Search

Search Constraints

Begin New Search You searched for: Topic International Security Remove constraint Topic: International Security

Search Results

1. China’s Role in the Middle East

2. Northeast Asia Defense Transparency Index 2021–22

3. The Zangezur corridor as part of the global transport route (against the backdrop of power games in the South Caucasus region)

4. Systemic Operational Design – a study in failed concept

5. Unknown gunmen and insecurity in Nigeria: Dancing on the brink of state fragility

6. Trojan spoofing: A threat to critical infrastructure

7. Integrating Earth observation IMINT with OSINT data to create added-value multisource intelligence information: A case study of the Ukraine–Russia war

8. Measuring economic resilience for the CEE and Black Sea countries in the framework of comprehensive defense

9. NATO's Strategic Concept: Implications for Greece and Türkiye

10. Net spills among NATO allies: Theory and empirical evidence from dynamic quantile connectedness

11. Introduction to Special Issue on Navigating NATO dynamics: Addressing various challenges in the international security environment

12. The Risk Pivot: Great Powers, International Security and the Energy Revolution

13. Rising from the Ashes: The Future of Arms Control

14. Inside China’s Techno-Security State

15. Tecnología y desigualdad: la gobernanza tecnológica como nuevo paradigma de la seguridad internacional

16. Are Gender Inclusive Militaries Better at Integrating Disruptive Technologies?

17. Pakistan Security Report 2021

18. China’s Rise and U.S. Defense Implications

19. China’s Shifting Approach to Alliance Politics

20. COVID-19 Implications for China's National Security

21. Bureaucratic policy and defense cooperation among the Baltic states

22. From geopolitical anomie to a syncretic metamodel of the Greater Black Sea Region – “Five Sea Region”

23. Critical factors influencing the development of Singapore’s defense industry

24. Genocide, ethical imperatives and the strategic significance of asymmetric power: India’s diplomatic and military interventions in the Bangladesh Liberation War (Indo-Pakistan War of 1971)

25. An evaluation of anti-terrorism laws in Pakistan: Lessons from the past and challenges for the future

26. Protection of critical infrastructure in Norway – factors, actors and systems

27. The cost of appeasement

28. IS CLIMATE CHANGE DRIVING GLOBAL CONFLICT?

29. Currency Power & International Security

30. International Information Security Threats as Side Effects of Modern Technologies

31. Climate change and security in West Africa

32. New Frontiers for Security Cooperation with Seoul and Tokyo

33. A Gender Framework for Arms Control and Disarmament

34. The Integration of the Western Balkans in NATO: a Logical Step in the Strengthening of the Regional Security Community in South East Europe

35. The Dominance Dilemma: The American Approach to NATO and its Future

36. Responsible Statecraft Requires Remaking America’s Foreign Relations Tool Kit

37. U.S. Security Ties With Korea and Japan: Getting Beyond Deterrence

38. Is Arms Control Over?

39. Why the U.S. Should Prioritize Security in Its 5G Roll Out

40. The One-China Policy: Adapting to Tensions in the Taiwan Strait

41. Principles for Building Confidence and Stability into National Defenses and International Security – toward sufficient, affordable, robust, and reliable defense postures

42. Psychological Resilience to Extremism and Violent Extremism

43. Antropoceno, naturaleza y seguridad en el Sudeste asiático: una aproximación Eco-crítica a los conflictos del Mar de China (Anthropocene, Nature, and Security in Southeast Asia: An Eco-Critical Approach to the Conflicts in the South China Sea)

44. Bridging the Silos: Integrating Strategies across Armed Conflict, Violent Crime, and Violent Extremism to Advance the UN’s Prevention Agenda

45. THE SPECIAL POLICE IN ETHIOPIA

46. Do the BRICS care about International Security?

47. Information disorder and What Ukraine is Doing About It: Analysis of Ukraine’s Policies and Actions to Combat Russia-Generated information disorder

48. The Modern Interfaces of Intermarium and the Fight against Destiny

49. Perceptions and Reflections of the Security Crisis in the Black Sea Region

50. NATO and 5G: Managing “High Risk” Vendors and Other Outsourced Infrastructure