Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
References
Journals A-Z
Journals by Subject
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Journals by Subject
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
References
•
Adams, P. and Newell, P. (1994) The Penguin Book of Australian Jokes. Penguin, Ringwo...
•
Almoayidi, K.A. (2018) Euphemism as a Communicative Tool: A Descriptive Study of Hija...
•
Act (2018:1174). Act on Information Security for Important and Digital Services (p. 1...
•
Baush, C., & Mehling, M. (2013). Alternative Venues of Climate Cooperation: An Instit...
•
Bray, D. A. (2008). Information Pollution, Knowledge Overload, Limited Attention Span...
•
Cassotta, S. (2012). Environmental Damage and Liability Problems in a Multilevel Cont...
•
Cybersecurity Forum (2013-18). Pivot Point Technology Corp.
•
De Sadeleer, N. (2006a). Polluter-Pays Precautionary Principle and Liability. In G. B...
•
De Sadeleer, N. (2006b). Les responsabilité environmentales dans l’espace européen—Po...
•
De Sadeleer, N. (2007). Implementing the Precautionary Principle. Approaches from The...
•
Directive 2016/1148 of the European Parliament and the Council of 6 July Concerning M...
•
Environmental Liability Directive 2004/35/EC with Regards the Prevention and Remedyin...
•
European Commission COM (2004). 702 of 20 October 2004.
•
Fidler, D. (2015). Whither the Web: International Law, Cybersecurity, and Critical In...
•
Frakes, J. (2003). The Common Heritage and Mankind Principle and the Deep Seabed, Out...
•
Hansel, M. (2013). Cyber-Security Governance and the Theory of Public Goods. 27 June ...
•
Hardin, G. (1968). The Tragedy of the Commons. Science, 162, 1243-1248.
https://...
•
Hathaway, O. A. et al. (2012). The Law of Cyber-Attack, Yale School. California Law R...
•
Jan, J. H. (2008). European Environmental Law. Amsterdam: European Law Publishing.
•
Jensen, E. T. (2014). State Obligations in Cyber Operations. In Baltic Yearbook of In...
•
Justitiedepartementet/Justice Department (2017). Skr. 2016/17:213. Nationell strategi...
•
Kramer, L. (2007). EC Environmental Law. London: Thomson-Sweet and Maxwell.
•
Lalou, M. et al. (2017). Identifying the Cyber Attack Origin with Partial Observation...
•
Monti, A. (2001). Environmental Risks: A Comparative Law and Economics Approach to Li...
•
Newman, L. H. (2018). Hacker Lexicon: What Is the Attribution Problem? Security.
•
Nordhaus W. (2015). Climate Clubs: Overcoming Free-Riding in International Climate Po...
•
Oates, W. E. (1992). Environmental Economics: A Survey. Journal of Economic Literatur...
•
Oberthür, S. et al. (2012). Managing Institutional Complex: Regime Interplay and Glob...
•
OECD (1974). Recommendation of the Council on the Implementation of the Polluter-Pays...
•
OECD (1977). Recommendation of the Council on Guiding Principles concerning Internati...
•
OECD (1989). Recommendation of the Council Concerning the Application of the Polluter...
•
Ophardt, J. A. (2010). Cyberspace and the Crime of Aggression: The Need for Individua...
•
Oran, Y. (2012). Building and International Regime Complex for the Arctic: Current St...
•
Protocol on Substances that Deplete the Ozone Layer (Montréal Protocol) of September ...
•
Pursiainen, C. (2018). Critical Infrastructure Resilience: A Nordic Model in the Maki...
•
Radzwill, Y. (2015). Cyber-Attack and the Exploitable Imperfections of International ...
•
Redder, M. E., & Hughes, M. P. (2008). Global Commons and Domain Interrelationships: ...
•
Report “Our Common Future”, Brundtland (1987). “World Commission on Environment and D...
•
Republican, H. (2011). Cybersecurity Task Force, Conference Recommendation of the Hou...
•
Schmitt, N. M. (2017). Peacetime Cyber Responses and Wartime Cyber Operations under I...
<
...
53632
53633
53634
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top