Search

Search Constraints

Begin New Search You searched for: Topic Security Remove constraint Topic: Security Content Type Journal Article Remove constraint Content Type: Journal Article Publication Year within 25 Years Remove constraint Publication Year: within 25 Years

Search Results

551. Challenges in Common European Defense Policy: Russia’s Involvement in Ukraine

552. Below the Threshold: Gray Warfare and the Erosion of U.S. Influence: A Conversation with Hal Brands

553. ISIS and Reporting: A Conversation with Graeme Wood

554. The Global Exchange (Special Edition: Energy)

555. Australia, New Zealand and Regional Security in the Pacific: Reflections on Peacekeeping in the Solomon Islands and Papua New Guinea

556. The Security Vectors in Africa

557. Iraq: Years of Post-Saddam Internal and External Developments

558. The Regional Security Complex of South America: An Analysis From the South American Defense Council of Unasur

559. Is it Possible to Ensure Development without Security and Security without Development? Transformation of Security-Development Relationship and its Conceptualization with Different Approaches

560. The South American Defense Council: the Building of a Community of Practice for Regional Defense

561. Brazilian Hybrid Security in South America

562. Managing Security in a Zone of Peace: Brazil´s Soft Approach to Regional Governance

563. Placing India in the Emerging Regional Dynamics of Central Asia: From ‘Look North’ to ‘Connect North’

564. A comparative study: Where and Why does the EU Impose Sanctions?

565. Shift of Power from West to East and Rise of China

566. US Withdrawal from Afghanistan: Implications for Pakistan

567. Shift of Power from West to East and Rise of China

568. Solitaire Arabian Style

569. The Run-up to Xi Jinping’s State Visit

570. Courting Partners

571. US-Japan Relations and the Trump Effect

572. Nuclear Test, Political Fallout, and Domestic Turmoil

573. What Goes Up, Must Come Down

574. Tokyo Transitions to Trump

575. Trump and Xi Break the Ice at Mar-a-Lago

576. Adrift Without Dialogue

577. Can Moon Restore Sunshine?

578. Nigeria’s Leadership Role Quests: The Race of the Crippled

579. Japan’s international peace operations in South Sudan

580. Towards Ending Conflict and Insecurity in the Niger Delta Region

581. Honing Cyber Attribution

582. Toward Practical Cyber Counter Deception

583. Attribution of Malicious Cyber Incidents: From Soup to Nuts

584. A Non-State Strategy for Saving Cyberspace

585. The Adaptation of the Spanish Armed Forces to Western Security in the 1960s / La adecuación de las Fuerzas Armadasespañolas a la seguridad occidental en la década de 1960

586. A U.S. Perspective on Bilateral Economic Relations

587. Between the Eagle and the Dragon: America, China, and Middle State Strategies in East Asia

588. The ROK–U.S. Alliance and the Third Offset Strategy

589. Analyzing Japan’s Role in Korean Security within the Framework of the Quasi-Alliance Model

590. The Canadian Armed Forces in the Arctic: Building Capabilities and Connections

591. Revisiting Africa in Canadian Security Planning & Assessment

592. Networked security between “restraint” and “responsibility”? Germany’s security policy towards Africa

593. Journal of Public and International Affairs 2016

594. KASHMIR: A Conflict between India and Pakistan

595. Water Scarcity- A Major Human Security Challenge to Pakistan

596. China Central Asia Relations and opportunities for Pakistan

597. Harvard Journal of Middle Eastern Politics and Policy: Spring 2016

598. In Defense of The “Obama Doctrine”

599. The Dispatch (Spring 2016)

600. The Dispatch (Fall 2016)