Academic literature on the topic 'Nuclear threats'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Nuclear threats.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Nuclear threats"

1

Barnaby, Frank. "Nuclear threats." Medicine and War 8, no. 2 (1992): 74–86. http://dx.doi.org/10.1080/07488009208409028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sechser, Todd S., and Matthew Fuhrmann. "Crisis Bargaining and Nuclear Blackmail." International Organization 67, no. 1 (2013): 173–95. http://dx.doi.org/10.1017/s0020818312000392.

Full text
Abstract:
AbstractDo nuclear weapons offer coercive advantages in international crisis bargaining? Almost seventy years into the nuclear age, we still lack a complete answer to this question. While scholars have devoted significant attention to questions about nuclear deterrence, we know comparatively little about whether nuclear weapons can help compel states to change their behavior. This study argues that, despite their extraordinary power, nuclear weapons are uniquely poor instruments of compellence. Compellent threats are more likely to be effective under two conditions: first, if a challenger can credibly threaten to seize the item in dispute; and second, if enacting the threat would entail few costs to the challenger. Nuclear weapons, however, meet neither of these conditions. They are neither useful tools of conquest nor low-cost tools of punishment. Using a new dataset of more than 200 militarized compellent threats from 1918 to 2001, we find strong support for our theory: compellent threats from nuclear states are no more likely to succeed, even after accounting for possible selection effects in the data. While nuclear weapons may carry coercive weight as instruments of deterrence, it appears that these effects do not extend to compellence.
APA, Harvard, Vancouver, ISO, and other styles
3

Attwood, David. "Threats and Nuclear Deterrence." Studies in Christian Ethics 4, no. 1 (1991): 40–57. http://dx.doi.org/10.1177/095394689100400103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mendelsohn, Jack. "The New Threats: Nuclear Amnesia, Nuclear Legitimacy." Current History 105, no. 694 (2006): 385–90. http://dx.doi.org/10.1525/curh.2006.105.694.385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rhodes, Edward. "Nuclear weapons and credibility: deterrence theory beyond rationaiity." Review of International Studies 14, no. 1 (1988): 45–62. http://dx.doi.org/10.1017/s0260210500113440.

Full text
Abstract:
The principal challenge for US nuclear deterrence policy in an era of mutual assured destruction capabilities has been to use the threat of nuclear retribution to deter Soviet actions that, however aggressive, do not directly threaten American national survival. The United States seeks to use nuclear threats to deter not only all-out nuclear attack on the United States, but major nuclear or conventional aggression against NATO and also limited, presumably counterforce, blows against America. Nuclear weapons are to serve as an umbrella protecting not only America's cities and society, but US allies and US military forces as well.
APA, Harvard, Vancouver, ISO, and other styles
6

Guchua, Alika, and Thornike Zedelashvili. "Cyberwar as a Phenomenon of Asymmetric Threat and Cyber-Nuclear Security Threats." Історико-політичні проблеми сучасного світу, no. 40 (December 15, 2019): 50–57. http://dx.doi.org/10.31861/mhpi2019.40.50-57.

Full text
Abstract:
The work deals with the topic of cyberwar as a phenomenon of asymmetric threat and cyber-nuclear security threats in modern world politics, potential threats to international politics and global security issues, counter-terrorism policies are discussed. The paper discusses the challenges facing cyber security worldwide and the phenomenon of cyber security against the backdrop of asymmetric threats. Cyberspace has already become a weapon of infinite capacity for the whole world. It has generated positive effect as well as has become the area of evil for terrorists, which are actively using modern technologies, computer systems. The facts are many and we are often in the center of events. With the development of technology in the 21st century, global changes are taking place in international security, the geopolitical transition and new threats and challenges, and international security issues are becoming increasingly important. The international security system is vulnerable to challenges such as the use of weapons of mass destruction and cyber terrorism. The article discusses the dangers and problems of hybrid warfare in international security, as well as the Russian-Georgian hybrid warfare.
 Keywords: Cyberwar, asymmetric threat, hackers, attack, hybrid war, Russia-Georgia, NATO, EU, nuclear terrorism, nuclear security
APA, Harvard, Vancouver, ISO, and other styles
7

Meyrowitz, Elliott L. "Nuclear weapons are illegal threats." Bulletin of the Atomic Scientists 41, no. 5 (1985): 35–37. http://dx.doi.org/10.1080/00963402.1985.11455966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Adikari, Swini. "Countering the Threat of Nuclear Terrorism Arising from Malicious Insiders." Global Affairs Review 1, no. 2 (2021): 1–18. http://dx.doi.org/10.51330/gar.0020214.

Full text
Abstract:
Nuclear theft from malicious insiders is a significant threat to Pakistan’s nuclear weapons arsenal. Pakistan is a member of the Convention of the Physical Protection of Nuclear Material (CPPNM), which is an international agreement that adheres to the protection of nuclear materials and the recovery of stolen nuclear materials. However, this agreement does not specifically take into account the risk of security breaches arising from malicious insiders due to Pakistan’s rapidly growing nuclear arsenal. The purpose of this paper is to examine the heightened risk of insider threats in conjunction with Pakistan’s increasing nuclear force structure. The first section of the paper examines the history of the development of Pakistan’s nuclear weapons programme and discusses Pakistan’s current nuclear force structure. The second section examines the international and domestic policies that Pakistan follows to address the issue of insider threats to Pakistan’s nuclear facilities. The final section proposes two policy alternatives to address Pakistan’s growing insider threat risks and outlines how the Design Basis Threat assessment is the most effective solution for Pakistan’s growing insider threat.
APA, Harvard, Vancouver, ISO, and other styles
9

Pilat, Joseph F. "NATO Nuclear Forces and the New Nuclear Threats." International Journal: Canada's Journal of Global Policy Analysis 63, no. 4 (2008): 875–92. http://dx.doi.org/10.1177/002070200806300405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Full text
Abstract:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are and will remain the main sources of global insecurity and major threats to global security. The persistence and rapid evolution of these phenomena motivate us to investigate the field, to analyze the sources of instability that seriously threaten the security of the human evolutionary environment and to present to the informed public a study of current threats to global security.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Nuclear threats"

1

Nottestad, Tammie L. "What are the security threats to further development of nuclear power plants in the U.S.?" Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FNottestad.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2010.<br>Thesis Advisor(s): Looney, Robert. Second Reader: Woodbury, Glen. "March 2010." Description based on title screen as viewed on April 21, 2010. Author(s) subject terms: Nuclear Power Plants. Includes bibliographical references (p. 99-111). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Dauberman, Jamie. "Making decisions about screening cargo containers for nuclear threats using decision analysis and optimization." VCU Scholars Compass, 2010. http://scholarscompass.vcu.edu/etd/2240.

Full text
Abstract:
One of the most pressing concerns in homeland security is the illegal passing of weapons-grade nuclear material through the borders of the United States. If terrorists can gather the materials needed to construct a nuclear bomb or radiological dispersion device (RDD, i.e., dirty bomb) while inside the United States, the consequences would be devastating. Preventing plutonium, highly enriched uranium (HEU), tritium gas or other materials that can be used to construct a nuclear weapon from illegally entering the United States is an area of vital concern. There are enormous economic consequences when our nation's port security system is compromised. Interdicting nuclear material being smuggled into the United States on cargo containers is an issue of vital national interest, since it is a critical aspect of protecting the United States from nuclear attacks. However, the efforts made to prevent nuclear material from entering the United States via cargo containers have been disjoint, piecemeal, and reactive, not the result of coordinated, systematic planning and analysis. Our economic well-being is intrinsically linked with the success and security of the international trade system. International trade accounts for more than thirty percent of the United States economy (Rooney, 2005). Ninety-five percent of international goods that enter the United States come through one of 361 ports, adding up to more than 11.4 million containers every year (Fritelli, 2005; Rooney, 2005; US DOT, 2007). Port security has emerged as a critically important yet vulnerable component in the homeland security system. Applying game theoretic methods to counterterrorism provides a structured technique for defenders to analyzing the way adversaries will interact under different circumstances and scenarios. This way of thinking is somewhat counterintuitive, but is an extremely useful tool in analyzing potential strategies for defenders. Decision analysis can handle very large and complex problems by integrating multiple perspectives and providing a structured process in evaluating preferences and values from the individuals involved. The process can still ensure that the decision still focuses on achieving the fundamental objectives. In the decision analysis process value tradeoffs are evaluated to review alternatives and attitudes to risk can be quantified to help the decision maker understand what aspects of the problem are not under their control. Most of all decision analysis provides insight that may not have been captured or fully understood if decision analysis was not incorporated into the decision making process. All of these factors make decision analysis essentially to making an informed decision. Game theory and decision analysis both play important roles in counterterrorism efforts. However, they both have their weaknesses. Decision analysis techniques such as probabilistic risk analysis can provide incorrect assessments of risk when modeling intelligent adversaries as uncertain hazards. Game theory analysis also has limitations. For example when analyzing a terrorist or terrorist group using game theory we can only take into consideration one aspect of the problem to optimize at a time. Meaning the analysis is either analyzing the problem from the defenders perspective or from the attacker’s perspective. Parnell et al. (2009) was able to develop a model that simultaneously maximizes the effects of the terrorist and minimizes the consequences for the defender. The question this thesis aims to answer is whether investing in new detector technology for screening cargo containers is a worthwhile investment for protecting our country from a terrorist attack. This thesis introduces an intelligent adversary risk analysis model for determining whether to use new radiological screening technologies at our nation’s ports. This technique provides a more realistic risk assessment of the true situation being modeled and determines whether it is cost effective for our country to invest in new cargo container screening technology. The optimal decision determined by our model is for the United States to invest in a new detector, and for the terrorists to choose agent cobalt-60, shown in Figure 18. This is mainly due to the prominence of false alarms and the high costs associated with screening all of these false alarms, and we assume for every cargo container that sounds an alarm, that container is physically inspected. With the new detector technology the prominence of false alarms decreases and the true alarm rate increases, the cost savings associated with this change in the new technology outweighs the cost of technical success or failure. Since the United States is attempting to minimize their expected cost per container, the optimal choice is to invest in the new detector. Our intelligent adversary risk analysis model can simultaneously determine the best decision for the United States, who is trying to minimize the expected cost, and the terrorist, who is trying to maximize the expected cost to the United States. Simultaneously modeling the decisions of the defender and attacker provides a more accurate picture of reality and could provide important insights to the real situation that may have been missed with other techniques. The model is extremely sensitive to certain inputs and parameters, even though the values are in line with what is available in the literature, it is important to understand the sensitivities. Two inputs that were found to be particularly important are the expected cost for physically inspecting a cargo container, and the cost of implementing the technology needed for the new screening device. Using this model the decision maker can construct more accurate judgments based on the true situation. This increase in accuracy could save lives with the decisions being made. The model can also help the decision maker understand the interdependencies of the model and visually see how his resource allocations affect the optimal decisions of the defender and the attacker.
APA, Harvard, Vancouver, ISO, and other styles
3

Genzman, Grant Norman. "Ship collision and the Offshore Floating Nuclear Plant (OFNP) : analysis of possible threats and security measures." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104144.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Mechanical Engineering, 2016.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 135-137).<br>The OFNP research group in the Nuclear Science and Engineering Department at MIT is developing a power plant that combines two well-established technologies -- light water reactors and offshore platforms -- into a new design called the Offshore Floating Nuclear Plant (OFNP). Deploying a nuclear reactor aboard a floating platform up to 12 nautical miles into the ocean raises unique security questions and considerations. This investigation presents a framework for analyzing the threat of intentional ship collision, modeling damage and characterizing the effectiveness of potential solutions, as well as integrating or adapting the recommended security strategies into existing regulatory and legal environments. First, a collision risk assessment is completed and a postulated design-basis collision threat (DBT) is determined to be a 150,000 DWT ship. Next, using the DBT characteristics and the finite element modeling software ABAQUS, estimations for damage are provided for a reference case and for cases with variations in collision characteristics. Results indicate increased ship penetration from faster and larger ships, wedge-shaped ship hulls, fixed OFNP moorings, direct broadside collisions, and OFNP designs with less internal structural support. Additionally, in order to minimize risk of unacceptable damage, the results indicate that vessels larger than 70,000 DWT should be restricted from entering within an eight-nautical mile exclusion zone. The results from the previous assessments are then used to present technical, operational, and regulatory recommendations for damage mitigation. The analysis concludes with an assessment of the existing regulatory and legal environments in which the regulatory solutions would have to be implemented, provides an analysis of the degree to which the ideal regulations comply with existing laws, and then culminates with the presentation of further recommendations and a regulatory strategy framework for meeting security goals while achieving legal compliance. In summary, this investigation considers the threat of intentional collision with an Offshore Floating Nuclear Plant and utilizes risk assessment techniques, numerical modeling, and legal research to contextualize the threat, model possible damage, and present technical, operational, and regulatory solutions for avoiding or mitigating damage.<br>by Grant Norman Genzman.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
4

Madson, Peter N. "The sky is not falling regional reaction to a nuclear-armed Iran." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://handle.dtic.mil/100.2/ADA445779.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): Lavoy, Peter R. "March 2006." Description based on title screen as viewed on January 16, 2008.. Includes bibliographical references (p.83-91). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

McDowell, Steven R. "Is Saudi Arabia a nuclear threat?" Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FMcDowell.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, September 2003.<br>Thesis advisor(s): James Russell, Peter R. Lavoy. Includes bibliographical references (p. 69-79). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
6

Van, Wyck Peter C. "Signs of dangerdangerous signs : responding to nuclear threat." Thesis, McGill University, 1997. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=35417.

Full text
Abstract:
This doctoral thesis ("Signs of Danger/Dangerous Signs: Responding to Nuclear Threat") is a poststructural, interdisciplinary exploration of the social, political and cultural workings of nuclear threat. Drawing extensively on a nuclear waste burial initiative being undertaken by the United States Department of Energy, this work is a detailed critical analysis of the relationships between the threats posed by nuclear wastes, and the responses provoked in relation to such threats.<br>Working through such theorists as Jacques Lacan and Slavoj Z&circ;iz&circ;ek (the second death, and le Reel), Francois Ewald (thresholds), Ulrich Beck (risk society), and Felix Guattari (ecology of the virtual), this work demonstrates the manner in which ecological threats, such as that posed by the nuclear, are (paradoxically) "creative" forces; that is, they have a propensity to cut through traditional social divisions (e.g., class, race), assembling news lines of affinity, and new constituencies of those at risk. Indeed, it seem that nuclear threat constitutes a novel form of threat. A form of threat that is irreducibly material, yet admits of no objective ground upon which decisions may be made. A form of threat that threatens the very biological foundations of life, yet whose ontology is to be determined through social and cultural responses.<br>The principle critical figure I use to analyse and illustrate the movement of threat is the vast monument/sign which is to be constructed above the Waste Isolation Pilot Plant (WIPP) in the desert near Carlsbad, New Mexico. If constructed, this monument will be one of the largest public works project in history. The purpose of this monument is to signify the danger which is to be buried below and thereby deter---for a legislated period of 10,000 years---inadvertent human intrusion into the site. Through analyses of the semiotic issues raised by the desert monument, the appropriation of the practice of burial and its relations to cultural conceptions of death, and the use of the desert as the mise-en-scene of waste, this dissertation shows how the larger context of waste burial demonstrates an extreme and unexamined field of cultural trauma and disavowal around issues of nuclear threat.
APA, Harvard, Vancouver, ISO, and other styles
7

Gurgel, Matthew G. "The threat of inadvertent Nuclear War in South Asia." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA390881.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, March 2001.<br>Thesis advisors, James Wirtz, Michael Barletta. Includes bibliographical references (p. 75-84). Also Available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Van, Wyck Peter C. "Signs of danger/dangerous signs, responding to nuclear threat." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ44615.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Srimuang, Sarunsiri. "The Mortality or Pre-Emtive War : In search of Justifications and Guidelines for Pre-Emptive Warfare." Thesis, Linköping University, Centre for Applied Ethics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9675.

Full text
Abstract:
<p>The thesis argues that, as a tradition, the concept of just war is socially and contextually sensitive and revisable. It explores the relevance of theory according to the dynamic changes in the nature of threats in the international arena and concludes that the just war tradition is still relevant to the contemporary modern threats that require an act of pre-emptive warfare. However, it needs some revision to be comprehensively applicable to the dynamic of modern threats and the nature of pre-emptive war. Due to the nature of pre-emptive war a nation launches the attack before the aggression from the other nation-in-conflict erupts. The author, therefore, proposed several theoretical and procedural revisions in both the principle of “Jus Ad Bellum” and “Jus In Bello” using the method of reflective equilibrium to create a comprehensive “just” pre-emptive war doctrine as part of the development and dynamic in just war tradition.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

Myers, Paul Allen. "Future hope and the threat of nuclear war evangelical responses /." Theological Research Exchange Network (TREN), 1985. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Nuclear threats"

1

Apikyan, Samuel, and David Diamond, eds. Nuclear Threats and Security Challenges. Springer Netherlands, 2015. http://dx.doi.org/10.1007/978-94-017-9894-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wallerstein, Mitchel B. Responding to proliferation threats. National Defense University, Institute for National Strategic Studies, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mærli, Morten Bremer. Nuclear terrorism: Threats, challenges, and responses. Norske Atlanterhavskomité, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Over the horizon proliferation threats. Stanford University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kahan, Jerome H. Nuclear threats from small states / Jerome H. Kahan. Strategic Studies Institute, U.S. Army War College, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Conze, Eckart, Martin Klimke, and Jeremy Varon, eds. Nuclear Threats, Nuclear Fear and the Cold War of the 1980s. Cambridge University Press, 2016. http://dx.doi.org/10.1017/9781316479742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kahan, Jerome H. Regional deterrence strategies for new proliferation threats. National Defense University, Institute for National Strategic Studies, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kahan, Jerome H. Regional deterrence strategies for new proliferation threats. National Defense University, Institute for National Strategic Studies, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

DeVolpi, Alexander. Nuclear shadowboxing: Contemporary threats from Cold War weaponry. Fidlar Doubleday, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Clemens, Anna J. Chemical, biological, radiological, and nuclear threats: Countermeasure preparation. Nova Science Publisher's, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Nuclear threats"

1

Futter, Andrew. "Managing Nuclear Threats: Structures of Global Nuclear Governance." In The Politics of Nuclear Weapons. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48737-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Krepon, Michael. "Prioritizing Threats and Responses." In Cooperative Threat Reduction, Missile Defense and the Nuclear Future. Palgrave Macmillan US, 2003. http://dx.doi.org/10.1057/9781403973580_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nacht, Michael. "Confronting Gathering Threats: U.S. Strategic Policy." In Perspectives on Sino-American Strategic Nuclear Issues. Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230613164_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Buckup, P. "A High Sensitivity Nuclear Method for Real-Time Detection of Elements and Compounds in Drinking Water and Soil." In Threats to Global Water Security. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fountain, Augustus Way. "Chemical, Biological, Radiological, Nuclear, and Explosive Threats: An Introduction." In Handbook of Security Science. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-51761-2_14-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Arbatov, Alexey. "Nuclear Deterrence: A Guarantee for or Threat to Strategic Stability?" In NL ARMS. T.M.C. Asser Press, 2020. http://dx.doi.org/10.1007/978-94-6265-419-8_5.

Full text
Abstract:
AbstractIn recent literature, much attention has been paid to factors that affect nuclear deterrence and stability from the outside: new missile defence systems, non-nuclear (conventional) high-precision long-range weapons, the influence of third and threshold nuclear states, space weapons, and—more recently—cyber threats. These new factors have pushed the core of nuclear deterrence—strategic relations between Russia and the United States—to the background in the public consciousness. Yet dangerous changes are taking place. This chapter examines the real and imaginary causes of the current situation and suggests potential ways to reduce tensions that could benefit international security. It concludes that nuclear deterrence can serve as a pillar of international security with one crucial reservation: namely, that it can only work in conjunction with negotiations and agreements on the limitation, reduction, and non-proliferation of nuclear weapons. Without such checks, nuclear deterrence goes berserk. It endlessly fuels the arms race, brings the great powers to the brink of nuclear war in any serious crisis, and sometimes the very dynamics of nuclear deterrence can instigate a confrontation.
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, Narendra, and Ambesh Dixit. "Nanotechnology-Enabled Management of Chemical, Biological, Radiological, and Nuclear Threats." In Nanotechnology for Defence Applications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29880-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Okuda, Hiroko. "Legacy Media Coverage of North Korea’s Nuclear Threats in Japan." In Palgrave Macmillan Series in Global Public Diplomacy. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70167-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nunn, Sam. "Countering Nuclear Threats: From Cold War Wehrkunde to Today’s Munich Security Conference." In Towards Mutual Security. Vandenhoeck & Ruprecht, 2014. http://dx.doi.org/10.13109/9783666300547.133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rajčić, Boris, Gvozden Tasić, Vladimir Karić, Bojan Radak, and Dubravka Milovanović. "Contemporary CBRN (Chemical, Biological, Radiological, Nuclear) Threats and Adequate Response – Real Situation Training." In 4th International Conference on Human Security. University of Belgrade, Faculty of Security Studies, Human Security Research Center, 2018. http://dx.doi.org/10.18485/fb_ic4hs.2018.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Nuclear threats"

1

Tolo, Silvia, and John Andrews. "Nuclear Facilities and Cyber Threats." In Proceedings of the 29th European Safety and Reliability Conference (ESREL). Research Publishing Services, 2019. http://dx.doi.org/10.3850/978-981-11-2724-3_0966-cd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

CACIUFFO, ROBERTO G. M. "IMPROVING RESILIENCE TO NUCLEAR AND RADIOLOGICAL THREATS." In International Seminar on Nuclear War and Planetary Emergencies — 49th Session. WORLD SCIENTIFIC, 2019. http://dx.doi.org/10.1142/9789811205217_0017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Karoly, Steve. "Technologies to counter aviation security threats." In NUCLEAR WEAPONS AND RELATED SECURITY ISSUES. Author(s), 2017. http://dx.doi.org/10.1063/1.5009231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kouzes, Richard T. "Challenges for interdiction of nuclear threats at borders." In 2009 1st International Conference on Advancements in Nuclear Instrumentation, Measurement Methods and their Applications (ANIMMA). IEEE, 2009. http://dx.doi.org/10.1109/animma.2009.5503731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kostadinov, Venceslav, Stojan Petelin, and Andrej Stritar. "Developing Procedure for Nuclear Regulatory Vulnerability Assessment of Nuclear Power Plants." In ASME 2004 International Mechanical Engineering Congress and Exposition. ASMEDC, 2004. http://dx.doi.org/10.1115/imece2004-59774.

Full text
Abstract:
First attempts of developing the procedure and adopting the methodology for nuclear regulatory vulnerability assessment of nuclear power plants are presented. The development of the philosophy and computer tools could be new and important insight for management of nuclear operators and nuclear regulatory bodies who face difficult questions about how to assess the vulnerability of nuclear power plants and other nuclear facilities on external and internal threats. In the situation where different and hidden threat sources throughout the world are dispersed, the assessments of security and safe operation of nuclear power plants are very important. Most risk assessments of nuclear power plants emphasize probability more than consequences. In addition, the probabilities omit terrorists. As of 09/11/2001, the emphasis has changed and this paper tries to show how to do this. Probabilities are enhanced by showing they are dynamic, interactive, and include countermeasures. Consequences are also enhanced by their dynamic nature dividing them on short, intermediate and long term effects. Risk is enhanced by creatively distinguishing between perceived and estimated.
APA, Harvard, Vancouver, ISO, and other styles
6

Gaertner, John P., and Grant A. Teagarden. "Development, Application, and Implementation of RAMCAP to Characterize Nuclear Power Plant Risk From Terrorism." In 14th International Conference on Nuclear Engineering. ASMEDC, 2006. http://dx.doi.org/10.1115/icone14-89858.

Full text
Abstract:
In response to increased interest in risk-informed decision making regarding terrorism, EPRI and ERIN Engineering were selected by U.S. DHS and ASME to develop and demonstrate the RAMCAP method for nuclear power plant (NPP) risk assessment. The objective is to characterize plant-specific NPP risk for risk management opportunities and to provide consistent information for DHS decision making. This paper is an update of this project presented at the American Nuclear Society (ANS) International Topical Meeting on Probabilistic Safety Analysis (PSA05) in September, 2005. The method uses a characterization of risk as a function of Consequence, Vulnerability, and Threat. For each site, worst case scenarios are developed for each of sixteen benchmark threats. Nuclear RAMCAP hypothesizes that the intent of the perpetrator is to cause offsite radiological consequences. Specific targets are the reactor core, the spent fuel pool, and nuclear spent fuel in a dry storage facility (ISFSI). Results for each scenario are presented as conditional risk for financial loss, early fatalities and early injuries. Expected consequences for each scenario are quantified, while vulnerability is estimated on a relative likelihood scale. Insights for other societal risks are provided. Although threat frequencies are not provided, target attractiveness and threat deterrence are estimated. To assure efficiency, completeness, and consistency; results are documented using standard RAMCAP Evaluator software. Trial applications were successfully performed at four plant sites. Implementation at all other U.S. commercial sites is underway, supported by the Nuclear Sector Coordinating Council (NSCC). Insights from RAMCAP results at 23 U.S. plants completed to date have been compiled and presented to the NSCC. Results are site-specific. Physical security barriers, an armed security force, preparedness for design-basis threats, rugged design against natural hazards, multiple barriers between fuel and environment, accident mitigation capability, severe accident management procedures, and offsite emergency plans are risk-beneficial against all threat types.
APA, Harvard, Vancouver, ISO, and other styles
7

Neuer, Marcus J., Kai Ruhnau, Arne Ruhnau, et al. "Surveillance of nuclear threats using multiple, autonomous detection units." In 2008 IEEE Nuclear Science Symposium and Medical Imaging conference (2008 NSS/MIC). IEEE, 2008. http://dx.doi.org/10.1109/nssmic.2008.4775056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

GARWIN, RICHARD L. "TERRORISM AND OTHER THREATS TO CIVILIZATION." In International Seminar on Nuclear War and Planetary Emergencies — 46th Session. WORLD SCIENTIFIC, 2014. http://dx.doi.org/10.1142/9789814623445_0015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fainberg, Anthony. "Terrorist threats: Technical and policy approaches to countering them." In NUCLEAR WEAPONS AND RELATED SECURITY ISSUES. Author(s), 2017. http://dx.doi.org/10.1063/1.5009232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Teagarden, Grant A., Kenneth T. Canavan, and Robert E. Nickell. "Spent Nuclear Fuel Transportation Risk Assessment Methodology for Homeland Security." In 14th International Conference on Nuclear Engineering. ASMEDC, 2006. http://dx.doi.org/10.1115/icone14-89855.

Full text
Abstract:
In response to increased interest in risk-informed decision making regarding terrorism, EPRI was selected by U.S. DHS and ASME to develop and demonstrate a nuclear sector specific methodology for owner / operators to utilize in performing a Risk Analysis and Management for Critical Asset Protection (RAMCAP) assessment for the transportation of spent nuclear fuel (SNF). The objective is to characterize SNF transportation risk for risk management opportunities and to provide consistent information for DHS decision making. The method uses a characterization of risk as a function of Consequence, Vulnerability, and Threat. Worst reasonable case scenarios characterize risk for a benchmark set of threats and consequence types. A trial application was successfully performed and implementation is underway by one utility.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Nuclear threats"

1

Spector, Leonard S. Deterring Regional Threats from Nuclear Proliferation. Defense Technical Information Center, 1992. http://dx.doi.org/10.21236/ada249955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Myers, Steven Charles. Radiation Signatures of Potential Nuclear Threats. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1511601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gosnell, T. Detection of nuclear threats in large cargo containers. Office of Scientific and Technical Information (OSTI), 2004. http://dx.doi.org/10.2172/15009832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ford, James L., and C. R. Schuller. Controlling Threats to Nuclear Security: A Hollistic Model. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada421832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Butler, J., P. Cronin, J. Dyer, T. Edmunds, and R. Ward. Decision Analysis Methods For the Analysis of Nuclear Terrorism Threats with Imperfect Information. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1162247.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Del Mauro, Diana, and Elena Guardincerri. Elena Guardincerri: Tracking muons to reduce nuclear threats and help preserve architectural treasures. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1239924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fotion, Katherine A. Optimizing the Performance of Radionuclide Identification Software in the Hunt for Nuclear Security Threats. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1305897.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nelson, K., and P. Sokkappa. A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/947761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Atencio, Julian James. UAS Blue Force can be used to detect, respond and mitigate adversaries/threats in the protection of nuclear material. Office of Scientific and Technical Information (OSTI), 2020. http://dx.doi.org/10.2172/1623396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cochran, John Russell, Yuichiro Ouchi, James Phillip Furaus, and Michelle K. Marincel. Summary report on transportation of nuclear fuel materials in Japan : transportation infrastructure, threats identified in open literature, and physical protection regulations. Office of Scientific and Technical Information (OSTI), 2008. http://dx.doi.org/10.2172/933223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography