الف) فارسی
1. اسمعیلزاده ملاباشی، پرستو؛ عبداللهی، محسن؛ زمانی، سید قاسم (1396). «حملات سایبری و اصول حقوق بینالملل بشردوستانه (مطالعۀ موردی: حملات سایبری به گرجستان)». فصلنامۀ مطالعات حقوق عمومی، دورۀ 47، شمارۀ 2، ص 559-537.
2. امینزاده، الهام؛ مومنیراد، احمد؛ خداپرست، ناصر (1397). حقوق بینالملل و ابعاد سیاسی و نظامی امنیت انرژیهای فسیلی. چاپ اول، تهران، انتشارات دانشگاه تهران.
3. برادران، نازنین؛ حبیبی، همایون (1398). «قابلیت اعمال قواعد حقوق بینالملل بشردوستانه در جنگهای سایبری». فصلنامۀ مطالعات حقوق عمومی، دورۀ 49، شمارۀ 1، ص 158- 139.
4. بنجامین کی، سوواکول (1391). کتاب مرجع امنیت انرژی. ترجمۀ علیرضا طیب، چاپ اول، تهران، ابرار معاصر تهران.
5. حاتمی، مهدی (1397). «نقدی بر نظریۀ «قتلهای هدفمند دولت آمریکا» در پرتو رویه و اصول بنیادین حقوق بشردوستانۀ بینالمللی». پژوهشنامۀ انتقادی متون و برنامههای علوم انسانی، دورۀ 18، شمارۀ 5، ص 113- 89.
6. خلف رضایی، حسین (1392). «حملات سایبری از منظر حقوق بینالملل (مطالعۀ موردی: استاکسنت)». فصلنامۀ مجلس و راهبرد، دورۀ 20، شمارۀ 73، ص 153- 125.
7. رنجبریان، امیرحسین؛ بذار، وحید (1397). «رعایت حقوق بینالملل بشردوستانه از سوی ربات نظامی خودفرمان و مسئولیت ناشی از اقدامات آنها». مجلۀ حقوقی بینالمللی، دورۀ 35، شمارۀ 59، ص 84- 63.
8. زرنشان، شهرام (1393). «مفهوم و ماهیت عنصر مادی در فرایند شکلگیری قواعد حقوق بینالملل عرفی». پژوهشهای حقوق تطبیقی، دورۀ 18، شمارۀ 3، ص 99- 77.
9. ____ (1397). «نسبت میان شرط مارتنس و حقوق بشر در نظم حقوقی بینالمللی جدید». فصلنامۀ مطالعات حقوق عمومی، دورۀ 48، شمارۀ 2، ص 338- 319.
10. سلیمی ترکمانی، حجت (1394). حقوق بینالملل انرژی. چاپ اول، تهران، شهر دانش.
11. ضیائی بیگدلی، محمدرضا (1396). حقوق بینالملل بشردوستانه. چاپ چهارم، تهران، گنج دانش.
12. محقق داماد، سید مصطفی (1394). قواعد فقه- بخش مدنی. چاپ چهل و پنجم، تهران، مرکز نشر علوم اسلامی.
13. نامدار، سعید؛ قاسمی، غلامعلی (1397). «بررسی مفهوم دفاع مشروع در پرتو حملات سایبری (با تأکید بر حملۀ استاکسنت به تأسیسات هستهای ایران)». مجلۀ مطالعات حقوقی، دورۀ 10، شمارۀ 1، ص 235- 199.
14. نوری، ولیالله؛ زمانی، سید قاسم؛ راعی، مسعود (1398). «ضرورت نظامی به عنوان یک استثنا در حقوق درگیریهای مسلحانه». فصلنامۀ مطالعات حقوق عمومی، دورۀ 49، شمارۀ 3، ص 734- 717.
15. ممتاز، جمشید؛ رنجبریان، امیرحسین (1386). حقوق بینالملل بشردوستانه- مخاصمات مسلحانۀ داخلی. چاپ دوم، تهران، نشر میزان.
ب) خارجی
16. Allhoff Fritz, Henschke Adam; Strawser Bradley Jay (2016). Binary Bullets- The ethics of Cyberwarfare. US: Oxford University Press.
17. Bradbrook Adrian J; Gardam Judith G (2006). "Placing Access to Energy Services within a Human Rights Framework". Human Rights Quarterly, Vol. 28, No. 2, pp. 389-415.
18. Bohm Erick R (2015). "Targeting Objects of Economic Interest in Contemporary Warfare". Creighton International and Comparative Law Journal, Vol. 6, No.1, pp.74-84.
19. Christen Markus; Gordihn Bert; Loi Michele (2020). The Ethics of Cybersecurity. Switzerland: Springer.
20. Cecchetti Emanuele Nicola; Jakson Heiki (2017). "The Role Risks and the Strategic Importance of Energy in Conflicts. The Case of Ukraine". Energy Security: Operational Highlights, NATO Energy Security Centre of Excellence, No. 11, pp. 16-24.
21. Clapham Andrew; Gaeta Paola (2014). The Oxford Handbook of International Law in Armed Conflict. UK: Oxford University Press.
22. Clifford Chance (2018). Infrastructure: 21st Century Challenges A Legal Perspective. London: Clifford Chance.
24. CTED; UNOCT (2018). "The Protection of Critical Infrastructure against Terrorist Attacks: Compendium of Good Practices". available at:
25. Desarnaud Gabrielle (2017). "Cyber Attacks and Energy Infrastructures-Anticipating Risks". Ifri Center for Energy, Available at:
26. Dinstein Yoram (2002). "Legitimate Military Objectives under the Current Jus in Bello". International Law Studies, Vol. 78, pp.139-172.
27. Dugulin Riccardo; Cussac Drum (2015)." The Potential Cooperation Between NATO and Private Risk Management Companies in the Protection of Critical Energy Infrastructure". In Alessandro Niglia (Ed.), The Protection of Critical Energy Infrastructure against Emerging Security Challenges( pp. 89-100), Amsterdam, The Netherlands: IOS Press BV.
28. Endicott Neil (2010). "Military Responses to Energy Security Problems: What role for Common Security and Defence Policy?". Bruxelles: Quaker Council for European Affairs aisbl.
29. Energy Infrastructure (2019, April 23). Retrieved from:
30. Final Report to the Prosecutor by the Committee Established to Review the NATO Bombing Campaign against the Federal Republic of Yugoslavia (June 2000). United Nations International Criminal Tribunal for the Former Yugoslavia, Available at:
31. Geneva Water Hub (July 2016). The Protection of Water During and after Armed Conflicts. Geneva: University of Geneva.
32. Gisel Laurent; Olejnik Lukasz (November 2018). The Potential Human Cost of Cyber Operations. Geneva: ICRC.
34. Guelpa Elisa; Bischi Aldo; Verda Vittoria; Chertkov Michael; Lund Henrik (2019). "Towards future Infrastructures for Sustainable Multi-Energy Systems: A Review". Energy, Vol. 184, pp.2-21.
35. Guzman Andrew T (2005). "Saving Customary International Law". Michigan Journal of International Law, Vol. 27, Issue. 1, pp. 116-176.
36. Henckaerts Jean-Marie; Doswald-Beck Louise (2005). Customary International Humanitarian Law, Rules. Volume 1, UK: Cambridge University press.
37. Herman Lior; Fischhendler (2019), "Energy as a Rewarding and Punitive Foreign Policy Instrument: The Case of Israeli–Palestinian Relations". Studies in Conflict and Terrorism, DOI: 10.1080/1057610X.2019.1567997.
38. Jakson Heiki; Brendan Byrne; Cecchetti Emanuela Nicola; Ciampor Jan; Hajek Jaroslav; Hausler Maximilian; Dubrova Kateryna (2017), Energy in Irregular Warfare. Energy in Conflict Series, Lithuania: NATO Energy Security Centre of Excellence.
39. Kerttunen Mika; Tikk Eneken (2017). The Alleged Demise of the UN GGE: An Autopsy and Eulogy. New York: Cyber Policy Institute.
40. Kodar Erki (2012). "Applying the Law of Armed Conflict to Cyber Attacks: From the Martens Clause to Additional Protocol I". In Rain Liivoja & Andres Saumets (Eds.), Cultural, Peace and Conflict Studies Series Volume III: The Law of Armed Conflict: Historical and Contemporary Perspectives (pp. 107-132), Estonia: Tartu University Press.
41. Kuzemco Caroline; Keating Michael F; Goldthau Andreas (2016). The Global Energy Challenge, Environment, Development and Security. London, UK: Palgrave.
42. Larsen Kjetil Mujezinovic; Cooper Camilla G. Guldahl; Nystuen Gro (2013). Searching for a Principle of Humanity in Internatioanl Humanitarian Law. New York: Cambridge University Press.
43. Leetaru Kalev (2017, February 9). "What Tallinn Manual 2.0 Teaches Us About The New Cyber Order". Retrieved from:
44. Letter dated 9 January 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General, U.N. Doc. A/69/723 (13 January 2015).
45. Letter dated 12 September 2011 from the Permanent Representatives of China, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General, U.N. Doc. A/66/359 (14 September 2011).
46. Liivoja Rain; McCormack Tim (2016). Routledge Handbook of the Law of Armed Conflict. London: Routledge.
47. Luban David (2013). "Military Necessity and the Cultures of Military Law". Leiden Journal of International Law, Vol.26, No.2, pp. 315-349.
48. Mourlam, Anna C. (2018). "Unarmed Attacks: Cyber Combatants and the Right to Defend". The California International Law Journal, Vol. 26, No. 1, pp. 19-30.
49. Ngai Jenny Sing-hang (2012). " Energy as a Human Right in Armed Conflict: A Question of Universal Need, Survival, and Human Dignity". Brooklyn Journal of International Law, Vol.37, Issue.2, pp.579-622.
50. Proninska Kamila (2007). "Energy and Security: Regional and Global Dimensions". In Stockholm Internatioal Peace Research Institute (Ed.), Yearbook 2007 Armaments, Disarmament and International Security (pp. 215-243), New York, US: Oxford University press Inc.
52. Ruhle Michael (2017). "Energy Security: Eight Relevant Lessons". Energy Security: Operational Highlights, NATO Energy Security Centre of Excellence, No. 11, pp. 5-7.
53. Sassoli Marco (2019). International Humanitarian Law. UK: Edward Elgar Publishing Limited.
54. Schmitt Michael N (2017). Tallin Manual 2.0 on the International Law Applicable to Cyber Operations. 2nd Edition, UK: Cambridge University Publication.
55. Solis Gary D (2016). The Law of Armed Conflict. 2nd Edition, New York: Cambridge University Press.
56. Sowers Jennie L; Weinthal Erika; Zawahri Neda (2017). "Targeting Environmental Infrastructures, International Law, and Civilians in the New Middle Eastern Wars". Security Dialogue, Vol.48, Issue.5, pp.1-21.
58. Tignino Mara (2016).
Water During and After Armed Conflicts:What Protection in International Law?. Leiden, The Netherlands: Koninklijke Brill nv.
59. Tsagourias Nicholas; Morrison Alasdair (2018). Internatioanl Humanitarian Law". UK: Cambridge University Press.
60. Tully, Stephen (2006). "The Human Right to Access Electricity". The Electricity Journal, Vol.19, Issue.3, pp. 30-39.
62. United Nations Environment Programme (2009). Protecting the Environment During Armed Conflict An Inventory and Analysis of International Law. Nairobi, Kenya: United Nations Environment Programme.
63. Valo Janne (January 2014). Cyber Attacks and the Use of Force in International Law. Faculty of Law, University of Helsinki.
64. Wagner Eric (1995). "Submarine Cables and Protections provided by the law of the Sea". Marine Policy, Vol. 19, No. 2, pp. 127-136.
65. Zarpelo Bruno Bogaz; Miani Rodrigo Sanches; Kawakani Cludio Toshio; De Alvarenga Sean Carlisto (2017). "A Survey of Intrusion Detection in Internet of Things". Journal of Network and Computer Applications, Vol. 84,Issue. C, pp. 25-37.
66. Zio Enrico (2016). "Challenges in the Vulnirability and Risk Analysis of Critical Infrastructures". Reliability Engineering and System Safety, Vol. 152, pp. 137-150.