Results 1 to 10 of about 48,930 (146)
Keystones of Irregular Warfare [PDF]
Abstract The current security environment is evolving towards a global complexity of unpredictable events. The risk of state and non-state actors attempting to achieve their goals through destabilization exists. In the operating environment, this implies a blurring of the boundaries between state and nonstate actors (such as insurgents,
openaire +1 more source
Contemporary Irregular Warfare: Defense Strategy [PDF]
Globalization influenced by the development of science and technology has brought the world into the era of industrial revolution 4.0. It led to an unstable and confusing situation, which implies the emergence of VUCA (Volatility, Uncertainty, Complexity, Ambiguity) conditions.
Siahaan, Sotardodo, Risman, Helda
openaire +2 more sources
Strategic Resource Allocation: Selecting Vessels to Support Maritime Irregular Warfare [PDF]
The article of record as published may be found at http://dx.doi.org/10.5711/1082598318321The US Navy is at a critical juncture in determining the types and numbers of ships it will acquire, retire, and sustain to support an evolving US military ...
Bummara, Justin +3 more
core +1 more source
Conflicts and Instability in the Contemporary Security Environment [PDF]
While current doctrines try to separate conflicts within two distinct categories – conventional versus irregular, there are, however, a series of contemporary conflicts that challenge this western view on war showing that the disjunctive manner of ...
Ţaranu, Olesea
core +1 more source
Blood revenge and violent mobilization: evidence from the Chechen Wars [PDF]
Despite a considerable amount of ethnographic research into the phenomena of blood revenge and blood feud, little is known about the role of blood revenge in political violence, armed conflict, and irregular war.
Aliyev, Huseyn, Souleimanov, Emil Aslan
core +1 more source
Lanchester Models for Irregular Warfare [PDF]
Military operations research and combat modeling apply mathematical models to analyze a variety of military conflicts and obtain insights about these phenomena. One of the earliest and most important set of models used for combat modeling is the Lanchester equations.
openaire +3 more sources
Trans-Sahel Armed Groups [PDF]
https://digital-commons.usnwc.edu/ciwag-reading-lists/1008/thumbnail ...
& Armed Groups, Center on Irregular Warfare
core +1 more source
https://digital-commons.usnwc.edu/ciwag-reading-lists/1000/thumbnail ...
& Armed Groups, Center on Irregular Warfare
core +1 more source
https://digital-commons.usnwc.edu/ciwag-reading-lists/1006/thumbnail ...
& Armed Groups, Center on Irregular Warfare
core +1 more source
Unconventional cyber warfare: cyber opportunities in unconventional warfare [PDF]
Given the current evolution of warfare, the rise of non-state actors and rogue states, in conjunction with the wide availability and relative parity of information technology, the U.S.
Eidman, Christopher R. +1 more
core

