Login

The International Framework for Cyber-Attacks Under the Rules of International Humanitarian Law

Vol. 5 No. 2 (2025): Journal of Human Rights, Culture and Legal System:

Tareq Al-Billeh (1), Jessica Al-Mudanat (2), Abdulaziz Almamari (3), Tawfiq Khashashneh (4), Odai Al-Hailat (5)

(1) Faculty of Law, Applied Science Private University, Jordan
(2) Faculty of Law, Applied Science Private University , Jordan
(3) Faculty of Law, Al-Zahra College for Women, Oman
(4) Faculty of Law, Ajloun National University, Jordan
(5) Faculty of Law, Gulf University- Kingdom of Bahrain, Sanad, Bahrain
Fulltext View | Download

Abstract:

The research paper analyses the extent of enforcement of the rules of international humanitarian law on perpetrators of cyber-attacks by stating the nature of cyber-attacks and identifying the types of cyber-attacks, highlighting international efforts to regulate cyber-attacks under international humanitarian law, deducing the extent of the suitability of the rules of international humanitarian law that govern cyber-attacks, and determining the extent of the jurisdiction of the International Criminal Court to punish perpetrators of cyber-attacks. This study followed the analytical and critical approach by reviewing the rules of international humanitarian law and the extent of their applicability to cyber-attacks. Finally, the study came to a conclusion with a list of results and suggestions. The most important of these is that the way international justice is done needs to change completely so that the International Criminal Court can better handle cybercrimes. This is to ensure that the inclusion of cybercrimes under the jurisdiction of the International Criminal Court aligns with the principles of international humanitarian law, while also highlighting the similarities between cyber weapons and conventional weapons. This is achieved through collaboration between legal and technical experts in addressing the intricacies of cybercrimes, promoting accountability, and bolstering justice in the digital era

References

Abu Issa, Hamzeh, and Abdullah Alkhseilat, 'The Cyber Espionage Crimes in the Jordanian Law', International Journal of Electronic Security and Digital Forensics, 14.2 (2022), 111-123. https://doi.org/10.1504/ijesdf.2022.121203

Abu Issa, Hamzeh, Mahmoud Ismail, and Omar Aamar, 'Unauthorized access crime in Jordanian law (comparative study)', Digital Investigation, 28 (2019), 104-111. https://doi.org/10.1016/j.diin.2019.01.006

Akbariavaz, Khalil, Pardis Moslemzadeh Tehrani, and Johan Shamsuddin bin Haj Sabaruddin. 'Cyberattacks and the Prohibition of the Use of Force under Humanitarian Law with Reference to the Tallinn Manual', In European Conference on Information Warfare and Security, 1 (2020), 451–457. https://doi.org/10.34190/EWS.20.508

Al Makhmari, Mohammed, Ali Al-Hammouri, Tareq Al-Billeh and Abdulaziz Almamari, 'Criminal Liability for Misuse of Social Media in Omani and UAE Legislation', International Journal of Cyber Criminology, 18.2 (2024) 92-106 https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/420/121

Al-Billeh, Tareq, Abdullah Alkhseilat, and Lana AL-Khalaileh, 'Scope of Penalties of Offences in Jordanian Public Office', Pakistan Journal of Criminology, 15.2 (2023), 341-356 https://www.pjcriminology.com/publications/scope-of-penalties-of-offences-in-jordanian-public-office/

Al-Billeh, Tareq, Ali Al-Hammouri, Tawfiq Khashashneh, Mohammed AL Makhmari, and Hamad Al Kalbani, 'Digital Evidence in Human Rights Violations and International Criminal Justice', Journal of Human Rights Culture and Legal System, 4.3 (2024), 842–871 https://doi.org/10.53955/jhcls.v4i3.446

Al-Billeh, Tareq, Ruba Hmaidan, Ali Al-Hammouri, and Mohammed AL Makhmari, 'The Risks of Using Artificial Intelligence on Privacy and Human Rights: Unifying Global Standards', Jurnal Media Hukum, 31.2 (2024), 333–350 https://doi.org/10.18196/jmh.v31i2.23480

AL-Hawamleh, Ahmad, 'Predictions of Cybersecurity Experts on Future Cyber-Attacks and Related Cybersecurity Measures', International Journal of Advanced Computer Science and Applications, 14.2 (2023), 801–809 https://doi.org/10.14569/IJACSA.2023.0140292

Al-Khawajah, Noor, Tareq Al-Billeh, and Majd Manasra, 'Digital Forensic Challenges in Jordanian Cybercrime Law', Pakistan Journal of Criminology, 15.3 (2023), 29-44. https://www.pjcriminology.com/publications/digital-forensic-challenges-in-jordanian-cybercrime-law/

Alkhseilat, Abdullah, Naser Al Ali, and Lujain Edweidar, 'Legal Regulation of Impersonation through Websites', International Journal of Electronic Security and Digital Forensics, 16.5 (2024), 557–576, https://doi.org/10.1504/ijesdf.2024.140748

Alkhseilat, Abdullah, Tareq Al Billeh, Mohammed Albazi, and Naser Al Ali, 'The Authenticity of Digital Evidence in Criminal Courts: A Comparative Study', International Journal of Electronic Security and Digital Forensics, 16.6 (2024), 720–738 https://doi.org/10.1504/ijesdf.2024.142010

Antonio Carlo and Kim Obergfaell, 'Cyber attacks on critical infrastructures and satellite communications', International Journal of Critical Infrastructure Protection, 46 (2024), 100701 https://doi.org/10.1016/j.ijcip.2024.100701

Arnold, Roberta, 'The Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, Edited by Michael N. Schmitt', International Criminal Law Review, 20.1 (2020), 155–159 https://doi.org/10.1163/15718123-02001008

Beatty, Georgia, 'War Crimes in Cyberspace: Prosecuting Disruptive Cyber Operations under Article 8 of the Rome Statute', The Military Law and the Law of War Review, 58.2 (2020), 209–239 https://doi.org/10.4337/mllwr.2020.02.17

Biggio, Giacomo, 'International Humanitarian Law and the Protection of the Civilian Population in Cyberspace: Towards a Human Dignity-Oriented Interpretation of the Notion of Cyber Attack under Article 49 of Additional Protocol I. The Military Law and the Law of War Review', Edward Elgar Publishing, 59.1 (2021), 114–140 https://doi.org/10.4337/mllwr.2021.01.06

Brianna Bace, Yasir Gökce, and Unal Tatar, 'Law in Orbit: International Legal Perspectives on Cyberattacks Targeting Space Systems', Telecommunications Policy, 48.4 (2024), 102739–39, https://doi.org/10.1016/j.telpol.2024.102739

Chang, Chih Hsiang, 'How Does the Tallinn Manual 2.0 Shed Light on the Threat of Cyber Attacks against Taiwan-', In European Conference on Information Warfare and Security, 1 (2023), 649–656 https://doi.org/10.34190/eccws.22.1.1294

Cong, Wanshu, 'Seeking Customary International Human Rights Law in the Cyberspace: A Critique of the Tallinn Manual 2.0.', SSRN Electronic Journal, 1 (2021), 1-20 https://doi.org/10.2139/ssrn.3744924

Daraji, Mohammad Hasan, and Omar Saleh AL-Okour, 'Cyber-Attacks in Accordance With International Humanitarian Law', Dirasat: Shari’a and Law Sciences, 51.1 (2024), 1-12 https://doi.org/10.35516/law.v51i1.786

Drobotov, Serhii, Roman Pertsev, Mariia Hrab, Vasyl Fedytnyk, Svitlana Moroz, and Mariia Kikalishvili, 'Forensic Research of the Computer Tools and Systems in the Fight against Cybercrime', Journal of Information Technology Management, 15.1 (2023), 135–62 https://doi.org/10.22059/jitm.2023.90741

Efrony, Dan, and Yuval Shany, 'A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice', American Journal of International Law, 112.4 (2018), 583–657 https://doi.org/10.1017/ajil.2018.86

Eoyang, Mieke, and Chimène Keitner, 'Cybercrime vs. Cyberwar: Paradigms for Addressing Malicious Cyber Activity', Journal of National Security Law and Policy, 1 (2020), 1-21 http://dx.doi.org/10.2139/ssrn.3599588

Espada, Cesáreo Gutiérrez, 'The Growing Need for Legislation against Cyber Threats, Sources of Serious Transnational Harm', Cuadernos de Derecho Transnacional, 14.2 (2022), 10–14 https://doi.org/10.20318/cdt.2022.7169

Faga, Hemen Philip, 'The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century', Baltic Journal of Law and Politics, 10.1 (2017), 1-34 https://doi.org/10.1515/bjlp-2017-0001

Fahey, Elaine, 'The Evolution of EU–US Cybersecurity Law and Policy: On Drivers of Convergence', Journal of European Integration, 46.7 (2024), 1073–1088 https://doi.org/10.1080/07036337.2024.2411240

Garkusha-Bozhko, Sergei Yu, 'The Definition of Armed Conflict in Cyberspace' Vestnik Sankt-Peterburgskogo Universiteta. Pravo, 14.1 (2023), 194–210 https://doi.org/10.21638/spbu14.2023.112

Garkusha-Bozhko, Sergei Yu, 'The Problem of Cyber Espionage in the International Humanitarian Law', Moscow Journal of International Law, 1 (2021), 70–80 https://doi.org/10.24833/0869-0049-2021-1-70-80

Gervais, Michael, 'Cyber Attacks and the Laws of War', SSRN Electronic Journal, 1 (2012), 1-45 https://doi.org/10.2139/ssrn.1939615

Heinze, Eric A., and Rhiannon Neilsen, 'Limited Force and the Return of Reprisals in the Law of Armed Conflict', Ethics and International Affairs, 34.2 (2020), 175-188 https://doi.org/10.1017/S0892679420000246

Holder, Maxron, 'Cyberspace in a State of Flux: Regulating Cyberspace through International Law', Groningen Journal of International Law, 9.2 (2022), 266–280 https://doi.org/10.21827/grojil.9.2.266-280

Hrushko, M. V., 'Attribution of Cyberattacks as a Prerequisite For Ensuring Responsible Behavior in Cyberspace', Constitutional State, 43 (2021), 195–201 https://doi.org/10.18524/2411-2054.2021.43.241002

Huang, Ke Zhen, Yi Feng Lian, Deng Guo Feng, Hai Xia Zhang, Di Wu, and Xiang Liang Ma, 'Method of Cyber Attack Attribution Based on Graph Model', Ruan Jian Xue Bao/Journal of Software, 33.2, (2022) 683–698. https://doi.org/10.13328/j.cnki.jos.006314

Igakuboon, Adasi Nsanawaji, 'An Appraisal of The Legal Framework for The Protection of Civilians in Cyber-Warfare Under International Humanitarian Law', International Journal of Research and Scientific Innovation, 9.7 (2022), 14–26 https://doi.org/10.51244/ijrsi.2022.9702

Janssens, Pauline Charlotte, and Jan Wouters, 'Informal International Law-Making: A Way around the Deadlock of International Humanitarian Law?', International Review of the Red Cross, 104.920–921 (2022), 2111–2130. https://doi.org/10.1017/S1816383122000467

Johnson, Craig J., Kimberly J. Ferguson-Walter, Robert S. Gutzwiller, Dakota D. Scott and Nancy Cooke, 'Investigating Cyber Attacker Team Cognition', Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 66.1 (2022), 105–109 https://doi.org/10.1177/1071181322661132

Julia E Sullivan and Dmitriy Kamensky, ‘Putin’s Power Play: Russia’s Attacks on Ukraine’s Electric Power Infrastructure Violate International Law’, The Electricity Journal, 37.2 (2024), 107371–71 https://doi.org/10.1016/j.tej.2024.107371

Kessler, Oliver, and Wouter Werner, 'Expertise, Uncertainty, and International Law: A Study of the Tallinn Manual on Cyberwarfare', Leiden Journal of International Law, 26.4 (2013), 793–810 https://doi.org/10.1017/S0922156513000410031

Khashashneh, Tawfiq, Tareq Al-Billeh, Ali Al-Hammouri, and Roua Belghit, 'The Importance of Digital Technology in Extracting Electronic Evidence: How Can Digital Technology be used at Crime Scenes?', Pakistan Journal of Criminology, 15.4 (2023), 69-85 https://www.pjcriminology.com/publications/the-importance-of-digital-technology-in-extracting-electronic-evidence-how-can-digital-technology-be-used-at-crime-scenes/

Kleemann, Steven, 'Cyber Warfare and the ‘Humanization’ of International Humanitarian Law', International Journal of Cyber Warfare and Terrorism, 11.2 (2021), 1–11. https://doi.org/10.4018/IJCWT.2021040101

Kotenko, Loger, Elena Fedorchenko, Evgenia Novikova and Ashish Jha, 'Cyber Attacker Profiling for Risk Analysis Based on Machine Learning', Sensors, 23.4, (2023) https://doi.org/10.3390/s23042028

Leggat, Helaine, 'Cyber Warfare: An Enquiry into the Applicability of National Law to Cyberspace', International Journal of Cyber Warfare and Terrorism, 10.3 (2020), 28–46 https://doi.org/10.4018/IJCWT.2020070103

Leng, Yaxuan, 'When Can Cyberattack Constitute Use of Force: A Case Study of Cyberattack in the Russia-Ukraine Conflict', Lecture Notes in Education Psychology and Public Media, 17.1 (2023), 201–7 https://doi.org/10.54254/2753-7048/17/20231249

Li, Yuchong, and Qinghui Liu, 'A Comprehensive Review Study of Cyber-Attacks and Cyber Security; Emerging Trends and Recent Developments', Energy Reports, 7 (2021), 8176–8186 https://doi.org/10.1016/j.egyr.2021.08.126

Lin, Herbert, 'Cyber Conflict and International Humanitarian Law', International Review of the Red Cross, 94.886 (2013), 515–531 https://doi.org/10.1017/S1816383112000811

Liu, Ian Yuying, 'The Due Diligence Doctrine under Tallinn Manual 2.0.', Computer Law and Security Review, 33.3 (2017), 390–395 https://doi.org/10.1016/j.clsr.2017.03.023

LUOR, Tainyi, Jen Fu WANG, and Hsi-Peng LU, 'Trends in and Contributions to Tallinn Manual Research: An Assessment of the Literature from 1998 to November 2022', Informatica Economica, 27.3 (2023), 45–60 https://doi.org/10.24818/issn14531305/27.3.2023.04

M. R, Amal, and Venkadesh P, 'Hybrid H-DOC: A bait for analyzing cyber attacker behavior', International Journal of Electrical and Computer Engineering Systems, 14.1, (2023), 37–44 https://doi.org/10.32985/ijeces.14.1.5

Maˇc´ak, Kubo, 'INTERNATIONAL LAW AND PRACTICE From Cyber Norms to Cyber Rules: Re-Engaging States as Law-Makers', Leiden Journal of International Law, 30 (2020), 877–899 https://doi.org/10.1017/S0922156517000358

Madubuike-Ekwe, Joseph N., 'Cyberattack and the Use of Force in International Law', Beijing Law Review, 12.2 (2021), 631–49 https://doi.org/10.4236/blr.2021.122034

Mazaraki, Nataliia, and Yulia Goncharova, 'Cyber Dimension of Hybrid Wars: Escaping A ‘Grey Zone’ Of International Law to Adress Economic Damages', Baltic Journal of Economic Studies, 8.2 (2022), 115–120 https://doi.org/10.30525/2256-0742/2022-8-2-115-120

McKenzie, Simon, 'Cyber Operations against Civilian Data', Journal of International Criminal Justice, 19.5 (2022), 1165–1192. https://doi.org/10.1093/jicj/mqab067

Mozid, Ashraful, and Nelufer Yesmen, 'Term Paper on The Nature of Cyber Crime and Cyber Threats: A Criminological Review', Journal of Advanced Forensic Sciences, 1.1 (2020), 1–9 https://doi.org/10.14302/issn.2692-5915.jafs-20-3204

Muzyka, Viktoriia, 'New Wine in Old Bottles: Applicability of the Rules on Attribution to Cyberattacks Committed against Objects of Critical Infrastructure', Law Review of Kyiv University of Law, 3 (2020), 388–391 https://doi.org/10.36695/2219-5521.3.2020.72

Nagasako, Tomoko, 'A Consideration of the Case Study of Disinformation and Its Legal Problems', In IFIP Advances in Information and Communication Technology, 590 (2020), 262–276 https://doi.org/10.1007/978-3-030-62803-1_21

National Cyber Security Centre, 6th Cybersecurity Forum, Oman, Muscat. https://cert.gov.om/news/270

National Cyber Security Centre, National Cybersecurity Products and Services Guide for 2025, Oman, Muscat. https://cert.gov.om//librarys/publications/servicesGuideline.pdf

National Cybersecurity Center, Approval of the National Cybersecurity Strategy 2025-2028. Amman, Jordan https://ncsc.jo/Ar/NewsDetails/National_CS_Strategy_2025_2028

National Cybersecurity Center, The National Cybersecurity Center Issues its Cybersecurity Posture Report for the First Quarter of 2025. Amman, Jordan https://ncsc.jo/Ar/NewsDetails/Q1_2025_Report_NCSCJO

Nnawulezi, Uche, and Salim Bashir Magashi, 'Evolving Roles of the International Institutions in the Implementation Mechanisms of the Rules of International Humanitarian Law', Kutafin Law Review, 9.4 (2022), 684–712 https://doi.org/10.17803/2313-5395.2022.4.22.684-712

Nnawulezi, Uche, Kelechi Onyegbule and Charis Godson Ukanwa, 'Evolving Roles of the United Nations Agencies on the Implementation Mechanisms of the Rules of International Humanitarian Law', The Nigerian Juridical Review, 16 (2022), 43–63 https://doi.org/10.56284/tnjr.v16i1.12

Oğurlu, Ebru, 'International Law in Cyberspace: An Evaluation of the Tallinn Manuals', Annales de La Faculte de Droit d’Istanbul, 73 (2023), 327–44 https://doi.org/10.26650/annales.2023.73.0010

Orr, Zachary R., 'Redress for Unlawful Cyber-Attacks During Armed Conflict: The Limits of the International Criminal Court and How Human Rights Bodies Can Help Close the Gap', SSRN Electronic Journal, 57.359 (2023), 359-410 https://doi.org/10.2139/ssrn.4422358

Pettoello-Mantovani, Clara, 'Cybercrimes: An Emerging Category of Offenses within the Frame of the International Criminal Court Jurisdiction.” International Journal of Law and Politics Studies', Al-Kindi Center for Research and Development, 6.2 (2024), 6–11 https://doi.org/10.32996/ijlps.2024.6.2.2

Pipyros, Kosmas, Christos Thraskias, Lilian Mitrou, Dimitris Gritzalis, and Theodoros Apostolopoulos, 'A New Strategy for Improving Cyber-Attacks Evaluation in the Context of Tallinn Manual', Computers and Security, 74 (2018), 371–383. https://doi.org/10.1016/j.cose.2017.04.007

Pratama, B., and M. Bamatraf, 'Tallinn Manual: Cyber Warfare in Indonesian Regulation', In IOP Conference Series: Earth and Environmental Science, 729 (2021), 1-8 https://doi.org/10.1088/1755-1315/729/1/012033

Protas, Petro, and Leornard Chimanda Joseph, 'The Law of Armed Conflict in the Era of Cyber Technology: Assessing the Legal Challenges and Response in Tanzania', Eastern Africa Law Review, 47.1 (2020), 95–139 https://doi.org/10.56279/ealr.v47i1.4

Quader, Faisal, and Vandana P. Janeja, 'Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies', Journal of Cybersecurity and Privacy, 1.4 (2021), 638-659 https://doi.org/10.3390/jcp1040032

Rendón-Segador, Fernando J., Juan A. Álvarez-García, and Angel Jesús Varela-Vaca, 'Paying Attention to Cyber-Attacks: A Multi-Layer Perceptron with Self-Attention Mechanism', Computers and Security, 132 (2023), 103318 https://doi.org/10.1016/j.cose.2023.103318

Richardson, John C, 'Stuxnet as Cyberwarfare: Applying the Law of War to the Virtual Battlefield', SSRN Electronic Journal, 1 (2012), 1-38 https://doi.org/10.2139/ssrn.1892888

Samuli Haataja, ‘Cyber operations and automatic hack backs under international law on necessity’, Computer Law & Security Review, 53 (2024), 105992 https://doi.org/10.1016/j.clsr.2024.105992

Schellekens, Jasper, 'Release the Bots of War: Social Media and Artificial Intelligence as International Cyber Attack', Przegląd Europejski, 4 (2021), 163–179 https://doi.org/10.31338/1641-2478pe.4.21.10

Schmitt, Michael, 'Classification of Cyber Conflict', Journal of Conflict and Security Law, 17.2 (2012), 245–260 https://doi.org/10.1093/jcsl/krs018

Schmitt, Michael. N, 'Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations', Cambridge University Press, (2017) https://doi.org/10.1017/9781316822524

Shah, Pritik A., and Marcos Roberto Tovani‐Palone, 'Surgical Care Services in Inaccessible Zones: Targeted Palliative Care Accessibility Models for Patients in Resource‐Limited Settings', The International Journal of Health Planning and Management, 37.S1 (2022), 243–49 https://doi.org/10.1002/hpm.3580

Shukla, Vanshika, 'A BRIEF STUDY OF INTERNATIONAL LAW IN THE AGE OF CYBERSECURITY', EPRA International Journal of Multidisciplinary Research (IJMR), 9.11 (2023), 269–273 https://doi.org/10.36713/epra14915

Spáčil, Jakub, 'Cyber Operations against Critical Financial Infrastructure: A Non-Destructive Armed Attack?', International and Comparative Law Review, 22.2 (2022), 27–42 https://doi.org/10.2478/iclr-2022-0013

Sweet, Colin, 'Tallinn Manual on the International Law Applicable to Cyber Warfare', Europe-Asia Studies, 66.4 (2014), 669–670. https://doi.org/10.1080/09668136.2014.897423

Tanodomdej, Papawadee, 'The Tallinn Manuals and the Making of the International Law on Cyber Operations', Masaryk University Journal of Law and Technology, 13.1 (2019), 67–85 https://doi.org/10.5817/MUJLT2019-1-4

The First Additional Protocol to the Geneva Conventions of 1949. https://www.icrc.org/sites/default/files/external/doc/en/assets/files/other/icrc_002_0321.pdf

The National Cybersecurity Center. Cybersecurity: Bahraini-UK partnership to enhance international cooperation and build cyber capabilities. Bahrain. https://www.ncsc.gov.bh/ar/media-center/news-details.html?src=

The National Cybersecurity Center. The National Cybersecurity Center participates in the meetings of the Arab Cybersecurity Ministers Council. Bahrain. https://www.ncsc.gov.bh/en/media-center/news-details

The Statute of the International Criminal Court. July 17, 1998. https://www.icc-cpi.int/sites/default/files/2025-02/Rome-Statute-EN-2025.pdf

The UN Charter. https://www.un.org/en/about-us/un-charter

Thumfart, Johannes, 'Public and Private Just Wars: Distributed Cyber Deterrence Based on Vitoria and Grotius', Internet Policy Review, 9.3 (2020), 1–26 https://doi.org/10.14763/2020.3.1500

Tignino, Mara, 'The Regulation of Crimes against Water in Armed Conflicts and Other Situations of Violence', International Review of the Red Cross, 105.923 (2023), 706–734 https://doi.org/10.1017/S1816383123000061

Trahan, Jennifer, 'The Criminalization of Cyber-Operations Under the Rome Statute', Journal of International Criminal Justice, 19.5 (2021), 1133–1164 https://doi.org/10.1093/jicj/mqab066

Usman, Hazrat, Raja Ishtiaq Ahmed, and Syed Suliman Ali. 'Navigating the Gray Area: A Comprehensive Analysis of Cyber Warfare and Its Relationship to the Law of Armed Conflict', Global Legal Studies Review, 7.3 (2022), 32–36 https://doi.org/10.31703/glsr.2022(vii-iii).05

Voitasec, Dan-Iulian, 'Applying International Humanitarian Law to Cyber Attacks', Lex ET Scientia International Journal, 22.Xxii (2015), 552–556. http://www.icj-cij.org/docket/files/70/6503.pdf

Werner, Wouter, 'Say That Again, Please: Repetition in the Tallinn Manual', In Repetition and International Law, (2022), 95–114 https://doi.org/10.1017/9781009039666.005

Wheatley, Steven, 'Election Hacking, the Rule of Sovereignty, and Deductive Reasoning in Customary International Law', Leiden Journal of International Law, 36.3 (2023), 675–698 https://doi.org/10.1017/S0922156523000092

Woods, Daniel W., and Sezaneh Seymour, 'Evidence-Based Cybersecurity Policy? A Meta-Review of Security Control Effectiveness', Journal of Cyber Policy, 8.3 (2024), 1–19 https://doi.org/10.1080/23738871.2024.2335461

Yeremyan, Ara, and Lilit Yeremyan, 'International Law Issues of Cyber Defense', Moscow Journal of International Law, 2 (2022), 85–100 https://doi.org/10.24833/0869-0049-2022-2-85-100

Yuliya Miadzvetskaya, 'EU sanctions in response to cyber-attacks as crime-based emergency measures', Computer Law & Security Review, 54 (2024), 106010 https://doi.org/10.1016/j.clsr.2024.106010

Zahra, Iradhati, and Diajeng Wulan Christianti. 'The Beginning Of The International Humanitarian Law Application to Cyber Attack: The Status of Rule 30 Tallinn Manual 1.0.', Padjadjaran Journal of International Law, 5.1 (2021), 98–113 https://doi.org/10.23920/pjil.v5i1.366

Zahra, Iradhati, Irawati Handayani, and Diajeng Wulan Christianti. 'Cyber-Attack In Estonia: A New Challenge in the Applicability of International Humanitarian Law', Yustisia Jurnal Hukum, 10.1 (2021), 48-66 https://doi.org/10.20961/yustisia.v10i1.48336

Zhang, Yan, Degang Zhu, Menglin Wang, Junhan Li, and Jie Zhang, 'A comparative study of cyber security intrusion detection in healthcare systems', International Journal of Critical Infrastructure Protection, 44. (2024) https://doi.org/10.1016/j.ijcip.2023.100658