Page 1 of 1
|1||Securitizing Irregular Migration: A Critical Analysis of the Impacts of Counterterrorism Operations on Migration in the Sahel.||
Bernard, Aneliese K.
|2||Developing Capacity of Countering Violent Extremism.||
Girling, Michael L.
|3||Welcome Home: Using persuasion to expand foreign fighter reintegration policies.||
Harvey, Ruth E.
|4||Terrorism and Freedom of Expression: An Econometric Analysis.||
|5||The Invisible Enemy: Suicide Terrorism in Chechnya and Sri Lanka||
Manekas, Jillian P.
|6||Malaria Treatment in Sub-Saharan Africa: Drug Development and Cost-Effectiveness Strategies.||
Kemmer, Michael R.
|7||The Fog of Peace: Comparing U.S. and UN Approaches to Conflict Management in Nepal||
Gross, Joshua R.
|8||Mass Atrocity Prevention in the Twenty-First Century: Assessing the Risk for Violence in Burundi and Examining Options for US Government Policy.||
Collman, Sarah L.
|9||Counterterrorism Lessons for Cybersecurity: How a Decade’s Worth of Experience Fighting Terrorism Can Provide Insights Into Mitigating the Threat of Cyber Attacks.||
Rosenbaum, Benjamin C.
|10||The Somali Insurgency: The Growing Threat of Terror's Resurgence.||
Meservey, Joshua R.
|11||On Our Own: Unilateralism in Israeli-Policymaking||
Davis, John D.
|12||Branding America: An Examination of U.S. Public Diplomacy Efforts After September 11, 2001||
Tiedeman, Anna K.
|13||The US policy of 'No Concessions to Terrorists': What are the pros and the cons and the implications for the US? What elements of negotiation should be integrated in the US policy or strategy?||
|14||Interpreting the Enemy: A Game Theoretic Model of Conflict with Applications to the Korean and Iraq Wars||
Thompson, Stephen W.
|15||Warning of Terror: Explaining the Failure of Intelligence Against Terrorism||
Dahl, Erik J.
|16||Exporting Jihad: Iran's Use of Non-State Armed Groups||
O'Brien, James M.
|17||Strengthening the Nuclear, Biological, and Chemical Weapons Nonproliferation Regimes||
Jessee, Devin D.