[1] 迈克尔·沃尔泽.正义与非正义战争:通过历史实证的道德论证[M].南京:江苏人民出版社,2008. [2] Dipert,Randall. The ethics of cyberwarfare. Journal of Military Ethics[J].2010,Volume 9,Issue 4. 384-410. [3] Winn Schwartau.Information warfare:chaos on the electronic superhighway[M].New York:Thunder's Mouth Press.1994. [4] John,Arquilla,David,Ronfeldt. Cyberwar Is Coming![J].Comparative Strategy,1993(2). [5] John Arquilla. Can information warfare ever be just?[J].Ethics and Information Technology:1999(3). [6] Rattray,Gregory.Strategic Warfare in Cyberspace. Cambridge[M].MA:The MIT Press.2001. [7] 乔良,王湘穗.超限战[M].北京:中国社会出版社.2005. [8] Kaspersky Lab's experts believe that Stuxnet manifests the beginning of the new age of cyber-warfare[EB/OL].http://www.kaspersky.com /about/news/virus/2010/Kaspersky_Lab_provides_its _insights_on_Stuxnet_worm. 24 Sep 2010,访问日期2015-02-12. [9] Randall R. Dipert. The Ethics of Cyberwarfare[J].Journal of Military Ethics,2010(4). [10] Patrick Lin,Fritz Allhoff,and Neil C. Rowe. War 2.0 Cyberweapons and Ethics[J].Communications of the Acm.March2012(3). [11] Hamelink,Cees J.The ethics of cyberspaceby[M].Sage.2000. [12] Kris E Barcomb;Dennis J Krill;Robert F Mills;Michael A Saville. Establishing Cyberspace Sovereignty[J].International Journal of Cyber Warfare and Terrorism,2012(3). [13] Dipert,R. R. (2006b) Preventive War and the Epistemological Dimension of the Morality of War,Journal of Military Ethics,Vol 5,No1. 32-54. [14] Michael N.Schmitt. Cyber Operations and the Jud Ad Bellum Revisited[EB/OL].digitalcomons. law.villanova.edu/cgi/viewcontent.cgi?article=101 9&context=vlr.访问日期2015-02-12. [15] Ralph Langner.To Kill a Centifuge:A Technical Analysis of What Stuxnet’s Creators Tried to Achive[M].Langner Group. 2013. [16] Kenneth Lieberthal,Peter W.Singer. Cyber security and US-China Relations[M].Brookings,2012. [17] Christopher J. Eberle. Just War and Cyberwar [J].Journal of Military Ethics,2013(1). [18] Eric Sterner. Retaliatory Deterrence in Cyberspace[J].Strategic Studies Quarterly,2011(1). [19] Will Goodman,Cyber Deterrence:Tougher in Theory than in Practice?[J].Strategic Studies Quarterly,Fall 2010. [20] Tikk,E.et al. Cyber Attacks Against Georgia:Legal Lessons Identified. CCDCOE.2008.www.infowar-monitor.net/2009/04/ccdcoe-cyber-attacks-against-georgia-legal-lessons-identified/. [21] Brookings. Deterrence in Cyberspace:Debating the Right Strategy with Ralph Langner and Dmitri Alperovitch[R]. Washington,D.C. Tuesday,September 20,2011. www.brookings.edu/~/media/events/2011/9/20-cyberspace-deterrence/20110920 _cyber_defense.pdf.访问日期2015-02-16. [22] Klaus-Gerd Giesen. Towards a Theory of Just Cyberwar[J].International Conference on Information Warfare and Security,2013(1). [23] David D.Clark;Susan Landau,“Untangling Attribution,” Washington D.C.:National Academies Press,2010,p40.转引自何奇松.美国网络威慑理论之争[J].国际政治研究.2013(2). [24] John Arquilla.Twenty Years of Cyberwar[J].Journal of Military Ethics. Apr 2013. [25] Herbert Lin.Escalation Dynamics and Conflict Termination in Cyberspace[J].Strategic Studies Quarterly,Vo1.6,No.3,Fall 2012. [26] Neil C. Rowe. The Ethics of Cyberweapons in Warfare[J].International Journal of Technoethics,2010(1). [27] Dacus,Chad;Yannakogeorgos,Panayotis A. Designing Cybersecurity into Defense Systems:An Information Economics Approach[J].IEEE Security & Privacy2016(3). [28] Meyer,Paul. Seizing the Diplomatic Initiative to Control Cyber Conflict[J].The Washington Quarterly.2015(2). |