Academic literature on the topic 'Theories of international security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Theories of international security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Theories of international security"
Koster, Ferry, and Maria Fleischmann. "Under pressure: an international comparison of job security, social security, and extra effort." International Journal of Sociology and Social Policy 37, no. 13/14 (December 4, 2017): 823–39. http://dx.doi.org/10.1108/ijssp-03-2016-0031.
Full textLebow, Richard Ned. "The long peace, the end of the cold war, and the failure of realism." International Organization 48, no. 2 (1994): 249–77. http://dx.doi.org/10.1017/s0020818300028186.
Full textAkbar, Asma, and Khawaja Alqama. "An Introduction to the Problematic of Security: Theory- Building in International Relations." PERENNIAL JOURNAL OF HISTORY 1, no. 2 (December 31, 2020): 113–31. http://dx.doi.org/10.52700/pjh.v1i2.8.
Full textHussein, Dalsooz Jalal. "Theoretical approaches towards the steps of non-state actors in world politics: global para-diplomacy of the Iraqi Kurdistan (KRI)." Международные отношения, no. 1 (January 2021): 23–33. http://dx.doi.org/10.7256/2454-0641.2021.1.34461.
Full textHussein, Dalsooz Jalal. "Theoretical approaches towards the steps of nongovernmental actors in world politics: global paradiplomacy of the Iraqi Kurdistan (KRI)." SENTENTIA. European Journal of Humanities and Social Sciences, no. 1 (January 2021): 31–41. http://dx.doi.org/10.25136/1339-3057.2021.1.34624.
Full textDEUDNEY, DANIEL, and G. JOHN IKENBERRY. "The nature and sources of liberal international order." Review of International Studies 25, no. 2 (April 1999): 179–96. http://dx.doi.org/10.1017/s0260210599001795.
Full textVukadinović, Lidija Čehulić, and Monika Begović. "NATO Summit in Wales: From global megatrends to the new Euro-Atlanticism." Croatian International Relations Review 20, no. 71 (October 1, 2014): 11–41. http://dx.doi.org/10.2478/cirr-2014-0007.
Full textLangendonck, Jef Van. "The meaning of the right to social security." Revista Brasileira de Direitos Fundamentais & Justiça 2, no. 2 (March 31, 2008): 13–21. http://dx.doi.org/10.30899/dfj.v2i2.553.
Full textCzaputowicz, Jacek. "European cooperation in the field of security and defence. International Relation theories perspective." Securitologia 19, no. 1 (January 1, 2014): 105–15. http://dx.doi.org/10.5604/18984509.1129716.
Full textMcCalla, Robert B. "NATO's persistence after the cold war." International Organization 50, no. 3 (1996): 445–75. http://dx.doi.org/10.1017/s0020818300033440.
Full textDissertations / Theses on the topic "Theories of international security"
Klykova, Ekaterina. "Security in International Relations: International cooperation to prevent non-states threats." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-197216.
Full textPerois, Jean Michel. "Theories of international relations and the private security analyst : the scope and limits of theoretically informed analysis." Thesis, University of Leicester, 2017. http://hdl.handle.net/2381/40132.
Full textHojzáková, Věra. "East Asia's Security System." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162792.
Full textSahlin, Jonathan. "Comparing Theories of the European Union: An essay on how to analyze the EU’s foreign policy and international power." Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23103.
Full textCobb, Adam Campbell. "Changes in the concept of security since World War II among Western international theorists." Thesis, University of Cambridge, 1996. https://www.repository.cam.ac.uk/handle/1810/252234.
Full textVirk, Kudrat. "Developing countries and humanitarian intervention in international society after the Cold War." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:60fbdfeb-341c-430c-91c7-5071397a0e47.
Full textGruici, Simona. "International Security : Crossing Borders: International Migration and National Security." Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15242.
Full textBaro, Mamadou Amadou 1959. "Household livelihood security: Theories, practice and perspectives." Diss., The University of Arizona, 1996. http://hdl.handle.net/10150/282180.
Full textPhan, Quoc-Sang. "Model Counting Modulo Theories." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/15130.
Full textHoogensen-Brown, Gunhild. "Jeremy Bentham and the theories of international relations." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ59972.pdf.
Full textBooks on the topic "Theories of international security"
Yi, Hyŏk-sŏp. Hanbando pʻyŏnghwa pangwiron =: The Peace theories of Korean defense. Sŏul-si: Pongmyŏng, 2006.
Find full textCritical approaches to security: An introduction to theories and methods. Milton Park, Abingdon, Oxon: Routledge, 2013.
Find full textBronstone, Adam. European security into the 21st century: Beyond traditional theories of international relations. Aldershot: Ashgate, 2000.
Find full textChwaszcza, Christine. Zwischenstaatliche Kooperation: Perspektiven einer normativen Theorie der internationalen Politik. Wiesbaden: Deutscher Universitäts Verlag, 1995.
Find full textBartosch, Ulrich. Weltinnenpolitik: Zur Theorie des Friedens von Carl Friedrich von Weizsäcker. Berlin: Duncker & Humblot, 1995.
Find full textMagenheimer, Heinz. Sicherheitspolitik in theorie und praxis: Strategische fallbeispiele. Wien: Landesverteidigungsakademie, 2003.
Find full textMeyer, Jörg. Theorien zum Frieden im neuen Europa: Ein Beitrag zur Debatte um eine europäische Friedensordnung. Berlin: Köster, 2000.
Find full text1954-, Okada M., Japan Monbushō, National Science Foundation (U.S.), and Nihon Gakujutsu Shinkōkai, eds. Software security: Theories and systems : Mext-NSF-JSPS international symposium, ISSS 2002 : Tokyo, Japan, November 8-10, revised papers. New York: Springer, 2003.
Find full textISSS 2002 (2003 Tokyo, Japan). Software security: Theories and systems : Second Mext-NSF-JSPS international symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 : revised papers. Berlin: Springer, 2004.
Find full textChaos and complexity theory in world politics. Hershey PA: Business Science Reference, 2014.
Find full textBook chapters on the topic "Theories of international security"
Zwolski, Kamil. "Liberal Security Theories." In The Liberal International Theory Tradition in Europe, 91–104. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-52643-6_6.
Full textGong, Gao-Xiang, Zheng Yuan, and Xiao Feng. "The Homomorphic Encryption Scheme of Security Obfuscation." In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013, 595–603. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37502-6_72.
Full textWang, Yanbo, Huiqiang Wang, Chao Zhao, Yushu Zhang, and Ming Yu. "Research on Attack Graph Generation for Network Security Situation." In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013, 1147–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37502-6_134.
Full textFang, Xianwen, Mimi Wang, and Shenbing Wu. "A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles." In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013, 587–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37502-6_71.
Full textSong, Xiaoqiang, Xia Lv, Xubo Guo, and Zuhai Zheng. "Research on Real-Time Security Risk Management of Rural Power Based on Monte Carlo Simulation Method." In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013, 1183–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37502-6_138.
Full textLiu, Lu, Xian-wen Fang, Xiang-wei Liu, and Jing Ji. "Study on Security Supervising and Managing Methods of the Trusted Cloud Computing Based on Petri Net." In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013, 579–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37502-6_70.
Full textNagy, Veronika. "Security: Theories." In Encyclopedia of Security and Emergency Management, 1–16. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-69891-5_244-1.
Full textNagy, Veronika. "Security: Theories." In Encyclopedia of Security and Emergency Management, 884–99. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_244.
Full textPeoples, Columba, and Nick Vaughan-Williams. "Constructivist theories." In Critical Security Studies, 16–30. 3rd edition. | Abingdon, Oxon ; New York, NY : Routledge, 2021.: Routledge, 2020. http://dx.doi.org/10.4324/9780429274794-1.
Full textPease, Kelly-Kate S. "Mainstream Theories." In International Organizations, 47–75. Sixth edition. | New York, NY: Routledge, 2019.: Routledge, 2018. http://dx.doi.org/10.4324/9781351213110-3.
Full textConference papers on the topic "Theories of international security"
Lu, Tianbo, Jiaxi Lin, Lingling Zhao, Yang Li, and Yong Peng. "An Analysis of Cyber Physical System Security Theories." In 2014 7th International Conference on Security Technology (SecTech). IEEE, 2014. http://dx.doi.org/10.1109/sectech.2014.12.
Full textKumar, P. R. "Three theories for delays, clocks and security in wireless networks." In the 18th annual international conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2348543.2348546.
Full textHoumani, Hanane, and Mohamed Mejri. "Sufficient Conditions for Secrecy under Any Equational Theories." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.102.
Full textPhan, Quoc-Sang, and Pasquale Malacaria. "All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks." In 2015 10th International Conference on Availability, Reliability and Security (ARES). IEEE, 2015. http://dx.doi.org/10.1109/ares.2015.14.
Full textXiazhong Zheng, Jie Guo, Shu Chen, and Wei Guo. "Rough set theories and applications in security evaluation of hydropower engineering construction." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689637.
Full textDong, Shuxiang, and Guojun Jia. "Internet Addiction Diagnostic Decision-Making Based on Attribute Reduction of Rough Set Theories." In 2011 International Conference on Network Computing and Information Security (NCIS). IEEE, 2011. http://dx.doi.org/10.1109/ncis.2011.173.
Full textSonmez, Yesim Ulgen, and Asaf Varol. "In-Depth Analysis of Speech Production, Auditory System, Emotion Theories and Emotion Recognition." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020. http://dx.doi.org/10.1109/isdfs49300.2020.9116231.
Full textJiao, Han, Jixue Liu, Jiuyong Li, and Chengfei Liu. "A Framework for Reputation Bootstrapping Based on Reputation Utility and Game Theories." In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.45.
Full textHirabayashi, Miki, Hiroaki Kojima, Kazuhiro Oiwa, Akio Nishikawa, Fumiaki Tanaka, and Masami Hagiya. "Implementation of tile sequencing for DNA logical computation toward next-generation information security." In 2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA). IEEE, 2010. http://dx.doi.org/10.1109/bicta.2010.5645074.
Full text"Research on Misunderstandings of "Cross-cultural Theories" and Strategies of Cultural Security in College English Teaching." In 2018 2nd International Conference on Social Sciences, Arts and Humanities. Francis Academic Press, 2018. http://dx.doi.org/10.25236/ssah.2018.120.
Full textReports on the topic "Theories of international security"
Malik, Fazley. XX International Workshop on Condensed Matter Theories. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada344669.
Full textEichengreen, Barry. Hegemonic Stability Theories of the International Monetary System. Cambridge, MA: National Bureau of Economic Research, March 1987. http://dx.doi.org/10.3386/w2193.
Full textMulligan, Casey, and Xavier Sala-i-Martin. Social Security in Theory and Practice (II): Efficiency Theories, Narrative Theories, and Implications for Reform. Cambridge, MA: National Bureau of Economic Research, May 1999. http://dx.doi.org/10.3386/w7119.
Full textDEPARTMENT OF THE ARMY WASHINGTON DC. Security Assistance and International Logistics: Security Assistance Teams. Fort Belvoir, VA: Defense Technical Information Center, June 1998. http://dx.doi.org/10.21236/ada402049.
Full textMulligan, Casey, and Xavier Sala-i-Martin. Social Security in Theory and Practice (I): Facts and Political Theories. Cambridge, MA: National Bureau of Economic Research, May 1999. http://dx.doi.org/10.3386/w7118.
Full textBrackin, S., S. Foley, L. Gong, B. Hartman, and A. Heff. Romulus, A Computer Security Properties Modeling Environment: Romulus Theories. Volume 2. Fort Belvoir, VA: Defense Technical Information Center, April 1996. http://dx.doi.org/10.21236/ada310946.
Full textRice, M. Global climate change and international security. Office of Scientific and Technical Information (OSTI), January 1991. http://dx.doi.org/10.2172/5506256.
Full textKaras, Thomas H. Global climate change and international security. Office of Scientific and Technical Information (OSTI), November 2003. http://dx.doi.org/10.2172/918355.
Full textKerr, Jaclyn A. Cyberspace, Information Strategy and International Security. Office of Scientific and Technical Information (OSTI), February 2018. http://dx.doi.org/10.2172/1635769.
Full textCarballo, Jerónimo, Georg Schaur, and Christian Volpe Martincus. Trust No One?: Security and International Trade. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000491.
Full text