انجمن حقوق بینالملل، اصول حاکم بر شکلگیری حقوق بینالملل عرفی عام، مترجم: محمدجعفر قنبری جهرمی، تهران: دراک، چاپ اول، 1384.
پاکزاد، بتول، تروریسم سایبری، رسالهی دکتری حقوق کیفری و جرمشناسی، دانشکدهی حقوق دانشگاه شهید بهشتی، 1388.
پاکزاد، بتول، «ماهیت تروریسم سایبری»، مجلهی تحقیقات حقوقی دانشگاه شهید بهشتی، ویژهنامهی شمارهی 4، بهار 1390.
حسنبیگی، ابراهیم، حقوق و امنیت در فضای سایبر، تهران: مؤسسهی فرهنگی مطالعات و تحقیقات بینالمللی ابرار معاصر تهران، چاپ اول، 1384.
حلمی، نصرتالله، تدوین و توسعه حقوق بینالملل: مسؤولیت بینالمللی دولت و حمایت سیاسی، تهران: میزان، چاپ اول، 1387.
ضیایی بیگدلی، محمدرضا، حقوق معاهدات بینالمللی، تهران: گنج دانش، چاپ اول، 1383.
فضلی، مهدی، مسؤولیت کیفری در فضای سایبر، تهران: خرسندی، چاپ اول، 1389.
محمدعلی پور، فریده، دفاع مشروع در حقوق بینالملل، تهران: دفتر مطالعات سیاسی و بینالمللی، چاپ اول، 1379.
نورمحمدی، مرتضی، «سایبر تروریسم: تروریسم در عصر اطلاعات»، مجموعهی مقالات تروریسم و مقابله با آن، به اهتمام عباسعلی کدخدایی؛ نادر ساعد، تهران: مجمع جهانی صلح اسلامی، چاپ اول، 1390.
Advisory Opinion on the Legality of the Threat or use of Nuclear weapons ICJ Reports 1996.
Ago, R., “Eight Report on State Responsibility”, in: ILC (ed.), Yearbook of the International Law Commission, vol. 2, 1980.
A More Secure World: Our shared Responsibility, Report of the High Level Panel on Threats, Challenges and Change, Doc. A/59/565.
Antolin-Jenkins, V.M., “Defining the Parameters of Cyberwar Operations: Looking for Law in All the wrong Places?” Naval Law Review, No. 51, 2005.
Armed Activities on the Territory of the Congo (DRC V.Uganda), ICJ Reports 2005.
Beaumont, P., “US Appoints First Cyber warfare General”, the Observer, 10. 23 May 2010.
Brenner, S.W., “At Light speed: Attribution and Response to Cyber Crime/ Terrorism/ warfare”, Journal of Criminal Law and Criminology, No, 97, 2006 - 2007.
Brownlie, I., International Law and the use of Force by States, Oxford: Clarendon Press, 1963.
Case Concerning Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosnia and Herzegovina V. Serbia and Montenegro), Merit, Judgment of 26 February 2007.
Case Concerning North Sea Continental shelf, ICJ Reports 1969.
Case Concerning Oil Platforms (Iran V. United states), ICJ Reports 2003.
Cassese, A., International Law, Oxford: Oxford University Press, second Edition. 2005.
Condron, S.M., “Getting It Right: Protecting American Critical Infrastructure in Cyberspace”, Harvard Journal of Law and Technology, No. 20, 2006-2007.
Conforti, B., The Law and Practice of the United Nations, Leiden: Martinus Nijhoff, 2005.
D’Amato, A., “International Law, Cybernetics, and Cyberspace”, in: Schmitt/O’Donnell (eds), Computer Network Attack and International Law, 2001.
Delibasis, D., The Right to National Self-Defence in Information warfare Operations, London: Arena Books, 2007.
Dinstein, Y., “Computer Network Attacks and self-Defense”, in: Schmitt/O’Donnel (eds), Computer Network Attack and International Law, 2001.
Dinstein, Y., war, Aggression and Self-Defence, Cambridge: Cambridge University Press, 3rd ed, 2005.
Documents of the United Nations Conference on International Organization, vol. 6, 1945.
Eshel, D., “Israel Adds Cyber-Attack to IDF”, Available at: www.military.com/features/o,15240,210486,00.html, 2010.
Garner, B.A. (ed), Black’s Law Dictionary, Eagan: West Group, 9th ed, 2009.
Gray, C., International Law and the Use of Force, Oxford: OxfordUniversity Press, 2008.
Greenberg, L.T., Information Warfare and International law, Mishawaka: National Defense University Press, 1998.
ICTY, Prosecutor V. Tadic, Case No. IT-94-1-A, Appeals Chamber, Judgment, 15 July 1999. Available at: www.icty.org
In Larger Freedom: Towards Development, Security and Human Rights for All”, Report of the Secretary-General, Doc. A/59/2005.
Johnson, P.A., “Is it Time for a Treaty on Information warfare?”, in: Schmitt/O’Donnell (eds), Computer Network Attack and International Law, 2001.
Joyner, C.C.; Lotrionte, C., “Information Warfare as International Coercion: Elements of a Legal Framework”, European Journal of International Law, No. 12, 2001.
Lewis, J., “To Protect the U.S. Against Cyberwar, Best Defense is a Good Offense”, U.S. News and World Report, 29 April 2010.
Military and Paramilitary Activities in and Against Nicaragua (Nicaragua V. United states), ICJ Reports 1986.
Ophardt, J.A., “Cyber warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield”, Duke Law and Technology Review, No. 3, 2010.
Osterdahl, I., Threat to Peace, Uppsala: Lustus Forlag, 1998.
Randelzhofer, A., “Article 2 (4)”, in: Simma, B. (ed.), The charter of the United Nations: A Commentary, vol. 1, 2002.
Robertson Jr., H.B., “Self-Defense Against Computer Network Attack Under International Law”, in: Schmitt/O’Donnell (eds), Computer Network Attack and International Law, 2001.
Roscini, M., “Threats of Armed Force and Contemporary International Law”, Netherlands International Law Review, No. 54, 2007.
Schmitt, M.N., “Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework”, Colum. J. Transnat’l L., No. 37, 1998-1999.
Shackelford, S.J., “From Nuclear war to Net war: Analogizing Cyber Attacks in International Law”, Barkeley Journal of International Law, No. 27, 2009.
UN Doc. A/RES/2625 (XXV) of 24 October 1970.
UN Doc. A/RES/36/103 of 9 December 1981.
N Doc. A/RES/42/22 of 18 November 1987.
UN Doc. A/RES/55/63 of 4 December 2000.
UN Doc. A/RES/56/121 of 19 December 2001.
UN Doc. A/RES/58/199 of 23 December 2003.
UN Doc. A/RES/63/37 of 2 December 2008.
UN Doc. A/RES/64/25 of 2 December 2009.
UN Doc. S/RES/1368 of 12 December 2001.
United States Diplomatic and Consular Staff in Tehran (United states V. Iran), ICJ Reports 1980.
Watts, S., “Combatant status and Computer Network Attack”, va. J.Int’l L., No. 50, 2010.
Weisbord, N., “Conceptualizing Aggression”, Duke J.Comp. & Int’l L., No. 20. 2009.
Zemanek, k., “Armed Attack”, Max Planck Encyclopedia of Public International Law, Oxford: OxfordUniversity Press, 2010.
www.cabinetoffice.gov.uk/media/216620/csso906.pdf
www.us-cert.gov/reading-room/cyberspace-strategy.pdf
www.dod.gov/pubs/foi/ojcs/07-F-2105doc1.pdf
www.carlisle.army.mil/DIME/documents/Georgia%201%200.pdf
www.nato-pa.int/default.asp?SHORTCUT=1782
www.au.af.mil/au/awcgate/dod-io-legal/dod-io-legal.pdf
www.mardomsalari.com/template1/NewsPrintableversion.aspx?NID=99623
www.nato.int/nato-static/assets/pdf
www.defense.gov/news/mar2005/d20050318nms.pdf
www.bangdad.com/bangdad/pages/details.asp?id=263
www.eur-lex.europa.eu/LexUriserv/LexUriserv.do?uri=com:2005:0576