Attributing Cyber Attacks | 2014/12/23 | English | 153 |
Cyber War Will Not Take Place | 2012/02/01 | English | 146 |
The future of military innovation studies | 2006/10/01 | English | 87 |
Countering global insurgency | 2005/08/01 | English | 75 |
Technology, civil‐military relations, and warfare in the developing world | 1996/06/01 | English | 72 |
Understanding critical geopolitics: Geopolitics and risk society | 1999/06/01 | English | 72 |
Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War | 2012/06/01 | English | 64 |
Russia’s strategy for influence through public diplomacy and active measures: the Swedish case | 2017/01/05 | English | 61 |
Improving in War: Military Adaptation and the British in Helmand Province, Afghanistan, 2006–2009 | 2010/08/01 | English | 59 |
Reports, politics, and intelligence failures: The case of Iraq | 2006/02/01 | English | 59 |
‘Hearts and Minds’? British Counter-Insurgency from Malaya to Iraq | 2009/06/01 | English | 57 |
Small footprint, small payoff: The military effectiveness of security force assistance | 2017/04/12 | English | 54 |
When speed kills: Lethal autonomous weapon systems, deterrence and stability | 2019/08/22 | English | 50 |
Theories of terrorism: Instrumental and organizational approaches | 1987/12/01 | English | 50 |
The Malayan Emergency as Counter-Insurgency Paradigm | 2009/06/01 | English | 48 |
Intelligence and the problem of strategic surprise∗ | 1984/09/01 | English | 46 |
Abandoned at the Palace: Why the Tunisian Military Defected from the Ben Ali Regime in January 2011 | 2013/04/01 | English | 45 |
Stalking the Secure Second Strike: Intelligence, Counterforce, and Nuclear Strategy | 2014/12/24 | English | 45 |
The Israel defense forces in the Second Lebanon War: Why the poor performance? | 2008/02/01 | English | 42 |
Economic Development and Military Effectiveness | 2010/02/01 | English | 39 |
Emerging technologies and strategic stability in peacetime, crisis, and war | 2019/08/22 | English | 38 |
Strategy in the Age of Artificial Intelligence | 2015/11/23 | English | 38 |
The Business of Piracy in Somalia | 2013/08/01 | English | 37 |
Toward a general theory of deception | 1982/03/01 | English | 36 |
Cyber WarWillTake Place! | 2013/02/01 | English | 36 |
The Libyan Armed Forces between Coup-proofing and Repression | 2013/04/01 | English | 34 |
Cyber campaigns and strategic outcomes | 2020/03/04 | English | 33 |
The capability/vulnerability paradox and military revolutions: Implications for computing, cyber, and the onset of war | 2019/08/22 | English | 33 |
Why Europe matters, why the third world doesn't: American grand strategy after the cold war | 1990/06/01 | English | 32 |
Southeast Asian perspectives on the China challenge | 2007/07/17 | English | 31 |