1393.

ج- پایان نامه و رساله:
1- اقبالی، کیوان؛ تحولات اخير در اصل تفكيك بين رزمندگان و غيررزمندگان در حقوق مخاصمات مسلحانه؛ پایان نامه کارشناسی ارشد، دانشگاه علامه طباطبایی، 1388.
2- برقعی، سید مهدی؛ بررسی حقوقی تهدیدات امنیتی ناشی از حملات سایبری:مورد استاکس نت؛ پایان نامه کارشناسی ارشد، دانشکده روابط بین‌الملل، تهران،1391.
3- حنفیه رجبی، محمد؛ حق توسل به زور در حملات شبکه‌ای رایانه‌ای ؛دانشگاه پیام نور تهران، پایان نامه کارشناسی ارشد، 1387.
4- داعی، علی، حق دادخواهی و جبران خسارت قربانیان نقض های شدید حقوق بین‌الملل بشردوستانه، رساله دکتری، دانشگاه علامه طباطبایی،1390.
5- عقیقی، نگار، جبران خسارت در طرح مسوولیت بین‌الملل دولت‌ها، پایان نامه کارشناسی ارشد، دانشگاه شهید بهشتی،1383.
6- لسانی،حسام الدین،مسئولیت بین‌المللی دولت در قبال الودگی هسته‌ای، پایان نامه کارشناسی ارشد،دانشگاه تهران،1380.
7- محقق ، مصطفی ، مبانی و توسعه مترقیانه حقوق بین‌الملل بشردوستانه، پایان نامه کارشناسی ارشد، دانشکده ی علوم سیاسی و معارف اسلامی دانشگاه امام صادق ( ع ) ، 1374.
8- مظفری، منصور، علل سیاسی عدم ایفای مسئولیت بین‌المللی دولت‌ها در چارچوب کنوانسیون کویت، پایان نامه کارشناسی ارشد، دانشگاه امام صادق (ع)، 1379.
9- یگانه آزاد،صنم، حقوق مخاصمات سایبری، پایان نامه کارشناسی ارشد، دانشگاه شیراز،دانشکده حقوق، 1393.

2-Non Persian Resources
A) Books

1- Brawski, J., “Avoiding War in the Nuclear age”, Westview Press,1986.
2- Brownlie, Ian, International Law and the Use of Force by States, Oxford University Press, 2002.
3- Barboza Julio,” International Criminal Law” ,Collected Courses of the Hague Academy of International Law,vol. 278,1999.
4- Boyle,Alan, “Soft Law in International Law-Making” in: Malcolm D.Evans,(ed) International Law, Oxford, Oxford University Press, 2006.
5- Borrie, John, Randin, Martin, Alternative Approaches in Multilateral Decision Making: Disarmament as Humanitarian Action, UNIDIR Publication, Geneva, 2005.
6- Clarke, Richard, Knake, Robert, Cyber War: The Next Threat to National Security and What to Do about it, New York, Ecco, 2010.
7- Cassese, Antonio,” The Proper Limit of Individual Responsibility uner the Doctrine of Joint Criminal Enterprise”,Journal of International Criminal Justice, vol.5,2007.
8- Crawford,J, The Draft Articles on Responsibility of States for International Wrongful Acts, Cambridge University,P.165 and Commentary Art 17 ,Para . 7, 2002.
9- C.W.Jenks,Liability for Ultra-Hazardous Activities in International Law,RCADI,1994.
10- Ckarl .Josef Partsch,”Humanitarian Law and Armed Conflicts”, Encyclopeia of Public International Law, vol.3, 1982.
11- Dinniss, Harrison, Cyber Warfare and the Laws of War, Cambridge University Press, 2012.
12- DD . Caron,”The Basis of Responsibility : Attribution and Other Trans-Substansive Rule,”lrvington-on-hudson,Transnational Publishers,1998.
13- D’Urso, Maurizio, The Cyber Combatant: a New Status for a New warrior, Philos. Technol, 2015.
14- Dunn, John E., “Stuxnet Details Leaked to Boost Obama, Alleges, 2012.
15- Dunant, Henry, A memory of Solferino ; published by: ICRC, 1986.
16- Gilten, Tom, Extending the Law of War into Cyberspace, 2010.
17- Haley, Andrew G., Space Law and Government, New York, Appleton-Century-Crofts, 1963.
18- Lauter pacht , The Contemporary Practice of the United Kingdom in the Field of International Law , International , Comparative Law Quarterly , Vol.7 ,Part 3 ,1959.
19- Law and Armed, Oxford Institute for Ethics Hosted by Responses, Draft of Arms Trade Treaty, 2010.
20- Malanczuc ,P., “Space Law as a Branch of International Law”, in:L.A.N.M. Barn Hoorn, K.C.Wellens,(Ed.) “Diversity in Secondary Rules and the Unity of International Law”, Martinus Nijhoff Publishers, 1995.
21- Pictet , J , Commentary on the Geneva Convention I of 1949.
22- Roscini, Marco, World Wide Warfare – Jus ad bellum and the Use of Cyber ,Max Planck Yearbook of United Nations Law, Volume 14, 2010.
23- Rex B. Hughes, NATO and Cyber Defence: Mission Accomplished, ATLANTISCH PERSPECTIEF, Apr. 2009.
24- Simma, Bruno, “The Charter of the United Nations: a commentary”, Oxford, 2002.
25- Simma, Bruno, and Andreas Mueller, Exercise and the Limits of Jurisdiction, In: James Crawford, and Martin Koskenniemi, The Cambridge Companion to International Law, Cambridge University Press, 2012.
26- Steve D. Roper and Others, Accountability for Human Right Atrocities in International Law, Oxford University Press,Oxford, 2007.
27- Schwarzenberger. G, International Law as Applied By International Courts and Tribunals vol ii, The Law of Armed Conflict , London. Stevens, 1968.
28- Schwarzenberger G.”A manual of International law” London Stevens & sons,1967.
29- Tsagourias, Nicholas ,Cyber attacks, self-defence and the problem of attribution, Journal of Conflict & Security Law _ Oxford University Press, 2012.
30- The Law of Armed Conflict , London. Stevens, 1968.
31- Wingfield, Thomas, The Law of Information Conflict, 2000.

B) Researches

1- A New Approach to China, THE OFFICIAL GOOGLE BLOG, 2010.
2- Andrea Shalal-Esa, Cyber-attacks “bought us time” on Iran: U.S. sources, WASHINGTON, 2012.
3- Arie Schaap, Cyber Warfare Operations: Development and Use under International Law, The Air Force Law Review 64 ،2009.
4- Betz David,Stevens Tim,” Cyberspace and Sovereignty”, In Cyberspace and the State, Toward a Strategy for Cyber Power, The International institute for Strategic Studies,2011.
5- Barton Gellman, Cyber Attacks by Al Qaeda Feared; Terrorists at Threshold of Using Internet as Tool of Bloodshed, Experts Say, WASH. POST, June 27, 2002, at A01.
6- Belk, Robert and Noyes, Matthew On the Use of Offensive Cyber
Capabilities: A Policy Analysis on Offensive US Cyber Policy, USA: The Office of Naval Research, 2012.
7- Bell,Tom , Polycentric Law in the New Century, “Policy,” publication of The Center for Independent Studies, St Leonards, Australia, Autumn, 1999.
8- CARR, JEFFREY, INSIDE CYBER WARFARE, Sebastopol, CA: O’Reilly Media, 2010.
9- Cassese, Antonio, On the Current Trend towards Criminal Prosecution and Punishment of Breaches of International Humanitarian Law,EJIL,vol.9,No.1,1998.
10- Cheng , General Principle of Law as Applied by International Courts and Tribunal, Cambridge University Press, 1987.
11- Crawford, Emily, Virtual Battlegrounds: Direct Participation in Cyber Warfare, Sydney Law School , Legal Studies Research Paper, No. 12/10, 2012.
12- Cornish, Paul, Livingstone, Clemente , Dave, Yorke ,Claire, On Cyber Warfare,A Chatham House Report ,November 2010.
13- Cheng, Bin, Studies in International Space Law, Clarendon Press, Oxford, 1997.
14- Deels ,Ashley ,”tallin2 and a chinese view on the tallin process” lawfare, 2015.
15- Dunlap, Charles J., “Perspectives for Cyber Strategists on Law for Cyberwar”, Strategic Studies Quarterly, 2011.
16- Evo
lving Nature of the Problem and Possible the International Proliferation of Conventional Arms-the Conflict, 8 julay 2008.
17- Freeman .M, International Law and Internal Armed Conflicts : Clarifying The Interplay between Human Rights and Humanitarian Protections , Subscribe to The Journal of Humanitarian Assistance 2000.
18- Gellman, Barton, Cyber Attacks by Al Qaeda Feared; Terrorists at Threshold of Using Internet as Tool of Bloodshed, Experts Say, WASH. POST, June 27, 2002.
19- Hollins, Duncan, Why States Need an International Law for Information Operations, 11 LEWIS & CLARK L. REV. 1023, 1042, 2007.
20- General Accounting Office, Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety, 1998.
21- Goldsmith, Jack, What is the Government’s Strategy for the Cyber-exploitation Threat, Lawfareblog.com, Aug. 10, 2011.
22- Gibney , Mark , state Responsibility and The Object and Purpose of the Genocide Convention , International studies Journal , Vol .4 , No.283 , 2007- 8.
23- Gibney, Mark ,Tomasevski . K and Jens Vedsted – Hansen , Transnational State Responsibility for Violation of Human Rights , Harvard Human Rights Journal , Vol . 129 , 1999.
24- Graham, David, Cyber Threats and the Law of War, JOURNAL OF NATIONAL
SECURITY LAW & POLICY, Vol. 4, 2010.
25- Goodin, Dan, “Enemies reduced to ‘hunks of metal and plastic’”, San Francisco Posted in Government, Date:?.
26- Hollis, Duncan, “Could Deploying Stuxnet be a War Crime?”, Available at: http://opiniojuris.org/2011/01/25/could-deploying-stuxnet-be-a-war-crime.
27- Hans-Henrich, Jeschech “The General Principles of International Criminal Law Set Out in Nurmberg, as Mirrored in the ICC Statute”, Journal of International Criminal Justice, Vol.2, 2008.
28- Hortensia D.T.Gutierrez Psse, “The Relationship between International Humanitarian Law and The International Criminal, International Review of the Red Cross(IRRC), Vol.88.
29- Hathaway Oona and Crootof Rebecca, Levitz Philip, “The Law of Cyber Attack”, California Law Review,2012.
30- Icrc, What limits does the law of war impose on cyber attacks?, 2013.
31- Jinks, Derek, State Responsibility for the Acts of Private Armed Groups, The Chicago Journal of International Law, Vol.14, N0.1 2003.
32- Josefson, Ebban,Cyber Warfare and the Concept of Armed Attack, Department of Law at the Gothenburg University, 2012.
33- Jescheck. H. H., War Crimes , E.P.I.L, Vol. 4,1982.
34- JOINT CHIEFS OF STAFF, U.S. DEP’T OF DEF., JOINT PUB. 3-13, INFORMATION OPERATIONS, 2006.
35- Jody Westby, International Guide to Combating Cybercrime, American
Bar Association Publishing, 2003.
36- Kellman, Barry, An International Criminal Law :Approach to Bioterrorism, Harvard Journal, Vol:25, 2001.
37-Komarow, Gary,”Individual Responsibility under International Law: The Nuremberg Principles in Domestic Legal Systems”, International and Comparative Law Quarterly.
38- Kelsey, “Hacking into International Humanitarian Law”, J.D. candidate, May 2008.
39- klimburg, Alexander,

دسته بندی : پایان نامه ها

دیدگاهتان را بنویسید