Results 1 to 10 of about 48,930 (146)

Keystones of Irregular Warfare [PDF]

open access: yesInternational conference KNOWLEDGE-BASED ORGANIZATION, 2017
Abstract The current security environment is evolving towards a global complexity of unpredictable events. The risk of state and non-state actors attempting to achieve their goals through destabilization exists. In the operating environment, this implies a blurring of the boundaries between state and nonstate actors (such as insurgents,
openaire   +1 more source

Contemporary Irregular Warfare: Defense Strategy [PDF]

open access: yesJournal of Social and Political Sciences, 2021
Globalization influenced by the development of science and technology has brought the world into the era of industrial revolution 4.0. It led to an unstable and confusing situation, which implies the emergence of VUCA (Volatility, Uncertainty, Complexity, Ambiguity) conditions.
Siahaan, Sotardodo, Risman, Helda
openaire   +2 more sources

Strategic Resource Allocation: Selecting Vessels to Support Maritime Irregular Warfare [PDF]

open access: yes, 2013
The article of record as published may be found at http://dx.doi.org/10.5711/1082598318321The US Navy is at a critical juncture in determining the types and numbers of ships it will acquire, retire, and sustain to support an evolving US military ...
Bummara, Justin   +3 more
core   +1 more source

Conflicts and Instability in the Contemporary Security Environment [PDF]

open access: yes, 2015
While current doctrines try to separate conflicts within two distinct categories – conventional versus irregular, there are, however, a series of contemporary conflicts that challenge this western view on war showing that the disjunctive manner of ...
Ţaranu, Olesea
core   +1 more source

Blood revenge and violent mobilization: evidence from the Chechen Wars [PDF]

open access: yes, 2015
Despite a considerable amount of ethnographic research into the phenomena of blood revenge and blood feud, little is known about the role of blood revenge in political violence, armed conflict, and irregular war.
Aliyev, Huseyn, Souleimanov, Emil Aslan
core   +1 more source

Lanchester Models for Irregular Warfare [PDF]

open access: yesMathematics, 2020
Military operations research and combat modeling apply mathematical models to analyze a variety of military conflicts and obtain insights about these phenomena. One of the earliest and most important set of models used for combat modeling is the Lanchester equations.
openaire   +3 more sources

Trans-Sahel Armed Groups [PDF]

open access: yes, 2017
https://digital-commons.usnwc.edu/ciwag-reading-lists/1008/thumbnail ...
& Armed Groups, Center on Irregular Warfare
core   +1 more source

Islamic State [PDF]

open access: yes, 2018
https://digital-commons.usnwc.edu/ciwag-reading-lists/1000/thumbnail ...
& Armed Groups, Center on Irregular Warfare
core   +1 more source

Gray Zones Russia [PDF]

open access: yes, 2017
https://digital-commons.usnwc.edu/ciwag-reading-lists/1006/thumbnail ...
& Armed Groups, Center on Irregular Warfare
core   +1 more source

Unconventional cyber warfare: cyber opportunities in unconventional warfare [PDF]

open access: yes, 2014
Given the current evolution of warfare, the rise of non-state actors and rogue states, in conjunction with the wide availability and relative parity of information technology, the U.S.
Eidman, Christopher R.   +1 more
core  

Home - About - Disclaimer - Privacy