Academic literature on the topic 'Warfare'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Warfare.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Warfare"
Tursyn, Alisher, and Aigerim Turuntaeva. "Hybrid warfare and the challenge to international law." Eurasian Science Review An International peer-reviewed multidisciplinary journal 2, no. 5 (May 3, 2024): 10–19. http://dx.doi.org/10.63034/esr-92.
Full textRautenbach, Peter. "The Subtle Knife." Journal of Intelligence, Conflict, and Warfare 2, no. 1 (December 6, 2019): 25. http://dx.doi.org/10.21810/jicw.v2i1.951.
Full textMartin, Garrett. "China's Strategic Devaluing of American Social Capital." Journal of Strategic Security 16, no. 1 (April 2023): 1–18. http://dx.doi.org/10.5038/1944-0472.16.1.2026.
Full textJalil Shah, Hassan, and Muhammad Ehsan. "HYBRID WARFARE: EMERGING CHALLENGES FOR PAKISTAN." Journal of Contemporary Studies 11, no. 2 (February 28, 2023): 69–85. http://dx.doi.org/10.54690/jcs.v11i2.234.
Full textShivalkar, Sushmita, Geeta Yadav, and Swapnali Patil Sakshi Dale. "Warfare Robot." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 781–83. http://dx.doi.org/10.31142/ijtsrd22888.
Full textŞTEFĂNESCU, Daniel-Cornel. "IS HYBRID WARFARE A NEW MANNER OF CONDUCTING WARFARE?" Review of the Air Force Academy 14, no. 2 (December 8, 2016): 155–60. http://dx.doi.org/10.19062/1842-9238.2016.14.2.20.
Full textStahel, Albert A. "Dissymmetric warfare versus asymmetric warfare." International Transactions in Operational Research 11, no. 4 (July 2004): 435–46. http://dx.doi.org/10.1111/j.1475-3995.2004.00468.x.
Full textDouglas, Matthew, and Mark Reith. "A Survey of Learning Technology Integration in Information Warfare Education." European Conference on Cyber Warfare and Security 23, no. 1 (June 21, 2024): 148–56. http://dx.doi.org/10.34190/eccws.23.1.2403.
Full textVerĉiĉ, Dejan. "From Marketing Warfare to Warfare Marketing." Journal of Political Marketing 1, no. 4 (September 6, 2002): 115–16. http://dx.doi.org/10.1300/j199v01n04_11.
Full textNikolić, Nebojša. "Unlimited warfare: Chinese perception of modern warfare." Vojno delo 69, no. 7 (2017): 293–303. http://dx.doi.org/10.5937/vojdelo1706293n.
Full textDissertations / Theses on the topic "Warfare"
Schaad, Michael A. "More Effective Warfare: Warfare Waged Psychologically." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/7411.
Full textEidman, Christopher R., and Gregory Scott Green. "Unconventional cyber warfare: cyber opportunities in unconventional warfare." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42615.
Full textGiven the current evolution of warfare, the rise of non-state actors and rogue states, in conjunction with the wide availability and relative parity of information technology, the U.S. will need to examine new and innovative ways to modernize its irregular warfare fighting capabilities. Within its irregular warfare capabilities, the U.S. will need to identify effective doctrine and strategies to leverage its tactical and technical advantages in the conduct of unconventional warfare. Rather than take a traditional approach to achieve unconventional warfare objectives via conventional means, this thesis proposes that unconventional warfare can evolve to achieve greater successes using the process of unconventional cyber warfare.
Lesyk, N. I. "Information warfare." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40628.
Full textSaleem, Y. "Environmental warfare." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/36287.
Full textKuzmenko, Victoria Vladimirovna, and Вікторія Володимирівна Кузьменко. "Information warfare a new face of warfare in international relations." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51632.
Full textInformation is one of the most important components in the life of modern society. The status of a person, state, or organization in the real world is largely determined by its ability to communicate with people and its position in the information space. International relations have always been based on the principles of communication. International communication- is the exchange of information between participants on the world stage, which has an international character . Information has a global impact, that is, with the successful management of people’s minds, it is possible to destroy the opponent or even to start a war. And international communication is a guide to the beginning of information conflicts between the subjects, which can later escalate into information warfare. Today, the causes of information warfare in international relations may be simple communication between participants, but most often it is terrorism and cybercrime. A computer as a tool can be used to commit a crime and can be the object of a specific crime. These actions are used to disrupt and disable various government databases and management systems.
Інформація - одна з найважливіших складових у житті сучасного суспільства. Статус людини, держави чи організації в реальному світі значною мірою визначається її здатністю спілкуватися з людьми та її становищем в інформаційному просторі. Міжнародні відносини завжди базувались на принципах спілкування. Міжнародне спілкування - це обмін інформацією між учасниками на світовій арені, що має міжнародний характер . Інформація має глобальний вплив, тобто завдяки успішному управлінню свідомістю людей можна знищити супротивника або навіть розпочати війну. А міжнародне спілкування є орієнтиром для початку інформаційних конфліктів між суб’єктами, які згодом можуть перерости в інформаційну війну. Сьогодні причинами інформаційної війни у міжнародних відносинах може бути просте спілкування між учасниками, але найчастіше це тероризм та кіберзлочинність. Комп’ютер як інструмент може бути використаний для вчинення злочину і може бути об’єктом конкретного злочину. Ці дії використовуються для порушення та відключення різних державних баз даних та систем управління.
Emmersen, Tracy, Ng Kiang Chuan, David Chiam, Ong Zi Xuan, Perh Hong Yih Daniel, Koh Wee Yung, Wes Wessner, et al. "Advanced Undersea Warfare Systems." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/6959.
Full textApproved for public release; distribution is unlimited.
Over the next twenty years, the proliferation of threats in the undersea environment will likely challenge the platform-centric model that the United States Navy uses to maintain dominance in Undersea Warfare (USW). Meanwhile, rapidly maturing technologies offer greater capabilities to potential adversaries around the world. Such a paradigm creates an imperative for the Navy to harness emerging technologies to maintain USW dominance amid a dynamic threat environment, while balancing cost, risk, and required performance. This systems engineering analysis develops Advanced Undersea Warfare Systems (AUWS) that provide a technological and tactical advantage based on the needs of the war-fighter. Following critical analysis of the numerous possible alternatives for performing the necessary Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) and prosecution and an objective screening process, four system architectures, and associated operational concepts, are selected for detailed analysis. From cost, risk, and performance analyses, superior AUWS concepts are shown to be flexible, scalable, and tailorable systems that balance critical need areas. This analysis highlights the need for new warfare systems that can meet future challenges to the traditional platform-centric model for USW dominance. Using the results and recommendations in this analysis will allow the Navy to deploy capabilities that effectively and efficiently meet future operational needs.
Higgins, Eric John, Ronald Leroy Higgs, Gregory Rodger Parkins, Vincent S. Tionquiao, and Christopher Kevin Wells. "Expeditionary warfare : force protection." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/6917.
Full textIn 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study. The Systems Engineering and Analysis Team used the Systems Engineering and Management process as the primary methodology to complete this multidisciplinary task. Survivability was identified as the most critical factor for evaluating the protection of the Sea Base and its transport assets. Threats to the Sea Base were reviewed, analyzed, and prioritized. System design and analysis focused on preliminary analyses of various sensors, search concepts, and weapons. These preliminary analyses identified capability gaps that were translated into functional concepts and proposed architectures for detailed modeling and analysis. These proposed architectures were identified as either Point or Distributed. In order to adequately determine the relative performance of the proposed architectures generated by the team, a thorough and systematic design of experiments was developed and applied in the Naval Simulation System and EXTEND. Based on the results obtained, the Systems Engineering and Analysis Team determined that a Distributed Sensor and Weapons architecture would significantly increase the survivability of future Expeditionary Warfare forces.
Torres, Santino M. "Countermobilization: unconventional social warfare." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42741.
Full textThe purpose of this thesis is to identify and understand the factors associated with effective social countermobilization against violent extremism. Understanding such factors can help a state develop a sponsored countermovement to protect its national interests against violent extremist movements. This thesis attempts to provide a strategy and framework by which to defeat violent extremist movements through the use of unconventional warfare techniques.
White, Scott C. "Reorganizing for Irregular Warfare." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4353.
Full textA thorough understanding of Irregular Warfare (IW) and the principles of organizational theory and design will enable the Department of Defense (DoD) to organize efficiently and effectively for operations within the Irregular Warfare Environment, while maintaining its conventional capabilities. We develop our argument for this thesis in several stages. First, we define irregular warfare and differentiate it from conventional warfare through the development of our critical success factors. We introduce organizational theory and design in order to incorporate the critical success factors. We conclude that the DoD should reorganize certain elements of the U.S. Special Operations Command by incorporating existing capabilities, focusing on conducting operations within the Irregular Warfare Environment, and implementing our critical success factors.
Ford, Alexander S. "Dehumanization and irregular warfare." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34664.
Full textIn the current global environment the practice of dehumanizationthe stripping away of common attributes among people that call for respect and constrain violenceand the misperception it creates have resulted in misguided attempts by militaries to influence the center of gravity in irregular warfare, the civilian population. Traditional thought in this matter implies that cultural training is the most important factor in creating more effective influence when dealing in irregular warfare scenarios. By examining dehumanization and the factors that cause it in irregular warfare environments, this thesis will provide a framework for how dehumanization impacts influence operations. My analysis seeks to explain how dehumanization occurs and how it can be prevented, thereby setting necessary conditions for effective population influence.
Books on the topic "Warfare"
Butterfield, Moira. Warfare! London: Franklin Watts, 2012.
Find full textInc, World Book, ed. Warfare. Chicago, IL: World Book, 2009.
Find full textKemp, Paul. Sea warfare. London: Arms & Armour Press, 1998.
Find full textCooksley, Peter G. Air warfare. London: Arms & Armour Press, 1997.
Find full textThiele, Ralph, ed. Hybrid Warfare. Wiesbaden: Springer Fachmedien Wiesbaden, 2021. http://dx.doi.org/10.1007/978-3-658-35109-0.
Full textSpiers, Edward M. Chemical Warfare. London: Palgrave Macmillan UK, 1986. http://dx.doi.org/10.1007/978-1-137-10454-0.
Full textJajodia, Sushil, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, and Cliff Wang, eds. Cyber Warfare. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14039-1.
Full textMurray, Williamson, and Peter R. Mansoor, eds. Hybrid Warfare. Cambridge: Cambridge University Press, 2012. http://dx.doi.org/10.1017/cbo9781139199254.
Full textAbdelnour, Ziad K., and Wesley A. Whittaker, eds. Economic Warfare. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781119203131.
Full textNicholson, Helen. Medieval Warfare. London: Macmillan Education UK, 2004. http://dx.doi.org/10.1007/978-1-4039-4386-6.
Full textBook chapters on the topic "Warfare"
Ritchie, William, Katherine Pond, Edward J. Anthony, George Maul, Patricia L. Wiberg, Miles O. Hayes, Andrew D. Short, et al. "Warfare—See Coastal Warfare." In Encyclopedia of Coastal Science, 1043. Dordrecht: Springer Netherlands, 2005. http://dx.doi.org/10.1007/1-4020-3880-1_339.
Full textLee, Steven P. "Warfare." In Encyclopedia of Global Bioethics, 2965–74. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-09483-0_440.
Full textLee, Steven P. "Warfare." In Encyclopedia of Global Bioethics, 1–10. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-05544-2_440-1.
Full textWeik, Martin H. "warfare." In Computer Science and Communications Dictionary, 1908. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_20990.
Full textBolin, Thomas M. "Warfare." In The Biblical World, 611–28. 2nd ed. London: Routledge, 2021. http://dx.doi.org/10.4324/9781315678894-39.
Full textOprey, Christopher. "Warfare." In Handbook for History Teachers, 515–18. London: Routledge, 2021. http://dx.doi.org/10.4324/9781032163840-69.
Full textWalters, D. R. W. G. "Warfare." In Handbook for History Teachers, 695–97. London: Routledge, 2021. http://dx.doi.org/10.4324/9781032163840-103.
Full textBaker, Jill L. "Warfare." In Technology of the Ancient Near East, 104–23. Milton Park, Abingdon, Oxon: Routledge, 2018.: Routledge, 2018. http://dx.doi.org/10.4324/9781351188111-9.
Full textScott, A. F. "Warfare." In The Saxon Age, 143–62. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003409625-12.
Full textMiddleton, Nick. "Warfare." In The Global Casino, 536–58. 7th ed. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003395096-20.
Full textConference papers on the topic "Warfare"
Gusterson, Hugh. "Drone warfare." In NUCLEAR WEAPONS AND RELATED SECURITY ISSUES. Author(s), 2017. http://dx.doi.org/10.1063/1.5009234.
Full textAskin, Osman, Riza Irmak, and Mustafa Avsever. "Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare." In SPIE Defense + Security, edited by Igor V. Ternovskiy and Peter Chin. SPIE, 2015. http://dx.doi.org/10.1117/12.2189351.
Full textBrandt, Kevin, and Ellen Roland. "Modeling coalition warfare." In the 25th conference. New York, New York, USA: ACM Press, 1993. http://dx.doi.org/10.1145/256563.256903.
Full textMartynenko, Evgeny. "HYBRID WARFARE PHENOMENA." In 4th International Multidisciplinary Scientific Conference on Social Sciences and Arts SGEM2017. Stef92 Technology, 2017. http://dx.doi.org/10.5593/sgemsocial2017/hb11/s01.011.
Full textHorne, Gary E. "Maneuver warfare distillations." In the 31st conference. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/324898.325020.
Full textXiangyong Chen, Yuanwei Jing, Chunji Li, Nan Jiang, and G. M. Dimirovski. "Effectiveness evaluation of warfare command systems with dissymmetrical warfare information." In 2010 American Control Conference (ACC 2010). IEEE, 2010. http://dx.doi.org/10.1109/acc.2010.5531011.
Full textKartusová, Alžběta. "Hybridní hrozby – fenomén v oblasti válek 21. století." In Nestandardní bezpečnostní situace: ústavní, mezinárodní a evropský pohled. Západočeská univerzita v Plzni, 2021. http://dx.doi.org/10.24132/zcu.2021.09228.89-102.
Full textAucsmith, David. "Implications of Cyber Warfare." In IH&MMSec '15: ACM Information Hiding and Multimedia Security Workshop. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2756601.2756622.
Full textStark, Andrew J., Kyle Davis, Chris Ward, and Jordan Gray. "Photonics for electronic warfare." In 2014 IEEE Avionics, Fiber-Optics and Photonics Technology Conference (AVFOP). IEEE, 2014. http://dx.doi.org/10.1109/avfop.2014.6999438.
Full textHale, Jim. "Cyber Warfare Integrated Network." In AIAA International Air and Space Symposium and Exposition: The Next 100 Years. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2003. http://dx.doi.org/10.2514/6.2003-2855.
Full textReports on the topic "Warfare"
Vatet, Ian V. Can Network-Centric Warfare Save Undersea Warfare? Fort Belvoir, VA: Defense Technical Information Center, February 2000. http://dx.doi.org/10.21236/ada379174.
Full textAIR UNIV MAXWELL AFB AL. Electronic Warfare. Fort Belvoir, VA: Defense Technical Information Center, February 2012. http://dx.doi.org/10.21236/ada562410.
Full textSherman, William C. Air Warfare. Fort Belvoir, VA: Defense Technical Information Center, March 2002. http://dx.doi.org/10.21236/ada421698.
Full textJOINT CHIEFS OF STAFF WASHINGTON DC. Electronic Warfare. Fort Belvoir, VA: Defense Technical Information Center, January 2007. http://dx.doi.org/10.21236/ada464647.
Full textVan Messel, John A. Unrestricted Warfare: A Chinese Doctrine for Future Warfare? Fort Belvoir, VA: Defense Technical Information Center, January 2005. http://dx.doi.org/10.21236/ada509132.
Full textSullivan, Gordon R., and James M. Dubik. Envisioning Future Warfare. Fort Belvoir, VA: Defense Technical Information Center, January 1995. http://dx.doi.org/10.21236/ada450234.
Full textMcGrady, John W. Sustaining Unconventional Warfare. Fort Belvoir, VA: Defense Technical Information Center, May 2013. http://dx.doi.org/10.21236/ada587508.
Full textWright, Darrell L. Electronic Warfare Test. Fort Belvoir, VA: Defense Technical Information Center, September 1999. http://dx.doi.org/10.21236/ada377902.
Full textDotto, Peter A. Defeating Guerrilla Warfare. Fort Belvoir, VA: Defense Technical Information Center, June 1991. http://dx.doi.org/10.21236/ada240241.
Full textNAVAL SURFACE WARFARE CENTER DAHLGREN DIV VA. Naval Surface Warfare Center Dahlgren Division, Technical Digest; Expeditionary Warfare. Fort Belvoir, VA: Defense Technical Information Center, January 1996. http://dx.doi.org/10.21236/ada332964.
Full text