شریفی طرازکوهی، حسین؛ حقوق بشردوستانه بینالمللی، چاپ دوم، میزان، 1395.
ضیایی بیگدلی، محمدرضا؛ حقوق بینالملل بشردوستانه، چاپ سوم، گنج دانش، 1392.
قرباننیا، ناصر؛ حقوق بشر و حقوق بشردوستانه، پژوهشگاه فرهنگ و اندیشه اسلامی، 1387.
Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, International Committee of the Red Cross, Geneva. 1987.
Green, Leslie C., The Contemporary Law of Armed Conflict, 3rd ed., UK, Juris Publishing, 2008.
“A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977”, (December 2006), International Committee of the Red Cross, Geneva, International Review of the Red Cross, vol. 88, no. 864.
Blake, Dunkan & Imburgia, Joseph S., “Bloodless Weapons? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining them as Weapons”, The Air Force Law Review, vol. 66. 2010.
Boothby, William H., “Where Do Cyber Hostilities Fit in the International Law Maze?” in Nasu, Hitoshi & McLaughlin, Robert (eds.), New Technologies and the Law of Armed Conflict, The Hague, ASSER Press. 2014.
Boulanin, Vincent, “Implementing Article 36 Weapon Reviews in the Light of Increasing Autonomy in Weapons Systems”, SIPRI Insight on Peace and Security, No.201/1. 2015.
Brown, Gary D. and Metcalf, Andrew O., “Easier Said Than Done: Legal Review of Cyber Weapons”, Journal of National Security Law and Policy, vol. 7, no. 1. 2014.
Daoust, Isabelle, Coupland, Robin and Ishoey, Rikke, “New Wars, New Weapons? The Obligation of States to Assess the Legality of Means and Methods of Warfare”, International Review of Red Cross, vol. 84, no. 846. 2002.
Denning, Dorothy, “Reflections on Cyber Weapons Controls”, Computer Security Journal, vol. 16, no. 4. 2002.
Devai, Dora, “Proliferation of Offensive Cyber Weapons. Strategic Implications and Non-Proliferation Assumptions”, AARMS, vol. 15, no. 1. 2016.
Ebner, Nike, “Cyber Space, Cyber Attack and Cyber Weapons”, Institute for Peace Research and Security Policy, University of Hamburg. 2015.
Gervais, Michael, “Cyber Attacks and the Laws of War”, Berkley Journal of International Law, vol. 30, iss. 2, 2012.
Herbach, Jonathan David, “Into the Caves of Steel: Precaution Cognition and Robotic Weapon Systems under the International; Law of Armed Conflict”, Amsterdam Law Forum, VU University Amsterdam, Summer Issue, 2012.
Hughes, Rex, “A Treaty for Cyberspace”, The Royal Institute of International Affairs, vol. 86, no. 2. 2010.
Lindsay, Jon R., “Stuxnet and the Limits of Cyber Warfare”, Security Studies, vol. 22. 2013.
Madison, David, “Geography, Territory and Sovereignty in Cyber Warfare”, in Nasu, Hitoshi & McLaughlin, Robert (eds.), New Technologies and the Law of Armed Conflict, The Hague, ASSER Press. 2014.
McClelland, Justin, “The Review of Weapons in Accordance with Article 36 of Additional Protocol I”, International Review of the Red Cross, vol. 85, no. 850. 2003.
Mele, Stefano, “Cyber Weapons: Legal and Strategic Aspects”, Italian Institute of Strategic Studies, Rome, 2013.
Robin, Bradley, “Corresponding Evolution: International Law and the Emergence of Cyber Warfare”, Journal of the National Association of Administrative Law Judiciary, vol. 31, iss. 2. 2011.
Schmitt Michael, N., “Cyber Operations and the Jus in Bello: Key Issues”, in Pedrozo R.A., Wollschlaeger D.P. (eds.) International Law and the Changing Character of War, Newport, US Naval War College International Law Studies, vol. 87, Naval War College, 2011.
Schmitt, Michael N., “Rewired Warfare: Rethinking the Law of Cyber Attack”, International Review of the Red Cross, vol. 96, no. 893. 2014.
Streltsov, Anatoly, “Key Trends of International Law Relating to the Conflicts in Cyber Space”, in Greppi, Edoardo (ed.) Conduct of Hostilities: The Practice, The Law and The Future, International Institute of Humanitarian Law, 2015.
Turns, David, “Cyber War and the Concept of Attack in International Humanitarian Law”, in Saxon, Dan (ed.) International Humanitarian Law and the Changing Technology of War, Boston, Martinus Nijhoff Publishers. 2013
Biontino, Michael, “Lethal Autonomous Weapon Systems Expert Meeting”, Geneva, 13-16 May 2014.
Brose, Robert, “Cyber War, Net War and the Future of Cyber Defence”, Office of the Director of National Intelligence, United States. 2015.
Tallin Manual on the International Law Applicable to Cyber Warfare, NATO Cooperative Defense Centre of Excellence, Cambridge University Press, Cambridge, 2013.
West, Dondi S., “A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare”, Defence Conference, July 30th -August 1st, Las Vegas. 2010.
“Toward Stable and Effective Use of Cyberspace”, Ministry of Defence, Japan, September 2012.
Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects, International Committee of Red Cross, Article 8, https://www.icrc.org/eng/assets/files/other/icrc_002_0811.pdf
, (last visited 11/2/2018).
Hern, Alex, “WannaCry, Petya, NotPetya: How Ransom Ware Hit the Big Time in 2017”, The Guardian, https://www.Theguar dian.com/technology/ 2017/dec/30/wannacry-petya-notpetya-ransomware, (last visited 5/3/2018).
Schmitt, Michael N., “Cyber Operations and International Humanitarian Law: Faultiness and Vectors”, HLS Program on International Law and Armed Conflict, http://www.youtube
.com/watch?v=zwwrvamsot4, (last visited 6/3/2018).
United Nations Arms Trade Treaty, Principles, p. 2, accessed on 11 February 2018 on: http://legal.un.org/avl/pdf/ha/att/att_e.pdf.