Although existing international law applies in cyberspace in principle like traditional…
After a brief introduction (chapter 1), the second chapter addresses the legal criteria…
Yielding a conclusive result regarding the perpetrator of a malicious cyber operation…
The pleas of self-defence and necessity may be invoked in rare cases because of their…
In the end, the author summarises the main findings of the entire research.…