References
Andress, J., & Winterfeld, S. (2013). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Elsevier.
Bílková, V. (2020). State Responsibility for Cyber Operations by Non-State Actors. Czech Yearbook of Public and Private International Law, 11, 127-145.
Brownlie, I. (2008). Principles of Public International Law. Oxford: Oxford University Press.
Cassese, A. (2019). International Law. Translated by Morteza Kalantarian, Tehran: Shahr Danesh. [In Persian]
Dinstein, Y. (2011). War, Aggression and Self-Defence. Cambridge: Cambridge University Press.
EU Council (2025). Statement by the High Representative on behalf of the European Union on the malicious cyber activity in the Middle East. Brussels.
Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the Future of Cyber War. Survival, 53(1), 23–40.
Fazaeli, M. (2024). Cyber Sovereignty in Light of International Law. Strategic Studies Quarterly, 26(1), 7-30. [In Persian]
Franck, T. M. (2002). Recourse to Force: State Action Against Threats and Armed Attacks. Cambridge: Cambridge University Press.
Gerke, M. (2019). Ahead of the Curve: Due Diligence in International Cybersecurity Law. Global Affairs, 5(4-5), 419-431.
Gharibabadi, K. (2021). Nuclear Diplomacy and Iran's Deterrence Doctrine. Tehran: Soroush Publications. [In Persian]
Giles, K. (2016). Handbook of Russian Information Warfare. NATO Defense College.
Glennon, M. J. (2003). The Fog of Law: Self-Defense, Inherence, and Incoherence in Article 51 of the United Nations Charter. Harvard Journal of Law & Public Policy, 25(2), 539-558.
Gray, C. (2018). International Law and the Use of Force. Oxford: Oxford University Press.
Hathaway, O. A., et al. (2012). The Law of Cyber-Attack. California Law Review, 100(4), 817–886.
Hoffman, F. G. (2007). Conflict in the 21st Century: The Rise of Hybrid Wars. Arlington, VA: Potomac Institute for Policy Studies.
International Committee of the Red Cross (ICRC) (2005). Customary International Humanitarian Law, Volume I: Rules. Cambridge: Cambridge University Press.
International Court of Justice (ICJ) (1949). Corfu Channel Case (United Kingdom v. Albania), Merits, Judgment. ICJ Reports 1949.
International Court of Justice (ICJ) (1986). Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v. United States of America), Merits, Judgment. ICJ Reports 1986.
International Law Commission (ILC) (2001). Draft Articles on Responsibility of States for Internationally Wrongful Acts.
Islamic Parliament Research Center (IPRC) (2025). Legal Dimensions of the Aggressive Attack by the Zionist Regime on the Islamic Republic of Iran. (Viewed on October 8, 2025) at:
https://rc.majlis.ir/fa/news/show/1843363 [In Persian]
Jamshidi, M. (2023). International Responsibility of the State for Cyber Attacks by Non-State Actors. Journal of Legal Studies, 15(3), 93-118. [In Persian]
Jennings, R., & Watts, A. (Eds.). (1992). Oppenheim's International Law (9th ed., Vol. 1). London: Longman.
Jensen, E. T. (2018). The Tallinn Manual 2.0: Highlights and Insights. Georgetown Journal of International Law, 49(3), 775-799.
Lin, H. (2012). Cyber Conflict and National Security. New York: The National Academies Press.
Nezam Masael (2025). A Strategic Analysis of the 12-Day War: Present and Future. (Viewed on October 8, 2025) at:
https://nezammasael.com/?p=2147 [In Persian]
Rid, T. (2013). Cyber War Will Not Take Place. Oxford: Oxford University Press.
Roscini, M. (2014). Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press.
Rostami, S. (2022). The Principle of Non-Intervention and the Threshold of Sovereignty in Cyberspace. Journal of Legal Studies, 14(2), 155-178. [In Persian]
Salimi, H. (2019). Theoretical and Practical Dimensions of the National Security Doctrine of the Islamic Republic of Iran. Tehran: Allameh Tabataba'i University Press. [In Persian]
Schmitt, M. N. (Ed.). (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press.
Sharifi, M. (2023). A Critique on the Approach of the Iranian Legislator towards Green Criminality. Journal of Legal Studies, 15(1), 64-92. [In Persian]
Sofaer, A. D. (2003). On the Necessity of Pre-emption. European Journal of International Law, 14(2), 209-226.
Tabrizi, B. (2018). Iran's Cyber Power: A Study of its Strategic Dimensions. Middle East Policy, 25(1), 89-103.
Tehran International Studies & Research Institute (2025).
The Visible and Hidden Dimensions of the Inefficiency of International Law in the 12-Day War. (Viewed on October 8, 2025) at:
http://iict.ac.ir/1404/04/ [In Persian]
Tikk, E., & Kaska, K. (2017). Due Diligence in Cyberspace. Tallinn: NATO CCDCOE Publications.
United Nations (1945). Charter of the United Nations. 1 UNTS XVI.
Wall Street Journal (2025).
Israel is running low on Arrow interceptor missiles, U.S. official says. (Viewed on October 8, 2025) at: [Note: Full URL needed if available, e.g.,
https://www.wsj.com/...]
Waxman, M. C. (2011). Cyber-Attacks and the Use of Force: A Primer. Yale Journal of International Law, 36(2), 421-450.
Zafari, M. et al. (2023). The Legal Basis of Preemptive Self-Defense in International Law. Foreign Relations Quarterly, 15(3), 199-220. [In Persian]
Zamani, S. Q. (2022). International Law and Cyber Security. Tehran: Shahr Danesh Institute for Legal Studies and Research. [In Persian]
Zamanian, M. (2022). Strategic Legal Studies: The Application of International Law as a Foreign Policy Tool. Tehran: Mizan Publishing. [In Persian]
Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. New York: Crown Publishing Group.