selected publications
-
academic article
-
Boothby W. Some legal challenges posed by remote attack.
International Review of the Red Cross.
94:579-595.
2013
Full text if available -
Boothby WHHeintschel von Heinegg WMichael JBSchmitt MNWingfield TC. When Is a Cyberattack a Use of Force or an Armed Attack?.
Computer.
45:82-84.
2012
Full text if available -
Boothby W. Direct Participation in Hostilities – A Discussion of the ICRC Interpretive Guidance.
Journal of International Humanitarian Legal Studies.
1:143-164.
2010
Full text if available
-
Boothby W. Some legal challenges posed by remote attack.
International Review of the Red Cross.
94:579-595.
2013
-
book
-
chapter
-
Boothby W. Biometrics.
392-420.
2019
Full text if available -
Boothby W. Cyber capabilities.
85-136.
2019
Full text if available -
Boothby W. Highly automated and autonomous technologies.
137-181.
2019
Full text if available -
Boothby W. Introduction.
3-15.
2019
Full text if available -
Boothby W. Regulating new weapon technologies.
16-42.
2019
Full text if available -
Boothby W. So, what do we make of all this?.
423-453.
2019
Full text if available -
Boothby W. The law on the conduct of hostilities.
43-60.
2019
Full text if available -
Boothby W. Weapons law, weapon reviews and new technologies.
22-40.
2019
Full text if available -
Boothby W. Dehumanization: Is there a legal problem under article 36?.
21-52.
2018
Full text if available -
Boothby W. Does the law of targeting meet twenty-first-century needs?.
216-234.
2014
Full text if available -
Boothby W. The legal challenges of new technologies: An overview.
21-28.
2014
Full text if available -
Boothby W. Where do cyber hostilities fit in the international law maze?.
59-73.
2014
Full text if available
-
Boothby W. Biometrics.
392-420.
2019
-
conference paper
-
Boothby WHB. Cyber deception and autonomous attack - Is there a legal problem?.
International Conference on Cyber Conflict, CYCON.
2013
-
Boothby WHB. Cyber deception and autonomous attack - Is there a legal problem?.
International Conference on Cyber Conflict, CYCON.
2013