Return to Article Details New wine in old bottles: applicability of the rules on attribution to cyberattacks committed against objects of critical infrastructure Download Download PDF