-
2
-
-
33645134706
-
A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict
-
Brown, D. (2006) "A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict", Harvard International Law Journal, 47 (1), 179-221.
-
(2006)
Harvard International Law Journal
, vol.47
, Issue.1
, pp. 179-221
-
-
Brown, D.1
-
3
-
-
84872910476
-
-
CDL. (n.d.) Retrieved from
-
CDL. (n.d.). Cyber Defence League. Retrieved from http://www.kaitseliit. ee/index.php?op=body&cat-id=395.
-
Cyber Defence League
-
-
-
4
-
-
84872956054
-
-
Retrieved from
-
Council of Europe. (2001). Convention on Cybercrime. Retrieved from http://conventions.coe.int/treaty/en/treaties/html/185.htm.
-
(2001)
Convention on Cybercrime
-
-
-
5
-
-
84872967674
-
Council Framework Decision 2005/222/JHA of 24 February 2005 on attacks against information systems
-
Council of Europe
-
Council of Europe. (2005). Council Framework Decision 2005/222/JHA of 24 February 2005 on attacks against information systems. Official Journal L 69, 67-71.
-
(2005)
Official Journal
, vol.L 69
, pp. 67-71
-
-
-
6
-
-
0242440508
-
Activism, hacktivism, and cyberterrorism: The internet as a tool for influencing foreign policy
-
Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism: the internet as a tool for influencing foreign policy. Networks and netwars: The future of terror, crime, and militancy, 239-288.
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
, pp. 239-288
-
-
Denning, D.E.1
-
8
-
-
84872938561
-
-
Retrieved January 31, 2011, from
-
ENISA. (2010). EU Cyber Security Exercise 'Cyber Europe 2010'. Retrieved January 31, 2011, from http://www.enisa.europa.eu/media/press-releases/cyber- europe-20102019-cyber-security-exercise-with-320-2018incidents2019-successfully- concluded.
-
(2010)
EU Cyber Security Exercise 'Cyber Europe 2010'
-
-
-
10
-
-
84872969017
-
-
Estonian Government. Retrieved from
-
Estonian Government. (2007b). Explanatory Memorandum to the Draft Act on the Amendment of the Penal Code (116 SE) (In Estonian). Retrieved from http://www.riigikogu.ee/?page=pub-file&op=emsplain&content-type= application/msword&u=20090902161440&file-id=198499&file-name=KarS seletuskiri(167).doc&file-sise=66048&mnsensk=166+SE&etapp=03.12. 2007&fd=29.10.2008.
-
(2007)
Explanatory Memorandum to the Draft Act on the Amendment of the Penal Code (116 SE) (In Estonian)
-
-
-
13
-
-
63349101242
-
Battling botnets and online mobs: Estonia's defense efforts during the internet war
-
Evron, G. (2008). Battling botnets and online mobs: Estonia's defense efforts during the internet war. Georgetown Journal of International Affairs, 9(1), 121-126.
-
(2008)
Georgetown Journal of International Affairs
, vol.9
, Issue.1
, pp. 121-126
-
-
Evron, G.1
-
14
-
-
84865426661
-
A Brief Examination of Media Coverage of Cyberattacks (2007 - Present)
-
C. Czosseck & K. Geers (Eds.), IOS Press
-
Farivar, C. (2009). A Brief Examination of Media Coverage of Cyberattacks (2007 - Present). In C. Czosseck & K. Geers (Eds.), The Virtual Battlefield: Perspectives on Cyber warfare (pp. 182-188). IOS Press.
-
(2009)
The Virtual Battlefield: Perspectives on Cyber Warfare
, pp. 182-188
-
-
Farivar, C.1
-
18
-
-
84872971904
-
-
Retrieved from
-
Kash, W. (2008). Lessons from the cyberattacks on Estonia. Retrieved from http://gcn.com/articles/2008/06/13/lauri-almann-lessons-from-the-cyberattacks- on-estonia.aspx.
-
(2008)
Lessons from the Cyberattacks on Estonia
-
-
Kash, W.1
-
20
-
-
0039903416
-
In Estonia, what may be the first war in cyberspace
-
Retrieved from
-
Landler, M., & Markoff, J. (2007). In Estonia, what may be the first war in cyberspace. The New York Times. Retrieved from http://www.nytimes.com/ 2007/05/28/business/worldbusiness/28iht-cyberwar.4.5901141.html.
-
(2007)
The New York Times
-
-
Landler, M.1
Markoff, J.2
-
21
-
-
84872952855
-
Pinprick attacks, a lesser included case?
-
C. Czosseck & K. Podins (Eds.), Tallinn: CCD COE Publications
-
Lemay, A., Fernandeza, J. M., & Knight, S. (2010). Pinprick attacks, a lesser included case? In C. Czosseck & K. Podins (Eds.), Conference on Cyber Conflict Proceedings (pp. 183-194). Tallinn: CCD COE Publications.
-
(2010)
Conference on Cyber Conflict Proceedings
, pp. 183-194
-
-
Lemay, A.1
Fernandeza, J.M.2
Knight, S.3
-
22
-
-
80051983932
-
Cyber Warfare: As a form of low-intensity conflict and insurgency
-
C. Czosseck & K. Podins (Eds.), Tallinn: CCD COE Publications
-
Liles, S. (2010). Cyber Warfare: As a form of low-intensity conflict and insurgency. In C. Czosseck & K. Podins (Eds.), Conference on Cyber Conflict Proceedings (pp. 47-57). Tallinn: CCD COE Publications.
-
(2010)
Conference on Cyber Conflict Proceedings
, pp. 47-57
-
-
Liles, S.1
-
24
-
-
79953896107
-
-
Retrieved from
-
MoD. (2008). Cyber Security Strategy. Retrieved from http://www.mod.gov. ee/files/kmin/img/files/Kuberjulgeoleku-strateegia-2008-2013-ENG.pdf.
-
(2008)
Cyber Security Strategy
-
-
-
25
-
-
84872967319
-
-
MoD. Retrieved from
-
MoD. (2010). NATIONAL SECURITY CONCEPT. Retrieved from http://www.kmin.ee/files/kmin/nodes/9470-National-Security-Concept-of-Estonia. pdf.
-
(2010)
National Security Concept
-
-
-
26
-
-
77954442435
-
-
MoEAC. Retrieved from
-
MoEAC. (2006). Estonian Information Society Strategy 2013. Retrieved from http://www.riso.ee/en/system/files/EstonianInformationSocietyStrategy2013.pdf.
-
(2006)
Estonian Information Society Strategy 2013
-
-
-
32
-
-
84872945334
-
-
MoI. unofficial translation Retrieved January 4, 2011, from
-
MoI. (2009). Estonian Emergency Act (unofficial translation). Retrieved January 4, 2011, from http://www.legaltext.ee/et/andmebaas/tekst.asp?loc= text&dok=XXXXX26&keel=en&pg=1&ptyyp=RT&tyyp=X&query= h□daolukorra.
-
(2009)
Estonian Emergency Act
-
-
-
35
-
-
84872898667
-
-
MoJ. unofficial translation Retrieved from
-
MoJ. (2010b). Estonian Code of Criminal Procedure (unofficial translation). Retrieved from http://www.legaltext.ee/text/en/X60027K6.htm.
-
(2010)
Estonian Code of Criminal Procedure
-
-
-
38
-
-
84865438649
-
Politically Motivated Denial of Service Attacks
-
C. Czosseck & K. Geers (Eds.), 163-181: IOS Press
-
Nazario, J. (2009). Politically Motivated Denial of Service Attacks. In C. Czosseck & K. Geers (Eds.), The Virtual Battlefield: Perspectives on Cyber Warfare (pp. 163-181). 163-181: IOS Press.
-
(2009)
The Virtual Battlefield: Perspectives on Cyber Warfare
, pp. 163-181
-
-
Nazario, J.1
-
40
-
-
84873187125
-
Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective
-
Academic Conferences Limited
-
Ottis, R. (2008). Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective. Proceedings of the 7th European Conference on Information Warfare (p. 163). Academic Conferences Limited.
-
(2008)
Proceedings of the 7th European Conference on Information Warfare
, pp. 163
-
-
Ottis, R.1
-
41
-
-
84873170803
-
Theoretical Model for Creating a Nation-State Level Offensive Cyber Capability
-
Academic Publishing Limited
-
Ottis, R. (2009). Theoretical Model for Creating a Nation-State Level Offensive Cyber Capability. 8th European Conference on Information Warfare and Security (pp. 177-182). Academic Publishing Limited.
-
(2009)
8th European Conference on Information Warfare and Security
, pp. 177-182
-
-
Ottis, R.1
|