{"has_more":true,"total_items":89,"items":[{"vg_id":0,"published_date":"1999-06","journal":"Research Publication 1 Information Series","page_from":1,"title":"Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework","authors":[{"author_name":"M N Schmitt"}],"page_to":41,"doi":"https://doi.org/10.21236/ada471993"},{"issue":8,"vg_id":0,"published_date":2013,"journal":"Commentary to Rule","volume":11,"authors":[{"author_name":"Tallinn Manual"}],"doi":"https://doi.org/10.1017/cbo9781139169288"},{"vg_id":0,"journal":"A seventh and eighth criteria were added in a later stage, see below. For stylistic reasons references in this article to 'the Manual' only refer to its Introduction or those parts of it dealing with the use of force. For similar reasons, references to 'the prohibition' or 'Article 2(4)' only refer to the 'use of force","authors":[{"author_name":" Ibid"}]},{"vg_id":0,"published_date":1980,"journal":"See International Law Commission, Responsibility of States for Internationally Wrongful Acts, GA/Res 56/83 annex"}]}