzyka, Viktoriia, 'New Wine in Old Bottles: Applicability of the Rules on Attribution to Cyberattacks Committed against Objects of Critical Infrastructure', Law Review of Kyiv University of Law, 3 (2020), 388–391 https://doi.org/10.36695/2219-5521.3.2020.72
Nagasako, Tomoko, 'A Consideration of the Case Study of Disinformation and Its Legal Problems', In IFIP Advances in Information and Communication Technology, 590 (2020), 262–276 https://doi.org/10.1007/978-3-030-62803-1_21
National Cyber Security Centre, 6th Cybersecurity Forum, Oman, Muscat. https://cert.gov.om/news/270
National Cyber Security Centre, National Cybersecurity Products and Services Guide for 2025, Oman, Muscat. https://cert.gov.om//librarys/publications/servicesGuideline.pdf
National Cybersecurity Center, Approval of the National Cybersecurity Strategy 2025-2028. Amman, Jordan https://ncsc.jo/Ar/NewsDetails/National_CS_Strategy_2025_2028
National Cybersecurity Center, The National Cybersecurity Center Issues its Cybersecurity Posture Report for the First Quarter of 2025. Amman, Jordan https://ncsc.jo/Ar/NewsDetails/Q1_2025_Report_NCSCJO
Nnawulezi, Uche, and Salim Bashir Magashi, 'Evolving Roles of the International Institutions in the Implementation Mechanisms of the Rules of International Humanitarian Law', Kutafin Law Review, 9.4 (2022), 684–712 https://doi.org/10.17803/2313-5395.2022.4.22.684-712
Nnawulezi, Uche, Kelechi Onyegbule and Charis Godson Ukanwa, 'Evolving Roles of the United Nations Agencies on the Implementation Mechanisms of the Rules of International Humanitarian Law', The Nigerian Juridical Review, 16 (2022), 43–63 https://doi.org/10.56284/tnjr.v16i1.12
Oğurlu, Ebru, 'International Law in Cyberspace: An Evaluation of the Tallinn Manuals', Annales de La Faculte de Droit d’Istanbul, 73 (2023), 327–44 https://doi.org/10.26650/annales.2023.73.0010
Orr, Zachary R., 'Redress for Unlawful Cyber-Attacks During Armed Conflict: The Limits of the International Criminal Court and How Human Rights Bodies Can Help Close the Gap', SSRN Electronic Journal, 57.359 (2023), 359-410 https://doi.org/10.2139/ssrn.4422358
Pettoello-Mantovani, Clara, 'Cybercrimes: An Emerging Category of Offenses within the Frame of the International Criminal Court Jurisdiction.” International Journal of Law and Politics Studies', Al-Kindi Center for Research and Development, 6.2 (2024), 6–11 https://doi.org/10.32996/ijlps.2024.6.2.2
Pipyros, Kosmas, Christos Thraskias, Lilian Mitrou, Dimitris Gritzalis, and Theodoros Apostolopoulos, 'A New Strategy for Improving Cyber-Attacks Evaluation in the Context of Tallinn Manual', Computers and Security, 74 (2018), 371–383. https://doi.org/10.1016/j.cose.2017.04.007
Pratama, B., and M. Bamatraf, 'Tallinn Manual: Cyber Warfare in Indonesian Regulation', In IOP Conference Series: Earth and Environmental Science, 729 (2021), 1-8 https://doi.org/10.1088/1755-1315/729/1/012033
Protas, Petro, and Leornard Chimanda Joseph, 'The Law of Armed Conflict in the Era of Cyber Technology: Assessing the Legal Challenges and Response in Tanzania', Eastern Africa Law Review, 47.1 (2020), 95–139 https://doi.org/10.56279/ealr.v47i1.4
Quader, Faisal, and Vandana P. Janeja, 'Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies', Journal of Cybersecurity and Privacy, 1.4 (2021), 638-659 https://doi.org/10.3390/jcp1040032
Rendón-Segador, Fernando J., Juan A. Álvarez-García, and Angel Jesús Varela-Vaca, 'Paying Attention to Cyber-Attacks: A Multi-Layer Perceptron with Self-Attention Mechanism', Computers and Security, 132 (2023), 103318 https://doi.org/10.1016/j.cose.2023.103318
Richardson, John C, 'Stuxnet as Cyberwarfare: Applying the Law of War to the Virtual Battlefield', SSRN Electronic Journal, 1 (2012), 1-38 https://doi.org/10.2139/ssrn.1892888
Samuli Haataja, ‘Cyber operations and automatic hack backs under international law on necessity’, Computer Law & Security Review, 53 (2024), 105992 https://doi.org/10.1016/j.clsr.2024.105992
Schellekens, Jasper, 'Release the Bots of War: Social Media and Artificial Intelligence as International Cyber Attack', Przegląd Europejski, 4 (2021), 163–179 https://doi.org/10.31338/1641-2478pe.4.21.10
Schmitt, Michael, 'Classification of Cyber Conflict', Journal of Conflict and Security Law, 17.2 (2012), 245–260 https://doi.org/10.1093/jcsl/krs018
Schmitt, Michael. N, 'Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations', Cambridge University Press, (2017) https://doi.org/10.1017/9781316822524
Shah, Pritik A., and Marcos Roberto Tovani‐Palone, 'Surgical Care Services in Inaccessible Zones: Targeted Palliative Care Accessibility Models for Patients in Resource‐Limited Settings', The International Journal of Health Planning and Management, 37.S1 (2022), 243–49 https://doi.org/10.1002/hpm.3580
Shukla, Vanshika, 'A BRIEF STUDY OF INTERNATIONAL LAW IN THE AGE OF CYBERSECURITY', EPRA International Journal of Multidisciplinary Research (IJMR), 9.11 (2023), 269–273 https://doi.org/10.36713/epra14915
Spáčil, Jakub, 'Cyber Operations against Critical Financial Infrastructure: A Non-Destructive Armed Attack?', International and Comparative Law Review, 22.2 (2022), 27–42 https://doi.org/10.2478/iclr-2022-0013
Sweet, Colin, 'Tallinn Manual on the International Law Applicable to Cyber Warfare', Europe-Asia Studies, 66.4 (2014), 669–670. https://doi.org/10.1080/09668136.2014.897423
Tanodomdej, Papawadee, 'The Tallinn Manuals and the Making of the International Law on Cyber Operations', Masaryk University Journal of Law and Technology, 13.1 (2019), 67–85 https://doi.org/10.5817/MUJLT2019-1-4
The First Additional Protocol to the Geneva Conventions of 1949. https://www.icrc.org/sites/default/files/external/doc/en/assets/files/other/icrc_002_0321.pdf
The National Cybersecurity Center. Cybersecurity: Bahraini-UK partnership to enhance international cooperation and build cyber capabilities. Bahrain. https://www.ncsc.gov.bh/ar/media-center/news-details.html?src=
The National Cybersecurity Center. The National Cybersecurity Center participates in the meetings of the Arab Cybersecurity Ministers Council. Bahrain. https://www.ncsc.gov.bh/en/media-center/news-details
The Statute of the International Criminal Court. July 17, 1998. https://www.icc-cpi.int/sites/default/files/2025-02/Rome-Statute-EN-2025.pdf
The UN Charter. https://www.un.org/en/about-us/un-charter
Thumfart, Johannes, 'Public and Private Just Wars: Distributed Cyber Deterrence Based on Vitoria and Grotius', Internet Policy Review, 9.3 (2020), 1–26 https://doi.org/10.14763/2020.3.1500
Tignino, Mara, 'The Regulation of Crimes against Water in Armed Conflicts and Other Situations of Violence', International Review of the Red Cross, 105.923 (2023), 706–734 https://doi.org/10.1017/S1816383123000061
Trahan, Jennifer, 'The Criminalization of Cyber-Operations Under the Rome Statute', Journal of International Criminal Justice, 19.5 (2021), 1133–1164 https://doi.org/10.1093/jicj/mqab066
Usman, Hazrat, Raja Ishtiaq Ahmed, and Syed Suliman Ali. 'Navigating the Gray Area: A Comprehensive Analysis of Cyber Warfare and Its Relationship to the Law of Armed Conflict', Global Legal Studies Review, 7.3 (2022), 32–36 https://doi.org/10.31703/glsr.2022(vii-iii).05
Voitasec, Dan-Iulian, 'Applying International Humanitarian Law to Cyber Attacks', Lex ET Scientia International Journal, 22.Xxii (2015), 552–556. http://www.icj-cij.org/docket/files/70/6503.pdf
Werner, Wouter, 'Say That Again, Please: Repetition in the Tallinn Manual', In Repetition and International Law, (2022), 95–114 https://doi.org/10.1017/9781009039666.005
Wheatley, Steven, 'Election Hacking, the Rule of Sovereignty, and Deductive Reasoning in Customary International Law', Leiden Journal of International Law, 36.3 (2023), 675–698 https://doi.org/10.1017/S0922156523000092
Woods, Daniel W., and Sezaneh Seymour, 'Evidence-Based Cybersecurity Policy? A Meta-Review of Security Control Effectiveness', Journal of Cyber Policy, 8.3 (2024), 1–19 https://doi.org/10.1080/23738871.2024.2335461
Yeremyan, Ara, and Lilit Yeremyan, 'International Law Issues of Cyber Defense', Moscow Journal of International Law, 2 (2022), 85–100 https://doi.org/10.24833/0869-0049-2022-2-85-100
Yuliya Miadzvetskaya, 'EU sanctions in response to cyber-attacks as crime-based emergency measures', Computer Law & Security Review, 54 (2024), 106010 https://doi.org/10.1016/j.clsr.2024.106010
Zahra, Iradhati, and Diajeng Wulan Christianti. 'The Beginning Of The International Humanitarian Law Application to Cyber Attack: The Status of Rule 30 Tallinn Manual 1.0.', Padjadjaran Journal of International Law, 5.1 (2021), 98–113 https://doi.org/10.23920/pjil.v5i1.366
Zahra, Iradhati, Irawati Handayani, and Diajeng Wulan Christianti. 'Cyber-Attack In Estonia: A New Challenge in the Applicability of International Humanitarian Law', Yustisia Jurnal Hukum, 10.1 (2021), 48-66 https://doi.org/10.20961/yustisia.v10i1.48336
Zhang, Yan, Degang Zhu, Menglin Wang, Junhan Li, and Jie Zhang, 'A comparative study of cyber security intrusion detection in healthcare systems', International Journal of Critical Infrastructure Protection, 44. (2024) https://doi.org/10.1016/j.ijcip.2023.100658