Open Access
Issue |
SHS Web Conf.
Volume 134, 2022
14th Session of Euro-Asian Law Congress “The value of law” 2021
|
|
---|---|---|
Article Number | 00159 | |
Number of page(s) | 5 | |
DOI | https://doi.org/10.1051/shsconf/202213400159 | |
Published online | 09 February 2022 |
- R. Buchan, Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions? Journal of Conflict and Security Law, 17(2) 211 (2012). [Google Scholar]
- M. Roscini, Cyber Operations as a Use of Force, Research Handbook on International Law and Cyberspace, 3,9 (2015). [Google Scholar]
- Cybersecurity Strategy. Toward a World-Leading, Resilient and Vigorous Cyberspace, 8 (2013). [Google Scholar]
- E. Ukhanova, Military aspect of Japan's space program, Asia and Africa today, 5, 22–26 (2015). [Google Scholar]
- The Basic Act on Cybersecurity (2014). [Google Scholar]
- Cybersecurity Strategy, 5 (2015). [Google Scholar]
- J. S. Nye Jr., Deterrence and dissuasion in cyberspace, International Security, 41:3, 56 (2017). [Google Scholar]
- I. Stadnik, N. Tsvetkova, United States cybersecurity policy. The evolution of threat perceptions, International Trends, 16:3, 164 (2018). [Google Scholar]
- E. Ukhanova, Japan’s space policy: state support for commercial sector, Japanese studies in Russia, 2, 63–81 (2020). [Google Scholar]
- L. Kello, Cyber legalism: why it fails and what to do about it, Journal of Cybersecurity, 7 (2021), https://doi.org/10.1093/cybsec/tyab014. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.