References
- Lancelot JF. Cyber-diplomacy: cyberwarfare and the rules of engagement. J Cyber Secur. 2020 Oct;4(4):240–254. doi: 10.1080/23742917.2020.1798155
- Yadav S. Social automation and APT attributions in national cybersecurity. J Cyber Secur. 2024 Jan;1–26. doi: 10.1080/23742917.2023.2300494
- Bommasani R, Klyman K, Zhang D, Liang P. Stanford Center for Research on Foundation Models. Stanford Center for Research on Foundation Models; 2023. https://crfm.stanford.edu/2023/06/15/eu-ai-act.html.
- Suhag A, Daniel DA. Study of statistical techniques and artificial intelligence methods in distributed denial of service (DDOS) assault and defense. J Cyber Secur. 2023 Jan;7(1):21–51. doi: 10.1080/23742917.2022.2135856
- US Department of State. Bureau of cyberspace and digital policy - United States Department of State. [cited 2023 Jul 24]. [Online]. Available: https://www.state.gov/bureaus-offices/deputy-secretary-of-state/bureau-of-cyberspace-and-digital-policy/.
- United Nations. The UN norms of responsible state behaviour in cyberspace | Australian strategic policy institute | ASPI. 2022 [cited 2023 Jul 24]. [Online]. Available: https://www.aspi.org.au/report/un-norms-responsible-state-behaviour-cyberspace
- United Nations. Group of governmental experts on developments in the field of information and telecommunications in the context of international security: note/: by the secretary-general. UN; 2015 Jul. [cited 2023 Jul. 24. [Online]. Available: https://digitallibrary.un.org/record/799853
- CCDCOE. The Tallinn Manual. 2013 [cited 2023 Jul 24]. [Online]. Available: https://ccdcoe.org/research/tallinn-manual/
- Council of Europe. Budapest Convention - Cybercrime. 2001 [cited 2023 Jul 25]. [Online]. Available: https://www.coe.int/en/web/cybercrime/the-budapest-convention
- United Nations. United Nations convention on the law of the sea. [cited 2023 Jul 24]. [Online]. Available: https://www.imo.org/en/ourwork/legal/pages/unitednationsconventiononthelawofthesea.aspx.
- JCPOA. What is the Iran nuclear deal? | council on foreign relations. [cited 2023 Jul 24]. [Online]. Available: https://www.cfr.org/backgrounder/what-iran-nuclear-deal.
- GDPR. What is GDPR, the EU’s new data protection law? - GDPR.Eu. [cited 2023 Jul 7]. [Online]. Available: https://gdpr.eu/what-is-gdpr/
- ICO. Information Commissioner’s Office (ICO): the UK GDPR,” UK GDPR guidance and resources. [cited 2023 Jul 8]. [Online]. Available: https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/lawful-basis/a-guide-to-lawful-basis/lawful-basis-for-processing/consent/
- NTI. Wassenaar Arrangement. [cited Jul 2023 24]. [Online]. Available: https://www.nti.org/education-center/treaties-and-regimes/wassenaar-arrangement/.
- OAS. Organization of American States: cybersecurity program. Aug. 2009.
- African Union. African Union convention on cyber security and personal data protection | African union. [cited 2023 Jul 24]. [Online]. Available: https://au.int/en/treaties/african-union-convention-cyber-security-and-personal-data-protection.
- United Nations. United Nations convention against transnational organized crime. [cited 2023 Jul 24]. [Online]. Available: https://www.unodc.org/unodc/en/organized-crime/intro/UNTOC.html.
- United Nations. Convention on the rights of the child | OHCHR. [cited 2023 Jul 24]. [Online]. Available: https://www.ohchr.org/en/instruments-mechanisms/instruments/convention-rights-child.
- United Nations. Optional protocol to the convention on the rights of the child on the sale of children, child prostitution and child pornography | OHCHR. [cited 2023 Jul 24]. [Online]. Available: https://www.ohchr.org/en/instruments-mechanisms/instruments/optional-protocol-convention-rights-child-sale-children-child.
- ISO. ISO/IEC 27035-1: 2016 - information technology — security techniques — information security incident management — part 1: principles of incident management. [cited 2023 Jul 24]. [Online]. Available: https://www.iso.org/standard/60803.html.
- NIST. SP 800-61 Rev. 2, Computer Security Incident Handling Guide | CSRC. [cited 2023 Jul 24]. [Online]. Available: https://csrc.nist.gov/pubs/sp/800/61/r2/final.
- ENISA. Good Practice Guide for Incident Management — ENISA. [cited 2023 Jul 24]. [Online]. Available: https://www.enisa.europa.eu/publications/good-practice-guide-for-incident-management.
- FIRST. Standards. [cited 2023 Jul 24]. [Online]. Available: https://www.first.org/standards/
- OASIS. OASIS cyber threat intelligence (CTI) TC | OASIS. [cited 2023 Jul 24]. [Online]. Available: https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=cti.
- CIS. CIS Critical Security Controls. [cited 2023 Jul 24]. [Online]. Available: https://www.cisecurity.org/controls.
- West-Brown MJ, Stikvoort D, Kossakowski K-P, Killcrece G, Ruefle R, Zajicek M. Handbook for computer security incident response teams (CSIRTs). Carnegie Mellon University, Software Engineering Institute; 2003.
- Cichonski P, Millar T, Grance T, et al. Computer security incident handling guide recommendations of the national institute of standards and technology. doi: 10.6028/NIST.SP.800-61r2.
- ITU-T X.1500 Series. X.1500: overview of cybersecurity information exchange. [cited 2023 Jul 24]. [Online]. Available: https://www.itu.int/rec/T-REC-X.1500.
- ICANN. ICANN Computer Incident Response Team - ICANN. [cited 2023 Jul 24]. [Online]. Available: https://www.icann.org/resources/pages/cirt-2012-02-25-en.
- The White House. National cybersecurity strategy. 2023.
- Cabinet Office. National cyber strategy 2022 - GOV.UK. 2022. [cited 2023 Jul. 23. [Online]. Available: https://www.gov.uk/government/publications/national-cyber-strategy-2022/national-cyber-security-strategy-2022
- NTIA. SBOM at a Glance. NTIA Multistakeholder Process On Software Component Transparency | Ntia.Gov/Sbom. [cited 2023 Jan 2]. [Online]. Available: https://tiny.cc/SPDX
- Meyers JS. Are SBOMs any good? Preliminary measurement of the quality of open source project SBOMs. Chainguard. [cited 2023 Jan 2]. [Online]. Available: https://www.chainguard.dev/unchained/are-sboms-any-good-preliminary-measurement-of-the-quality-of-open-source-project-sboms
- M. P. on S. C. T.-S. and F. W. G. NTIA. Survey of existing SBOM formats and standards-version 2021 survey of existing SBOM formats and standards credit: photo by Patrick Tomasso on unsplash NTIA multistakeholder process on software component transparency standards and formats working group. 2021. [cited 2023 Dec 24. [Online]. Available: https://www.ntia.gov/files/ntia/publications/sbom_formats_survey-version-2021.pdf
- Biden J. Executive order on improving the Nation’s cybersecurity | the White House. The White House. [cited 2023 Jan 2]. [Online]. Available: https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
- EU Commission. Proposal for directive on measures for high common level of cybersecurity across the Union | Shaping Europe’s digital future. 2020. [cited 2023 Jul 23]. [Online]. Available: https://digital-strategy.ec.europa.eu/en/library/proposal-directive-measures-high-common-level-cybersecurity-across-union
- ENISA. Cybersecurity of AI and standardisation — ENISA. [cited 2023 Apr 5]. [Online]. Available: https://www.enisa.europa.eu/publications/cybersecurity-of-ai-and-standardisation