Industrial cyber vulnerabilities: Lessons from Stuxnet and the Internet of Things

LJ Trautman, PC Ormerod - U. Miami L. Rev., 2017 - HeinOnline
Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things Page 1
Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things LAWRENCE J …

Hacking into China's cybersecurity law

JA Lee - Wake Forest L. Rev., 2018 - HeinOnline
HACKING INTO CHINA'S CYBERSECURITY LAW Page 1 HACKING INTO CHINA'S
CYBERSECURITY LAW Jyh-An Lee* China's Cybersecurity Law, which is thus far the most …

Understand legal documents with contextualized large language models

X Jin, Y Wang - arXiv preprint arXiv:2303.12135, 2023 - arxiv.org
The growth of pending legal cases in populous countries, such as India, has become a
major issue. Developing effective techniques to process and understand legal documents is …

Governance of the Internet of Things (IOT)

LJ Trautman, MT Hussein, L Ngamassi, MJ Molesky - Jurimetrics, 2020 - JSTOR
Today's increasing rate of technological change results from the rapid growth in computer
processing speed, when combined with the cost decline of processing capacity, and is of …

International Cybertorts: Expanding State Accountability in Cyberspace

R Crootof - Cornell L. Rev., 2017 - HeinOnline
In 2014, the North Korean" Guardians of Peace" hacker group raided Sony Pictures
Entertainment servers and publicized extensive confidential data, including previously …

A cyber duty of due diligence: Gentle civilizer or crude destabilizer?

ET Jensen, S Watts - Tex. L. Rev., 2016 - HeinOnline
In the final book of Virgil's epic poem the Aeneid, Latinus, King of Laurentum, delivers a
speech to calm his aspirant son-in-law Turnus. Turnus is enraged that his rival Aeneas …

The law of cyber peace

SJ Shackelford - Chi. J. Int'l L., 2017 - HeinOnline
Scholars and poligmakers are paying greater attention to the application ofinternational law
to the cause of enhancing global gbersecurity. The bulk of this research, though, has been …

Rethinking espionage in the modern era

D Pun - Chi. J. Int'l L., 2017 - HeinOnline
Espionage's permissibility under international law remains largely unsettled; no global
regulation exists for this important state activity. This Comment frst surveys the longstanding …

[图书][B] Cyber War and Peace: Toward Cyber Peace

SJ Shackelford - 2020 - books.google.com
Many pressing environmental and security threats now facing the international community
may be traced to the frontiers. From climate change and cyber-attacks to the associated …

Securing cyber space: the obligation of States to prevent harmful international cyber operations

I Couzigou - International Review of Law, Computers & Technology, 2018 - Taylor & Francis
The paper argues that the obligation of States to prevent harmful international activities
perpetrated within their territory, or any other area under their exclusive control, applies to …