사이버전의 국제법적 분석을 위한 기본개념의 연구

' 사이버전의 국제법적 분석을 위한 기본개념의 연구' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • 법학
  • cyber attack
  • cyber operation
  • cyber warfare
  • jusadbellum
  • tallinn manual
  • un gge
  • un정부전문가그룹
  • 무력충돌법
  • 사이버 공격
  • 사이버 조작
  • 사이버전
  • 탈린매뉴얼
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
8,313 1

0.0%

' 사이버전의 국제법적 분석을 위한 기본개념의 연구' 의 참고문헌

  • 나토 “사이버 테러로 인명피해 땐 군사력 보복 가능, 사이버 교전 수칙 첫 성문화 무력분쟁 규정 … 국제법 적용 댐․제방․원전 공격은 못하게
    중앙일보 [2013]
  • 간호학대사전
  • “Attack” as a Term of Art in International Law: The Cyber Operations Context
    Michael N. Schmitt 2012 4th International Conference on Cyber Conflict : 287 ~ [2012]
  • http://krdic.naver.com/detail.nhn?docid=34342200
  • http://krdic.naver. com/detail.nhn?docid=31964500
  • Ziolkowski, supra note 61
  • Ziolkowski, supra note 3
  • Yoram Dinstein, War Aggression and Self Defence, supra note 121 : 203 ~ 204
  • War Aggression, and Self-Defence
    Yoram Dinstein Cambridge University Press : 206 ~ [2011]
  • W32.Stuxnet Dossier
  • USDOD, supra note 4, B-5, Figure B-3 'Terminology commonly used in error'
  • The Sixth Annual Waldemar A. Solf Lecture in International Law: Terrorism, the Law, and the National Defense
    Abraham D. Sofaer Mil. L. Rev 126 (89) : 93 ~ 96 [1989]
  • The New Oxford American Dictionary
  • The 'Use of Force' in Cyberspace: A Reply to Dr Ziolkowski, supra note 48 : 315 ~
  • The 'Use of Force' in Cyberspace: A Reply to Dr Ziolkowski
    Michael N. Schmitt 2012 4th International Conference on Cyber Conflict : 313 ~
  • Tallinn Manual, supra note 7, para. 2 of commentary accompanying chapeau to Part 1
  • Tallinn Manual, supra note 7, para. 1 of commentary accompanying chapeau to Ch. II
  • Tallinn Manual, supra note 7, Rule 48
  • Tallinn Manual, supra note 7, Rule 20 cmt. 10
  • Tallinn Manual, supra note 7, Rule 11 cmt. 1
  • Tallinn Manual, supra note 7, Rule 10 cmt. 5, Rule 13 cmt. 16
  • Tallinn Manual on the International Law Applicable to Cyber Warfare
    Michael N. Schmitt Cambridge University Press [2013]
  • Stuxnet may have destroyed 1,000 centrifuges at Natanz
  • Stuxnet Malware and Natanz: Update of ISIS December 22, 2010 Report
  • Strategy for Operating in Cyberspace
  • Self-Defense and the Oil Platforms Decision
    William H. Taft IV Yale J. Int’l L 59 (259) : 299 ~ 302 [2004]
  • Self- Defence in International Law : 188 ~ 189
  • Schmitt, supra note 48 : 314 ~ 315
  • Schmitt, supra note 19
  • Schmitt, supra note 105 : 288 ~
  • Retired US general 'may have leaked Stuxnet cyberattack details
  • Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security
    [2013]
  • Reading the UN Charter Connotatively: Toward a New Definition of Armed Attack
    Norman Menachem Feder N.Y.U. J. Int’l L. & Pol 19 : 415 ~ [1986]
  • Protocol Additional(I) to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts(Additional Protocol I), art. 1(2), June 8, 1977, 1125 U.N.T.S. 3
    [1977]
  • Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts, Art. 36(June 8, 1977, 1125 U.N.T.S. 3
    [1977]
  • Oil Platforms : 161 ~
    [2003]
  • Newsmaker: Cyberattack in Estonia--what it really means
  • New British Cyber defense force will protect industry – and “if needed, strike in cyberspace
  • NATO Glossary of Terms and Definitionas(AAP-6)
  • Military and Paramilitary Activities in and Against Nicaragua, supra note 45, paras. 191, 195 and 210
  • Military and Paramilitary Activities in and Against Nicaragua, supra note 45
  • Military and Paramilitary Activities in and Against Nicaragua, Id,. para. 195
  • Military and Paramilitary Activities in and Against Nicaragua
    [1986]
  • Letter from Daniel Webster to Lord Ashburton(1842. 8. 6.), reprinted in John Bassett Moore(ed), 2 International Law Digest 412(1906)
    [1906]
  • Legality of the Threat or Use of Nuclear Weapons, supra note 30
  • Legality of the Threat or Use of Nuclear Weapons : 226 ~
  • Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory, Advisory Opinion, 2004 I.C.J. 136, para. 139(2004.7.9)
    [2004]
  • Koh, supra note 20 : 7 ~
  • Ius ad bellum in Cyberspace – Some Thoughts on the “Schmitt-Criteria” for Use of Force
    Katharina Ziolkowski 2012 4th International Conference on Cyber Conflict : 295 ~ [2012]
  • International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World
    White House
  • International Strategy for Cyberspace, supra note 9 : 5 ~
  • International Strategy for Cyberspace, supra note 9 : 14 ~
  • International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed
    Michael N. Schmitt Harv. Int'l L.J. Online 54 : 15 ~ [2012]
  • International Law in Cyberspace Remarks as Prepared for Delivery by Harold Hongju Koh to the USCYBERCOM Inter-Agency Legal Conference Ft. Meade, MD, Sept. 18, 2012 54 : 1 ~
  • International Law and the Use of Force between States : 275 ~ 278
  • International Law and Armed Conflict: Exploring the Faultlines : 165 ~ 168
  • Information Warfare as International Coercion: Elements of a Legal Framework
    C.C. Joyner European Journal of International Law 12 : 855 ~ [2001]
  • Information Warfare and International Law on the Use of Force
    J. Barkham New York University Journal of International Law & Politics 34 : 88 ~ [2001]
  • Independent International Commission on Kosovo, The Kosovo Report: Executive Summary - Main Findings
  • Id., Rules 14, 15
  • Id., Rule 13, cmt. 6
  • Id
  • IT용어사전
  • Estonia's Lessons in Cyberwarfare
  • Dictionary of Military and Associated Terms
    U.S. Department of Defense
  • Developments in the Field of Information and Telecommunications in the Context of International Security
    UNODA Disarmament Study Series (33) : 35 ~ 37 [2011]
  • DOD at Work on New Cyber Strategy
  • Cyber-focused British command operational
  • Cyber Operations and the Jus Ad Bellum Revised
    Michael N. Schmitt Villanova Law Review 56 : 576 ~ [2011]
  • Convention(IV) Respecting the Laws and Customs of War on Land and its annex: Regulations concerning the Laws and Customs of War on Land, art. 22, Oct. 18, 1907, 36 Stat. 2277
    [1907]
  • Convention(II) with Respect to the Laws and Customs of War on Land, pmbl., July 29, 1899, 22 Stat. 1803
    [1899]
  • Computers and War: The Legal Battlespace : 5 ~
  • Computer Network Operations and the Law of Armed Conflict
    Katharina Ziolkowski Military Law and the Law of War Review 47 : 47 ~ 94 [2010]
  • Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework
    Michael N. Schmitt Columbia Journal of Transnational Law 37 (3) : 914 ~ [1999]
  • Computer Network Attack and International Law : 67 ~
  • Computer Network Attack and International Law : 103 ~
  • Armed Activities on the Territory of the Congo (Dem. Rep. Congo v. Uganda), 2005 I.C.J.168, paras. 146-147(2005.12.19)
    [2005]
  • After Stuxnet: Iran says it’s discovered 2nd cyber attack”
    Reuters