فصلنامه روابط خارجی

فصلنامه روابط خارجی

بُعد سایبری جنگ ترکیبی و تحول مفهومی حقوق مخاصمات مسلحانه بین‌المللی: مطالعه موردی دکترین دفاعی جمهوری اسلامی ایران

نوع مقاله : مقاله پژوهشی

نویسندگان
1 استادیار گروه حقوق، واحد تهران مرکزی، دانشگاه آزاد اسلامی، تهران، ایران
2 دانشجوی دکتری حقوق بین‌الملل، دانشکده امنیت، دانشگاه عالی دفاع ملی، تهران، ایران
چکیده
جنگ ترکیبی در عصر جدید به‌عنوان شکلی پیچیده و چندبُعدی از مخاصمات، تحولات عمیقی در ماهیت سنتی جنگ و چهارچوب‌های حقوقی حاکم بر آن به‌وجود آورده است. این پدیده به دلیل گستردگی و پیچیدگی آن و استفاده هم‌زمان نیروهای نامنظم، نیروهای ویژه، حمایت از ناآرامی‌های داخلی، جنگ اطلاعاتی و تبلیغاتی، دیپلماسی، حملات سایبری، جنگ اقتصادی و نیروهای نظامی منظم در میدان جنگ به تحولات حقوق مخاصمات افزوده است. از طرفی توسعه فناوری‌های نوین، به‌ویژه در بُعد سایبری جنگ ترکیبی، علاوه بر ایجاد تغییرات بنیادین در رویکردهای نظامی، چالش‌های حقوقی بی‌سابقه‌ای را در سطح بین‌المللی ایجاد نموده است. جنگ سایبری با توجه به مطرح و گسترده‌تر شده بحث هوش مصنوعی موجب تقویت توانمندی‌های ملی و جنگ‌های آینده در نظام بین‌الملل شده است. جمهوری اسلامی ایران با توجه به تعارضات راهبردی که در منطقه غرب آسیا با آمریکا و اعضای ناتو دارد همواره در قالب جنگ ترکیبی از سوی آمریکا و متحدین آن مورد هجمه واقع شده است. در این چهارچوب دکترین دفاعی ایران با اتخاذ رویکردی پیشگیرانه و بازدارندگی فعال بر هوشمندسازی سامانه‌های دفاعی، تقویت زیرساخت‌های امنیت سایبری و انعطاف‌پذیری راهبردی تأکید داشته است. سؤال پژوهش حاضر این است که در چهارچوب جنگ ترکیبی آمریکا و متحدین آن بر علیه ایران دکترین دفاعی جمهوری اسلامی ایران چه تغییراتی داشته است؟ در پاسخ به سؤال فوق، نگارندگان فرضیه ذیل را مطرح می‌کنند: دکترین دفاعی جمهوری اسلامی ایران با توجه به تنوع تهدیدات پیشِ­رو در حال تحول است و بر اساس لحاظ شدن اصل تنوع در دفاع همه‌جانبه تنظیم شده است. روش پژوهش مقاله حاضر توصیفی- تبیینی و روش گردآوری منابع اسنادی است.
کلیدواژه‌ها

موضوعات


عنوان مقاله English

The Cyber Dimension of Hybrid Warfare and the Conceptual Transformation of International Armed Conflict Law: A Case Study of the Defensive Doctrine of the Islamic Republic of Iran

نویسندگان English

Abdolhossein Safaee 1
Farshad Bakhshi Jolfan 2
1 Assistant Professor, Department of Law, Central Tehran Branch, Islamic Azad University, Tehran, Iran
2 PhD Candidate in International Law, Faculty of Security, National Defense University, Tehran, Iran
چکیده English

Introduction: The increasing complexity of modern armed conflicts, driven by advancements in technology and the emergence of hybrid warfare, has profoundly reshaped the normative framework of international humanitarian law. Hybrid warfare a form of conflict that blends conventional military operations with cyber warfare, disinformation, proxy tactics, and economic measures poses unique legal and strategic challenges, particularly in regions marked by protracted geopolitical tension. This article focuses on the Islamic Republic of Iran as a case study, analyzing the country's evolving defensive doctrine in response to the multidimensional threats posed by the United States and its allies. It explores how Iran has restructured its military and legal strategy to address the blurred lines of conflict in hybrid settings, particularly within the cyber domain. Moreover, as warfare increasingly migrates into the digital realm, traditional conceptualizations of battlefield and belligerency are no longer sufficient. The proliferation of non-kinetic operations ranging from coordinated cyber espionage to AI-enabled surveillance and disruption requires an expanded legal lexicon and new operational doctrines. Iran's strategic environment, situated at the crossroads of international cyber conflict, has become a testing ground for such emerging paradigms.
Research Question:What transformations has the defensive doctrine of the Islamic Republic of Iran undergone in response to the hybrid warfare conducted by the United States and its allies, and how do these transformations influence the adaptation of international armed conflict law to the cyber domain?
Research Hypothesis:The central hypothesis of this study is that the Islamic Republic of Iran’s defensive doctrine has undergone a systematic transformation in response to multidimensional threats, especially in cyberspace. This transformation reflects a strategic shift toward active deterrence, intelligentized cyber defense, and legal countermeasures. It rests on a comprehensive interpretation of deterrent defense aligned with Iran’s geopolitical context and legal traditions. As traditional legal instruments often fail to address the sub-threshold nature of hybrid threats, Iran’s evolving doctrine reveals the need for conceptual expansion of legal norms to address cyber warfare and asymmetric tactics.
Methodology (and Theoretical Framework if there are):This study employs a descriptive-analytical approach, using both doctrinal and empirical methods. It analyzes primary and secondary legal sources, including international treaties, resolutions, reports from international organizations, national policy documents, and relevant legal doctrines. The research also incorporates a theoretical framework based on jus ad bellum, jus in bello, and the law of state responsibility. It evaluates Iran’s defense policy in light of normative legal developments, focusing on how Iran's responses align or diverge from the principles of necessity, proportionality, distinction, and attribution. Emphasis is placed on interpreting Iran’s doctrinal evolution within both regional strategic dynamics and the broader context of international legal discourse on cyber conflict.
Results and Discussion:Iran’s response to hybrid threats has unfolded along several strategic and normative lines. First, it has institutionalized the concept of intelligentized defense, combining cyber surveillance, artificial intelligence, and automated threat response systems. These innovations allow Iran to identify and neutralize threats proactively, enhancing both tactical readiness and legal justifiability. Second, Iran has embraced strategic deterrence and escalation control through asymmetric tactics such as cyber counterattacks, regional proxy engagement, and targeted disinformation campaigns while framing these actions as lawful under Article 51 of the UN Charter. Third, the doctrinal emphasis on legalism has led Iran to justify its countermeasures by invoking customary international law, including the ILC’s Articles on State Responsibility, which support proportionate non-forcible responses to internationally wrongful acts. These countermeasures are carefully framed to fall below the threshold of armed conflict while still sending strong strategic signals to adversaries.
The study further finds that Iran's cyber strategy has evolved to include multi-layered public-private partnerships aimed at building domestic cyber capacity. These partnerships not only enhance operational resilience but also reflect a broader effort to localize cyber technologies and reduce dependence on foreign infrastructures. Additionally, Iran has introduced legal reforms to integrate cyber threats into national security law, recognizing them as potential threats to territorial integrity and sovereign functionality. This institutional embedding of hybrid and cyber dimensions into national law exemplifies a deeper harmonization between strategic doctrine and legal adaptation.
Furthermore, Iran’s strategic posture has been deeply shaped by its leadership's political ideology, emphasizing resistance, sovereignty, and independence. The Supreme Leader’s discourse reinforces a defense culture grounded in asymmetry and legitimacy, viewing hybrid threats as part of a larger struggle over legal norms and narrative dominance. Within this framework, law becomes both a tool of resistance and a shield against external intervention. Iran’s legal counter-strategy thus reflects both a rejection of Western dominance over the international legal order and an effort to influence that order from within by proposing normative alternatives.
This study also finds that the gaps in existing international humanitarian law frameworks, particularly regarding cyber operations, attribution standards, and thresholds of armed attack, create legal ambiguities that Iran navigates through interpretive innovation. Iran argues that the fragmented nature of hybrid threats necessitates a revised understanding of jus ad bellum, including recognition of hostile cyber acts and disinformation campaigns as forms of aggression. Moreover, it emphasizes that the principle of proportionality must be contextually applied in cyber domains, taking into account the cumulative and often indirect effects of such operations.
Conclusion:Iran’s evolving defensive doctrine exemplifies how a state subjected to continuous hybrid aggression can reshape both its strategic behavior and legal interpretations. Its emphasis on legal countermeasures, intelligentized defense, and norm-building in cyberspace illustrates a multifaceted approach to modern conflict that is both defensive and anticipatory. The Iranian case reveals the pressing need for the international community to update the legal architecture governing warfare to include cyber-specific rules, improve attribution standards, and legitimize proportional defensive responses to hybrid threats. As hybrid warfare becomes the defining feature of 21st-century conflict, Iran’s experience offers a compelling model for how national defense doctrines and international law can co-evolve in response to unprecedented strategic realities.
Finally, the findings suggest that Iran's experience can inform the global conversation on legal innovation in warfare. By foregrounding the principles of legal proportionality, strategic necessity, and cyber sovereignty, Iran contributes to an evolving body of practice that may influence future treaty-making processes. This development underscores the role of regional powers in shaping international norms, particularly in domains where legal consensus remains fragmented or underdeveloped.

کلیدواژه‌ها English

Hybrid warfare
Cyber Warfare
Defensive Doctrine
Deterrent Defense
Countermeasures
Sovereignty
Intelligentized Defense
International Humanitarian Law
Strategic Adaptation
Iran
  • آیت‌الله خامنه‌ای، سید علی (25/04/1368). بیانات در دیـدار اقشـار مختلـف مـردم، رجـوع شـود بـه تارنمای الکترونیکی:https://farsi.khamenei.ir/speech-content?id=2144   
  • آیت‌الله خامنه‌ای، سید علی (29/08/1368). بیانات و رهنمودهای ایشان پس از بازدید از ستاد کل سپاه پاسداران انقلاب اسلامی،. رجوع شود به تارنمای الکترونیکی: https://farsi.khamenei.ir/speech-content?id=11062                                                                 
  • آیت‌الله خامنه‌ای، سید علی (14/08/1376) بیانات در دیدار جمعی از دانش آموزان و دانشجویان رجوع شود به تارنمای الکترونیکی:

https://farsi.khamenei.ir/speech-content?id=9945                                                     

  • آیت‌الله خامنه‌ای، سید علی (15/08/1370) بیانات در دیدار اقشار مختلف مردم رجوع شود به تارنمای الکترونیکی:  https://farsi.khamenei.ir/search-result?q=%D9%81%DA%
  • آیت‌الله خامنه‌ای، سید علی (14/08/1374) بیانات در دیدار جمعی از دانش آموزان و دانشجویان رجوع شود به تارنمای الکترونیکی:https content?id=2772h/ir.khamenei.farsi 
  • آیت‌الله خامنه‌ای، سید علی (19/11/1399) بیانات در دیدار فرماندهان و کارکنان نیروی هوایی و پدافند هوایی ارتش. رجوع شود به تارنمای الکترونیکی: https://farsi.khamenei.ir/speech-content?id=49572                                                             
  • آیت‌الله خامنه‌ای، سید علی (01/01/1402). بیانات در اجتماع زائران و مجاوران حرم مطهر رضوی. رجـوع شـود بـه تارنمای الکترونیکی:

https://farsi.khamenei.ir/speech-content?id=52275                                                             

  • اعلائی فرد، سپیده (۱۴۰۳). اصل تناسب در پرتو استفاده از هوش مصنوعی در مخاصمات مسلحانه. مطالعات حقوقی فضای مجازی، شماره نهم،44-35
  • بخشی، فرشاد؛ محمودی، هادی (1402). بررسی تأثیر ابعاد سایبری جنگ ترکیبی بر حقوق مخاصمات مسلحانه، چهارمین کنفرانس ملی پدافند سایبری، مراغه،280
  • دانش آشتیانی، محمدباقر (1388). اصول و روش تدوین دکترین نظامی، فصلنامه نظم و امنیت انتظامی، شماره سوم سال دوم.
  • رحمانی، ساعد؛ شفیعی، جمال (1401). مفهوم و مؤلفه‌های امنیت فرهنگی در گفتمان ایرانی اسلامی، فصلنامه امنیت ملی، 12(44)، 299-332
  • شریفی طراز کوهی، حسین (1395). حقوق بشردوستانه بین‌المللی،چاپ دوم، تهران: انتشارات بنیاد حقوقی میزان.
  • صادقی زهره؛ عربیان محمدجواد (1401). چالش‌های کاربرد حقوق بین‌الملل بشردوستانه در جنگ‌های سایبری چالش‌های تطبیق اصول حاکم بر مخاصمات مسلحانه بر حملات سایبری بررسی موردی: رعایت اصل ممنوعیت توسل به زور و اصل تفکیک در حملات سایبری، مطالعات حقوقی فضای مجازی، شماره دوم،73-86
  • فلک، دیتر (1395). حقوق بشردوستانه در مخاصمات مسلحانه،ترجمه حسین شریفی طراز کوهی و همکاران، چاپ چهارم، تهران: انتشارات شهر دانش
  • قاسمی، فرهاد؛ اسماعیلی فرزین، ایرج (۱۳۹۶). جنگ ترکیبی در سیستم بین‌المللی پیچیده آشوبی، فصلنامه مدیریت نظامی، سال هفدهم، شماره ۲،69-85
  • موثقی، حسن (1401). چالش‌های کاربرد حقوق بین‌الملل بشردوستانه در جنگ‌های سایبری،مطالعات حقوقی فضای مجازی، شماره دوم،17-2
  • نامدار مظفر، ضمیریان محمدحسین (1390). مقام معظم رهبری و نظریه ساختاری روابط بین‌الملل در سیاست‌گذاری خارجی جمهوری اسلامی ایران.
  • یداللهی، رضا (1399). مبانی و اصول دفاعی جمهوری اسلامی ایران از منظر قرآن کریم. مطالعات دفاعی استراتژیک، سال هجدهم،شماره 79، 330-311.

 

  • Alston, P. (2010). Report of the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions: Addendum, Study on Targeted Killings. United Nations, General Assembly.‌
  • Ambos, K. (2013). Treatise on International Criminal Law: Volume 1: Foundations and General Part. OUP Oxford.‌
  • Ambos, K. (2022). Treatise on International Criminal Law: Volume II: The Crimes and Sentencing. Oxford University Press.
  • Amsellem, D. (2020). Le cyberespace israélien, un enjeu de puissance. Hérodote, (2-3), 281-296.‌
  • Asada, M. (2012). The Concept of “Armed Conflict” in International Armed Conflict. In What Is War? (pp. 51-67).
  • Assidiq, H., Safira, A., & Lubis, S. N. (2020, December). Cyber Attack-The Burden of International Crime Proof: Obstacles and Challenges. In The 2nd International Conference of Law, Government and Social Justice (ICOLGAS 2020) (pp. 67-74). Atlantis Press.‌
  • Bachmann & Munoz Mosquera (2018). Hybrid Warfare as Lawfare: Towards a Comprehensive Legal Approach.
  • Bange, O. (2009). NATO as a Framework for Nuclear Nonproliferation: The West German Case, 1954–2008. International Journal.
  • Barno, D. (2014). Unconventional warfare and modern conflicts. Foreign Affairs.
  • Bellal, A. (2020). What Are ‘Armed Non-State Actors’? A Legal and Semantic Approach. International Humanitarian Law and Non-State Actors: Debates, Law and Practice, 21-46.‌
  • Blank, L. R. (2020). Irreconcilable Differences: The Thresholds for Armed Attack and International Armed Conflict. Notre Dame L. Rev., 96, 249.‌
  • Bokil, R. (2023). Cyber Warfare: Taking War to Cyberspace and its Implications for International Humanitarian Law. International Journal for Multidisciplinary Research, 5(1), 1-12.‌
  • Bordin, F. L. (2018). The Nicaragua v. United States Case: An Overview of the Epochal Judgments. Nicaragua Before the International Court of Justice: Impacts on International Law, 59-83.‌
  • Bothe, M., Partsch, K. J., & Solf, W. A. (Eds.). (1982). New rules for victims of armed conflicts: commentary on the two 1977 protocols additional to the Geneva Conventions of 1949. Martinus Nijhoff Publishers.‌
  • Cantwell, D. (2017). Hybrid Warfare: Aggression and Coercion in the Gray Zone. American Society of International Law.‌
  • Dinstein, Y. (2022). The conduct of hostilities under the law of international armed conflict. Cambridge university press
  • Dooley, J. F. (2024). Cyber Weapons and Cyber Warfare. In History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms (pp. 241-268). Cham: Springer International Publishing.‌
  • Ducaru, S. D. (2016). The cyber dimension of modern hybrid warfare and its relevance for NATO. Europolity-Continuity and Change in European Governance, 10(1), 7-23.‌
  • Fèvre, V. (2017). TALLINN MANUAL 2.0 ON THE INTERNATIONAL LAW APPLICABLE TO CYBER OPERATIONS, Cambridge, Cambridge University Press, 2017, 640 pages. Politique étrangère, (4).
  • Galeotti, M. (2016). Hybrid, ambiguous, and non-linear? How new is Russia’s ‘new way of war’? Small Wars & Insurgencies, 27(2), 282-301.‌
  • Gerasimov, V. (2016). The evolution of modern warfare. Military Review, 23(1)
  • Gervais, M. (2012). Cyber-Attacks and the Laws of War. Berkeley Journal of International Law, 30, 525-531.‌
  • Gervais, M. (2012). Cyber-Attacks and the Laws of War. Berkeley Journal of International Law, 30, 525-531.‌
  • Giegerich, B. (2016). Hybrid warfare and the changing character of conflict. Connections, 15(2), 65-72.‌
  • Gillett, M. (2013). The Anatomy of an International Crime: Aggression at the International Criminal Court. International Criminal Law Review, 13(4), 829-864.‌
  • Graham, D. E. (2010). Cyber Threats and the Law of War. Journal of National Security Law and Policy, 4, 89.‌
  • Graham, D. E. (2010). Cyber Threats and the Law of War. Journal of National Security Law and Policy, 4, 89.‌
  • Hadji-Janev, M. (2016). International Legal Aspects of Protecting Civilians and Their Property in the Future Cyber Conflict. In Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (pp. 423-449). IGI Global.‌
  • Hoffman, F. G. (2009). Hybrid threats: Reconceptualizing the evolving character of modern conflict (Vol. 220). Washington, DC: Institute for National Strategic Studies, National Defense University.‌
  • Hannigan, R. (2014). The web is a terrorist’s command-and-control network of choice. Financial Times, 3, 2014.‌
  • Hansel, M. (2011). Stuxnet und die Sabotage des iranischen Atomprogramms: Ein neuer Kriegsschauplatz im Cyberspace? (pp. 564-576). VS Verlag für Sozialwissenschaften.‌
  • Hathaway, O. A., & Crootof, R. (2012). The Law of Cyber Attack. Faculty Scholarship Series, Paper 3852.
  • International Committee of the Red Cross (ICRC). (2016). Commentary on the First Geneva Convention. Cambridge University Press.
  • International Court of Justice. (1986). Nicaragua v. United States of America: Case concerning military and paramilitary activities in and against Nicaragua (Nicaragua v. United States of America). ICJ Reports 1986, p. 14. https://www.icj-cij.org/en/case/70
  • Kabiri, F. V., Rajaipour, M., & Razmi, S. M. (2021). Una investigación de los delitos cibernéticos desde el punto de vista de la jurisprudencia de Imamieh (Irán). Apuntes Universitarios, 11(1), 352-363.‌
  • Kofman, M., & Rojansky, M. (2015). A closer look at Russia's' hybrid war'. Woodrow Wilson International Center for Scholars
  • Korhonen, O. (2015). Deconstructing the conflict in Ukraine: The relevance of international law to hybrid states and wars. German Law Journal, 16(3), 452-478.‌
  • Leonard, M. (2021). The age of unpeace: How connectivity causes conflict. Random House.‌
  • Lin, H. (2012). Cyber conflict and international humanitarian law. International Review of the Red Cross, 94(886), 515-531.‌
  • Lin, H. S. (2010). Offensive cyber operations and the use of force. Nat'l Sec. L. & Pol'y, 4, 63.‌
  • Mattis, J. N., & Hoffman, F. (2005). Future warfare: The rise of hybrid wars. Proceedings-United States Naval Institute, 131(11), 18.‌
  • Mazaraki, N., & Goncharova, Y. (2022). CYBER DIMENSION OF HYBRID WARS: ESCAPING A‘GREY ZONE’OF INTERNATIONAL LAW TO ADRESS ECONOMIC DAMAGES. Baltic Journal of Economic Studies, 8(2), 115-120.‌
  • Melzer, N. (2009). Interpretive guidance on the notion of direct participation in hostilities under international humanitarian law. International Committee of the Red Cross.‌
  • Moore, J. N. (2005). Development of International Law of Conflict Management. In National Security Law (2nd ed.). Durham, NC: Carolina Academic Press.
  • Nyemann, D. B., & Sørensen, H. (2019). Deterrence by Punishment as a way of Countering Hybrid Threats-Why we need to go" beyond resilience" in the gray zone.‌
  • Ohlin, J. D. (2015). The Doctrine of Legitimate Defense(Cornell Law School Research Paper No. 15-12).
  • Ophardt, J. A. (2010). Cyber warfare and the crime of aggression: The need for individual accountability on tomorrow's battlefield. Duke L. & Tech. Rev., 9, 1.‌
  • Palyvoda, V. (2022). ON HYBRID WARFARE, WITHOUT MYSTIFICATION OR CONSPIRACY. Strategic Panorama, (1), 66-69.‌
  • Parker, S. K., Winslow, C. J., & Tetrick, L. E. (2016). Designing meaningful, healthy, and effective cyber security work. In Psychosocial dynamics of cyber security (pp. 240-266). Routledge.‌
  • Re, D. (2018). International Crimes: A Hybrid Future?. Nigerian Yearbook of International Law 2017, 173-190.‌
  • Reichborn-Kjennerud, E., & Cullen, P. (2022). What is hybrid warfare?. Norwegian Institute for International Affairs (NUPI)
  • Rekotov, P., Nikitenko, V., Korshykova, T., Zherebko, O., & Samoilenko, I. (2022). Protection of the rights and legitimate interests of the individual in a hybrid war. Cuestiones Políticas, 40(73).‌
  • Remus, T. (2013). Cyber-attacks and international law of armed conflicts; a jus ad bellum perspective. Int't Com. L. & Tech., 8, 179.‌
  • Schmitt, M. (2012). Classification of cyber conflict. Journal of Conflict and Security Law, 17(2), 245-260.‌
  • Schmitt, M. N. (1999). Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. Columbia Journal of Transnational Law, 37, 885-937.‌
  • Schmitt, M. N. (Ed.). (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press.‌
  • Schmitt, M., & Biller, J. (2019). Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare.‌
  • Schulze, S. H. (2015). Cyber-" War"-Testfall der Staatenverantwortlichkeit (Vol. 107). Mohr Siebeck.‌
  • Shaw, M. (2010). International Law (6th ed.). Cambridge: Cambridge University Press.‌
  • Sklerov, M. J. (2009). Solving the Dilemma of State Responses to Cyber-Attacks: A Justification for the Use of Active Defenses against States Which Neglect Their Duty to Prevent. Military Law Review, 201, 1-85.‌
  • Smith, Michael. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press.‌
  • Smith, W. (2015). “Our Defense is a Holy Defense!”-The Iran-Iraq War and its Legacy in Contemporary Iranian Factional Politics. Journal of Georgetown University-Qatar Middle Eastern Studies Student Association, 2015(1), 3.‌
  • Sokolov, S., Nyrkov, A., Knysh, T., & Demakov, Y. (2020, September). Cybernetic attacks as a component of information operations during the hybrid warfare. In International Scientific Conference on Architecture and Construction (pp. 67-83). Singapore: Springer Nature Singapore.‌
  • Thiele, R. D. (2015). Crisis in Ukraine–the emergence of hybrid warfare. ISPSW Strategy Series: Focus on Defense and International Security, 347, 1-13.‌
  • Torbat, A. E. (2005). Impacts of the US trade and financial sanctions on Iran. World Economy, 28(3),
  • 407-434.
  • Treverton, G. F., Thvedt, A., Chen, A. R., Lee, K., & McCue, M. (2018). Addressing hybrid threats.‌
  • UN-Human Rights (Office of the High Commissioner). (2016). International Legal Protection of Human Rights in Armed Conflict. United Nations Publication.‌
  • Upeniece, V. (2019). Conditions for the legal commencement of an armed attack. In SHS Web of Conferences (Vol. 68, p. 01022). EDP Sciences.‌
  • van der Wilt, H. (2021). Towards a Better Understanding of the Concept of ‘Indiscriminate Attack’—How International Criminal Law Can Be of Assistance. Yearbook of International Humanitarian Law, Volume 22 (2019), 29-42.‌
  • Vasilovsky, A. (2002). The changing face of war. Journal of Conflict Studies, 23(1)
  • Villaruel, A. J. R. (2007). Kombattantbegrepet: Taliban-og Al Qaeda-inns
  • Watney, M. (2022).Cybersecurity threats to and cyberattacks on critical infrastructure: a legal perspective. In European conference on cyber warfare and security (Vol. 21, No. 1, pp. 319-327).‌
  • Zhuang, R., Bardas, A. G., DeLoach, S. A., & Ou, X. (2015, October). A theory of cyber attacks: A step towards analyzing MTD systems. In Proceedings of the second ACM workshop on moving target defense (pp. 11-20).‌