Industrial cyber vulnerabilities: Lessons from Stuxnet and the Internet of Things
LJ Trautman, PC Ormerod - U. Miami L. Rev., 2017 - HeinOnline
Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things Page 1
Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things LAWRENCE J …
Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things LAWRENCE J …
Hacking into China's cybersecurity law
JA Lee - Wake Forest L. Rev., 2018 - HeinOnline
HACKING INTO CHINA'S CYBERSECURITY LAW Page 1 HACKING INTO CHINA'S
CYBERSECURITY LAW Jyh-An Lee* China's Cybersecurity Law, which is thus far the most …
CYBERSECURITY LAW Jyh-An Lee* China's Cybersecurity Law, which is thus far the most …
Understand legal documents with contextualized large language models
X Jin, Y Wang - arXiv preprint arXiv:2303.12135, 2023 - arxiv.org
The growth of pending legal cases in populous countries, such as India, has become a
major issue. Developing effective techniques to process and understand legal documents is …
major issue. Developing effective techniques to process and understand legal documents is …
Governance of the Internet of Things (IOT)
Today's increasing rate of technological change results from the rapid growth in computer
processing speed, when combined with the cost decline of processing capacity, and is of …
processing speed, when combined with the cost decline of processing capacity, and is of …
International Cybertorts: Expanding State Accountability in Cyberspace
R Crootof - Cornell L. Rev., 2017 - HeinOnline
In 2014, the North Korean" Guardians of Peace" hacker group raided Sony Pictures
Entertainment servers and publicized extensive confidential data, including previously …
Entertainment servers and publicized extensive confidential data, including previously …
A cyber duty of due diligence: Gentle civilizer or crude destabilizer?
ET Jensen, S Watts - Tex. L. Rev., 2016 - HeinOnline
In the final book of Virgil's epic poem the Aeneid, Latinus, King of Laurentum, delivers a
speech to calm his aspirant son-in-law Turnus. Turnus is enraged that his rival Aeneas …
speech to calm his aspirant son-in-law Turnus. Turnus is enraged that his rival Aeneas …
The law of cyber peace
SJ Shackelford - Chi. J. Int'l L., 2017 - HeinOnline
Scholars and poligmakers are paying greater attention to the application ofinternational law
to the cause of enhancing global gbersecurity. The bulk of this research, though, has been …
to the cause of enhancing global gbersecurity. The bulk of this research, though, has been …
Rethinking espionage in the modern era
D Pun - Chi. J. Int'l L., 2017 - HeinOnline
Espionage's permissibility under international law remains largely unsettled; no global
regulation exists for this important state activity. This Comment frst surveys the longstanding …
regulation exists for this important state activity. This Comment frst surveys the longstanding …
[图书][B] Cyber War and Peace: Toward Cyber Peace
SJ Shackelford - 2020 - books.google.com
Many pressing environmental and security threats now facing the international community
may be traced to the frontiers. From climate change and cyber-attacks to the associated …
may be traced to the frontiers. From climate change and cyber-attacks to the associated …
Securing cyber space: the obligation of States to prevent harmful international cyber operations
I Couzigou - International Review of Law, Computers & Technology, 2018 - Taylor & Francis
The paper argues that the obligation of States to prevent harmful international activities
perpetrated within their territory, or any other area under their exclusive control, applies to …
perpetrated within their territory, or any other area under their exclusive control, applies to …