A regularly updated and easily searchable bibliography on international cyber security-related publications.
This bibliography was originally compiled by Liisi Adamson and is maintained by The Hague Program on International Cyber Security - please send any additions or suggestions to [email protected]
NB: Underlined items link directly to the referred article or book.
"Let Them Roar: Small States as Cyber Norm Entrepreneurs." European Foreign Affairs Review 24 (2): 217-234.
"Who spies on whom? Unravelling the puzzle of state-sponsored cyber economic espionage." Journal of Peace Research.
"New technology, old strategy: Cyberspace and the international politics of African agency." Journal of Strategic Studies.
Emerging and Disruptive Digital Technologies: National, Regional, and Global Perspectives. Luxembourg, Publications Office of the European Union.
Bitskrieg: The New Challenge of Cyberwarfare, Wiley.
"Solving the International Internet Policy Coordination Problem." Global Commission on Internet Governance, Paper Series: No. 12 – May, Centre for International Governance Innovation (CIGI) and Chatham House.
"International Legal Norms in Cyberspace: Evolution of China’s National Security Motivations." In: Osula, Anna-Maria & Henry Rõigas (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 171-201.
"Risk vs. threat-based cybersecurity: the case of the EU." European Security 23 (1): 85-103.
"Understanding the European Union’s Perception of the Threat of Cyberterrorism: A Discursive Analysis." Journal of Common Market Studies.
"The Bumpy Road to a Meaningful International Law of Cyber Attribution." AJIL Unbound 113: 191-196.
"Due Diligence: a Strategic Norm of Responsible Behaviour for the EU Cyber Diplomacy Toolbox?" Inaugural meeting of the European Cyber Diplomacy Dialogue, EU Cyber Direct, January 2019.
"Cyber-diplomacy: The Emergence of a Transient Field." The Hague Journal of Diplomacy.
"Power and diplomacy in the post-liberal cyberspace." International Affairs 96 (3): 749-766.
“Strategic narratives and the multilateral governance of cyberspace: The cases of European Union, Russia and India.” Contemporary Security Policy.
"Norm Origin and Development in Cyberspace: Models of Cybernorm Evolution." Washington University Law Quarterly 78 (1): 59-111.
"Transparency and Confidence-Building Measures in Cyberspace: Towards Norms of Behaviour." In: Vignard, Kerstin, Ross McCrae & Jason Powers (eds), Disarmament Forum: Confronting Cyberconflict, Geneva: UNIDIR, 2011 (4): 31-40.
"Prepare and Prevent: Don’t Repair and Repent: The Role of Insurance in Offensive Cyber." The Cyber Defense Review 7 (3): 17-29.
"Cross-Network Weaponization in the Semiconductor Supply Chain." International Studies Quarterly 68 (1).
"Limiting the undesired impact of cyber weapons: technical requirements and policy implications." Journal of Cybersecurity 3 (1): 59-68.
"From Consumers to Users: Shifting the Deeper Structures of Regulation Toward Sustainable Commons and User Access." Federal Communications Law Journal 52 (3): 561-579.
"The Spontaneous Evolution of Cyber Law: Norms, Property Rights, Contracting, Dispute Resolution and Enforcement without the State." Journal of Law, Economics & Policy 1 (2): 269-348.
"Classification of Cyber Capabilities and Operations as Weapons, Means or Methods of Warfare." International Law Studies 95: 179-225.
"The Demilitarisation of Cyber Conflict." Survival 60 (6): 73-90.
International Law As We Know It: Cyberwar Discourse and the Construction of Knowledge in International Legal Scholarship, Cambridge University Press.
"Cyber Operations as Imperfect Tools of Escalation." Strategic Studies Quarterly 13 (3): 122-145.
"Regulating Disinformation and Big Tech in the EU: A Research Agenda on the Institutional Strategies, Public Spheres and Analytical Challenges." Journal of Common Market Studies.
"UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security." International Affairs: A Russian Journal of World Politics, Diplomacy, and International Relations 62 (5).
Digital Empires: The Global Battle to Regulate Technology. Oxford University Press.
"What's in a Name? Metaphors and Cybersecurity." International Organization: 1-32.
"Entanglement in Cyberspace: Minding the Deterrence Gap." Democracy and Security 16 (3): 210-233.
"Private active cyber defense and (international) cyber security - pushing the line?" Journal of Cybersecurity 7 (1).
The Public Core of the Internet, An International Agenda for Internet Governance, Amsterdam: Amsterdam University Press.
Three tales of attribution in cyberspace: Criminal law, international law and policy debates, The Hague Program for Cyber Norms Policy Brief, April 2020.
A coalition of the unwilling? Chinese and Russian perspectives on cyberspace, The Hague Program for Cyber Norms Policy Brief, November 2019.
Foreign intelligence in the digital age. Navigating a state of 'unpeace', The Hague Program for Cyber Norms Policy Brief, September 2019.
"The Customary International Law of Cyberspace." Strategic Studies Quarterly 6 (3): 126-145.
"Taking Care of Business: Industrial Espionage and International Law." The Brown Journal of World Affairs 26 (1): 143-160.
The New Fire: War, Peace, and Democracy in the Age of AI, The MIT Press.
"Preparing the Cyber Battlefield: Assessing a Novel Escalation Risk in a Sino-American Crisis." Texas National Security Review 3 (4): 54-81.
"Cyber Security Norms in the Euro-Atlantic Region: NATO and the EU as Norm Entrepreneurs and Norm Diffusers." In: Gruszczak, Artur & Pawel Frankowski (eds), Technology, Ethics and the Protocols of Modern War, London: Routledge.
"The Future of Cyber Conflict Studies: Cyber Subcultures and the Road to Interdisciplinarity." The Cyber Defense Review 7 (3): 103-115.
"Bridging the gap between cyberwar and cyberpeace." International Affairs 97 (6): 1727-1747.
"Multilateral Approaches for Improving Global Security in Cyberspace." Georgetown Journal of International Affairs: 5-14.
"Trends in International Law for Cyberspace." NATO Cooperative Cyber Defense Centre of Excellence (CCDCOE), May 2019.
"Until consensus: Introducing the International Cyber Expression dataset." Journal of Peace Research.
A Universal Internet in a Bordered World: Research on Fragmentation, Openness and Interoperability (Research Volume One), Global Commission on Internet Governance, Centre for International Governance Innovation (CIGI) and Chatham House.
"Technological Integrity and the Role of Industry in Emerging Cyber Norms." In: Osula, Anna-Maria & Henry Rõigas (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 203-220.
From Articulation to Implementation: Enabling Progress on Cybersecurity Norms, Microsoft Corporation.
"A systematic literature review on advanced persistent threat behaviors and its detection strategy." Journal of Cybersecurity 10 (1): 1-18.
"Contesting Western and Non-Western Approaches to Global Cyber Governance beyond Westlessness." The International Spectator 57 (3): 1-14.
"The contested meanings of cybersecurity: evidence from post-conflict Colombia." Conflict, Security & Development 21 (1): 1-19.
"A Primer on Globally Harmonizing Internet Jurisdiction and Regulations." Global Commission on Internet Governance, Paper Series: No. 10 – March, Centre for International Governance Innovation (CIGI) and Chatham House.
Deter, Disrupt, or Deceive: Assessing Cyber Conflict as an Intelligence Contest, Georgetown University Press.
"Co-Evolution of Cyberspace and International Relations: New Challenges for the Social Sciences." Prepared for World Social Science Forum (WSSF) 2013 Montreal, Canada, Cambridge, MA: MIT.
Cybersecurity in the European Union: Resilience and Adaptability in Governance Policy, Palgrave Macmillan.
"The Collective Securitisation of Cyberspace in the European Union." West European Politics 42 (2): 278-301.
"The Challenges of Cybercrime in the European Union." European Politics and Society 19 (3): 355-375.
Securing Cyberspace Through International Norms: Recommendations for Policymakers and the Private Sector, Washington D.C: Good Harbor Security Risk Management, LLC.
"Beyond Norms: Using International Economic Tools to Deter Malicious State-Sponsored Cyber Activities." Temple International & Comparative Law Journal 32 (2): 113-125. (Available at SSRN: https://ssrn.com/abstract=3395176).
"Cyber Security Assemblages: A Framework for Understanding the Dynamic and Contested Nature of Security Provision." Politics and Governance 6 (2): 13-21.
"The Use of Force and Cyber Countermeasures." Temple International & Comparative Law Journal 32 (2): 127-133. (Available at SSRN: https://ssrn.com/abstract=3190253).
Dark Wire: The Incredible True Story of the Largest Sting Operation in History. PublicAffairs.
"Small States and Big Ideas: Estonia’s Battle for Cybersecurity Norms." Contemporary Security Policy 36 (2): 346-368.
"The Chinese Conception of Cybersecurity: A Conceptual, Institutional and Regulatory Genealogy." Journal of Contemporary China.
The Emergence of China’s Smart State. Rowman and Littlefield.
"Israel: Cyber Warfare and Security as National Trademarks of International Legitimacy." In: Romaniuk, Scott N. & Mary Manjikian (eds), The Routledge Companion to Global Cyber-Security Strategy, Basingstoke: Palgrave Macmillan. (Available at SSRN: https://ssrn.com/abstract=3698972).
"Palestine: Whose Cyber Security without Cyber Sovereignty?" In: Romaniuk, Scott N. & Mary Manjikian (eds), The Routledge Companion to Global Cyber-Security Strategy, Basingstoke: Palgrave Macmillan. (Available at SSRN: https://ssrn.com/abstract=3700850).
"From Simulations to Simulacra of War: Game Scenarios in Cyberwar Exercises." Journal of War & Culture Studies 11 (1): 22-37.
"Strategic Substitution: China’s Search for Coercive Leverage in the Information Age." International Security 47 (1): 46-92.
Stateless Attribution: Toward International Accountability in Cyberspace, Research Reports, Santa Monica, CA: RAND Corporation.
"Beyond the United Nations Group of Governmental Experts." The Cyber Defense Review: 161-168.
Cyber Operations and International Law, Cambridge University Press, Vol. 146.
"Covid-19 and the Cyber Pandemic: A Plea for International Law and the Rule of Sovereignty in Cyberspace." In: Jančárková, T., Lindström, L., Visky, G. & Zotz, P. (eds), 2021 13th International Conference on Cyber Conflict: Going Viral, Tallinn: NATO CCD COE Publications.
"Governing cyber crises: policy lessons from a comparative analysis." Policy Design and Practice.
"Exploit Brokers and Offensive Cyber Operations." The Cyber Defense Review 7 (3): 31-47.
"On the strategic consequences of digital espionage." Journal of Cyber Policy.
"The 2019 Venezuelan Blackout and the consequences of cyber uncertainty." Revista Brasileira De Estudos De Defesa 7 (2).
"Cyberspace is used, first and foremost, to wage wars: proliferation, security and stability in cyberspace." Journal of Cyber Policy 6 (1).
"Mapping the spread of Russian and Chinese contents on the French-speaking African web." Journal of Cyber Policy 6 (1).
The Politics of Cyber-Security. Routledge.
The Politics of Cyber-Security. Routledge.
"Cyber security meets security politics: Complex technology, fragmented politics, and networked science." Contemporary Security Policy 41 (1): 5-32.
"Regulatory cybersecurity governance in the making: the formation of ENISA and its struggle for epistemic authority." Journal of European Public Policy.
Cyber Security Politics: Socio-Technical Transformations and Political Fragmentation, Routledge.
"Introduction: An Offensive Future?" The Cyber Defense Review 7 (3): 9-13.
"Dangerous Gaming: Cyber-Attacks, Air-Strikes and Twitter." E-International Relations, 23 September 2019.
"Cyberspace and the Law of the Horse." University of Chicago Legal Forum, Vol. 1996, Article 7.
"International Cybersecurity Norm Development: The Roles of States Post-2017." Research in Focus, EU Cyber Direct.
"Contested public attributions of cyber incidents and the role of academia." Contemporary Security Policy.
Semi-State Actors in Cybersecurity, Oxford University Press.
"Offensive Cyber Capabilities and State Violence: Three Logics of Integration." Journal of Global Security Studies 7 (1).
"Publicly attributing cyber attacks: a framework." Journal of Strategic Studies.
"Attribution and Knowledge Creation Assemblages in Cybersecurity Politics." Journal of Cybersecurity 7 (1).
"Not Illegal: The SolarWinds Incident and International Law." European Journal of International Law.
"The Governance of Turkey’s Cyberspace: Between Cyber Security and Information Security." International Journal of Public Administration.
"Weighing the Case For a Convention to Limit Cyberwarfare." Arms Control Today 39 (9): 21-27.
"Beyond ‘Quasi-Norms’: The Challenges and Potential of Engaging with Norms in Cyberspace." In: Osula, A.-M. & Rõigas, H. (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 87-109.
"The state of Microsoft? The role of corporations in international norm creation." Journal of Cyber Policy 4 (3): 380-403.
"Cybersecurity and the Concept of Norms." Carnegie Endowment for International Peace, 30 November 2017.
"Cultivating International Cyber Norms." In: Lord, K.M. & Sharp, T (eds), America’s Cyber Future: Security and Prosperity in the Information Age, Washington D.C.: Center for a New American Security, 87-102.
"Beyond Naming and Shaming: Accusations and International Law in Cybersecurity." Temple University Legal Studies Research Paper No. 2019-14. (Available at SSRN: https://dx.doi.org/10.2139/ssrn.3347958).
"Constructing Norms for Global Cybersecurity." American Journal of International Law 110 (3): 425-479.
"Emerging illiberal norms: Russia and China as promoters of internet content control." International Affairs 97 (6): 1925-1944.
"Controlling internet content in the EU: towards digital sovereignty." Journal of European Public Policy.
"Controlling internet content in the EU: towards digital sovereignty." Journal of European Public Policy.
"Cybersecurity Risk." The Review of Financial Studies 36 (1): 351-407.
"What Great Powers Make It. International Order and the Logic of Cooperation in Cyberspace." Strategic Studies Quarterly 7 (1): 93-113.
"Structural Causes and Cyber Effects: Why International Order is Inevitable in Cyberspace." Strategic Studies Quarterly 8 (4): 112-128.
"The non-anthropocentric informational agents: Codes, software, and the logic of emergence in cybersecurity." Review of International Studies: 1-20.
"The strategic surprise of Russian information operations on social media in 2016 in the United States: mapping a blind spot." Journal of Cyber Policy 6 (1).
"Submarine Cables and the Risks to Digital Sovereignty." Minds and Machines 34 (31).
"An Attractive Alternative? China’s Approach to Cyber Governance and Its Implications for the Western Model." The International Spectator 57 (3): 15-30.
Elements of Deterrence: Strategy, Technology, and Complexity in Global Politics. Oxford University Press.
"Appropriate Norms of State Behavior in Cyberspace: Governance in China and Opportunities for US Businesses." Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper No. 1706, 28 July 2017.
"Norms, Confidence and Capacity Building: Putting the UN Recommendations on Information and Communication Technologies in the Context of International Security Into OSCE-Action." European Cybersecurity Journal 2 (1).
"The unexpected norm-setters: Intelligence agencies in cyberspace." Contemporary Security Policy.
"We Need a Cyberspace Treaty: Regional and bilateral agreements are not enough." Intermedia 38 (3): 4-5.
"Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage." International Security 43 (3): 141-189.
"Intelligence in the Cyber Era: Evolution or Revolution?" Political Science Quarterly 135 (2): 191-224.
"The Dark Future of International Cybersecurity Regulation." Journal of National Security Law & Policy 6 (2): 563-570.
"Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War." International Security 46 (3): 7-50.
"From Reaction to Action: Adopting a Competitive Posture in Cyber Diplomacy." Texas National Security Review, special issue on Cyber Competition.
"Responsibility for the Harm and Risk of Software Security Flaws." In: Dark, M.J. (ed), Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives, Hershey PA: IGI Global, 104-131.
"Cybersecurity Treaties: A Skeptical View." In: Berkowitz, P. (ed), Future Challenges in National Security and Law, Hoover Institution Press.
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers, Doubleday.
"Deciphering Cyber Operations." The Cyber Defense Review 5 (1): 135-152.
Getting beyond Norms: New Approaches to International Cyber Security Challenges, Centre for International Governance Innovation.
"Great power narratives on the challenges of cyber norm building." Policy Design and Practice.
"Cyber campaigns and strategic outcomes." Journal of Strategic Studies.
"Manipulating uncertainty: cybersecurity politics in Egypt." Journal of Cybersecurity 7 (1).
"The implications of persistent (and permanent) engagement in cyberspace." Journal of Cybersecurity 5 (1).
"Applying International Environmental Legal Norms to Cyber Statecraft." I/S: A Journal of Law and Policy for the Information Society 8 (2): 356- 387.
"International Law and International Information Security: A Response to Krutskikh and Streltsov." Tallinn Paper No. 9, Tallinn: NATO CCD COE Publications.
"Countering foreign interference: election integrity lessons for liberal democracies." Journal of Cyber Policy 5 (2): 180-198.
"Opening up or closing down? Non-state actors in UN cybersecurity governance." Journal of Global Security Studies 9 (3): ogae026.
"Standardising the splinternet: how China's technical standards could fragment the internet." Journal of Cyber Policy 5 (2): 1-26.
"Strategic autonomy in the European Union's external relations law." Common Market Law Review 60 (3): 667-700.
"The Failure of the Rule of Law in Cyberspace?: Reorienting the Normative Debate on Borders and Territorial Sovereignty." The John Marshall Journal of Information Technology & Privacy Law 24 (1): 1-34.
"China and the US Strategic Construction of Cybernorms: The Process is the Product." Hoover Working Group on National Security, Technology, and Law, Aegis Paper Series No. 1704, 7 July 2017.
"Information Operations under International Law." Vanderbilt Journal of Transnational Law 55 / Temple University Legal Studies Research Paper No. 2022-16.
"Conceptual Ambiguity of International Norms on State Behaviour in Cyberspace." Research in Focus, EU Cyber Direct.
"Towards a Global Regime for Cyber Warfare." In: Czosseck, C. & Geers, K. (eds), The Virtual Battlefield: Perspectives on Cyber Warfare, Conference proceedings - Cooperative Cyber Defense Centre of Excellence (CCD CoE) Conference on Cyber Warfare (June 2009, Tallinn, Estonia).
"We'll never have a model of an AI major-general: Artificial Intelligence, command decisions, and kitsch visions of war." Journal of Strategic Studies.
"Interrogating the Cybersecurity Development Agenda: A Critical Reflection." The International Spectator 57 (3): 66-84.
"Beyond the Great Powers: Challenges for Understanding Cyber Operations in Latin America." Global Security Review 2: article 7.
"Unpacking Cyber Norms: Private Companies as Norm Entrepreneurs." Journal of Cyber Policy 3 (1): 61-76.
A Call to Cyber Norms: Discussions at the Harvard-MIT-University of Toronto Cyber Norms Workshops, 2011 and 2012, Belfer Center for Science and International Affairs, Kennedy School of Government, Harvard University.
"A New Normal? The Cultivation of Global Norms as Part of a Cybersecurity Strategy." In: Yannakogeorgos, P.A. & Lowther, A.B. (eds), Conflict and Cooperation In Cyberspace, The Challenge to National Security, Taylor & Francis.
"The Play of States: Norms and Security in Cyberspace." American Foreign Policy Interests: The Journal of the National Committee on American Foreign Policy 36 (5): 322-331.
"Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation." Policy Design and Practice.
"Shining a Light on Cyber: An Interview with John C. 'Chris' Inglis." Strategic Studies Quarterly 14 (3): 3-11.
"Responding to cyberattacks: Prospects for the EU Cyber Diplomacy Toolbox." Europe in the World Programme Discussion Paper, European Policy Centre.
"Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions." Government Information Quarterly 40 (4).
"Law and Borders – the Rise of Law in Cyberspace." First Monday 1 (1).
Cyber Sovereignty: The Future of Governance in Cyberspace. Stanford University Press.
"United Nations Group of Governmental Experts: The Estonian Perspective." In: Osula, A.-M. & Rõigas, H. (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 111-127.
"Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks." Journal of Cybersecurity 7 (1).
"China’s quest for quantum advantage—Strategic and defense innovation at a new frontier." Journal of Strategic Studies 44 (3): 922-952.
"Sovereign Discourse on Cyber Conflict Under International Law." Texas Law Review 88 (7): 1571-1598.
"Attributing Digital Covert Action: the curious case of WikiSaudileaks." Intelligence and National Security.
"Three Conditions for Cyber Countermeasures: Opportunities and Challenges of Active-Defense Operations." The Cyber Defense Review 7 (3): 79-89.
"Cyber Dialogue 2012 Briefs: Whither “Rules of the Road” for Cyberspace?" CyberDialogue 2012: What is Stewardship in Cyberspace.
"In Defense of Pure Sovereignty in Cyberspace." International Law Studies 97 (1): 1432-1499.
"Cyber legalism: why it fails and what to do about it." Journal of Cybersecurity 7 (1).
Striking Back: The End of Peace in Cyberspace – And How to Restore It, Yale University Press.
"Patterns of Behavior: States In, Through, and About Cyberspace." Cyber Policy Institute.
"Roles and Limitations of Middle Powers in Shaping Global Cyber Governance." The International Spectator 57 (3): 31-47.
"Mixed Signals: A Flawed Approach to Cyber Deterrence." Survival 62 (1): 107-130.
"Cybersecurity and Cyberpower: Concepts, Conditions and Capabilities for Cooperation for Action Within the EU." Directorate-General for External Policies of the Union, Directorate B, Policy Department, European Parliament.
"Cyber Peace and Cyber Stability: Taking the Norm Road to Stability." IEEE Internet Computing 23 (4): 61-66.
"Military Aspects of Ensuring International Information Security in the Context of Elaborating Universally Acknowledged Principles of International Law." In: Vignard, K. (ed), Disarmament Forum: ICTs and International Security, Geneva: UNIDIR, 2007 (3): 35-44.
"The Microfoundations of State Cybersecurity: Cyber Risk Perceptions and the Mass Public." Journal of Global Security Studies 6 (2).
When the Chips Are Down: A Deep Dive into a Global Crisis. Bloomsbury India.
Achieving International Cyber Stability, Washington D.C.: The Atlantic Council.
Subversion: The Strategic Weaponization of Narratives, Georgetown University Press.
"International Law and the Problem of International Information Security." International Affairs: A Russian Journal of World Politics, Diplomacy, and International Relations0 60 (6): 64-76.
"[On Legal and Political Foundations of Global Information Security]." (in Russian) Mezhdunarodniye Protsessy 1 (5): 28–37.
"Cyber norms: technical extensions and technological challenges." Journal of Cyber Policy 6 (3).
"The politics of cyber norms: Beyond norm construction towards strategic narrative contestation." Research in Focus, EU Cyber Direct.
Unilateral Remedies to Cyber Operations: Self-Defence, Countermeasures, Necessity, and the Question of Attribution, Cambridge University Press.
"State Behaviour in Cyberspace: Normative Development and Points of Contention." Zeitschrift für Außen- und Sicherheitspolitik.
"Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic." Computers & Security 105 (June).
"The Territorialization of Cyberspace." International Studies Review 22 (3): 482-506.
"Beyond sovereignty as authority: the multiplicity of European approaches to digital sovereignty." Global Political Economy.
"Changing the code? Norm contestation and US antipreneurism in cyberspace." International Relations 32 (2): 149-172.
"Between Two Stools: Military and Intelligence Organizations in the Conduct of Offensive Cyber Operations." The Cyber Defense Review 7 (3): 67-77.
"Cheerleading in Cyberspace: How the American Public Judges Attribution Claims for Cyberattacks." Foreign Policy Analysis 18 (2).
"Public attribution in the US government: implications for diplomacy and norms in cyberspace." Policy Design and Practice.
"Cracking Attribution: Moving International Norms Forward". (Available at SSRN: https://dx.doi.org/10.2139/ssrn.3300202).
New War Technologies and International Law: The Legal Limits to Weaponising Nanomaterials, Cambridge University Press.
"Why cybersecurity insurance should be regulated and compulsory." Journal of Cyber Policy.
"Back to the Roots: The Laws of Neutrality and the Future of Due Diligence in Cyberspace." European Journal of International Law 33 (3): 789-819.
"The Law of the Horse: What Cyberlaw Might Teach." Harvard Law Review 113 (501).
"Multilateral Agreements to Constrain Cyberconflict." Arms Control Today 40 (5): 14-19.
"Confidence-Building and International Agreement in Cybersecurity." In: Vignard, K., McCrae, R. & Powers, J. (eds), Disarmament Forum: Confronting Cyberconflict, Geneva: UNIDIR, 2011 (4): 51-60.
"Liberty, Equality, Connectivity: Transatlantic Cybersecurity Norms." Washington D.C: Center for Strategic & International Studies.
"The Coming of Cyber Espionage Norms." In: Rõigas, H., Jakschis, R., Lindström, L. & Minárik, T. (eds), 2017 9th International Conference on Cyber Conflict: Defending the Core, Tallinn: NATO CCD COE Publications.
"Expectations of Cyber Deterrence." Strategic Studies Quarterly 12 (4): 44-57.
"Organizing cyber capability across military and intelligence entities: collaboration, separation, or centralization." Policy Design and Practice.
"Problematising EU Cybersecurity: Exploring How the Single Market Functions as a Security Practice." Journal of Common Market Studies.
Russian Information Warfare: Assault on Democracies in the Cyber Wild West, Naval Institute Press.
"Attribution of malicious cyber incidents: From soup to nuts." Journal of International Affairs 70 (1): 75-137.
"The existential threat from cyber-enabled information warfare." Bulletin of the Atomic Scientists 75 (4): 187-196.
"Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem." Intelligence and National Security: 1-19.
Information Technology and Military Power, Cornell University Press.
Escalation Dynamics in Cyberspace. Oxford University Press.
"A Better Defense: Examining the United States' New Norms-Based Approach to Cyber Deterrence." Georgetown Journal of International Affairs: 75-88.
The International Law of Intelligence: The World of Spycraft and the Law of Nations. Oxford University Press.
"Cybersecurity and Cyber Warfare: The Ethical Paradox of 'Universal Diffidence'." In: Christen, M., Gordijn, B. & Loi, M. (eds). The Ethics of Cybersecurity, The International Library of Ethics, Law and Technology, 21, Springer: 245-258.
"Russian Approaches to Regulating Use of Force in Cyberspace." Baltic Yearbook of International Law Online 20 (1): 109-132.
"The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations." International Security 46 (2).
"Subversion, Cyber Operations, and Reverse Structural Power in World Politics." European Journal of International Relations.
"Subversion, cyber operations, and reverse structural power in world politics." European Journal of International Relations 29 (1): 79-103.
Subversion: From Covert Operations to Cyber Conflict. Oxford University Press.
Subversion: From Covert Operations to Cyber Conflict. Oxford University Press.
"Donetsk Don’t Tell – “Hybrid War” in Ukraine and the Limits of Social Media Influence Operations." Journal of Information Technology & Politics.
"A tale of two cybers-how threat reporting by cybersecurity firms systematically underrepresents threats to civil society." Journal of Information Technology & Politics: 1-20.
“Tech titans, cyber commons and the war in Ukraine: An incipient shift in international relations.” International relations.
"A Dose of Realism: The Contestation and Politics of Cyber Norms." Hague Journal on the Rule of Law: 1-23.
"Cyber Norm Emergence at the United Nations, An Analysis of the UN‘s Activities Regarding Cyber-security." Discussion Paper 2011-11, Cambridge, Mass.: Belfer Center for Science and International Affairs, Harvard Kennedy School.
"The New Norms: Global Cyber-Security Protocols Face Challenges." IHS Jane’s Intelligence Review March: 52-53.
"Toward a Global Norm Against Manipulating the Integrity of Financial Data." Carnegie Endowment for International Peace, 27 March 2017.
"Why International Order in Cyberspace is Not Inevitable." Strategic Studies Quarterly 9 (2): 78-98.
The Evolution of Cyber War: International Norms for Emerging-Technology Weapons, Lincoln, NE: University of Nebraska Press.
"From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers." Leiden Journal of International Law 30 (4): 877-899.
"Is the International Law of Cyber Security in Crisis?" In: Pissanidis, N., Rõigas, H. & Veenendaal, M. (eds), 2016 8th International Conference on Cyber Conflict: Cyber Power, Tallinn: NATO CCD COE Publications, 127-139.
"Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law." Israel Law Review 48 (1): 55-80.
"Unblurring the lines: military cyber operations and international law." Journal of Cyber Policy 6 (3).
International Cybersecurity Norms: Reducing conflict in an Internet-dependent world, Microsoft Corporation.
"Cyberwarfare and International Law." UNIDIR Resources, Ideas for Peace and Security.
"Norms of Responsible State Behaviour in Cyberspace." In: Christen, M., Gordijn, B. & Loi, M., The Ethics of Cybersecurity, Springer.
Critical Perspectives on Cybersecurity: Feminist and Postcolonial Interventions. Oxford University Press.
"Between Israel and Iran: Middle-East Attitudes to the Role of International Law in the Cyber-Sphere." Baltic Yearbook of International Law Online 20 (1): 209-235.
"Transversal Politics of Big Tech." International Political Sociology 17 (1): olac020.
Offensive Cyber Operations: Understanding Intangible Warfare, London: Hurst & Company.
"The EU Cyber Diplomacy Toolbox: towards a cyber sanctions regime?" European Union Institute for Security Studies (EUISS) Brief, July 2017.
"Preparing for future cyber crises: lessons from governance of the coronavirus pandemic." Policy Design and Practice.
"The vital role of international law in the framework for responsible state behaviour in cyberspace." Journal of Cyber Policy.
"The Laws of War and Cyberspace: On the Need for a Treaty Concerning Cyber Conflict." Strategic Update 14.2, London: London School of Economics and Political Science.
"Cyber Attribution: Can a New Institution Achieve Transnational Credibility?" The Cyber Defense Review 4 (1): 107-122.
"The Need for an International Convention on Cyberspace." Horizons: Journal of International Relations and Sustainable Development 16: 198-209.
The Regulation of Cyberspace: Control in the Online Environment, New York: Routledge.
"Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State." Science, Technology, & Human Values 46 (1): 112-138.
"Democracies and the Future of Offensive (Cyber-Enabled) Information Operations." The Cyber Defense Review 7 (3): 49-65.
"Coding protection: 'cyber humanitarian interventions' for preventing mass atrocities." International Affairs 99 (1): 299-319.
"From Bombs to Bytes: Can Our Nuclear History Inform Our Cyber Future?" Bulletin of the Atomic Scientists 69 (5): 8-14.
Normative Restraints on Cyber Conflict, Cambridge, Mass.: Belfer Center for Science and International Affairs, Harvard Kennedy School.
"The Regime Complex for Managing Global Cyber Activities. The Centre for International Governance." Global Commission on Internet Governance, Paper Series: No. 1 – May, Centre for International Governance Innovation (CIGI) and Chatham House.
"Sending a message: the primacy of action as communication in cyber-security." In: Dutton, W.H. (ed), A Research Agenda for Digital Politics, Elgar Research Agendas: 146-158.
Election Interference: International Law and the Future of Democracy, Cambridge University Press.
"Cyber-attacks and the right of self-defense: a case study of the Netherlands." Policy Design and Practice.
Cybersecurity: Law and Regulation, Wolf Legal Publishers.
"Looking towards Europe? Assessing the prospects of the ECOWAS Cybersecurity Strategy in promoting responsible state behavior." International Cybersecurity Law Review 5: 143-168.
"Conflict in Cyberspace: How International Legal Norms Can Reduce Military Escalation in Cyberspace." Fletcher Security Review 3 (1): 67-76.
"Confidence-Building Measures in Cyberspace: Current Debates and Trends." In: Osula, A.-M. & Rõigas, H. (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 129-153.
"The EU’s Role in Shaping the Cyber Regime Complex." European Foreign Affairs Review 24 (2): 167–186.
"Narrow windows of opportunity: the limited utility of cyber operations in war". Journal of Cybersecurity 10: tyae014.
"The EU and Internet standards – Beyond the spin, a strategic turn?"Journal of European Public Policy.
"Erice Declaration on Principles for Cyber Stability and Cyber Peace." International Seminar on Nuclear War and Planetary Emergencies: 42nd Session, Erice, Italy, 19-24 August: 110-111.
Influence Operations in Cyberspace and the Applicability of International Law. Elgar International Law and Technologies Series, Edward Elgar.
“Careful What You Wish For: Tackling Legal Uncertainty in Cyberspace.” Nordic Journal of International Law 92 (3): 394-421.
Customary Law of the Internet. In the Search for a Supranational Cyberspace Law, The Hague: TMC Asser Press.
"Towards a Supranational Internet Law." Journal of International Commercial Law and Technology 1 (1): 1-9.
"Of Black Holes and Decentralized Law-Making in Cyberspace." Vanderbilt Journal of Entertainment Law & Practice 2 (1): 70-79.
"An Emergent Community of Cyber Sovereignty: The Reproduction of Boundaries?" Global Studies Quarterly 4 (1).
"The governance of 5G infrastructure: between path dependency and risk-based approaches." Journal of Cybersecurity 7 (1).
"Applying Old Rules to New Cases: International Law in the Cyber Domain." Paper presented to the International Studies Association, Atlanta GA, 16-19 March 2016.
"Authoritarian multilateralism in the global cyber regime complex: The double transformation of an international diplomatic practice." Contemporary Security Policy.
“Authoritarian multilateralism in the global cyber regime complex: The double transformation of an international diplomatic practice.” Contemporary Security Policy.
"Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyber-attack." Zeitschrift für Friedens- und Konfliktforschung.
"Challenges for Cyber Arms Control: A Qualitative Expert Interview Study." Zeitschrift für Außen- und Sicherheitspolitik 16: 289-310.
"Unmasking the Term 'Dual Use' in EU Spyware Export Control." European Journal of International Law 34 (3): 697-720.
Application of International Law to Cyber Operations: A Comparative Analysis of States' Views, The Hague Program for Cyber Norms Policy Brief, March 2020.
"Private-Sector Attribution of Cyber Incidents: Benefits and Risks to the U.S. Government." International Journal of Intelligence and CounterIntelligence: 1-31.
“Going nuclear: The development of American strategic conceptions about cyber conflict.” Journal of Strategic Studies.
"A Taxonomy of Norms in Cyberconflict for Government Policymakers." Journal of Information Warfare 17 (1): 31-48.
"Cyberspace and the “Devil’s Hatband”." Seattle University Law Review 24 (2): 577-598.
"Fighting Cyber Attacks with Sanctions: Digital Threats, Economic Responses." Israel Law Review.
"Cybersecurity Regulation: Using Analogies to Develop Frameworks for Regulation." In: Tikk, E. & Talihärm, A-M. (eds), International Cyber Security Legal & Policy Proceedings 2010, Tallinn: NATO CCD COE, 76-99.
"Democracy Under The Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections." Chinese Journal of International Law 18 (1): 1–56.
Four Battlegrounds: Power in the Age of Artificial Intelligence, W.W. Norton.
A Global Protocol on Cybersecurity and Cybercrime, Cybercrimelaw.net.
A Global Treaty on Cybersecurity and Cybercrime, Cybercrimelaw.net.
""Virtual" Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law." Chicago Journal of International Law 19 (1): 30-67.
"Grey Zones in the International Law of Cyberspace." The Yale Journal of International Law Online 42 (2): 1-21.
"Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: An Analytical Vade Mecum." Harvard National Security Journal 8: 239-282.
"Wired Warfare 3.0: Protecting the Civilian Population During Cyber Operations." International Review of the Red Cross: 1-23.
"Autonomous Cyber Capabilities and the International Law of Sovereignty and Intervention." International Law Studies 96: 549-576.
"The Nature of International Law Cyber Norms." Tallinn Paper No. 5, Special Expanded Issue, Tallinn: NATO CCD COE Publications.
"Sovereignty in Cyberspace: Lex Lata Vel Non?" AJIL Unbound 111: 213-218.
"Respect for Sovereignty in Cyberspace." Texas Law Review 95: 1639-1670.
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, Cambridge: Cambridge University Press.
Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge: Cambridge University Press.
International Cyber Norms: Reflections on the Path Ahead, Ministerie van Defensie.
"Looking back to look forward: Autonomous systems, military revolutions, and the importance of cost." Journal of Strategic Studies.
"Inside the Drive for Cyber Peace: Unpacking Implications for Practitioners and Policymakers." UC Davis Business Law Journal 21 (285).
Governing New Frontiers in the Information Age: Toward Cyber Peace, Cambridge University Press.
"Tragedy of the Digital Commons." North Carolina Law Review (forthcoming/available at SSRN).
Cybersecurity under the Ocean: Submarine Cables and US National Security, Hoover Institution, Aegis Series Paper No. 2301.
"Windmills of the Mind: Higher-Order Forms of Disinformation in International Politics." In: Jančárková, T., Lindström, L., Visky, G. & Zotz, P. (eds), 2021 13th International Conference on Cyber Conflict: Going Viral, Tallinn: NATO CCD COE Publications.
The Politics of Cybersecurity in the Middle East, Hurst.
“Career connections: transnational expert networks and multilateral cybercrime negotiations.” Contemporary Security Policy.
"Governance of International Trade and the Internet: Existing and Evolving Regulatory Systems." Global Commission on Internet Governance, Paper Series: No. 32 – May, Centre for International Governance Innovation (CIGI) and Chatham House.
"War, Health, & Ecosystem: Generative Metaphors in Cybersecurity Governance." Philosophy & Technology, forthcoming. (Pre-print available at SSRN: https://ssrn.com/abstract=3534579).
"US cyber strategy of persistent engagement & defend forward: implications for the alliance and intelligence collection." Intelligence and National Security 35 (3): 444-453.
"Cyber Arms Transfer: Meaning, Limits, and Implications." Security Studies 31 (1): 65-91.
No Shortcuts: Why States Struggle to Develop a Military Cyber-Force, London: Hurst & Company.
“The geopolitics of cyberspace and the European Union’s changing identity.” Journal of European Integration 45 (8): 1219-1234.
"Cyber Security and International Agreements." Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, National Academies Press: 179-206.
"Cybersecurity and cyber defence in the emerging democracies." Journal of Cyber Policy 5 (3): 392-412.
"The Layers Principle: Internet Architecture and the Law." Notre Dame Law Review 79 (3): 815-948.
"Prospects for Global Restraints on Cyberattack." Arms Control Today 41 (10): 21-26.
"A Cyberwar of Ideas? Deterrence and Norms in Cyberspace." Contemporary Security Policy 33 (1): 148-170.
"United Kingdom: Pragmatism and adaptability in the cyber realm." In: Romaniuk, S.N. & Manjikian, M., The Routledge Companion to Global Cyber-Security Strategy, Basingstoke: Palgrave MacMillan.
"International Information Security: Description and Legal Aspects." In: Vignard, K. (ed), Disarmament Forum: ICTs and International Security, Geneva: UNIDIR, 2007 (3): 5-14.
"Deterrence and Norms to Foster Stability in Cyberspace." Philosophy & Technology 31: 323-329.
"Norms and Strategies for Stability in Cyberspace." In: Burr, C. & Milano, S. (eds). The 2019 Yearbook of the Digital Ethics Lab, Digital Ethics Lab Yearbook: Springer.
"Deterrence by Norms to Stop Interstate Cyber Attacks." Minds and Machines 27 (3): 387-392.
"Disrupt and restraint: The evolution of cyber conflict and the implications for collective security." Contemporary Security Policy 40 (3): 368-381.
"Winning Future Wars: Russian Offensive Cyber and Its Vital Importance in Moscow’s Strategic Thinking." The Cyber Defense Review 7 (3): 117-135.
"Developments in the Field of Information and Telecommunication in the Context of International Security: Work of the UN First Committee 1998-2012." Cyber Policy Process Brief, ICT4Peace Foundation.
"Legal Framework of Cyber Security." In: Lehto, M. & Neittaanmäki, P. (eds), Cyber Security: Analytics, Technology and Automation, Springer International Publishing.
"International Cyber Norms Dialogue as an Exercise of Normative Power." Georgetown Journal of International Affairs 17 (3): 47-59.
Evolution of the Cyber Domain: The Implications for National and Global Security - Strategic Dossier, IISS-Routledge, "Chapter 5: The 2000s".
Self- and Co-regulation in Cybercrime, Cybersecurity and National Security, Springer.
"Non-State Actors, Ungoverned Spaces and International Responsibility for Cyber Acts." Journal of Conflict and Security Law 21 (3): 455-474.
"The Failure of the Offense/Defense Balance in Cyber Security." The Cyber Defense Review 7 (3): 91-101.
The AI Mirror: How to Reclaim Our Humanity in an Age of Machine Thinking. Oxford University Press.
"Fragmenting Cybersecurity Norms Through the Language(s) of Subalternity: India in 'the East' and the Global Community." Columbia Journal of Asian Law 32 (2): 78-138. (Available at SSRN: https://ssrn.com/abstract=3392781).
"Key Concepts in Cyber Security: Towards a Common Policy and Technology Context for Cyber Security Norms." In: Osula, A.-M. & Rõigas, H. (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 221-242.
"Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace." Intelligence and National Security.
"Domestic Law Responses to Transnational Cyberattacks and Other Online Harms: Internet Dreams Turned to Internet Nightmares and Back Again." Notre Dame Journal of International & Comparative Law 10 (1).
"Law of the Horse to Law of the Submarine: The Future State Behavior in Cyberspace." In: Maybaum, M., Osula, A.-M., & Lindström, L. (eds), 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace, Tallinn: NATO CCD COE Publications, 93-104.
"Cyber Law Development and the United States Law of War Manual." In: Osula, A.-M. & Rõigas, H. (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 49-63.
"A Call for Feminist Insights in Cybersecurity: Implementing United Nations Security Council Resolution 1325 on Women, Peace, and Security in Cyberspace". In: Critical Perspectives on Cybersecurity: Feminist and Postcolonial Interventions, edited by Anwar Mhajne and Alexis Henshaw.
"Dissecting the Digital World: A Review of the Construction and Constitution of Cyber Conflict Research." International Studies Review 20 (3): 520-532.
"US cyber deterrence: Practising guiding theory." Journal of Strategic Studies 43 (2): 245-280.
"Frameworks for International Cyber Security: The Cube, the Pyramid, and the Screen." In: Tikk, E. & Talihärm, A-M. (eds), International Cyber Security Legal & Policy Proceedings 2010, Tallinn: NATO CCD COE, 16-23.
Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks, MIT Press.
“The role of insurers in shaping international cyber-security norms about cyber-war.” Contemporary Security Policy.
"Insurance definitions of cyber war." The Geneva Papers on Risk and Insurance - Issues and Practice 45: 639-656.
"Burned and Blinded: Escalation Risks of Intelligence Loss from Countercyber Operations in Crisis." International Journal of Intelligence and CounterIntelligence.
"Gendered Transnational Authoritarianism in Cyberspace: A Case Study of the Uyghurs". In: Critical Perspectives on Cybersecurity: Feminist and Postcolonial Interventions, edited by Anwar Mhajne and Alexis Henshaw.
Spies, Lies, and Algorithms: The History and Future of American Intelligence, Princeton University Press.
"Chinese Approach to International Law with Regard to Cyberspace Governance and Cyber Operation: From the Perspective of the Five Principles of Peaceful Co-existence." Baltic Yearbook of International Law Online 20 (1): 187-208.
"Strategic studies and cyber warfare." Journal of Strategic Studies.
Confidence Building Measures for Cyberspace – Legal Implications, Tallinn: NATO CCD COE Publications.
Peacetime Regime for State Activities in Cyberspace, International Law, International Relations and Diplomacy, Tallinn: NATO CCD COE Publications.
The Future of the Internet and How to Stop It, New Haven: Yale University Press.
"The Geopolitics of Technology Standards: Historical Context for US, EU and Chinese Approaches." International Affairs 100 (4).
The Politics of Cyber-Security. Routledge.
The International Law of Intelligence: The World of Spycraft and the Law of Nations. Oxford University Press.
"Who spies on whom? Unravelling the puzzle of state-sponsored cyber economic espionage." Journal of Peace Research.
"Cross-Network Weaponization in the Semiconductor Supply Chain." International Studies Quarterly 68 (1).
"Until consensus: Introducing the International Cyber Expression dataset." Journal of Peace Research.
"Controlling internet content in the EU: towards digital sovereignty." Journal of European Public Policy.
"Attributing Digital Covert Action: the curious case of WikiSaudileaks." Intelligence and National Security.
"Beyond sovereignty as authority: the multiplicity of European approaches to digital sovereignty." Global Political Economy.
Critical Perspectives on Cybersecurity: Feminist and Postcolonial Interventions. Oxford University Press.
"An Emergent Community of Cyber Sovereignty: The Reproduction of Boundaries?" Global Studies Quarterly 4 (1).
"Identification-imitation-amplification: understanding divisive influence campaigns through cyberspace." Intelligence and National Security.
"Cyber-diplomacy: The Emergence of a Transient Field." The Hague Journal of Diplomacy.
"Looking towards Europe? Assessing the prospects of the ECOWAS Cybersecurity Strategy in promoting responsible state behavior." International Cybersecurity Law Review 5: 143-168.
"A systematic literature review on advanced persistent threat behaviors and its detection strategy." Journal of Cybersecurity 10 (1): 1-18.
"New technology, old strategy: Cyberspace and the international politics of African agency." Journal of Strategic Studies.
Elements of Deterrence: Strategy, Technology, and Complexity in Global Politics. Oxford University Press.
The Politics of Cyber-Security. Routledge.
"Controlling internet content in the EU: towards digital sovereignty." Journal of European Public Policy.
"Gendered Transnational Authoritarianism in Cyberspace: A Case Study of the Uyghurs". In: Critical Perspectives on Cybersecurity: Feminist and Postcolonial Interventions, edited by Anwar Mhajne and Alexis Henshaw.
"A Call for Feminist Insights in Cybersecurity: Implementing United Nations Security Council Resolution 1325 on Women, Peace, and Security in Cyberspace". In: Critical Perspectives on Cybersecurity: Feminist and Postcolonial Interventions, edited by Anwar Mhajne and Alexis Henshaw.
Subversion: From Covert Operations to Cyber Conflict. Oxford University Press.
Emerging and Disruptive Digital Technologies: National, Regional, and Global Perspectives. Luxembourg, Publications Office of the European Union.
Dark Wire: The Incredible True Story of the Largest Sting Operation in History. PublicAffairs.
"Submarine Cables and the Risks to Digital Sovereignty." Minds and Machines 34 (31).
"Opening up or closing down? Non-state actors in UN cybersecurity governance." Journal of Global Security Studies 9 (3): ogae026.
Cyber Sovereignty: The Future of Governance in Cyberspace. Stanford University Press.
Subversion: From Covert Operations to Cyber Conflict. Oxford University Press.
"Narrow windows of opportunity: the limited utility of cyber operations in war". Journal of Cybersecurity 10: tyae014.
The AI Mirror: How to Reclaim Our Humanity in an Age of Machine Thinking. Oxford University Press.
"The Geopolitics of Technology Standards: Historical Context for US, EU and Chinese Approaches." International Affairs 100 (4).
"Risk vs. threat-based cybersecurity: the case of the EU." European Security 23 (1): 85-103.
"Regulatory cybersecurity governance in the making: the formation of ENISA and its struggle for epistemic authority." Journal of European Public Policy.
"Great power narratives on the challenges of cyber norm building." Policy Design and Practice.
"State Behaviour in Cyberspace: Normative Development and Points of Contention." Zeitschrift für Außen- und Sicherheitspolitik.
"Subversion, cyber operations, and reverse structural power in world politics." European Journal of International Relations 29 (1): 79-103.
"Coding protection: 'cyber humanitarian interventions' for preventing mass atrocities." International Affairs 99 (1): 299-319.
Four Battlegrounds: Power in the Age of Artificial Intelligence, W.W. Norton.
Cybersecurity under the Ocean: Submarine Cables and US National Security, Hoover Institution, Aegis Series Paper No. 2301.
"Strategic studies and cyber warfare." Journal of Strategic Studies.
"Transversal Politics of Big Tech." International Political Sociology 17 (1): olac020.
"Cybersecurity Risk." The Review of Financial Studies 36 (1): 351-407.
"The Chinese Conception of Cybersecurity: A Conceptual, Institutional and Regulatory Genealogy." Journal of Contemporary China.
Deter, Disrupt, or Deceive: Assessing Cyber Conflict as an Intelligence Contest, Georgetown University Press.
"Fighting Cyber Attacks with Sanctions: Digital Threats, Economic Responses." Israel Law Review.
"Preventing the escalation of cyber conflicts: towards an approach to plausibly assure the non-involvement in a cyber-attack." Zeitschrift für Friedens- und Konfliktforschung.
"Cyber-attacks and the right of self-defense: a case study of the Netherlands." Policy Design and Practice.
"Preparing for future cyber crises: lessons from governance of the coronavirus pandemic." Policy Design and Practice.
"Donetsk Don’t Tell – “Hybrid War” in Ukraine and the Limits of Social Media Influence Operations." Journal of Information Technology & Politics.
"Organizing cyber capability across military and intelligence entities: collaboration, separation, or centralization." Policy Design and Practice.
"Public attribution in the US government: implications for diplomacy and norms in cyberspace." Policy Design and Practice.
Subversion: The Strategic Weaponization of Narratives, Georgetown University Press.
"Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation." Policy Design and Practice.
"Strategic autonomy in the European Union's external relations law." Common Market Law Review 60 (3): 667-700.
"Governing cyber crises: policy lessons from a comparative analysis." Policy Design and Practice.
"Challenges for Cyber Arms Control: A Qualitative Expert Interview Study." Zeitschrift für Außen- und Sicherheitspolitik 16: 289-310.
Influence Operations in Cyberspace and the Applicability of International Law. Elgar International Law and Technologies Series, Edward Elgar.
Escalation Dynamics in Cyberspace. Oxford University Press.
"Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions." Government Information Quarterly 40 (4).
"We'll never have a model of an AI major-general: Artificial Intelligence, command decisions, and kitsch visions of war." Journal of Strategic Studies.
"Unmasking the Term 'Dual Use' in EU Spyware Export Control." European Journal of International Law 34 (3): 697-720.
"Authoritarian multilateralism in the global cyber regime complex: The double transformation of an international diplomatic practice." Contemporary Security Policy.
"Looking back to look forward: Autonomous systems, military revolutions, and the importance of cost." Journal of Strategic Studies.
"The EU and Internet standards – Beyond the spin, a strategic turn?"Journal of European Public Policy.
"Problematising EU Cybersecurity: Exploring How the Single Market Functions as a Security Practice." Journal of Common Market Studies.
"Regulating Disinformation and Big Tech in the EU: A Research Agenda on the Institutional Strategies, Public Spheres and Analytical Challenges." Journal of Common Market Studies.
“The role of insurers in shaping international cyber-security norms about cyber-war.” Contemporary Security Policy.
“The geopolitics of cyberspace and the European Union’s changing identity.” Journal of European Integration 45 (8): 1219-1234.
“Career connections: transnational expert networks and multilateral cybercrime negotiations.” Contemporary Security Policy.
“Going nuclear: The development of American strategic conceptions about cyber conflict.” Journal of Strategic Studies.
“Authoritarian multilateralism in the global cyber regime complex: The double transformation of an international diplomatic practice.” Contemporary Security Policy.
“Careful What You Wish For: Tackling Legal Uncertainty in Cyberspace.” Nordic Journal of International Law 92 (3): 394-421.
“Tech titans, cyber commons and the war in Ukraine: An incipient shift in international relations.” International relations.
The Emergence of China’s Smart State. Rowman and Littlefield.
“Strategic narratives and the multilateral governance of cyberspace: The cases of European Union, Russia and India.” Contemporary Security Policy.
When the Chips Are Down: A Deep Dive into a Global Crisis. Bloomsbury India.
Digital Empires: The Global Battle to Regulate Technology. Oxford University Press.
Spies, Lies, and Algorithms: The History and Future of American Intelligence, Princeton University Press.
Semi-State Actors in Cybersecurity, Oxford University Press.
Cyber Security Politics: Socio-Technical Transformations and Political Fragmentation, Routledge.
"Cheerleading in Cyberspace: How the American Public Judges Attribution Claims for Cyberattacks." Foreign Policy Analysis 18 (2).
The New Fire: War, Peace, and Democracy in the Age of AI, The MIT Press.
"Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War." International Security 46 (3): 7-50.
"Cyber Arms Transfer: Meaning, Limits, and Implications." Security Studies 31 (1): 65-91.
"Offensive Cyber Capabilities and State Violence: Three Logics of Integration." Journal of Global Security Studies 7 (1).
No Shortcuts: Why States Struggle to Develop a Military Cyber-Force, London: Hurst & Company.
Offensive Cyber Operations: Understanding Intangible Warfare, London: Hurst & Company.
New War Technologies and International Law: The Legal Limits to Weaponising Nanomaterials, Cambridge University Press.
"Burned and Blinded: Escalation Risks of Intelligence Loss from Countercyber Operations in Crisis." International Journal of Intelligence and CounterIntelligence.
Russian Information Warfare: Assault on Democracies in the Cyber Wild West, Naval Institute Press.
Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks, MIT Press.
"Strategic Substitution: China’s Search for Coercive Leverage in the Information Age." International Security 47 (1): 46-92.
"Introduction: An Offensive Future?" The Cyber Defense Review 7 (3): 9-13.
"Winning Future Wars: Russian Offensive Cyber and Its Vital Importance in Moscow’s Strategic Thinking." The Cyber Defense Review 7 (3): 117-135.
"The Future of Cyber Conflict Studies: Cyber Subcultures and the Road to Interdisciplinarity." The Cyber Defense Review 7 (3): 103-115.
"The Failure of the Offense/Defense Balance in Cyber Security." The Cyber Defense Review 7 (3): 91-101.
"Three Conditions for Cyber Countermeasures: Opportunities and Challenges of Active-Defense Operations." The Cyber Defense Review 7 (3): 79-89.
"Between Two Stools: Military and Intelligence Organizations in the Conduct of Offensive Cyber Operations." The Cyber Defense Review 7 (3): 67-77.
"Democracies and the Future of Offensive (Cyber-Enabled) Information Operations." The Cyber Defense Review 7 (3): 49-65.
"Exploit Brokers and Offensive Cyber Operations." The Cyber Defense Review 7 (3): 31-47.
"Prepare and Prevent: Don’t Repair and Repent: The Role of Insurance in Offensive Cyber." The Cyber Defense Review 7 (3): 17-29.
"Not Illegal: The SolarWinds Incident and International Law." European Journal of International Law.
"Subversion, Cyber Operations, and Reverse Structural Power in World Politics." European Journal of International Relations.
Striking Back: The End of Peace in Cyberspace – And How to Restore It, Yale University Press.
"Roles and Limitations of Middle Powers in Shaping Global Cyber Governance." The International Spectator 57 (3): 31-47.
"An Attractive Alternative? China’s Approach to Cyber Governance and Its Implications for the Western Model." The International Spectator 57 (3): 15-30.
"Interrogating the Cybersecurity Development Agenda: A Critical Reflection." The International Spectator 57 (3): 66-84.
"Beyond the Great Powers: Challenges for Understanding Cyber Operations in Latin America." Global Security Review 2: article 7.
"Contesting Western and Non-Western Approaches to Global Cyber Governance beyond Westlessness." The International Spectator 57 (3): 1-14.
"Information Operations under International Law." Vanderbilt Journal of Transnational Law 55 / Temple University Legal Studies Research Paper No. 2022-16.
"Back to the Roots: The Laws of Neutrality and the Future of Due Diligence in Cyberspace." European Journal of International Law 33 (3): 789-819.
"Russian Approaches to Regulating Use of Force in Cyberspace." Baltic Yearbook of International Law Online 20 (1): 109-132.
"Between Israel and Iran: Middle-East Attitudes to the Role of International Law in the Cyber-Sphere." Baltic Yearbook of International Law Online 20 (1): 209-235.
"Tragedy of the Digital Commons." North Carolina Law Review (forthcoming/available at SSRN).
"Chinese Approach to International Law with Regard to Cyberspace Governance and Cyber Operation: From the Perspective of the Five Principles of Peaceful Co-existence." Baltic Yearbook of International Law Online 20 (1): 187-208.
"Windmills of the Mind: Higher-Order Forms of Disinformation in International Politics." In: Jančárková, T., Lindström, L., Visky, G. & Zotz, P. (eds), 2021 13th International Conference on Cyber Conflict: Going Viral, Tallinn: NATO CCD COE Publications.
"Private active cyber defense and (international) cyber security - pushing the line?" Journal of Cybersecurity 7 (1).
"Manipulating uncertainty: cybersecurity politics in Egypt." Journal of Cybersecurity 7 (1).
"The governance of 5G infrastructure: between path dependency and risk-based approaches." Journal of Cybersecurity 7 (1).
"Inside the Drive for Cyber Peace: Unpacking Implications for Practitioners and Policymakers." UC Davis Business Law Journal 21 (285).
"Restraint under conditions of uncertainty: Why the United States tolerates cyberattacks." Journal of Cybersecurity 7 (1).
"Publicly attributing cyber attacks: a framework." Journal of Strategic Studies.
"Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic." Computers & Security 105 (June).
"Why cybersecurity insurance should be regulated and compulsory." Journal of Cyber Policy.
"Mapping the spread of Russian and Chinese contents on the French-speaking African web." Journal of Cyber Policy 6 (1).
"The Microfoundations of State Cybersecurity: Cyber Risk Perceptions and the Mass Public." Journal of Global Security Studies 6 (2).
"Covid-19 and the Cyber Pandemic: A Plea for International Law and the Rule of Sovereignty in Cyberspace." In: Jančárková, T., Lindström, L., Visky, G. & Zotz, P. (eds), 2021 13th International Conference on Cyber Conflict: Going Viral, Tallinn: NATO CCD COE Publications.
"Making Digital Territory: Cybersecurity, Techno-nationalism, and the Moral Boundaries of the State." Science, Technology, & Human Values 46 (1): 112-138.
"The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations." International Security 46 (2).
"Cyber legalism: why it fails and what to do about it." Journal of Cybersecurity 7 (1).
"Cyberspace is used, first and foremost, to wage wars: proliferation, security and stability in cyberspace." Journal of Cyber Policy 6 (1).
"The strategic surprise of Russian information operations on social media in 2016 in the United States: mapping a blind spot." Journal of Cyber Policy 6 (1).
"Attribution and Knowledge Creation Assemblages in Cybersecurity Politics." Journal of Cybersecurity 7 (1).
The Politics of Cybersecurity in the Middle East, Hurst.
"Unblurring the lines: military cyber operations and international law." Journal of Cyber Policy 6 (3).
"Cyber norms: technical extensions and technological challenges." Journal of Cyber Policy 6 (3).
"China’s quest for quantum advantage—Strategic and defense innovation at a new frontier." Journal of Strategic Studies 44 (3): 922-952.
"The non-anthropocentric informational agents: Codes, software, and the logic of emergence in cybersecurity." Review of International Studies: 1-20.
"Emerging illiberal norms: Russia and China as promoters of internet content control." International Affairs 97 (6): 1925-1944.
"Bridging the gap between cyberwar and cyberpeace." International Affairs 97 (6): 1727-1747.
"Understanding the European Union’s Perception of the Threat of Cyberterrorism: A Discursive Analysis." Journal of Common Market Studies.
"In Defense of Pure Sovereignty in Cyberspace." International Law Studies 97 (1): 1432-1499.
"On the strategic consequences of digital espionage." Journal of Cyber Policy.
Bitskrieg: The New Challenge of Cyberwarfare, Wiley.
International Law As We Know It: Cyberwar Discourse and the Construction of Knowledge in International Legal Scholarship, Cambridge University Press.
"The contested meanings of cybersecurity: evidence from post-conflict Colombia." Conflict, Security & Development 21 (1): 1-19.
Cyber Operations and International Law, Cambridge University Press, Vol. 146.
"Mixed Signals: A Flawed Approach to Cyber Deterrence." Survival 62 (1): 107-130.
"US cyber strategy of persistent engagement & defend forward: implications for the alliance and intelligence collection." Intelligence and National Security 35 (3): 444-453.
"Deciphering Cyber Operations." The Cyber Defense Review 5 (1): 135-152.
"Entanglement in Cyberspace: Minding the Deterrence Gap." Democracy and Security 16 (3): 210-233.
Three tales of attribution in cyberspace: Criminal law, international law and policy debates, The Hague Program for Cyber Norms Policy Brief, April 2020.
"The vital role of international law in the framework for responsible state behaviour in cyberspace." Journal of Cyber Policy.
"US cyber deterrence: Practising guiding theory." Journal of Strategic Studies 43 (2): 245-280.
"What's in a Name? Metaphors and Cybersecurity." International Organization: 1-32.
"War, Health, & Ecosystem: Generative Metaphors in Cybersecurity Governance." Philosophy & Technology, forthcoming. (Pre-print available at SSRN: https://ssrn.com/abstract=3534579).
"Preparing the Cyber Battlefield: Assessing a Novel Escalation Risk in a Sino-American Crisis." Texas National Security Review 3 (4): 54-81.
"Cyber security meets security politics: Complex technology, fragmented politics, and networked science." Contemporary Security Policy 41 (1): 5-32.
"Countering foreign interference: election integrity lessons for liberal democracies." Journal of Cyber Policy 5 (2): 180-198.
"Intelligence in the Cyber Era: Evolution or Revolution?" Political Science Quarterly 135 (2): 191-224.
"Cybersecurity and Cyber Warfare: The Ethical Paradox of 'Universal Diffidence'." In: Christen, M., Gordijn, B. & Loi, M. (eds). The Ethics of Cybersecurity, The International Library of Ethics, Law and Technology, 21, Springer: 245-258.
"Israel: Cyber Warfare and Security as National Trademarks of International Legitimacy." In: Romaniuk, Scott N. & Mary Manjikian (eds), The Routledge Companion to Global Cyber-Security Strategy, Basingstoke: Palgrave Macmillan. (Available at SSRN: https://ssrn.com/abstract=3698972).
"Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem." Intelligence and National Security: 1-19.
"Standardising the splinternet: how China's technical standards could fragment the internet." Journal of Cyber Policy 5 (2): 1-26.
Application of International Law to Cyber Operations: A Comparative Analysis of States' Views, The Hague Program for Cyber Norms Policy Brief, March 2020.
"Insurance definitions of cyber war." The Geneva Papers on Risk and Insurance - Issues and Practice 45: 639-656.
"The Territorialization of Cyberspace." International Studies Review 22 (3): 482-506.
"Shining a Light on Cyber: An Interview with John C. 'Chris' Inglis." Strategic Studies Quarterly 14 (3): 3-11.
Governing New Frontiers in the Information Age: Toward Cyber Peace, Cambridge University Press.
"Private-Sector Attribution of Cyber Incidents: Benefits and Risks to the U.S. Government." International Journal of Intelligence and CounterIntelligence: 1-31.
"Palestine: Whose Cyber Security without Cyber Sovereignty?" In: Romaniuk, Scott N. & Mary Manjikian (eds), The Routledge Companion to Global Cyber-Security Strategy, Basingstoke: Palgrave Macmillan. (Available at SSRN: https://ssrn.com/abstract=3700850).
Election Interference: International Law and the Future of Democracy, Cambridge University Press.
"From Reaction to Action: Adopting a Competitive Posture in Cyber Diplomacy." Texas National Security Review, special issue on Cyber Competition.
"Norms and Strategies for Stability in Cyberspace." In: Burr, C. & Milano, S. (eds). The 2019 Yearbook of the Digital Ethics Lab, Digital Ethics Lab Yearbook: Springer.
"Norms of Responsible State Behaviour in Cyberspace." In: Christen, M., Gordijn, B. & Loi, M., The Ethics of Cybersecurity, Springer.
"United Kingdom: Pragmatism and adaptability in the cyber realm." In: Romaniuk, S.N. & Manjikian, M., The Routledge Companion to Global Cyber-Security Strategy, Basingstoke: Palgrave MacMillan.
Unilateral Remedies to Cyber Operations: Self-Defence, Countermeasures, Necessity, and the Question of Attribution, Cambridge University Press.
"A tale of two cybers-how threat reporting by cybersecurity firms systematically underrepresents threats to civil society." Journal of Information Technology & Politics: 1-20.
"The Need for an International Convention on Cyberspace." Horizons: Journal of International Relations and Sustainable Development 16: 198-209.
"Sending a message: the primacy of action as communication in cyber-security." In: Dutton, W.H. (ed), A Research Agenda for Digital Politics, Elgar Research Agendas: 146-158.
"Domestic Law Responses to Transnational Cyberattacks and Other Online Harms: Internet Dreams Turned to Internet Nightmares and Back Again." Notre Dame Journal of International & Comparative Law 10 (1).
"Cyber campaigns and strategic outcomes." Journal of Strategic Studies.
"Autonomous Cyber Capabilities and the International Law of Sovereignty and Intervention." International Law Studies 96: 549-576.
"Power and diplomacy in the post-liberal cyberspace." International Affairs 96 (3): 749-766.
Information Technology and Military Power, Cornell University Press.
"Cybersecurity and cyber defence in the emerging democracies." Journal of Cyber Policy 5 (3): 392-412.
"The 2019 Venezuelan Blackout and the consequences of cyber uncertainty." Revista Brasileira De Estudos De Defesa 7 (2).
"Dangerous Gaming: Cyber-Attacks, Air-Strikes and Twitter." E-International Relations, 23 September 2019.
"The unexpected norm-setters: Intelligence agencies in cyberspace." Contemporary Security Policy.
Foreign intelligence in the digital age. Navigating a state of 'unpeace', The Hague Program for Cyber Norms Policy Brief, September 2019.
Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers, Doubleday.
"Taking Care of Business: Industrial Espionage and International Law." The Brown Journal of World Affairs 26 (1): 143-160.
"Disrupt and restraint: The evolution of cyber conflict and the implications for collective security." Contemporary Security Policy 40 (3): 368-381.
"Fragmenting Cybersecurity Norms Through the Language(s) of Subalternity: India in 'the East' and the Global Community." Columbia Journal of Asian Law 32 (2): 78-138. (Available at SSRN: https://ssrn.com/abstract=3392781).
"Beyond the United Nations Group of Governmental Experts." The Cyber Defense Review: 161-168.
"Classification of Cyber Capabilities and Operations as Weapons, Means or Methods of Warfare." International Law Studies 95: 179-225.
A coalition of the unwilling? Chinese and Russian perspectives on cyberspace, The Hague Program for Cyber Norms Policy Brief, November 2019.
"A Dose of Realism: The Contestation and Politics of Cyber Norms." Hague Journal on the Rule of Law: 1-23.
"The state of Microsoft? The role of corporations in international norm creation." Journal of Cyber Policy 4 (3): 380-403.
"Democracy Under The Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections." Chinese Journal of International Law 18 (1): 1–56.
"The Governance of Turkey’s Cyberspace: Between Cyber Security and Information Security." International Journal of Public Administration.
"The politics of cyber norms: Beyond norm construction towards strategic narrative contestation." Research in Focus, EU Cyber Direct.
"Cyber Attribution: Can a New Institution Achieve Transnational Credibility?" The Cyber Defense Review 4 (1): 107-122.
"The Bumpy Road to a Meaningful International Law of Cyber Attribution." AJIL Unbound 113: 191-196.
"Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage." International Security 43 (3): 141-189.
"Trends in International Law for Cyberspace." NATO Cooperative Cyber Defense Centre of Excellence (CCDCOE), May 2019.
"Let Them Roar: Small States as Cyber Norm Entrepreneurs." European Foreign Affairs Review 24 (2): 217-234.
"Beyond Naming and Shaming: Accusations and International Law in Cybersecurity." Temple University Legal Studies Research Paper No. 2019-14. (Available at SSRN: https://dx.doi.org/10.2139/ssrn.3347958).
"Conceptual Ambiguity of International Norms on State Behaviour in Cyberspace." Research in Focus, EU Cyber Direct.
"The existential threat from cyber-enabled information warfare." Bulletin of the Atomic Scientists 75 (4): 187-196.
"Due Diligence: a Strategic Norm of Responsible Behaviour for the EU Cyber Diplomacy Toolbox?" Inaugural meeting of the European Cyber Diplomacy Dialogue, EU Cyber Direct, January 2019.
"Cyber Peace and Cyber Stability: Taking the Norm Road to Stability." IEEE Internet Computing 23 (4): 61-66.
"The implications of persistent (and permanent) engagement in cyberspace." Journal of Cybersecurity 5 (1).
"Wired Warfare 3.0: Protecting the Civilian Population During Cyber Operations." International Review of the Red Cross: 1-23.
"Cyber Operations as Imperfect Tools of Escalation." Strategic Studies Quarterly 13 (3): 122-145.
"The EU’s Role in Shaping the Cyber Regime Complex." European Foreign Affairs Review 24 (2): 167–186.
"International Cybersecurity Norm Development: The Roles of States Post-2017." Research in Focus, EU Cyber Direct.
"Responding to cyberattacks: Prospects for the EU Cyber Diplomacy Toolbox." Europe in the World Programme Discussion Paper, European Policy Centre.
"Contested public attributions of cyber incidents and the role of academia." Contemporary Security Policy.
"The Collective Securitisation of Cyberspace in the European Union." West European Politics 42 (2): 278-301.
"Deterrence and Norms to Foster Stability in Cyberspace." Philosophy & Technology 31: 323-329.
"A Taxonomy of Norms in Cyberconflict for Government Policymakers." Journal of Information Warfare 17 (1): 31-48.
Normative Restraints on Cyber Conflict, Cambridge, Mass.: Belfer Center for Science and International Affairs, Harvard Kennedy School.
""Virtual" Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law." Chicago Journal of International Law 19 (1): 30-67.
"Beyond Norms: Using International Economic Tools to Deter Malicious State-Sponsored Cyber Activities." Temple International & Comparative Law Journal 32 (2): 113-125. (Available at SSRN: https://ssrn.com/abstract=3395176).
"Changing the code? Norm contestation and US antipreneurism in cyberspace." International Relations 32 (2): 149-172.
"Unpacking Cyber Norms: Private Companies as Norm Entrepreneurs." Journal of Cyber Policy 3 (1): 61-76.
International Cyber Norms: Reflections on the Path Ahead, Ministerie van Defensie.
"Dissecting the Digital World: A Review of the Construction and Constitution of Cyber Conflict Research." International Studies Review 20 (3): 520-532.
"The Use of Force and Cyber Countermeasures." Temple International & Comparative Law Journal 32 (2): 127-133. (Available at SSRN: https://ssrn.com/abstract=3190253).
"The Demilitarisation of Cyber Conflict." Survival 60 (6): 73-90.
"Cyber Security Norms in the Euro-Atlantic Region: NATO and the EU as Norm Entrepreneurs and Norm Diffusers." In: Gruszczak, Artur & Pawel Frankowski (eds), Technology, Ethics and the Protocols of Modern War, London: Routledge.
"Cyber Security Assemblages: A Framework for Understanding the Dynamic and Contested Nature of Security Provision." Politics and Governance 6 (2): 13-21.
"Expectations of Cyber Deterrence." Strategic Studies Quarterly 12 (4): 44-57.
"From Simulations to Simulacra of War: Game Scenarios in Cyberwar Exercises." Journal of War & Culture Studies 11 (1): 22-37.
"Cracking Attribution: Moving International Norms Forward". (Available at SSRN: https://dx.doi.org/10.2139/ssrn.3300202).
"The Challenges of Cybercrime in the European Union." European Politics and Society 19 (3): 355-375.
"From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers." Leiden Journal of International Law 30 (4): 877-899.
Stateless Attribution: Toward International Accountability in Cyberspace, Research Reports, Santa Monica, CA: RAND Corporation.
"Limiting the undesired impact of cyber weapons: technical requirements and policy implications." Journal of Cybersecurity 3 (1): 59-68.
"Grey Zones in the International Law of Cyberspace." The Yale Journal of International Law Online 42 (2): 1-21.
"The EU Cyber Diplomacy Toolbox: towards a cyber sanctions regime?" European Union Institute for Security Studies (EUISS) Brief, July 2017.
"Appropriate Norms of State Behavior in Cyberspace: Governance in China and Opportunities for US Businesses." Hoover Working Group on National Security, Technology, and Law, Aegis Series Paper No. 1706, 28 July 2017.
"Conflict in Cyberspace: How International Legal Norms Can Reduce Military Escalation in Cyberspace." Fletcher Security Review 3 (1): 67-76.
"The Coming of Cyber Espionage Norms." In: Rõigas, H., Jakschis, R., Lindström, L. & Minárik, T. (eds), 2017 9th International Conference on Cyber Conflict: Defending the Core, Tallinn: NATO CCD COE Publications.
"Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: An Analytical Vade Mecum." Harvard National Security Journal 8: 239-282.
"Toward a Global Norm Against Manipulating the Integrity of Financial Data." Carnegie Endowment for International Peace, 27 March 2017.
"Sovereignty in Cyberspace: Lex Lata Vel Non?" AJIL Unbound 111: 213-218.
"Deterrence by Norms to Stop Interstate Cyber Attacks." Minds and Machines 27 (3): 387-392.
Getting beyond Norms: New Approaches to International Cyber Security Challenges, Centre for International Governance Innovation.
"Respect for Sovereignty in Cyberspace." Texas Law Review 95: 1639-1670.
"Cybersecurity and the Concept of Norms." Carnegie Endowment for International Peace, 30 November 2017.
"China and the US Strategic Construction of Cybernorms: The Process is the Product." Hoover Working Group on National Security, Technology, and Law, Aegis Paper Series No. 1704, 7 July 2017.
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, Cambridge: Cambridge University Press.
"International Cyber Norms Dialogue as an Exercise of Normative Power." Georgetown Journal of International Affairs 17 (3): 47-59.
"Non-State Actors, Ungoverned Spaces and International Responsibility for Cyber Acts." Journal of Conflict and Security Law 21 (3): 455-474.
"Applying Old Rules to New Cases: International Law in the Cyber Domain." Paper presented to the International Studies Association, Atlanta GA, 16-19 March 2016.
"Beyond ‘Quasi-Norms’: The Challenges and Potential of Engaging with Norms in Cyberspace." In: Osula, A.-M. & Rõigas, H. (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 87-109.
"Cyber Law Development and the United States Law of War Manual." In: Osula, A.-M. & Rõigas, H. (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 49-63.
"Norms, Confidence and Capacity Building: Putting the UN Recommendations on Information and Communication Technologies in the Context of International Security Into OSCE-Action." European Cybersecurity Journal 2 (1).
"Technological Integrity and the Role of Industry in Emerging Cyber Norms." In: Osula, Anna-Maria & Henry Rõigas (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 203-220.
"Governance of International Trade and the Internet: Existing and Evolving Regulatory Systems." Global Commission on Internet Governance, Paper Series: No. 32 – May, Centre for International Governance Innovation (CIGI) and Chatham House.
"International Legal Norms in Cyberspace: Evolution of China’s National Security Motivations." In: Osula, Anna-Maria & Henry Rõigas (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 171-201.
"Is the International Law of Cyber Security in Crisis?" In: Pissanidis, N., Rõigas, H. & Veenendaal, M. (eds), 2016 8th International Conference on Cyber Conflict: Cyber Power, Tallinn: NATO CCD COE Publications, 127-139.
"Constructing Norms for Global Cybersecurity." American Journal of International Law 110 (3): 425-479.
A Universal Internet in a Bordered World: Research on Fragmentation, Openness and Interoperability (Research Volume One), Global Commission on Internet Governance, Centre for International Governance Innovation (CIGI) and Chatham House.
"Attribution of malicious cyber incidents: From soup to nuts." Journal of International Affairs 70 (1): 75-137.
"United Nations Group of Governmental Experts: The Estonian Perspective." In: Osula, A.-M. & Rõigas, H. (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 111-127.
"Confidence-Building Measures in Cyberspace: Current Debates and Trends." In: Osula, A.-M. & Rõigas, H. (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 129-153.
"Key Concepts in Cyber Security: Towards a Common Policy and Technology Context for Cyber Security Norms." In: Osula, A.-M. & Rõigas, H. (eds), International Cyber Norms: Legal, Policy & Industry Perspectives, Tallinn: NATO CCD COE Publications, 221-242.
From Articulation to Implementation: Enabling Progress on Cybersecurity Norms, Microsoft Corporation.
The Public Core of the Internet, An International Agenda for Internet Governance, Amsterdam: Amsterdam University Press.
"UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security." International Affairs: A Russian Journal of World Politics, Diplomacy, and International Relations 62 (5).
"The New Norms: Global Cyber-Security Protocols Face Challenges." IHS Jane’s Intelligence Review March: 52-53.
"Patterns of Behavior: States In, Through, and About Cyberspace." Cyber Policy Institute.
Cybersecurity in the European Union: Resilience and Adaptability in Governance Policy, Palgrave Macmillan.
A Call to Cyber Norms: Discussions at the Harvard-MIT-University of Toronto Cyber Norms Workshops, 2011 and 2012, Belfer Center for Science and International Affairs, Kennedy School of Government, Harvard University.
"Small States and Big Ideas: Estonia’s Battle for Cybersecurity Norms." Contemporary Security Policy 36 (2): 346-368.
"Law of the Horse to Law of the Submarine: The Future State Behavior in Cyberspace." In: Maybaum, M., Osula, A.-M., & Lindström, L. (eds), 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace, Tallinn: NATO CCD COE Publications, 93-104.
"A Primer on Globally Harmonizing Internet Jurisdiction and Regulations." Global Commission on Internet Governance, Paper Series: No. 10 – March, Centre for International Governance Innovation (CIGI) and Chatham House.
Self- and Co-regulation in Cybercrime, Cybersecurity and National Security, Springer.
"Why International Order in Cyberspace is Not Inevitable." Strategic Studies Quarterly 9 (2): 78-98.
"Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law." Israel Law Review 48 (1): 55-80.
Evolution of the Cyber Domain: The Implications for National and Global Security - Strategic Dossier, IISS-Routledge, "Chapter 5: The 2000s".
The Evolution of Cyber War: International Norms for Emerging-Technology Weapons, Lincoln, NE: University of Nebraska Press.
"Legal Framework of Cyber Security." In: Lehto, M. & Neittaanmäki, P. (eds), Cyber Security: Analytics, Technology and Automation, Springer International Publishing.
"International Law and International Information Security: A Response to Krutskikh and Streltsov." Tallinn Paper No. 9, Tallinn: NATO CCD COE Publications.
"Solving the International Internet Policy Coordination Problem." Global Commission on Internet Governance, Paper Series: No. 12 – May, Centre for International Governance Innovation (CIGI) and Chatham House.
"The Nature of International Law Cyber Norms." Tallinn Paper No. 5, Special Expanded Issue, Tallinn: NATO CCD COE Publications.
"Structural Causes and Cyber Effects: Why International Order is Inevitable in Cyberspace." Strategic Studies Quarterly 8 (4): 112-128.
International Cybersecurity Norms: Reducing conflict in an Internet-dependent world, Microsoft Corporation.
"The Regime Complex for Managing Global Cyber Activities. The Centre for International Governance." Global Commission on Internet Governance, Paper Series: No. 1 – May, Centre for International Governance Innovation (CIGI) and Chatham House.
"The Play of States: Norms and Security in Cyberspace." American Foreign Policy Interests: The Journal of the National Committee on American Foreign Policy 36 (5): 322-331.
"International Law and the Problem of International Information Security." International Affairs: A Russian Journal of World Politics, Diplomacy, and International Relations0 60 (6): 64-76.
"The Laws of War and Cyberspace: On the Need for a Treaty Concerning Cyber Conflict." Strategic Update 14.2, London: London School of Economics and Political Science.
"Liberty, Equality, Connectivity: Transatlantic Cybersecurity Norms." Washington D.C: Center for Strategic & International Studies.
"What Great Powers Make It. International Order and the Logic of Cooperation in Cyberspace." Strategic Studies Quarterly 7 (1): 93-113.
"From Bombs to Bytes: Can Our Nuclear History Inform Our Cyber Future?" Bulletin of the Atomic Scientists 69 (5): 8-14.
Peacetime Regime for State Activities in Cyberspace, International Law, International Relations and Diplomacy, Tallinn: NATO CCD COE Publications.
Confidence Building Measures for Cyberspace – Legal Implications, Tallinn: NATO CCD COE Publications.
"A New Normal? The Cultivation of Global Norms as Part of a Cybersecurity Strategy." In: Yannakogeorgos, P.A. & Lowther, A.B. (eds), Conflict and Cooperation In Cyberspace, The Challenge to National Security, Taylor & Francis.
"Co-Evolution of Cyberspace and International Relations: New Challenges for the Social Sciences." Prepared for World Social Science Forum (WSSF) 2013 Montreal, Canada, Cambridge, MA: MIT.
"The Dark Future of International Cybersecurity Regulation." Journal of National Security Law & Policy 6 (2): 563-570.
"A Better Defense: Examining the United States' New Norms-Based Approach to Cyber Deterrence." Georgetown Journal of International Affairs: 75-88.
Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge: Cambridge University Press.
"A Cyberwar of Ideas? Deterrence and Norms in Cyberspace." Contemporary Security Policy 33 (1): 148-170.
"Multilateral Approaches for Improving Global Security in Cyberspace." Georgetown Journal of International Affairs: 5-14.
Achieving International Cyber Stability, Washington D.C.: The Atlantic Council.
"The Customary International Law of Cyberspace." Strategic Studies Quarterly 6 (3): 126-145.
Cybersecurity: Law and Regulation, Wolf Legal Publishers.
"Developments in the Field of Information and Telecommunication in the Context of International Security: Work of the UN First Committee 1998-2012." Cyber Policy Process Brief, ICT4Peace Foundation.
Securing Cyberspace Through International Norms: Recommendations for Policymakers and the Private Sector, Washington D.C: Good Harbor Security Risk Management, LLC.
"Applying International Environmental Legal Norms to Cyber Statecraft." I/S: A Journal of Law and Policy for the Information Society 8 (2): 356- 387.
"Cyber Dialogue 2012 Briefs: Whither “Rules of the Road” for Cyberspace?" CyberDialogue 2012: What is Stewardship in Cyberspace.
"Cyberwarfare and International Law." UNIDIR Resources, Ideas for Peace and Security.
"Transparency and Confidence-Building Measures in Cyberspace: Towards Norms of Behaviour." In: Vignard, Kerstin, Ross McCrae & Jason Powers (eds), Disarmament Forum: Confronting Cyberconflict, Geneva: UNIDIR, 2011 (4): 31-40.
"Confidence-Building and International Agreement in Cybersecurity." In: Vignard, K., McCrae, R. & Powers, J. (eds), Disarmament Forum: Confronting Cyberconflict, Geneva: UNIDIR, 2011 (4): 51-60.
A Global Treaty on Cybersecurity and Cybercrime, Cybercrimelaw.net.
"Cybersecurity Treaties: A Skeptical View." In: Berkowitz, P. (ed), Future Challenges in National Security and Law, Hoover Institution Press.
"Cyber Norm Emergence at the United Nations, An Analysis of the UN‘s Activities Regarding Cyber-security." Discussion Paper 2011-11, Cambridge, Mass.: Belfer Center for Science and International Affairs, Harvard Kennedy School.
"Prospects for Global Restraints on Cyberattack." Arms Control Today 41 (10): 21-26.
"Cultivating International Cyber Norms." In: Lord, K.M. & Sharp, T (eds), America’s Cyber Future: Security and Prosperity in the Information Age, Washington D.C.: Center for a New American Security, 87-102.
"Cybersecurity and Cyberpower: Concepts, Conditions and Capabilities for Cooperation for Action Within the EU." Directorate-General for External Policies of the Union, Directorate B, Policy Department, European Parliament.
"We Need a Cyberspace Treaty: Regional and bilateral agreements are not enough." Intermedia 38 (3): 4-5.
"Multilateral Agreements to Constrain Cyberconflict." Arms Control Today 40 (5): 14-19.
"Responsibility for the Harm and Risk of Software Security Flaws." In: Dark, M.J. (ed), Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives, Hershey PA: IGI Global, 104-131.
"Frameworks for International Cyber Security: The Cube, the Pyramid, and the Screen." In: Tikk, E. & Talihärm, A-M. (eds), International Cyber Security Legal & Policy Proceedings 2010, Tallinn: NATO CCD COE, 16-23.
"Erice Declaration on Principles for Cyber Stability and Cyber Peace." International Seminar on Nuclear War and Planetary Emergencies: 42nd Session, Erice, Italy, 19-24 August: 110-111.
"Cybersecurity Regulation: Using Analogies to Develop Frameworks for Regulation." In: Tikk, E. & Talihärm, A-M. (eds), International Cyber Security Legal & Policy Proceedings 2010, Tallinn: NATO CCD COE, 76-99.
"Cyber Security and International Agreements." Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, National Academies Press: 179-206.
"Sovereign Discourse on Cyber Conflict Under International Law." Texas Law Review 88 (7): 1571-1598.
"Towards a Global Regime for Cyber Warfare." In: Czosseck, C. & Geers, K. (eds), The Virtual Battlefield: Perspectives on Cyber Warfare, Conference proceedings - Cooperative Cyber Defense Centre of Excellence (CCD CoE) Conference on Cyber Warfare (June 2009, Tallinn, Estonia).
A Global Protocol on Cybersecurity and Cybercrime, Cybercrimelaw.net.
"Weighing the Case For a Convention to Limit Cyberwarfare." Arms Control Today 39 (9): 21-27.
The Future of the Internet and How to Stop It, New Haven: Yale University Press.
"Military Aspects of Ensuring International Information Security in the Context of Elaborating Universally Acknowledged Principles of International Law." In: Vignard, K. (ed), Disarmament Forum: ICTs and International Security, Geneva: UNIDIR, 2007 (3): 35-44.
Customary Law of the Internet. In the Search for a Supranational Cyberspace Law, The Hague: TMC Asser Press.
"[On Legal and Political Foundations of Global Information Security]." (in Russian) Mezhdunarodniye Protsessy 1 (5): 28–37.
The Regulation of Cyberspace: Control in the Online Environment, New York: Routledge.
"International Information Security: Description and Legal Aspects." In: Vignard, K. (ed), Disarmament Forum: ICTs and International Security, Geneva: UNIDIR, 2007 (3): 5-14.
"Towards a Supranational Internet Law." Journal of International Commercial Law and Technology 1 (1): 1-9.
"The Failure of the Rule of Law in Cyberspace?: Reorienting the Normative Debate on Borders and Territorial Sovereignty." The John Marshall Journal of Information Technology & Privacy Law 24 (1): 1-34.
"The Spontaneous Evolution of Cyber Law: Norms, Property Rights, Contracting, Dispute Resolution and Enforcement without the State." Journal of Law, Economics & Policy 1 (2): 269-348.
"The Layers Principle: Internet Architecture and the Law." Notre Dame Law Review 79 (3): 815-948.
"Cyberspace and the “Devil’s Hatband”." Seattle University Law Review 24 (2): 577-598.
"Of Black Holes and Decentralized Law-Making in Cyberspace." Vanderbilt Journal of Entertainment Law & Practice 2 (1): 70-79.
"Norm Origin and Development in Cyberspace: Models of Cybernorm Evolution." Washington University Law Quarterly 78 (1): 59-111.
"From Consumers to Users: Shifting the Deeper Structures of Regulation Toward Sustainable Commons and User Access." Federal Communications Law Journal 52 (3): 561-579.
"The Law of the Horse: What Cyberlaw Might Teach." Harvard Law Review 113 (501).
"Law and Borders – the Rise of Law in Cyberspace." First Monday 1 (1).
"Cyberspace and the Law of the Horse." University of Chicago Legal Forum, Vol. 1996, Article 7.