فهرست منابع
الف) منابع فارسی
ایپسن، نات. «رزمندگان و غیررزمندگان». ترجمه کتایون حسیننژاد در حقوق بشردوستانه در مخاصمات مسلحانه، دیتر فلک، ویراسته سید قاسم زمانی و نادر ساعد. 145-101. تهران: انتشارات مؤسسه مطالعات و پژوهشهای حقوقی، 1387.
مورکیان، محمود. «جنگ اطلاعات از منظر حقوق بینالملل». پایاننامه کارشناسی ارشد حقوق بینالملل، تهران: دانشگاه علامه طباطبائی، 1385.
ب) منابع انگلیسی
Brown, Davis. “A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict.” Harward International Law Journal 47(1) (2006): 179-221.
Dormann, Knut. “Applicability of the Additional Protocol to Computer Network Attacks, International Expert Conference on Computer Network Attacks and the Applicability of International Humanitarian Law.” Stockholm (2004): 3. Last Visited 2012/05/10. http://www.icrc.org/eng/resources/documents/misc/68lg92.htm
ICTY, Prosecutor vs. Dusko Tadic, Case IT-94-1, Opinion and Judgment, May 7, 1997.
Kelsey, Jeffrey T.G. “Hacking into International Humanitarian Law: the Principles of Distinction and Neutrality in the Age of Cyber Warfare.” Michigan Law Review 106 (2008): 1427-1452.
Legality of the Threat or Use of Nuclear Weapon, ICJ Reports, 1996.
McDonald, Avrill. “The Challenges to International Humanitarian Law and the Principles of Distinction and Protection from the Increased Participation of Civilians in Hostilities.” Paper Presented at the Round Table of “Intitative on Interplay between International Humanitarian Law and International Human Rights Law”, Tehran, Tehran University, April, 2004.
Melzer, Nils. “Direct Participation in Hostilites under International Humanitarain Law.” Geneva: ICRC, May, 2009.
Protocol Additional to Geneva Conventions of 12 August 1949.
Robbat, Micheal J. “Resolving the Legal Issues Concerning the Use of Information Warfare in the International Forum: The Reach of the Existing Legal Framework, and the Creation of a New Paradigm.” Journal of Science & Technology Law 6 (2000): 264-289.
Schmitt, Michael N. “Direct Participation in Hostilities and 21st Century Armed Conflict.” In Crisis Management and Humanitarian Protection: Festschrift fur Dieter Fleck, edited by Horst Fischer, 505-529. Berlin: Berliner Wiss.Verl, 2004
Schmitt, Micheal N. “Wired Warfare: Computer Network Attack and Jus in Bello.” International Review of the Red Cross 84(846) (2002): 365-399.
Sussoli, Macro. “Legitimate Targets of Attacks under International Humanitarian Law.” Paper Presented at the the Meeting on the Reaffirmation and Development of International Humanitarian Law, The Program on Humanitarian Policy and Conflict Research In Harvard University, Cambridge, UK, January 27, 2003.
Watts, Sean. “Combatants Status and Computer Network Attack.” Virginia Journal of International Law 50 (2010): 391-447.