[ 1]اصلانی، جبار و رنجبریان، امیرحسین (1394). «بررسی تطبیقی و تحلیل تعریف حمله سایبری از منظر دکترین، رویه کشورها و سازمانهای بینالمللی در حقوق بینالملل». فصلنامه تحقیقات حقوقی دانشگاه شهید بهشتی. 18 (71): 257-278.
[2]بیگزاده، ابراهیم ( 1400). حقوق سازمانهای بینالمللی. چاپ هشتم. تهران: انتشارات مجد.
[3] بیگلربیگی، کیان (1402). حملات سایبری و نقض اصل عدم مداخله. پایاننامه کارشناسی ارشد حقوق بینالملل. به راهنمایی ابراهیم
بیگزاده. تهران: دانشگاه شهید بهشتی، دانشکده حقوق، تاریخ دفاع 1402/06/19.
[4] Additional Protocol Concerning the Criminalization of Acts of a Racist and Xenophobic Nature Committed through Computer System, (2003). Retrieved November 17, 2024 from https://rm.coe.int/168008160f
[5] Adel, A., Sarwar, D. & Hosseinian-Far, A. (2021). Transformation of Cybersecurity Posture in IT Telecommunication: A Case Study of a Telecom Operator, In book: Cybersecurity, Privacy and Freedom Protection in the Connected World, Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London.
[6] Arthur, Charles. (2011). Egypt blocks social media websites in attempted clampdown on unrest, The Guardian. Retrieved January 12, 2025 from https:// www.theguardian.com/world/2011/jan/26/egypt-blockssocial-media-websites
[7] Circular Letter from François Rancy, Director, Radiocommunication Bureau, to Administrations of Member States of the ITU, (2016). CR/389. Retrieved January 14, 2025 from
https://www.itu.int/en/ITU-R/conferences/ RRB/Documents/ai%204_1_compendium%20to%20be%20published%20as%20special%20topics_English.docx
[8] Consolidated Version of General Conditions Office of Communications (UK) (‘Ofcom General Conditions’) (2015). Retrieved January 12, 2025 from
https://www.ofcom.org.uk/siteassets/resources/documents/phonestelecoms-and-internet/information-for-industry/generalauthorisationregime/consolidated_version_of_general_ conditions_as_at_28_may_20151.pdf?v=335358
[9] Convention on Cybercrime (Budapest Convention), (2001). Council of Europe, European Treaty Series – No. 185., Entered into Force on 1 July 2004. Retrieved November 17, 2024 from https://rm.coe.int/1680081561
[10] Directive 2002/58/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (amended by Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006, and Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009). Retrieved January 12, 2025 from
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32002L0058
[11] Ezeigweneme, C.A., Umoh, A.A., Ilojianya, V.I., & Oluwatoyin, A. (2023). “Telecom project management: Lessons learned and best practices: A review from Africa to the USA”, World Journal of Advanced Research and Reviews, 20(03), pp. 1713-1730.
[12] Folorunsho, S. O., Adenekan, O. A., Ezeigweneme, C., Somadina, I. C., & Okeleke, P. T. (2024). “Ensuring Cybersecurity in telecommunications: Strategies to protect digital infrastructure and sensitive data”, Computer Science & IT Research Journal, 5(8), pp. 1855-1883.
[13] General Agreement on Trade in Services, Annex on Telecommunications. (1994). Retrieved January 12, 2025 from https://www.wto.org/english/docs_e/legal_e/26-gats.pdf
[14] Giles, K., & Hartmann, K. (2021). “Adversary Targeting of Civilian Telecommunications Infrastructure”, 13th International Conference on Cyber Conflict (CyCon), pp. 133-150.
[15] Hill, R. (2015). Dealing with Cyber Security Threats: International Cooperation, ITU and WCIT, in Maybaum, M., Osula, A.M, and Lindström L. (Eds.), Proceedings of the7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015, NATO CCDCOE Publications.
[16] International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Center of Excellence. (2017). Tallinn Manual 2.0 On The International Law Applicable To Cyber Operation, Cambridge University Press.
[17] International Radiotelegraph Convention. (1906). Retrieved January 13, 2025 from
https://www.itu.int/en/ history/Pages/RadioConferences.aspx?conf=4.36
[18] International Radiotelegraph Convention. (1927). Retrieved January 13, 2025 from
https://history.state. gov/historicaldocuments/frus1927v01/d235
[19] International Telecommunication Convention. (1932). Retrieved January 13, 2025 from https://www.itu.int/en/history/Pages/PlenipotentiaryConferences.aspx?conf=4.5
[20] International Telecommunication Convention. (1973). Retrieved January 13, 2025 from https://treaties.un.org/pages/showDetails.aspx?objid=08000002800e18c9 [21] ITU Constitution, Annex, No. 1012. Retrieved January 12, 2025 from
https://www.itu.int/en/council/Documents/ basic-texts/Constitution-E.pdf
[22] ITU Constitution. Retrieved January 12, 2025 from https://www.itu.int/en/council/Documents/basic-texts/Constitution-E.pdf
[23] ITU International Telecommunication Regulations. (1988). Retrieved January 12, 2025 from https://www.itu.int/dms_pub/itu-t/oth/3f/01/t3f010000010001pdfe.pdf
[24] ITU International Telecommunication Regulations. (2012). Retrieved January 12, 2025 from https://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf
[25] ITU Radio Regulations. (2024). Retrieved January 12, 2025 from https://www.itu.int/pub/R-REG-RR
[26] Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). “Artificial intelligence for cybersecurity: Literature review and future research directions”. Information Fusion, 97(101804), pp. 1-29.
[27] Lin, H. S. (2010). “Offensive Cyber Operations and the Use of Force”, Journal of National Security Law & Policy, 4(63), pp. 63-86.
[28] Manukonda, K. R. R. (2019). “Cyber Attack on Telecommunications Company”, European Journal of Advances in Engineering and Technology, 6(12), pp.113-120.
[29] Naughton, J. (2016). “The evolution of the Internet: from military experiment to General Purpose Technology”, Journal of Cyber Policy, (1), pp. 5-28.
[30] Okafor, E. S., Akinrinola, O., Usman, F. O., Amoo, O. O., & Ochuba, N. A. (2024). “Cybersecurity analytics in protecting satellite telecommunications networks: a conceptual development of current trends, challenges, and strategic responses”, International Journal of Applied Research in Social Sciences, 6(3), pp. 254-266.
[31] Oleg, S. (2022). “Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system”, Technology audit and production reserves, 4 (2/66), pp. 25-28.
[32] Privalov, A., Lukicheva, V., Kotenko, I., & Saenko, I. (2020). “Increasing the Sensitivity of the Method of Early Detection of Cyber-Attacks in Telecommunication Networks Based on Traffic Analysis by Extreme Filtering”, Energies, 13(11), 2774, pp. 1-18
[33] Roscini, M. (2014). Cyber Operations and the Use of Force in International Law. Oxford University Press.
[34] Sadiku, M. N. O., Adekunte, P. A., & Sadiku. J. O. (2024). “Cybersecurity in Telecommunications”, International Journal of Trend in Scientific Research and Development, 8(6), pp. 493-502.
[35] Sadiku, M. N. O., Tembely, M., & Musa, S. M. (2016). “Smart grid cybersecurity”, Journal of Multidisciplinary Engineering Science and Technology, 3(9), pp. 5574-5576.
[36] Shoetan, P.A.,Amoo, O. O., Okafor, E. S., & Olorunfemi, O. L. (2024). “Synthesizing Ai’s impact on cybersecurity in telecommunications: a conceptual framework”, Computer Science & IT Research Journal, 5(3), pp. 594-605.
[37] Singh, K., Kapoor, R. (2023). “Robotic Process Automation and Security Operations in Telecommunications: Addressing Cyber Threats and Vulnerabilities”, MZ Computing Journal, 4(1). pp. 1-7.
[38] Stockburger, P. Z. (2016). “Known Unknowns: State Cyber Operations, Cyber Warfare, and the Jus Ad Bellum”, American University International Law Review, 31(4), pp. 544-591.
[39] The Prosecutor v. Ferdinand Nahimana, Jean-Bosco Barayagwiza, Hassan Ngeze, Case No. ICTR-99-52-T, judgment and sentence, (2003). Retrieved January 12, 2025 from https://www.refworld.org/jurisprudence/caselaw/ictr/2003/en/91852
[40] Twain, M. W., Morrison, J. L. & Scott, W. F. (2023). “Assessing the Effectiveness of Cybersecurity Measures in the United States Telecommunications Industry: A Comprehensive Analysis”, Journal of Marketing and Communication, 6(1), pp. 1-10.
[41] United States Department of Defense, JP 6-01, Joint Electromagnetic Spectrum Management Operations, (2012). Retrieved January 13, 2025 from https://www.govinfo.gov/content/pkg/GOVPUB-D5-PURLgpo29176/pdf/GOVPUB-D5-PURL-gpo29176.pdf
[42] Vaseashta, A., Susmann, F., & Braman, E. (2014). Cyber Security and Resiliency Policy Framework, IOS Press.
[43] Wallace, W., & Visger, M. (2018). “ Responding to the Call for a Digital Geneva Convention: An Open Letter to Brad Smith and the Technology Community”, Journal of Law & Cyber Warfare, 6(2), pp. 3-55.
[44] Woltag, J. C. (2015). Cyber Warfare, Max Planck Encyclopedias of International Law.