Literatura académica sobre el tema "Asymmetrical Warfare"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Asymmetrical Warfare".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Asymmetrical Warfare"

1

Algernon, S. R. "Asymmetrical warfare". Nature 519, n.º 7544 (marzo de 2015): 498. http://dx.doi.org/10.1038/519498a.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Primayanti, Luh Putu Ika y Saudi Firmansyah Putra. "SEAPOWER AND ASYMMETRIC WARFARE IN INDONESIA". Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 6, n.º 1 (4 de abril de 2020): 94. http://dx.doi.org/10.33172/jp.v6i1.620.

Texto completo
Resumen
<p>This study analyzes the Asymmetric Warfare that occurs at sea and the seapower that should be possessed by a state to overcome maritime asymmetrical threats. This study uses descriptive qualitative which explains in detail the asymmetrical warfare at sea and seapower using case examples. This research uses case examples of asymmetrical threats that occur in the domestic territory of Indonesia, namely the Malacca Strait case. The theories used in this study are defense theory, the concept of seapower, the concept of asymmetric warfare and the concept of international cooperation to analyze the case that occurs. The results of this study are Indonesia’s seapower to combat asymmetric warfare was built in three ways namely, strengthen the military defense equipment, carry out defense cooperation with the state that borders with Indonesia and strengthen the collaboration between related ministries and institutions. These ways are implemented through Malacca Strait Patrol which is defense cooperative include Malacca Sea Strait Patrol, Eyes in the Sky and Information Sharing.</p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Feinauer, Evan y Nir Eisikovits. "Noncombatant Immunity in Asymmetrical Warfare". International Journal of Applied Philosophy 26, n.º 2 (2012): 165–80. http://dx.doi.org/10.5840/ijap201226213.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Klincewicz, Michał. "Autonomous Weapon Systems, Asymmetrical Warfare, and Myth". Civitas. Studia z filozofii polityki 23 (15 de diciembre de 2018): 179–95. http://dx.doi.org/10.35757/civ.2018.23.10.

Texto completo
Resumen
Predictions about autonomous weapon systems (AWS) are typically thought to channel fears that drove all the myths about intelligence embodied in matter. One of these is the idea that the technology can get out of control and ultimately lead to horrifi c consequences, as is the case in Mary Shelley’s classic Frankenstein. Given this, predictions about AWS are sometimes dismissed as science-fiction fear-mongering. This paper considers several analogies between AWS and other weapon systems and ultimately offers an argument that nuclear weapons and their effect on the development of modern asymmetrical warfare are the best analogy to the introduction of AWS. The fi nal section focuses on this analogy and offers speculations about the likely consequences of AWS being hacked. These speculations tacitly draw on myths and tropes about technology and AI from popular fi ction, such as Frankenstein, to project a convincing model of the risks and benefi ts of AWS deployment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Freedman, Lawrence D. y Roger Barnett. "Asymmetrical Warfare: Today's Challenge to U.S. Military Power". Foreign Affairs 82, n.º 3 (2003): 151. http://dx.doi.org/10.2307/20033597.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Moltchanova, Anna. "Stateless National Groups, International Justice and Asymmetrical Warfare*". Journal of Political Philosophy 13, n.º 2 (junio de 2005): 194–215. http://dx.doi.org/10.1111/j.1467-9760.2005.00220.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Gray, Phillip W. "Weaponized NonCombatants: A Moral Conundrum of Future Asymmetrical Warfare". Journal of Military Ethics 13, n.º 3 (3 de julio de 2014): 240–56. http://dx.doi.org/10.1080/15027570.2014.975009.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Pfanner, Toni. "Asymmetrical warfare from the perspective of humanitarian law and humanitarian action". International Review of the Red Cross 87, n.º 857 (marzo de 2005): 149–74. http://dx.doi.org/10.1017/s1816383100181238.

Texto completo
Resumen
AbstractWarring parties are increasingly unequal and the principle of equality of arms does not apply to them. This asymmetry in warfare has many ramifications. The militarily weaker party is tempted to have recourse to unlawful methods of warfare in order to overcome the adversaries' strength. The expectation of reciprocity as a fundamental motivation for respecting the law is often illusory and replaced instead with perfidious behaviour; covert operations substitute for open battles, “special rules” are made for “special situations”. The fight against international terrorism seems to constitute the epitome of this kind of warfare. “Elementary considerations of humanity” as enshrined in article 3 common to the 1949 Geneva Conventions however constitute universally binding rules for all — even unequal and asymmetrical — parties to any situation of armed violence. Furthermore, attacks on humanitarian organizations have showed that humanitarian relief may be contrary to belligerents' interests, or, even worse, that attacks on humanitarian workers may be part of their agenda. Humanitarian actors must be aware of these facts and adapt their working methods so as to be able to continue to provide impartial assistance, based solely on the needs of the victims of armed violence.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Huhtinen, Aki-Mauri, Noora Kotilainen, Saara Särmä y Mikko Streng. "Information Influence in Hybrid Environment". International Journal of Cyber Warfare and Terrorism 9, n.º 3 (julio de 2019): 1–20. http://dx.doi.org/10.4018/ijcwt.2019070101.

Texto completo
Resumen
The traditional government-military-public relationship to the public driver's relationship is moving to the government and military. Conflicts are increasingly asymmetrical, networked, urbanized and open to the global publicities because of internet global connections and especially global access to the social media. The public-driven network-based global possibility to online communication means threats and the nature of conflict to become “hybrid.” “Hybrid warfare” challenges the standard way of waging military operations. Military and security organizations have to combat new technologies of their adversaries. This article sets out to discuss the phenomena of hybrid warfare in contemporary rhizomatic society and a hybrid media environment. Furthermore, this research considers how reflexive control functions can provide a historical perspective to ahistorical accounts of hybrid warfare and thus help us to better understand the contemporary challenges and threats of hybrid warfare, particularly coming from Russia.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

DiPaolo, Amanda. "Book Review: Asymmetrical Warfare: Today’s Challenge to U.S. Military Power". Armed Forces & Society 31, n.º 3 (abril de 2005): 477–78. http://dx.doi.org/10.1177/0095327x0503100312.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Asymmetrical Warfare"

1

Abel, Heiko. "Frigate defense effectiveness in asymmetrical green water engagements". Thesis, Monterey, California : Naval Postgraduate School, 2009. http://handle.dtic.mil/100.2/ADA508855.

Texto completo
Resumen
Thesis (M.S. in Modeling, Virtual Environments and Simulation (MOVES))--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Sanchez, Paul J. ; Second Reader: Kline, Jeffrey E. "September 2009." Author(s) subject terms: Agent Based Simulation, Asymmetric Warfare, Data Farming, Design of Experiments, Evolving Design, MANA, Modeling and Simulation, Naval Swarm Defense, Robust Design, Regression Analysis, Simulation Experiments and Efficient Design Center, Taguchi Method Description based on title screen as viewed on November 03, 2009. DTIC Descriptor (s): Frigates, Theater Level Operations, Defense Systems, Experimental Design, Confined Environments, Asymmetry, Statistical Analysis, Sea Water, Small Ships, Threats, Survivability, Weapons, Theses DTIC Identifier (s): SSTR (Stability Security Transition and Reconstruction), Asymmetric Warfare, Mana Includes bibliographical references (p. 125-132). Also available in print.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Willey, Paul F. "The art of riverine warfare from an asymmetrical approach". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FWilley.pdf.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Childers, Rex A. "The Rationality of Nonconformity: the United States decision to refuse ratification of Protocol I Additional to the Geneva Conventions of 1949". Bowling Green, Ohio : Bowling Green State University, 2008. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1214247432.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kelly, Rodney D. "Center of gravity in the asymmetric environment : applicable or not? /". Thesis, Monterey, CA : Naval Postgraduate School, 2006. http://handle.dtic.mil/100.2/ADA457503.

Texto completo
Resumen
Thesis (M.A. in National Security Affairs) -- Naval Postgraduate School, June 2006.
Thesis advisor : Richard Grahlman. "June 2006." Includes bibliographical references (p. 61-63). Full text available on Public Stinet.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Herrera, Cary A. Quinn Matthew D. "Asymmetric warfare and the will to win". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA401469.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Quinn, Matthew D. "Asymmetric warfare and the will to win". Thesis, Monterey, California. Naval Postgraduate School, 2001. http://hdl.handle.net/10945/5998.

Texto completo
Resumen
This thesis explores the will to win in asymmetric war. Asymmetric war, in which one side has an overwhelming advantage over its opponent, will likely be the war of the future for the United States in the post-Cold War uni-polar world. To win an asymmetric war, the individual and then the masses must be motivated to fight and, ultimately, the will to win must be cultivated and sustained for victory. Religion is a highly effective motivat or for both the individual and the masses. This motivation, when properly directed, can provide the will to win in the face of over whelming odds. This thesis focuses on religion as the primary motivator in an asymmetric war. Religion is a strong motivat or for the individual because off our factors: appropriateness, identity, rationality, and religionαs strength as an internally consistent logic. With a highly motivated individual, an organizationg a insspecific advantages by focusing on the religious aspects of the conflict. These advantages are: commitment, legitimacy, membership, and longevity. These are the measurable elements that create a strong will to win. Three case studiesâ Iran and Iraq, Hezbollah and Israel, and the Islamic Salvation Front (FIS) and Algeria-are explored as examples of contemporary asymmetric conflict. These case studies are used to examine the asymmetries between the countries in conflict and test the validity of our theory about the significance of the will to win.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Nguyen, Triet M. ""Little Consideration... to Preparing Vietnamese Forces for Counterinsurgency Warfare"? History, Organization, Training, and Combat Capability of the RVNAF, 1955-1963". Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23126.

Texto completo
Resumen
This dissertation is a focused analysis of the origins, organization, training, politics, and combat capability of the Army of the Republic of Viet Nam (ARVN) from 1954 to 1963, the leading military instrument in the national counterinsurgency plan of the government of the Republic of Viet Nam (RVN). Other military and paramilitary forces that complemented the army in the ground war included the Viet Nam Marine Corps (VNMC), the Civil Guard (CG), the Self-Defense Corps (SDC) and the Civil Irregular Defense Groups (CIDG) which was composed mainly of the indigenous populations in the Central Highlands of South Vietnam. At sea and in the air, the Viet Nam Air Force (VNAF) and the Viet Nam Navy (VNN) provided additional layers of tactical, strategic and logistical support to the military and paramilitary forces. Together, these forces formed the Republic of Viet Nam Armed Forces (RVNAF) designed to counter the communist insurgency plaguing the RVN. This thesis argues the following. First, the origin of the ARVN was rooted in the French Indochina War (1946-1954). Second, the ARVN was an amalgamation of political and military forces born from a revolution that encompassed three overlapping wars: a war of independence between the Vietnamese and the French; a civil war between the Vietnamese of diverse social and political backgrounds; and a proxy war as global superpowers and regional powers backed their own Vietnamese allies who, in turn, exploited their foreign supporters for their own purposes. Lastly, the ARVN failed not because it was organized, equipped, and trained for conventional instead of counterinsurgency warfare. Rather, it failed to assess, adjust, and adapt its strategy and tactics quickly enough to meet the war’s changing circumstances. The ARVN’s slowness to react resulted from its own institutional weaknesses, military and political problems that were beyond its control, and the powerful and dangerous enemies it faced. The People’s Army of Viet Nam (PAVN) and the People’s Liberation Armed Forces (PLAF) were formidable adversaries. Not duplicated in any other post-colonial Third World country and led by an experienced and politically tested leadership, the Democratic Republic of Viet Nam (DRVN) and the National Front for the Liberation of Southern Viet Nam (NFLSVN) exploited RVN failures effectively. Hypothetically, there was no guarantee that had the US dispatched land forces into Cambodia and Laos or invaded North Vietnam that the DRVN and NFLSVN would have quit attacking the RVN. The French Far East Expeditionary Corps (FFEEC)’ occupation of the Red River Delta did not bring peace to Cochinchina, only a military stalemate between it and the Vietnamese Liberation Army (VLA). Worse yet, a US invasion potentially would have unnerved the People’s Republic of China (PRC) which might have sent the PLAF to fight the US in Vietnam as it had in Korea. Inevitably, such unilateral military action would certainly provoke fierce criticism and opposition amongst the American public at home and allies abroad. At best, the war’s expansion might have bought a little more time for the RVN but it could never guarantee South Vietnam’s survival. Ultimately, RVN’s seemingly endless political, military, and social problems had to be resolved by South Vietnam’s political leaders, military commanders, and people but only in the absence of constant PAVN and PLAF attempts to destroy whatever minimal progress RVN made politically, militarily, and socially. The RVN was plagued by many problems and the DRVN and NFLSVN, unquestionably, were amongst those problems.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Carlson, Ted W. "The Philippine Insurrection the U.S. Navy in a military operation other than war, 1899-1902". Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1288.

Texto completo
Resumen
Approved for public release; distribution in unlimited.
U.S. naval doctrine has been dominated by the Mahanian concept of massing large capital ships for over one hundred years. Yet, it was a Cyclone-class patrol craft, a USCG cutter, and an Australian frigate that pushed up the Khor-Abd-Allah waterway and opened up the port of Umm Qasr, Iraq, during the Second Gulf War. They continue to protect it and the surrounding oil infrastructure from attack from insurgents and terrorists today. With the navy's current interest in transformation, the question arises, is the navy as presently configured well suited for today's threats? This thesis explores the question of how should the navy meet threats to national interests. This is accomplished through historical analysis of an event that is similar to the situation today: The Philippine Insurrection (1899-1902). This episode showcases the shortcomings of the navy's conventional approach to military operations other than war, and the need for change. In today's asymmetric environment, the past provides insight into effective means for handling these types of threats. This thesis concludes that the navy needs to diversify itself to incorporate different ship platforms, platforms that incorporate the utility of old with the technology of new.
Lieutenant, United States Navy
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Gourley, Bernard. "Playing a poor hand well : weak actors face the Russian war machine". Thesis, Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/30659.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Tsai, Wen-Hsiang. "An analysis of China's information technology strategies and their implications for US national security". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FTsai.pdf.

Texto completo
Resumen
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, June 2006.
Thesis Advisor(s): Karl D. Pfeiffer. "June 2006." Includes bibliographical references (p. 83-89). Also available in print.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Libros sobre el tema "Asymmetrical Warfare"

1

Lavoy, Peter R., ed. Asymmetric Warfare in South Asia. Cambridge: Cambridge University Press, 2009. http://dx.doi.org/10.1017/cbo9780511691805.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Modern stateless warfare. Basingstoke, Hampshire: Palgrave Macmillan, 2010.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Brooker, Paul. Modern stateless warfare. New York: Palgrave Macmillan, 2010.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Brooker, Paul. Modern stateless warfare. New York: Palgrave Macmillan, 2010.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

The complexity of modern asymmetric warfare. Norman, OK: University of Oklahoma Press, 2012.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Conflict in Afghanistan: Studies in asymmetric warfare. New York: RoutledgeCurzon, 2005.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Desportes, Vincent. La guerre probable. Paris: Economica, 2007.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Desportes, Vincent. La guerre probable: Penser autrement. Paris: Economica, 2007.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Resperger, István. Aszimetrikus hadviselés a modern korban: Kis háborúk nagy hatással. Budapest: Zrínyi Kiadó, 2013.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Desportes, Vincent. La guerre probable: Penser autrement. Paris: Economica, 2007.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Capítulos de libros sobre el tema "Asymmetrical Warfare"

1

Chehtman, Alejandro. "Asymmetrical Warfare". En The Palgrave Encyclopedia of Peace and Conflict Studies, 1–7. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-11795-5_27-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Schmitt, Michael N. "Asymmetrical Warfare and International Humanitarian Law". En International Humanitarian Law Facing New Challenges, 11–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-49090-6_2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Snow, Donald M. "The Structure and Consequences of Modern Violence: Asymmetrical Warfare". En National Security, 210–37. Seventh edition. | New York, NY : Routledge, [2019]: Routledge, 2019. http://dx.doi.org/10.4324/9780429427923-13.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Pfaff, C. Anthony. "Anticipation in Asymmetric Warfare". En Handbook of Anticipation, 1–26. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-31737-3_75-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Pfaff, C. Anthony. "Anticipation in Asymmetric Warfare". En Handbook of Anticipation, 1479–503. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-91554-8_75.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Cohen, Samy. "Asymmetric Warfare: A Challenge for Democracies". En Israel's Asymmetric Wars, 11–26. New York: Palgrave Macmillan US, 2010. http://dx.doi.org/10.1057/9780230112971_2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Bowen, Wyn Q. "The Dimensions of Asymmetric Warfare". En The Changing Face of Military Power, 15–43. London: Palgrave Macmillan UK, 2002. http://dx.doi.org/10.1057/9780230502161_2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Jacob, Frank. "Asymmetric wars and the future of US warfare". En The Future of US Warfare, 71–85. Milton Park, Abingdon, Oxon, New York, NY: Routledge, [2017] | Series: Military strategy and operational art: Routledge, 2017. http://dx.doi.org/10.4324/9781315557892-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Agwu, Fred Aja. "Insurgency and Terrorism as Forms of Asymmetric Warfare". En Armed Drones and Globalization in the Asymmetric War on Terror, 10–47. New York : Routledge, 2018. | Series: Routledge research in the law of armed conflict: Routledge, 2017. http://dx.doi.org/10.4324/9781315123936-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Caforio, Giuseppe. "The Sociology of the Military and Asymmetric Warfare". En Handbooks of Sociology and Social Research, 497–522. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71602-2_26.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Asymmetrical Warfare"

1

Castillo, Juan-Camilo. "The Mexican Cartels' employment of Inform and Influence Activities (IIA) as tools of asymmetrical warfare". En 2014 Information Security for South Africa (ISSA). IEEE, 2014. http://dx.doi.org/10.1109/issa.2014.6950512.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Sherwin, Jason y Dimitri Mavris. "Hierarchical Temporal Memory algorithms for understanding asymmetric warfare". En 2009 IEEE Aerospace conference. IEEE, 2009. http://dx.doi.org/10.1109/aero.2009.4839644.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Milton, Fenner. "Detection of hostiles in asymmetric warfare (Conference Presentation)". En Infrared Technology and Applications XLV, editado por Gabor F. Fulop, Charles M. Hanson y Bjørn F. Andresen. SPIE, 2019. http://dx.doi.org/10.1117/12.2516174.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kabir, Nouman y Shaharyar Kamal. "Secure Mobile Sensor Data Transfer using Asymmetric Cryptography Algorithms". En 2020 International Conference on Cyber Warfare and Security (ICCWS). IEEE, 2020. http://dx.doi.org/10.1109/iccws48432.2020.9292392.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Opitz, Felix, Josef Filusch, Kaeye Dastner y Thomas Kausch. "Information fusion in anti asymmetric warfare and low intensity conflicts". En 2007 10th International Conference on Information Fusion. IEEE, 2007. http://dx.doi.org/10.1109/icif.2007.4408015.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Rosenberg, Brad y Paul G. Gonsalves. "Adaptation of a multi-resolution adversarial model for asymmetric warfare". En Defense and Security Symposium, editado por Kevin Schum y Alex F. Sisti. SPIE, 2006. http://dx.doi.org/10.1117/12.665877.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Kalra, Prem K. y Raj Kumar Vishwakarma. "Risk profiling in asymmetric warfare through intelligent analysis of images and neural networks". En 2013 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM). IEEE, 2013. http://dx.doi.org/10.1109/ieem.2013.6962462.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Asymmetrical Warfare"

1

Hartman, William J. Globalization and Asymmetrical Warfare. Fort Belvoir, VA: Defense Technical Information Center, abril de 2002. http://dx.doi.org/10.21236/ada420688.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Miles, Frankling B. Asymmetric Warfare: An Historical Perspective. Fort Belvoir, VA: Defense Technical Information Center, marzo de 1999. http://dx.doi.org/10.21236/ada363836.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Abbott, Franklin T. y Ganesh Vaidyanathan. Integrated Asymmetric Urban Warfare Program (IAUWP). Fort Belvoir, VA: Defense Technical Information Center, enero de 2011. http://dx.doi.org/10.21236/ada538559.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Manwaring, Max G. Venezuela's Hugo Chavez, Bolivarian Socialism, and Asymmetric Warfare. Fort Belvoir, VA: Defense Technical Information Center, octubre de 2005. http://dx.doi.org/10.21236/ada439743.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Patterson, LaWarren V. Information Operations and Asymmetric Warfare...Are We Ready? Fort Belvoir, VA: Defense Technical Information Center, abril de 2002. http://dx.doi.org/10.21236/ada402007.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Lambakis, Steven J. Reconsidering Asymmetric Warfare (Joint Force Quarterly, Issue 36). Fort Belvoir, VA: Defense Technical Information Center, enero de 2004. http://dx.doi.org/10.21236/ada430420.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Spenard, Thomas M. Force Protection for Distribution Based-Logistics in Asymmetric Warfare. Fort Belvoir, VA: Defense Technical Information Center, mayo de 2005. http://dx.doi.org/10.21236/ada436192.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Disney, Paul R. Transforming Military Overseas Presence to Deter and Prevent Asymmetric Warfare Against the United States. Fort Belvoir, VA: Defense Technical Information Center, abril de 2002. http://dx.doi.org/10.21236/ada402070.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Brown, Michael T. Terrorist Use of Weapons of Mass Destruction Within the United States: Asymmetric Warfare Paradigm in the 21st Century. Fort Belvoir, VA: Defense Technical Information Center, marzo de 1997. http://dx.doi.org/10.21236/ada326609.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Idrissa, Rahmane y Bethany McGann. Mistrust and Imbalance: The Collapse of Intercommunal Relations and the Rise of Armed Community Mobilization on the Niger-Mali Border. RESOLVE Network, abril de 2021. http://dx.doi.org/10.37805/cbags2021.2.

Texto completo
Resumen
The border area of Mali, Niger, and Burkina Faso is a site of endemic violence. The area is punctuated by anti-state attacks, the targeted killing of traditional chiefs, and attacks on markets and other socioeconomic convening locales that otherwise serve as central mechanisms for the preservation of normalized intercommunal interactions. In addition, foreign military interventions and asymmetric insurgent warfare pit multiple state and non-state actors equipped with heavy weaponry against one another, adding another level of insecurity and threat to local communities. Community-based armed groups (CBAGs) of Fulani and Tuareg ethnicity have aligned themselves with outside actors carrying out operations in the region out of choice, coercion, or in some cases both. Building on other research reports in RESOLVE’s Community-Based Armed Groups Series, this report explores local perceptions regarding the nature and impact of the violence in southwestern Niger. The report provides a summary of understanding of ongoing conflict dynamics from the most impacted communities and an insight on the knowledge and attitudes around actors participating in the violence. It hopes to inform efforts to bring an end to the violence and increase understanding of participating actors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía