847:
about the defending state's expected behaviour in future conflicts. The credibilities of a defending state's policies are arguably linked over time, and reputations for resolve have a powerful causal impact on an attacking state's decision whether to challenge either general or immediate deterrence. The second approach argues that reputations have a limited impact on deterrence outcomes because the credibility of deterrence is heavily determined by the specific configuration of military capabilities, interests at stake, and political constraints faced by a defending state in a given situation of attempted deterrence. The argument of that school of thought is that potential attacking states are not likely to draw strong inferences about a defending states resolve from prior conflicts because potential attacking states do not believe that a defending state's past behaviour is a reliable predictor of future behavior. The third approach is a middle ground between the first two approaches and argues that potential attacking states are likely to draw reputational inferences about resolve from the past behaviour of defending states only under certain conditions. The insight is the expectation that decisionmakers use only certain types of information when drawing inferences about reputations, and an attacking state updates and revises its beliefs when a defending state's unanticipated behavior cannot be explained by case-specific variables.
741:
regime security are better served by defiance, or there are domestic political gains to be made from improving relations with the defending state. The second factor is an economic calculation of the costs that military force, sanctions, and other coercive instruments can impose and the benefits that trade and other economic incentives may carry. That is partly a function of the strength and flexibility of the attacking state's domestic economy and its capacity to absorb or counter the costs being imposed. The third factor is the role of elites and other key domestic political figures within the attacking state. To the extent that such actors' interests are threatened with the defending state's demands, they act to prevent or block the defending state's demands.
832:
seemingly resolved adversary. If all defending states have such incentives, potential attacking states may discount statements made by defending states along with any movement of military forces as merely bluffs. In that regard, rational deterrence theorists have argued that costly signals are required to communicate the credibility of a defending state's resolve. Those are actions and statements that clearly increase the risk of a military conflict and also increase the costs of backing down from a deterrent threat. States that bluff are unwilling to cross a certain threshold of threat and military action for fear of committing themselves to an armed conflict.
1458:, said: Deterrence is working in the Ukraine crisis, just not for the right side. The United States and its allies failed to deter Russia from invading. The purpose of deterrence strategy is to prevent the conflict entirely, and there Washington failed badly. On the other hand, Russian deterrence is enjoying spectacular success. Russia has convinced the West that even a whisper of NATO military action in Ukraine would bring disastrous consequences. Putin threatens, blusters, uses the word “nuclear,” and the West wilts.
624:
and military co-operation into a crisis or militarized confrontation that threatens armed conflict and possibly war. The prevention of crises of wars, however, is not the only aim of deterrence. In addition, defending states must be able to resist the political and the military demands of a potential attacking nation. If armed conflict is avoided at the price of diplomatic concessions to the maximum demands of the potential attacking nation under the threat of war, it cannot be claimed that deterrence has succeeded.
797:
equally, if not more, the art of coercion, intimidation and deterrence. Schelling says the capacity to harm another state is now used as a motivating factor for other states to avoid it and influence another state's behavior. To be coercive or deter another state, violence must be anticipated and avoidable by accommodation. It can therefore be summarized that the use of the power to hurt as bargaining power is the foundation of deterrence theory and is most successful when it is held in reserve.
814:
persuade the other guy to give in, when the only method at your disposal—threatening to push him off the cliff—would doom you both? Answer: You start dancing, closer and closer to the edge. That way, you don't have to convince him that you would do something totally irrational: plunge him and yourself off the cliff. You just have to convince him that you are prepared to take a higher risk than he is of accidentally falling off the cliff. If you can do that, you win."
1527:
and interpret intentions, the advantage of offense over defense, and weak actors and non-state actors can develop considerable cyber capabilities. Scholars have also debated the feasibility of launching highly damaging cyber attacks and engaging in destructive cyber warfare, with most scholars expressing skepticism that cyber capabilities have enhanced the ability of states to launch highly destructive attacks. The most prominent cyber attack to date is the
915:
691:
state's costs of compliance and the greater need for the defending state's strategy to increase the costs of noncompliance and the benefits of compliance. That is a challenge, as deterrence is by definition a strategy of limited means. George (1991) goes on to explain that deterrence sometimes goes beyond threats to the actual use of military force, but if force is actually used, it must be limited and fall short of full-scale use to succeed.
823:
orientation of potential attacking states generally is for the short term and is driven by concerns about military cost and effectiveness. For successful deterrence, defending states need the military capacity to respond quickly and strongly to a range of contingencies. Deterrence often fails if either a defending state or an attacking state underestimates or overestimates the other's ability to undertake a particular course of action.
860:
at stake for the defending state that would justify the risks of a military conflict. The argument is that defending states that have greater interests at stake in a dispute are more resolved to use force and more willing to endure military losses to secure those interests. Even less well-established arguments are the specific interests that are more salient to state leaders such as military interests and economic interests.
38:
1341:(MAD). Therefore, the period of détente was characterized by a general reduction in the tension between the Soviet Union and the United States and a thawing of the Cold War, which lasted from the late 1960s until the start of the 1980s. The doctrine of mutual nuclear deterrence then characterized relations between the United States and the Soviet Union and relations with Russia until the onset of the
1264:
Logan have challenged this assertion. A 2023 study found that a state with nuclear weapons is less likely to be targeted by non-nuclear states, but that a state with nuclear weapons is not less likely to target other nuclear states in low-level conflict. A 2022 study by
Kyungwon Suh suggests that nuclear superiority may not reduce the likelihood that nuclear opponents will initiate nuclear crises.
632:
the extent of an attacking state's vulnerability as shaped by its domestic political and economic conditions. In broad terms, a state wishing to implement a strategy of deterrence is most likely to succeed if the costs of noncompliance that it can impose on and the benefits of compliance it can offer to another state are greater than the benefits of noncompliance and the costs of compliance.
1497:, said that Western fears about nuclear weapons and World War III have left it "fully deterred" and Putin "completely undeterred." The West have "ceded the initiative to the enemy." No attempt was made by NATO to deter Moscow with the threat of military force, wondered another expert. To the contrary, it was Russia’s deterrence that proved to be successful.
789:
costs on an attacking state in an armed conflict, and the attacking state believes that the defending state is resolved to use its available military forces. Huth goes on to explain the four key factors for consideration under rational deterrence theory: the military balance, signaling and bargaining power, reputations for resolve, interests at stake.
1563:, states frequently neither confirm nor deny responsibility for cyber operations so that they can avoid the escalatory risks (that come with public credit) while also signaling that they have cyber capabilities and resolve (which can be achieved if intelligence agencies and governments believe they were responsible).
1701:
reductions without the state becoming vulnerable, but it has been noted that there comes a point that further reductions may be undesirable, once minimal deterrence is reached, as further reductions beyond that point increase a state's vulnerability and provide an incentive for an adversary to expand
1616:
Scholars have also argued that leaders do not behave in ways that are consistent with the predictions of nuclear deterrence theory. Scholars have also argued that rational deterrence theory does not grapple sufficiently with emotions and psychological biases that make accidents, loss of self-control,
1526:
Scholars have debated how cyber capabilities alter traditional understandings of deterrence, given that it may be harder to attribute responsibility for cyber attacks, the barriers to entry may be lower, the risks and costs may be lower for actors who conduct cyber attacks, it may be harder to signal
1177:
give nations the potential to destroy their enemies but also the rest of humanity without drawing immediate reprisal because of the lack of a conceivable defense system and the speed with which nuclear weapons can be deployed. A nation's credible threat of such severe damage empowers their deterrence
831:
The central problem for a state that seeks to communicate a credible deterrent threat by diplomatic or military actions is that all defending states have an incentive to act as if they are determined to resist an attack in the hope that the attacking state will back away from military conflict with a
822:
Deterrence is often directed against state leaders who have specific territorial goals that they seek to attain either by seizing disputed territory in a limited military attack or by occupying disputed territory after the decisive defeat of the adversary's armed forces. In either case, the strategic
724:
must be sufficiently credible to raise the attacking state's perceived costs of noncompliance. A defending state having a superior military capability or economic strength in itself is not enough to ensure credibility. Indeed, all three elements of a balanced deterrence strategy are more likely to be
1862:
Definition of deterrence from the
Dictionary of Modern Strategy and Tactics by Michael Keane: "The prevention or inhibition of action brought about by fear of the consequences. Deterrence is a state of mind brought about by the existence of a credible threat of unacceptable counteraction. It assumes
1660:
where proposed steps to achieve nuclear disarmament. Kissinger has argued, "The classical notion of deterrence was that there was some consequences before which aggressors and evildoers would recoil. In a world of suicide bombers, that calculation doesn't operate in any comparable way." Shultz said,
1418:
in 1985. They "agreed that a nuclear war cannot be won and must never be fought. Recognizing that any conflict between the USSR and the U.S. could have catastrophic consequences, they emphasized the importance of preventing any war between them, whether nuclear or conventional. They will not seek to
876:
A 2022 study by Brian
Blankenship and Erik Lin-Greenberg found that high-resolve, low-capability signals (such as tripwires) were not viewed as more reassuring to allies than low-resolve, high-capability alternatives (such as forces stationed offshore). Their study cast doubt on the reassuring value
690:
provides further detail in relation to those factors. Proportionality refers to the relationship between the defending state's scope and nature of the objectives being pursued and the instruments available for use to pursue them. The more the defending state demands of another state, the higher that
606:
A threat serves as a deterrent to the extent that it convinces its target not to carry out the intended action because of the costs and losses that target would incur. In international security, a policy of deterrence generally refers to threats of military retaliation directed by the leaders of one
546:
Most of the innovative work on deterrence theory occurred from the late 1940s to mid-1960s. Historically, scholarship on deterrence has tended to focus on nuclear deterrence. Since the end of the Cold War, there has been an extension of deterrence scholarship to areas that are not specifically about
1737:
immoral in nature. In addition, he observes that deterrence theories serve to perpetuate a state of mutual assured destruction between nations over time. Holmes further argues that it is therefore both irrational and immoral to utilize a methodology for perpetuating international peace which relies
1566:
According to
Lennart Maschmeyer, cyber weapons have limited coercive effectiveness due to a trilemma "whereby speed, intensity, and control are negatively correlated. These constraints pose a trilemma for actors because a gain in one variable tends to produce losses across the other two variables."
863:
Furthermore, Huth argues that both supporters and critics of rational deterrence theory agree that an unfavorable assessment of the domestic and international status quo by state leaders can undermine or severely test the success of deterrence. In a rational choice approach, if the expected utility
859:
Although costly signaling and bargaining power are more well established arguments in rational deterrence theory, the interests of defending states are not as well known. Attacking states may look beyond the short-term bargaining tactics of a defending state and seek to determine what interests are
631:
argue, two key sets of factors for successful deterrence are important: a defending state strategy that balances credible coercion and deft diplomacy consistent with the three criteria of proportionality, reciprocity, and coercive credibility and minimizes international and domestic constraints and
1422:
While the army was dealing with the breakup of the Soviet Union and the spread of nuclear technology to other nations beyond the United States and Russia, the concept of deterrence took on a broader multinational dimension. The US policy on deterrence after the Cold War was outlined in 1995 in the
813:
columnist and one of
Schelling's former students, anecdotally summarizes Schelling's reorientation of game theory thus: "ou're standing at the edge of a cliff, chained by the ankle to someone else. You'll be released, and one of you will get a large prize, as soon as the other gives in. How do you
623:
A successful deterrence policy must be considered in military terms but also political terms: International relations, foreign policy and diplomacy. In military terms, deterrence success refers to preventing state leaders from issuing military threats and actions that escalate peacetime diplomatic
1263:
Scholars have debated whether having a superior nuclear arsenal provides a deterrent against other nuclear-armed states with smaller arsenals. Matthew
Kroenig has argued that states with nuclear superiority are more likely to win nuclear crises, whereas Todd Sechser, Matthew Fuhrmann and David C.
1209:
is a key concept in rational deterrence theory. It states that when two countries each have nuclear weapons, the probability of a direct war between them greatly decreases, but the probability of minor or indirect conflicts between them increases. This occurs because rational actors want to avoid
846:
There are three different arguments that have been developed in relation to the role of reputations in influencing deterrence outcomes. The first argument focuses on a defending state's past behavior in international disputes and crises, which creates strong beliefs in a potential attacking state
788:
Deterrence theorists have consistently argued that deterrence success is more likely if a defending state's deterrent threat is credible to an attacking state. Huth outlines that a threat is considered credible if the defending state possesses both the military capabilities to inflict substantial
740:
that must be taken into consideration is the domestic political and economic conditions in the attacking state affecting its vulnerability to deterrence policies and the attacking state's ability to compensate unfavourable power balances. The first factor is whether internal political support and
610:
As outlined by Huth, a policy of deterrence can fit into two broad categories: preventing an armed attack against a state's own territory (known as direct deterrence) or preventing an armed attack against another state (known as extended deterrence). Situations of direct deterrence often occur if
1575:
Intrawar deterrence is deterrence within a war context. It means that war has broken out but actors still seek to deter certain forms of behavior. In the words of
Caitlin Talmadge, "intra-war deterrence failures... can be thought of as causing wars to get worse in some way." Examples of intrawar
619:
becomes involved. The latter case has generated most interest in academic literature. Building on the two broad categories, Huth goes on to outline that deterrence policies may be implemented in response to a pressing short-term threat (known as immediate deterrence) or as strategy to prevent a
796:
brought his background in game theory to the subject of studying international deterrence. Schelling's (1966) classic work on deterrence presents the concept that military strategy can no longer be defined as the science of military victory. Instead, it is argued that military strategy was now
1595:
Deterrence theory has been criticized by numerous scholars for various reasons, the most basic being skepticism that decision makers are rational. A prominent strain of criticism argues that rational deterrence theory is contradicted by frequent deterrence failures, which may be attributed to
1267:
Proponents of nuclear deterrence theory argue that newly nuclear-armed states may pose a short- or medium-term risk, but that "nuclear learning" occurs over time as states learn to live with new nuclear-armed states. Mark S. Bell and
Nicholas L. Miller have however argued that there is a weak
872:
International relations scholars Dan Reiter and Paul Poast have argued that so-called "tripwires" do not deter aggression. Tripwires entail that small forces are deployed abroad with the assumption that an attack on them will trigger a greater deployment of forces. Dan Altman has argued that
710:
outlines that reciprocity involves an explicit understanding of linkage between the defending state's carrots and the attacking state's concessions. The balance lies in not offering too little, too late or for too much in return and not offering too much, too soon, or for too little return.
5022:
719:
Finally, coercive credibility requires that in addition to calculations about costs and benefits of co-operation, the defending state convincingly conveys to the attacking state that failure to co-operate has consequences. Threats, uses of force, and other coercive instruments such as
1336:
was established, with peaceful co-existence was sought between the United States and the Soviet Union. Although all of those factors contributed to this shift, the most important factor was probably the rough parity achieved in stockpiling nuclear weapons with the clear capability of
1431:) not to threaten the United States, its interests, or allies. The document explains that such threats must also be used to ensure that nations without nuclear technology refrain from developing nuclear weapons and that a universal ban precludes any nation from maintaining
1168:
In 1966, Schelling is prescriptive in outlining the impact of the development of nuclear weapons in the analysis of military power and deterrence. In his analysis, before the widespread use of assured second strike capability, or immediate reprisal, in the form of
501:
military force or action refrains from doing so. Scholars distinguish between "extended deterrence" (the protection of allies) and "direct deterrence" (protection of oneself). Rational deterrence theory holds that an attacker will be deterred if they believe
850:
An example shows that the problem extends to the perception of the third parties as well as main adversaries and underlies the way in which attempts at deterrence can fail and even backfire if the assumptions about the others' perceptions are incorrect.
1488:
Timo S. Koster who served at NATO as
Director of Defence Policy & Capabilities similarly argued: A massacre is taking place in Europe and the strongest military alliance in the world is staying out of it. We are deterred and Russia is not.
5904:
4986:
4961:
1427:". It explains that while relations with Russia continue to follow the traditional characteristics of MAD, but the US policy of deterrence towards nations with minor nuclear capabilities should ensure by threats of immense retaliation (or even
1672:
argued in 1994 that nuclear weapons were obsolete in the "new world disorder" after the dissolution of the Soviet Union, and he advocated reliance on precision guided munitions to secure a permanent military advantage over future adversaries.
438:
refers to the scholarship and practice of how threats of using force by one party can convince another party to refrain from initiating some other course of action. The topic gained increased prominence as a military strategy during the
1653:
have all called upon governments to embrace the vision of a world free of nuclear weapons, and created the
Nuclear Security Project to advance that agenda. In 2010, the four were featured in a documentary film entitled
1617:
and loss of control over others likely. Frank C. Zagare has argued that deterrence theory is logically inconsistent and empirically inaccurate. In place of classical deterrence, rational choice scholars have argued for
1558:
There is a risk of unintended escalation in cyberspace due to difficulties in discerning the intent of attackers, and complexities in state-hacker relationships. According to political scientists Joseph Brown and
1576:
deterrence include deterring adversaries from resorting to nuclear, chemical and biological weapons attacks or attacking civilian populations indiscriminately. Broadly, it involves any prevention of escalation.
2381:
496:
otherwise take an action refrains from doing so due to the consequences that the deterrer is perceived likely to take. "Immediate deterrence" is considered successful when an actor seriously contemplating
5896:
698:, which has been seen in Libya, Iraq, and North Korea. There, defending states have sought to change the leadership of a state and to policy changes relating primarily to their nuclear weapons programs.
543:", his country needed an air force that could immediately retaliate: "If we are prepared it may never come. It is not immediately conceivable that any nation will dare to attack us if we are prepared".
4925:
4021:
the findings reinforce a key theoretical tenet of the nuclear revolution: Once states have achieved a secure second-strike capability, nuclear superiority does not confer additional political benefits.
3324:
Since the consequence of a breakdown of the nuclear deterrence strategy is so catastrophic for human civilisation, it is reasonable to employ the strategy only if the chance of breakdown is zero.
485:
Deterrence is most likely to be successful when a prospective attacker believes that the probability of success is low and the costs of attack are high. Central problems of deterrence include the
455:
would devastate both parties. The central problem of deterrence revolves around how to credibly threaten military action or nuclear punishment on the adversary despite its costs to the deterrer.
1210:
nuclear wars, and thus they neither start major conflicts nor allow minor conflicts to escalate into major conflicts—thus making it safe to engage in minor conflicts. For instance, during the
4466:
1933:
5552:
3960:
3710:
3410:
2029:
864:
of not using force is reduced by a declining status quo position, deterrence failure is more likely since the alternative option of using force becomes relatively more attractive.
422:
1485:
would be met with a nuclear response. Later Ukrainian attacks on the same fleet using a different communications system also caused deterrence, this time to the Russian Navy.
3153:
577:, synonymous with naivete and weakness, and signifying a craven willingness to barter away the nation's vital interests for empty promises." They claimed that the success of
596:
The concept of deterrence can be defined as the use of threats in limited force by one party to convince another party to refrain from initiating some course of action. In
1047:
635:
Deterrence theory holds that nuclear weapons are intended to deter other states from attacking with their nuclear weapons, through the promise of retaliation and possibly
615:
between neighboring states in which major powers like the United States do not directly intervene. On the other hand, situations of extended deterrence often occur when a
506:(Probability of deterrer carrying out deterrent threat Ă— Costs if threat carried out) > (Probability of the attacker accomplishing the action Ă— Benefits of the action)
6278:
4310:
6646:
4394:
1689:
in which a state possesses no more nuclear weapons than is necessary to deter an adversary from attacking is presently the most common form of deterrence practiced by
5675:
4343:
5165:
47:, one of two submarines designed to provide a nuclear deterrence using cruise missiles with a 500-mile (800 km) range—placed on patrol by starting to carry the
2812:
7832:
3343:
5838:
1053:
1596:
misperceptions. Here it's argued that misestimations of perceived costs and benefits by analysts contribute to deterrence failures, as exemplified in case of
1316:, asserted that he never advocated military intervention, merely economic support, and that his ideas were misinterpreted as espoused by the general public.
1114:
607:
state to the leaders of another in an attempt to prevent the other state from resorting to the use of military force in pursuit of its foreign policy goals.
559:
The two most prominent deterrent strategies are "denial" (denying the attacker the benefits of attack) and "punishment" (inflicting costs on the attacker).
1103:
1424:
873:
tripwires do work to deter aggression, citing the Western deployment of forces to Berlin in 1948–1949 to deter Soviet aggression as a successful example.
5808:
2644:
1124:
2310:
646:
A successful nuclear deterrent requires a country to preserve its ability to retaliate by responding before its own weapons are destroyed or ensuring a
603:
Glenn Snyder also offers a broad definition of deterrence, as he argues that deterrence involves both the threat of sanction and the promise of reward.
4254:
6298:
1155:
415:
1661:"If you think of the people who are doing suicide attacks, and people like that get a nuclear weapon, they are almost by definition not deterrable."
1357:'s arms build-up during the 1980s. Reagan attempted to justify the policy by concerns of growing Soviet influence in Latin America and the post-1979
6641:
6056:"Reviewed work: On War and Morality, Robert L. Holmes; Paths to Peace: Exploring the Feasibility of Sustainable Peace, Richard Smoke, Willis Harman"
4440:
1909:
1098:
6406:
6401:
6396:
7877:
7842:
6328:
1454:, many western hawks expressed the view that deterrence worked in that war but only in one way – in favor of Russia. Former US security advisor,
581:
often depends upon a president withstanding "the inevitable charges of appeasement that accompany any decision to negotiate with hostile powers.
4639:
4303:"An explosive Elon Musk biography is just hitting shelves. But the book's acclaimed author is already walking back a major claim | CNN Business"
3526:
3468:
1439:. The current tensions with Iran and North Korea over their nuclear programs are caused partly by the continuation of the policy of deterrence.
6661:
3928:
2736:
2272:
1068:
1058:
334:
5518:
1385:, who were fighting for independence from the Soviet Union, and several anticommunist movements in Latin America such as the overthrow of the
6760:
6271:
6235:
6177:
6149:
5538:
5490:
5388:
5342:
5296:
5159:
4460:
4220:
4180:
3946:
3768:
3682:
3558:
3090:
2855:
2774:
2722:
2676:
2600:
2258:
2204:
2158:
2112:
2061:
2023:
1970:
1927:
1084:
1073:
1063:
841:
486:
3717:
7659:
6666:
6656:
4528:
1257:
988:
408:
4903:
4280:
3402:
3032:
See, for example, Carl von Clausewitz, On War, trans. and ed. Michael Howard and Peter Paret (Princeton, Princeton University Press, 1989)
2005:
1621:, which assumes that states may vary in their internal characteristics and especially in the credibility of their threats of retaliation.
478:. Compellence has been characterized as harder to successfully implement than deterrence. Deterrence also tends to be distinguished from
7872:
6651:
6504:
6494:
2519:
1474:
1119:
1037:
578:
4837:
7476:
7011:
6809:
6421:
6411:
5696:
Zagare, Frank C. (2004), "Reconciling Rationality with Deterrence: A Re-examination of the Logical Foundations of Deterrence Theory",
4407:
Tavberidze, Vazha, (2022). "Former NATO Commander Says Western Fears Of Nuclear War Are Preventing A Proper Response To Putin,"
749:
One approach to theorizing about deterrence has entailed the use of rational choice and game-theoretic models of decision making (see
540:
475:
5356:
4373:
1482:
1206:
7837:
7295:
7114:
6717:
6671:
6348:
5868:
1892:
3125:
4234:
600:(1966), Schelling offers a broader definition of deterrence, as he defines it as "to prevent from action by fear of consequences."
6916:
6264:
1451:
5646:
1531:
attack on Iran's nuclear program. By 2019, the only publicly acknowledged case of a cyber attack causing a power outage was the
7847:
7385:
6712:
6571:
2218:
2172:
6926:
6633:
6388:
5963:
4302:
1402:
1189:
Part of a state's nuclear arsenal must appear to be able to survive an attack by the adversary and be used for a retaliatory
299:
7255:
5496:
5394:
5302:
4186:
3774:
3688:
3592:
3564:
3096:
2838:
NL ARMS Netherlands Annual Review of Military Studies 2020: Deterrence in the 21st Century—Insights from Theory and Practice
2682:
2606:
2067:
1976:
5667:
4335:
7827:
7436:
6854:
6829:
5141:
1414:
The final expression of the full impact of deterrence during the cold war can be seen in the agreement between Reagan and
1304:
throughout most of the globe, particularly Africa, Asia, Central America, and South America. One notable conflict was the
1148:
966:
574:
474:, which is the attempt to get an actor (such as a state) to take an action (i.e. alter the status quo). Both are forms of
1709:
under the belief that the United States will refuse to risk its own cities by assisting Western Europe in a nuclear war.
7786:
7212:
6966:
6956:
6891:
6333:
3340:
2801:
1758:
1682:
1532:
636:
5929:
5830:
7006:
6986:
6514:
5863:
2126:
1597:
1129:
7471:
5778:
5748:
1738:
exclusively upon the continuous development of new iterations of the very weapons which it is designed to prohibit.
30:
This article is about Deterrent in peace and conflict studies and nuclear weapons. For legal theory of justice, see
7852:
7822:
7720:
7441:
7099:
6941:
6936:
6722:
6531:
6308:
5072:
4148:
3906:
3840:
1407:
1338:
1089:
934:
894:
448:
366:
273:
5617:
3650:
3299:
3233:
2981:
2915:
2458:
1721:
era, philosophical objections to the reliance upon deterrence theories in general have also been raised on purely
1239:
7862:
7756:
7679:
7415:
6971:
6896:
6753:
1515:
Since the early 2000s, there has been an increased focus on cyber deterrence. Cyber deterrence has two meanings:
2836:
Mueller, Karl (2021), Osinga, Frans; Sweijs, Tim (eds.), "The Continuing Relevance of Conventional Deterrence",
535:
during World War II, was thinking about how the next war would be fought. He said in a speech that month to the
7867:
7857:
7771:
7504:
7390:
7187:
6981:
6799:
6524:
1141:
954:
536:
452:
361:
319:
123:
116:
7574:
5800:
2628:
2294:
7776:
7375:
7345:
7001:
6789:
6697:
6509:
6287:
5927:
From Counterforce to Minimal Deterrence: A New Nuclear Policy on the Path Toward Eliminating Nuclear Weapons
4258:
1768:
983:
949:
460:
208:
138:
7710:
639:. Nuclear deterrence can also be applied to an attack by conventional forces. For example, the doctrine of
7801:
7781:
7761:
7380:
7285:
7144:
7094:
7089:
7021:
6991:
6911:
6839:
5705:
5417:"Utility-based predictions of military escalation: Why experts forecasted Russia would not invade Ukraine"
1818:
1634:
1590:
590:
1247:
589:
The use of military threats as a means to deter international crises and war has been a central topic of
6819:
5574:"The Perils of Proliferation: Organization Theory, Deterrence Theory, and the Spread of Nuclear Weapons"
5237:"Emerging technology and intra-war escalation risks: Evidence from the Cold War, implications for today"
3051:
Huth, P. K. (1999), "Deterrence and International Conflict: Empirical Findings and Theoretical Debate",
2757:
Rynning, Sten (2021). "Deterrence Rediscovered: NATO and Russia". In Osinga, Frans; Sweijs, Tim (eds.).
1690:
1656:
1243:
1023:
1008:
944:
283:
41:
31:
7260:
7245:
6219:
6139:
1823:
466:
Deterrence is widely defined as any use of threats (implicit or explicit) or limited force intended to
344:
489:
communication of threats and assurance. Deterrence does not necessarily require military superiority.
7594:
7579:
7466:
7461:
7365:
7350:
7315:
7280:
6879:
6824:
6746:
6687:
6601:
6338:
4603:
971:
959:
349:
6223:
5710:
2704:
2240:
1365:. Similar to the old policy of containment, the US funded several proxy wars, including support for
7751:
7370:
7320:
7157:
7084:
7064:
6921:
6804:
6611:
6606:
6469:
1763:
1630:
1297:
1199:
1013:
890:
640:
612:
278:
177:
154:
58:
1548:
Norms: the establishment and maintenance of norms that establish appropriate standards of behavior
7730:
7589:
7420:
7400:
7250:
7129:
7034:
6961:
6906:
6442:
6120:
6078:
6036:
5994:
5723:
5609:
5601:
5544:
5348:
5264:
5217:
5122:
5064:
5014:
4953:
4895:
4887:
4829:
4742:
4692:
4631:
4581:
4520:
4226:
4140:
4132:
4085:
4012:
3952:
3898:
3890:
3832:
3824:
3642:
3518:
3460:
3381:
3291:
3283:
3225:
3217:
3145:
3015:
2973:
2965:
2907:
2899:
2728:
2571:
2511:
2450:
2442:
2373:
2264:
2210:
2164:
2118:
1753:
1694:
1686:
1436:
1398:
1358:
1293:
721:
532:
471:
467:
396:
314:
309:
94:
3711:"The Stability-Instability Paradox, Misperception, and Escalation Control in South Asia (essay)"
1374:
4891:
4859:
4492:
4272:
7715:
7684:
7639:
7534:
7405:
7360:
7335:
7265:
7139:
7069:
6951:
6901:
6849:
6707:
6576:
6541:
6452:
6369:
6231:
6173:
6145:
5942:
5593:
5534:
5486:
5384:
5338:
5292:
5256:
5209:
5155:
5114:
5056:
5006:
4945:
4879:
4821:
4782:
4734:
4684:
4623:
4573:
4512:
4456:
4388:
4216:
4176:
4124:
4004:
3942:
3882:
3816:
3764:
3678:
3634:
3554:
3510:
3452:
3275:
3209:
3086:
2957:
2891:
2851:
2770:
2718:
2672:
2636:
2596:
2563:
2503:
2434:
2365:
2302:
2254:
2200:
2154:
2108:
2057:
2019:
1966:
1923:
1888:
1808:
1788:
1773:
1748:
1698:
1415:
1329:
1235:
1178:
policies and fuels political coercion and military deadlock, which can produce proxy warfare.
1018:
1003:
998:
993:
929:
898:
304:
268:
172:
104:
17:
7796:
7791:
7725:
7689:
7669:
7629:
7599:
7554:
7509:
7494:
7451:
7305:
6946:
6883:
6869:
6834:
6727:
6596:
6519:
6241:
6112:
6070:
6028:
5986:
5715:
5585:
5526:
5461:
5428:
5330:
5282:
5248:
5199:
5147:
5106:
4998:
4937:
4871:
4813:
4772:
4726:
4676:
4615:
4565:
4504:
4448:
4116:
4077:
4046:
3994:
3934:
3874:
3808:
3626:
3502:
3444:
3373:
3267:
3201:
3137:
3060:
2949:
2883:
2841:
2780:
2762:
2710:
2553:
2495:
2426:
2355:
2347:
2246:
2100:
2011:
1915:
1833:
1803:
1726:
1642:
1554:
Entanglement and interdependence: interdependence between actors can have a deterrent effect
1490:
1309:
886:
793:
570:
562:
479:
1542:
Denial: preventing adversaries from achieving military objectives by defending against them
1250:
and spent substantial amounts of money and manpower on gaining relative influence over the
7694:
7654:
7609:
7524:
7519:
7240:
7192:
7079:
6844:
6814:
6784:
6556:
6551:
6546:
6464:
5946:
5933:
4365:
3347:
1828:
1813:
1733:
presumption which prohibits the killing of innocent life. Consequently, such theories are
1706:
1646:
1601:
1470:
1428:
1174:
939:
806:
801:
733:
are supportive, and opposition within the defending state's domestic politics is limited.
556:
A distinction is sometimes made between nuclear deterrence and "conventional deterrence."
444:
356:
263:
247:
187:
48:
7559:
4987:"#SorryNotSorry: Why states neither confirm nor deny responsibility for cyber operations"
4452:
2015:
1919:
1697:
during arms negotiations between the United States and Russia allows each state to make
694:
The main source of disproportionality is an objective that goes beyond policy change to
7634:
7624:
7614:
7549:
7539:
7529:
7514:
7310:
7290:
7275:
7270:
7230:
7197:
7182:
7177:
7167:
6976:
6353:
5958:
5859:
4230:
4208:
2785:
1838:
1793:
1729:
have noted that the implementation of such theories is inconsistent with a fundamental
1478:
1366:
1028:
976:
906:
671:
329:
7816:
7674:
7664:
7619:
7604:
7584:
7410:
7355:
7330:
7202:
7172:
7162:
7149:
7054:
6996:
6931:
6864:
6194:
6190:
5638:
5613:
5548:
5352:
5268:
5221:
5018:
4957:
4899:
4696:
4635:
4089:
4016:
3956:
3902:
3836:
3522:
3464:
3295:
3229:
2977:
2911:
2732:
2575:
2454:
2268:
1798:
1730:
1650:
1560:
1481:
argued Musk had been deterred by Russia after the country's ambassador warned him an
1466:
1354:
1313:
1260:
wrote in 1959 that a credible nuclear deterrent must be always ready but never used.
1215:
1190:
1182:
695:
655:
651:
647:
381:
371:
182:
5727:
5126:
4833:
4585:
4524:
4144:
3797:"Nuclear Superiority and the Balance of Resolve: Explaining Nuclear Crisis Outcomes"
3149:
2515:
2377:
2214:
2194:
2168:
2148:
573:
and Kenneth Osgood, "Munich and appeasement have become among the dirtiest words in
470:
an actor from taking an action (i.e. maintain the status quo). Deterrence is unlike
7649:
7644:
7499:
7074:
6616:
6536:
6489:
6198:
4746:
4714:
4553:
4105:"The Spread of Nuclear Weapons and International Conflict: Does Experience Matter?"
3065:
1783:
1506:
1219:
620:
military conflict or short-term threat from arising (known as general deterrence).
528:
376:
227:
84:
37:
5465:
5433:
5416:
5252:
5110:
4730:
4664:
4619:
4569:
4207:
Bell, Mark S.; Miller, Nicholas L. (2022), Narang, Vipin; Sagan, Scott D. (eds.),
3506:
3448:
2558:
2541:
5480:
5378:
5286:
4680:
4215:, Deterrence in the New Nuclear Age, Cornell University Press, pp. 209–229,
4170:
3758:
3672:
3586:
3548:
3080:
2666:
2590:
2051:
1960:
7766:
7569:
7564:
7544:
7340:
7325:
7134:
7104:
7039:
7029:
6859:
6794:
6770:
6702:
6581:
6561:
6474:
6459:
6374:
5449:
5236:
5094:
4066:"Nuclear balance and the initiation of nuclear crises: Does superiority matter?"
3674:
The Meaning of the Nuclear Revolution: Statecraft and the Prospect of Armageddon
3490:
3432:
3403:"The Truth About Tripwires: Why Small Force Deployments Do Not Deter Aggression"
2846:
2766:
1734:
1510:
1455:
1382:
1342:
1325:
1289:
1251:
1231:
750:
616:
566:
511:
391:
386:
339:
217:
197:
133:
99:
74:
65:
6097:
6055:
6013:
5482:
The Revolution that Failed: Nuclear Competition, Arms Control, and the Cold War
1551:
Escalation: raising the probability that costs will be imposed on the adversary
27:
Military strategy during the Cold War with regard to the use of nuclear weapons
7395:
7049:
6586:
5530:
4941:
4875:
4081:
3878:
3812:
3141:
1778:
1669:
1605:
1386:
1378:
1333:
1305:
1301:
1227:
1223:
5719:
5597:
5260:
5213:
5118:
5060:
5010:
4949:
4883:
4825:
4817:
4786:
4738:
4688:
4627:
4577:
4516:
4128:
4120:
4008:
3886:
3820:
3638:
3514:
3456:
3279:
3213:
2961:
2895:
2640:
2567:
2542:"Strategies of Extended Deterrence: How States Provide the Security Umbrella"
2507:
2438:
2369:
2306:
2293:
Glaser, Bonnie S.; Weiss, Jessica Chen; Christensen, Thomas J. (2023-11-30).
7300:
7220:
7044:
6692:
6447:
6215:
5926:
4777:
4764:
4065:
1843:
1462:
1390:
324:
237:
232:
222:
111:
5873:
4801:
2499:
2336:"Active Denial: Redesigning Japan's Response to China's Military Challenge"
2122:
2094:
6256:
5897:"IS IT TIME TO JUNK OUR NUKES? THE NEW WORLD DISORDER MAKES THEM OBSOLETE"
5188:"The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations"
5151:
4050:
3938:
2714:
2250:
800:
In an article celebrating Schelling's Nobel Memorial Prize for Economics,
7735:
7235:
6499:
6437:
6416:
5770:
5740:
5324:
5204:
5187:
4508:
3999:
3982:
3760:
The Logic of American Nuclear Strategy: Why Strategic Superiority Matters
3433:"Advancing without Attacking: The Strategic Game around the Use of Force"
2483:
2360:
2351:
1718:
1638:
1432:
1277:
1211:
440:
163:
128:
6738:
5334:
5068:
5044:
5002:
4136:
4104:
3894:
3862:
3828:
3796:
3177:, Washington, D.C: United States Institute of Peace Press, pp. 3–14
3173:
George, A (1991), "The General Theory and Logic of Coercive Diplomacy",
3019:
3003:
2104:
7456:
7446:
7124:
6124:
6082:
6040:
5998:
5605:
5573:
4033:
Lee, Kyung Suk; Kim, James D.; Jin, Hwalmin; Fuhrmann, Matthew (2023).
3646:
3614:
3385:
3287:
3255:
3221:
3189:
2969:
2937:
2903:
2871:
2446:
2414:
2335:
1722:
1528:
1394:
1195:
The state must not respond to false alarms of a strike by the adversary
914:
643:
threatened to launch US nuclear weapons in response to Soviet attacks.
79:
4802:"Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?"
4034:
6591:
6479:
5523:
Before and After the Fall: World Politics and the End of the Cold War
4715:"Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace"
4420:
Bar, Shmuel, (2022). "Deterrence after Ukraine—a critical analysis,"
1494:
1292:
of communism, an aggressive stance on behalf of the US especially on
1288:
The early stages of the Cold War were generally characterized by the
675:
659:
6116:
6074:
6032:
5990:
5589:
4255:"The Nautilus Institute Nuclear Strategy Project: US FOIA Documents"
3630:
3491:"Trivial Tripwires?: Military Capabilities and Alliance Reassurance"
3377:
3271:
3205:
2953:
2887:
2430:
1328:
from Vietnam, the normalization of US relations with China, and the
5380:
Perception and Misperception in International Politics: New Edition
4765:"The role of effects, saliencies and norms in US Cyberwar doctrine"
3744:"The Anatomy of Deterrence" as found in Strategy in the Missile Age
1268:
theoretical and empirical basis for notions of "nuclear learning."
569:
failed, contributes to deterrence theory. In the words of scholars
463:
context is the application of deterrence theory to avoid conflict.
7225:
6566:
6323:
5977:
Ullman, Richard H. (Summer 1989). "The Covert French Connection".
5288:
Cooperation Under Fire: Anglo-German Restraint During World War II
2802:"How Does Nuclear Deterrence Differ from Conventional Deterrence?"
1185:, there are three requirements for successful nuclear deterrence:
810:
667:
663:
36:
4172:
When Proliferation Causes Peace: The Psychology of Nuclear Crises
451:, according to which a full-scale nuclear attack on a power with
6343:
5517:
Jervis, Robert (2021), Bartel, Fritz; Monteiro, Nuno P. (eds.),
3175:
Forceful Persuasion: Coercive Diplomacy as an Alternative to War
2872:"Conventional Deterrence and Conventional Retaliation in Europe"
1693:, such as China, India, Pakistan, Britain, and France. Pursuing
1370:
1362:
1345:
in the early 2010s. Since then, relations have been less clear.
1170:
730:
550:
492:"General deterrence" is considered successful when an actor who
6742:
6260:
6623:
1911:
Introduction: Cross-Domain Deterrence, from Practice to Theory
1332:, the policy of containment was abandoned and a new policy of
192:
89:
772:: interactions tend to be between dyads (or triads) of states
553:
was founded 1949 with a role including deterring aggression.
541:
No air attack, once it is launched, can be completely stopped
5450:"A New Concert for Europe: Security and Order After the War"
5045:"Escalation Dynamics and Conflict Termination in Cyberspace"
2668:
The Use of Force: Military Power and International Politics
2053:
The Use of Force: Military Power and International Politics
726:
650:
capability. A nuclear deterrent is sometimes composed of a
2759:
NL ARMS Netherlands Annual Review of Military Studies 2020
1493:, a retired four-star U.S. Air Force general and a former
3746:, Princeton: Princeton University Press, pp. 264–304
3190:"Rational Deterrence Theory and Comparative Case Studies"
2007:
Cross-Domain Deterrence: Strategy in an Era of Complexity
736:
The other important considerations outlined by Jentleson
51:(shown at Pier 86 in New York, its home as a museum ship)
5925:
Kristensen, Hans M, Robert S Norris, and Ivan Oelrich. "
6098:"Reviewed work: On War and Morality., Robert L. Holmes"
4209:"The Limits of Nuclear Learning in the New Nuclear Age"
1312:, who is taken to be the founder of this policy in his
6014:"Reviewed work: On War and Morality, Robert L. Holmes"
1538:
There are various ways to engage in cyber deterrence:
725:
achieved if other major international actors like the
4602:
Borghard, Erica D.; Lonergan, Shawn W. (2021-08-03).
3256:"Testing Deterrence Theory: Rigor Makes a Difference"
2938:"Why the Soviets Can't Win Quickly in Central Europe"
2415:"What Makes Deterrence Work? Cases from 1900 to 1980"
2056:. Rowman & Littlefield Publishers. pp. 3–5.
678:, have only sea-based and air-based nuclear weapons.
654:, as in the case of the nuclear weapons owned by the
6205:. Baltimore: Johns Hopkins University Press. 270 pp.
3364:
Jervis, Robert (1982). "Deterrence and Perception".
3004:"THE GHOST OF MUNICH: America's Appeasement Complex"
1545:
Punishment: the imposition of costs on the adversary
784:: outcomes reflect actors' cost-benefit calculations
7744:
7703:
7485:
7429:
7211:
7113:
7020:
6878:
6777:
6680:
6632:
6430:
6387:
6362:
6316:
6307:
5937:
447:and is related to but distinct from the concept of
5639:"Don't Be So Confident in Nuclear Decision-Making"
2671:. Rowman & Littlefield Publishers. p. 3.
4035:"Nuclear Weapons and Low-Level Military Conflict"
3330:, New Haven: Yale University Press, pp. 1–34
3320:
3318:
3316:
2761:. The Hague: T.M.C. Asser Press. pp. 29–45.
1522:The deterrence of an adversary's cyber operations
5525:, Cambridge University Press, pp. 115–131,
5415:Driedger, Jonas J.; Polianskii, Mikhail (2023).
5143:Cyber Mercenaries: The State, Hackers, and Power
3489:Blankenship, Brian; Lin-Greenberg, Erik (2022).
1222:never engaged each other in warfare, but fought
6248:. Vol. 84, No. 3 (Sep, 1990), pp. 731–746.
5093:Borghard, Erica D.; Lonergan, Shawn W. (2017).
4800:Kostyuk, Nadiya; Zhukov, Yuri M. (2019-02-01).
4552:Borghard, Erica D.; Lonergan, Shawn W. (2017).
3983:"The Nuclear Balance Is What States Make of It"
2840:, Nl Arms, T.M.C. Asser Press, pp. 47–63,
2334:Heginbotham, Eric; Samuels, Richard J. (2018).
1401:, while overt support led to a ruling from the
6329:Collective Security Treaty Organization (CSTO)
6228:Complex Deterrence: Strategy In the Global Age
4273:"How Russia Is Beating the West at Deterrence"
3588:The Balance of Power and the Balance of Terror
3188:Achen, Christopher H.; Snidal, Duncan (1989).
1519:The use of cyber actions to deter other states
6754:
6272:
5741:"Nuclear endgame: The growing appeal of zero"
4926:"Constructing Norms for Global Cybersecurity"
4924:Finnemore, Martha; Hollis, Duncan B. (2016).
4860:"Constructing Norms for Global Cybersecurity"
4858:Finnemore, Martha; Hollis, Duncan B. (2016).
2150:Bombing to Win: Air Power and Coercion in War
1637:, have criticized nuclear deterrence theory.
1149:
778:: actors consider the choices of other actors
518:Costs Ă— P(Costs) > Benefits Ă— P(Benefits)
416:
8:
5801:"Documentary Advances Nuclear Free Movement"
4985:Brown, Joseph M.; Fazal, Tanisha M. (2021).
4447:, Oxford University Press, pp. 95–120,
4393:: CS1 maint: multiple names: authors list (
3927:Sechser, Todd S.; Fuhrmann, Matthew (2017).
3861:Sechser, Todd S.; Fuhrmann, Matthew (2013).
3119:
3117:
3115:
3113:
3046:
3044:
3042:
3040:
3038:
2665:Art, Robert J.; Greenhill, Kelly M. (2015).
2050:Art, Robert J.; Greenhill, Kelly M. (2015).
1705:France has developed and maintained its own
4763:Farrell, Henry; Glaser, Charles L. (2017).
3002:Logevall, Fredrik; Osgood, Kenneth (2010).
2295:"Taiwan and the True Sources of Deterrence"
1300:. The period was characterized by numerous
6761:
6747:
6739:
6313:
6279:
6265:
6257:
4991:European Journal of International Security
4364:Koster, Ben Hodges, Timo S. (2022-05-05).
3716:. The Henry Stimson Center. Archived from
2595:. Princeton University Press. p. 20.
1156:
1142:
913:
902:
423:
409:
54:
6344:North Atlantic Treaty Organization (NATO)
6244:"Nuclear Myths and Political Realities".
5709:
5432:
5203:
5146:. Cambridge: Cambridge University Press.
4864:The American Journal of International Law
4776:
4665:"Stuxnet and the Limits of Cyber Warfare"
4493:"Deterrence and Dissuasion in Cyberspace"
3998:
3933:. Cambridge: Cambridge University Press.
3863:"Crisis Bargaining and Nuclear Blackmail"
3064:
2845:
2784:
2557:
2359:
1353:A third shift occurred with US President
6168:Schultz, George P. and Goodby, James E.
5668:"The Psychology of Nuclear Brinkmanship"
3615:"Why Nuclear Superiority Doesn't Matter"
2199:. Cornell University Press. p. 23.
2153:(1 ed.). Cornell University Press.
753:). Rational deterrence theory entails:
6349:Shanghai Cooperation Organisation (SCO)
4713:Gartzke, Erik; Lindsay, Jon R. (2015).
3550:The Spread of Nuclear Weapons: A Debate
3124:Jentleson, B.A.; Whytock, C.A. (2005),
2709:. Cornell University Press. p. 1.
2245:. Cornell University Press. p. 6.
2004:Gartzke, Eric; Lindsay, Jon R. (2019).
1908:Lindsay, Jon R.; Gartzke, Erik (2019).
1887:(first ed.). Osprey. p. 108.
1875:
1863:and requires rational decision makers."
1855:
1276:The US policy of deterrence during the
1036:
921:
905:
510:This model is frequently simplified in
291:
255:
207:
162:
146:
64:
57:
4980:
4978:
4758:
4756:
4708:
4706:
4658:
4656:
4441:"Deterrence in and through Cyberspace"
4386:
4336:"What Russia Got by Scaring Elon Musk"
4329:
4327:
3930:Nuclear Weapons and Coercive Diplomacy
1914:. Oxford University Press. p. 2.
1425:Essentials of Post–Cold War Deterrence
335:Forum (alternative dispute resolution)
7833:Deterrence theory during the Cold War
6246:The American Political Science Review
6063:The American Political Science Review
5949:. April 2009. Accessed July 31, 2010.
5781:from the original on December 3, 2011
5751:from the original on December 3, 2011
5095:"The Logic of Coercion in Cyberspace"
4930:American Journal of International Law
4597:
4595:
4554:"The Logic of Coercion in Cyberspace"
4547:
4545:
4486:
4484:
4482:
4434:
4432:
4430:
3547:Sagan, Scott; Waltz, Kenneth (1995).
3397:
3395:
2477:
2475:
2408:
2406:
2404:
2402:
2400:
2398:
2329:
2327:
2088:
2086:
2084:
1965:. SAGE Publications. pp. 26–30.
842:Credibility (international relations)
482:or the use of full force in wartime.
7:
6230:(University of Chicago Press, 2009)
4604:"Deterrence by denial in cyberspace"
1999:
1997:
1995:
1993:
1954:
1952:
1950:
5967:32, no. 3 (September 1988): p. 424.
5479:Green, Brendan Rittenhouse (2020).
3254:Huth, Paul; Russett, Bruce (1990).
2413:Huth, Paul; Russett, Bruce (1984).
1685:form of deterrence, the concept of
6810:First-player and second-player win
6422:International relations since 1989
6412:Diplomatic history of World War II
6334:International Criminal Court (ICC)
6138:Holmes, Robert L. (14 July 2014).
4453:10.1093/oso/9780190908645.003.0005
4109:The Journal of Conflict Resolution
3053:Annual Review of Political Science
2706:Israel and Conventional Deterrence
2592:Analyzing Strategic Nuclear Policy
2484:"Selection Effects and Deterrence"
2242:Israel and Conventional Deterrence
2016:10.1093/oso/9780190908645.001.0001
1920:10.1093/oso/9780190908645.003.0001
1280:underwent significant variations.
1173:submarines, Schelling argues that
766:: actors are understood as unitary
593:research for at least 2000 years.
25:
6718:International political sociology
6170:The War that Must Never be Fought
5939:Federation of American Scientists
5907:from the original on July 2, 2019
5869:Bulletin of the Atomic Scientists
3341:"A Nobel Laureate Who's Got Game"
1962:Deterrence: A Conceptual Analysis
1475:Starlink communications in Crimea
1272:Stages of US policy of deterrence
6917:Coalition-proof Nash equilibrium
5961:. "Minimal Nuclear Deterrence."
4439:Schneider, Jacquelyn G. (2019),
1465:prevented Ukraine from carrying
1452:2022 Russian invasion of Ukraine
1419:achieve military superiority.".
6713:International political economy
5841:from the original on 2014-02-13
5811:from the original on 2023-04-05
5698:Journal of Theoretical Politics
5678:from the original on 2023-03-04
5649:from the original on 2023-07-07
5620:from the original on 2022-02-14
5555:from the original on 2024-02-24
5499:from the original on 2024-02-24
5397:from the original on 2024-02-24
5359:from the original on 2024-02-24
5305:from the original on 2023-04-05
5168:from the original on 2021-11-07
5075:from the original on 2021-11-06
5025:from the original on 2021-11-06
4964:from the original on 2021-11-07
4906:from the original on 2021-11-07
4892:10.5305/amerjintelaw.110.3.0425
4840:from the original on 2022-02-25
4642:from the original on 2021-11-06
4531:from the original on 2021-01-26
4469:from the original on 2021-11-06
4376:from the original on 2023-07-16
4366:"NATO Must Re-Learn Deterrence"
4346:from the original on 2023-09-16
4313:from the original on 2023-09-22
4283:from the original on 2023-06-05
4237:from the original on 2023-08-31
4189:from the original on 2023-12-01
4175:. Georgetown University Press.
4151:from the original on 2023-08-31
4039:International Studies Quarterly
3963:from the original on 2022-03-20
3909:from the original on 2022-05-07
3843:from the original on 2022-01-26
3777:from the original on 2023-04-10
3691:from the original on 2022-10-26
3653:from the original on 2022-01-28
3595:from the original on 2023-04-05
3567:from the original on 2023-04-10
3529:from the original on 2024-02-24
3471:from the original on 2024-02-24
3413:from the original on 2021-06-02
3302:from the original on 2021-09-11
3236:from the original on 2021-09-08
3156:from the original on 2021-04-26
3099:from the original on 2023-04-10
2984:from the original on 2021-09-05
2918:from the original on 2021-09-05
2818:from the original on 2021-10-25
2739:from the original on 2021-09-06
2685:from the original on 2024-02-24
2647:from the original on 2019-12-12
2629:"The General and World War III"
2609:from the original on 2023-04-10
2522:from the original on 2024-02-24
2461:from the original on 2021-09-11
2384:from the original on 2024-02-24
2313:from the original on 2023-12-01
2275:from the original on 2021-09-06
2221:from the original on 2023-04-05
2175:from the original on 2021-08-30
2129:from the original on 2022-05-19
2070:from the original on 2024-02-24
2032:from the original on 2021-08-30
1979:from the original on 2024-02-24
1936:from the original on 2021-08-30
670:. Other countries, such as the
7878:Subfields of political science
7843:International relations theory
6927:Evolutionarily stable strategy
6144:. Princeton University Press.
5964:Journal of Conflict Resolution
5485:. Cambridge University Press.
5383:. Princeton University Press.
5329:. Princeton University Press.
4806:Journal of Conflict Resolution
4334:Applebaum, Anne (2023-09-11).
3407:Texas National Security Review
3326:Schelling, T. C. (1966), "2",
3085:. Princeton University Press.
3066:10.1146/annurev.polisci.2.1.25
2870:Huntington, Samuel P. (1983).
2627:Rhodes, Richard (1995-06-11).
1702:its nuclear arsenal secretly.
1443:
1403:International Court of Justice
827:Signaling and bargaining power
300:Alternative dispute resolution
1:
6855:Simultaneous action selection
6212:. Cambridge University Press.
5777:. June 18, 2011. p. 66.
5466:10.1080/0163660X.2023.2192137
5434:10.1080/13523260.2023.2259153
5253:10.1080/01402390.2019.1631811
5111:10.1080/09636412.2017.1306396
4731:10.1080/09636412.2015.1038188
4620:10.1080/01402390.2021.1944856
4570:10.1080/09636412.2017.1306396
4213:The Fragile Balance of Terror
3742:Brodie, Bernard (1959), "8",
3585:Snyder, Glenn Herald (1965).
3507:10.1080/09636412.2022.2038662
3449:10.1080/09636412.2017.1360074
2936:Mearsheimer, John J. (1982).
2559:10.1080/09636412.2021.2010887
2193:Mearsheimer, John J. (1983).
2093:Schelling, Thomas C. (1966).
1405:against the United States in
1207:stability–instability paradox
18:Independent nuclear deterrent
7787:List of games in game theory
6967:Quantal response equilibrium
6957:Perfect Bayesian equilibrium
6892:Bayes correlated equilibrium
6681:Related fields and subfields
5831:"Cold Warriors say no nukes"
5771:"The Growing Appeal of Zero"
5421:Contemporary Security Policy
5291:. Cornell University Press.
5241:Journal of Strategic Studies
5186:Maschmeyer, Lennart (2021).
4681:10.1080/09636412.2013.816122
4608:Journal of Strategic Studies
4301:Darcy, Oliver (2023-09-12).
3677:. Cornell University Press.
2703:Shimshoni, Jonathan (1988).
2239:Shimshoni, Jonathan (1988).
1759:Confidence-building measures
1683:mutually assured destruction
1533:2015 Ukraine power grid hack
1473:by denying to enable needed
637:mutually assured destruction
7256:Optional prisoner's dilemma
6987:Self-confirming equilibrium
5049:Strategic Studies Quarterly
3763:. Oxford University Press.
3619:Political Science Quarterly
3553:. W.W. Norton. p. 20.
2847:10.1007/978-94-6265-419-8_4
2809:Strategic Studies Quarterly
2767:10.1007/978-94-6265-419-8_3
2589:Glaser, Charles L. (1990).
2010:. Oxford University Press.
1959:Morgan, Patrick M. (1977).
1598:Russian invasion of Ukraine
7894:
7873:Peace and conflict studies
7721:Principal variation search
7437:Aumann's agreement theorem
7100:Strategy-stealing argument
7012:Trembling hand equilibrium
6942:Markov perfect equilibrium
6937:Mertens-stable equilibrium
6723:Peace and conflict studies
6339:Non-Aligned Movement (NAM)
6183:Freedman, Lawrence. 2004.
5829:Ben Goddard (2010-01-27).
5235:Talmadge, Caitlin (2019).
4169:Cohen, Michael D. (2017).
4103:Horowitz, Michael (2009).
3867:International Organization
3801:International Organization
2488:International Interactions
1725:grounds. Scholars such as
1681:As opposed to the extreme
1588:
1504:
1408:Nicaragua v. United States
1339:mutual assured destruction
895:Mutual assured destruction
884:
839:
745:Rational deterrence theory
627:Furthermore, as Jentleson
449:mutual assured destruction
443:with regard to the use of
367:Peace and conflict studies
274:Mutual assured destruction
29:
7757:Combinatorial game theory
7416:Princess and monster game
6972:Quasi-perfect equilibrium
6897:Bayesian Nash equilibrium
6294:
6203:Psychology and Deterrence
6187:. New York: Polity Press.
6054:Rock, Stephen R. (1989).
6012:Meyers, Diana T. (1992).
5531:10.1017/9781108910194.008
4942:10.1017/S0002930000016894
4876:10.1017/S0002930000016894
4082:10.1177/00223433211067899
4070:Journal of Peace Research
3879:10.1017/S0020818312000392
3813:10.1017/S0020818312000367
3795:Kroenig, Matthew (2013).
3757:Kroenig, Matthew (2018).
3328:The Diplomacy of Violence
3142:10.1162/isec.2005.30.3.47
3079:Snyder, Glenn H. (1966).
2099:. Yale University Press.
1612:Misprediction of behavior
1604:can be seen as rewarding
881:Nuclear deterrence theory
782:Cost-benefit calculations
527:By November 1945 general
7838:Geopolitical terminology
7772:Evolutionary game theory
7505:Antoine Augustin Cournot
7391:Guess 2/3 of the average
7188:Strictly determined game
6982:Satisfaction equilibrium
6800:Escalation of commitment
6021:The Philosophical Review
5720:10.1177/0951629804041117
5572:Sagan, Scott D. (1994).
5454:The Washington Quarterly
4818:10.1177/0022002717737138
4769:Journal of Cybersecurity
4663:Lindsay, Jon R. (2013).
4121:10.1177/0022002708330388
3981:Logan, David C. (2022).
2147:Pape, Robert A. (1996).
1885:A Dictionary of Aviation
1883:Wragg, David W. (1973).
1450:By the beginning of the
1397:in Nicaragua led to the
1198:The state must maintain
764:Unitary actor assumption
537:Ohio Society of New York
453:second-strike capability
362:Non-aggression principle
320:Conflict style inventory
124:Nonviolent Communication
7777:Glossary of game theory
7376:Stackelberg competition
7002:Strong Nash equilibrium
6698:Foreign policy analysis
6510:International community
6288:International relations
6208:Morgan, Patrick. 2003.
5864:"The new abolitionists"
5377:Jervis, Robert (1976).
5323:Carson, Austin (2018).
4491:Nye, Joseph S. (2017).
4445:Cross-Domain Deterrence
4231:10.7591/j.ctv310vm0j.11
3671:Jervis, Robert (1989).
3613:Jervis, Robert (1979).
2196:Conventional Deterrence
1769:International relations
836:Reputations for resolve
792:The American economist
461:international relations
209:International relations
139:Speaking truth to power
7848:International security
7802:Tragedy of the commons
7782:List of game theorists
7762:Confrontation analysis
7472:Sprague–Grundy theorem
6992:Sequential equilibrium
6912:Correlated equilibrium
5901:washingtonpost dot com
5672:International Security
5578:International Security
5448:Jung, Karsten (2023).
5192:International Security
4497:International Security
4064:Suh, Kyungwon (2022).
3987:International Security
3366:International Security
3130:International Security
3082:Deterrence and Defense
2942:International Security
2876:International Security
2540:Lee, Do Young (2021).
2500:10.1080/03050620210390
2482:Fearon, James (2002).
2340:International Security
1819:Peace through strength
1591:Salami slicing tactics
776:Strategic interactions
591:international security
520:
508:
52:
7575:Jean-François Mertens
5152:10.1017/9781316422724
5043:Lin, Herbert (2012).
4778:10.1093/cybsec/tyw015
3939:10.1017/9781316227305
2800:Wirtz, James (2018).
2715:10.7591/9781501737831
2251:10.7591/9781501737831
1691:nuclear weapon states
1657:Nuclear Tipping Point
1491:Philip Breedlove
1393:. The funding of the
760:: actors are rational
516:
504:
284:Nuclear proliferation
40:
32:Deterrence (penology)
7828:Cold War terminology
7704:Search optimizations
7580:Jennifer Tour Chayes
7467:Revelation principle
7462:Purification theorem
7401:Nash bargaining game
7366:Bertrand competition
7351:El Farol Bar problem
7316:Electronic mail game
7281:Lewis signaling game
6825:Hierarchy of beliefs
6688:Comparative politics
6096:Lee, Steven (1992).
5205:10.1162/isec_a_00418
5140:Maurer, Tim (2018).
4509:10.1162/isec_a_00266
4261:on December 8, 2008.
4000:10.1162/isec_a_00434
3431:Altman, Dan (2018).
2352:10.1162/isec_a_00313
2215:10.7591/j.ctt1rv61v2
2169:10.7591/j.ctt1287f6v
1038:Nuclear-armed states
715:Coercive credibility
706:Secondly, Jentleson
350:Paradox of tolerance
7752:Bounded rationality
7371:Cournot competition
7321:Rock paper scissors
7296:Battle of the sexes
7286:Volunteer's dilemma
7158:Perfect information
7085:Dominant strategies
6922:Epsilon-equilibrium
6805:Extensive-form game
6470:Collective security
6354:United Nations (UN)
6141:On War and Morality
5876:on 17 February 2014
5335:10.2307/j.ctv346p45
5003:10.1017/eis.2021.18
4051:10.1093/isq/sqac067
3354:, October 12, 2005.
3352:The Washington Post
2105:10.2307/j.ctt5vm52s
1764:Decapitation strike
1631:nuclear disarmament
1585:Deterrence failures
1571:Intrawar deterrence
1298:sphere of influence
1200:command and control
891:Massive retaliation
641:massive retaliation
613:territorial dispute
531:, who led American
279:Nuclear disarmament
178:Conflict escalation
155:Conflict management
59:Conflict resolution
7731:Paranoid algorithm
7711:Alpha–beta pruning
7590:John Maynard Smith
7421:Rendezvous problem
7261:Traveler's dilemma
7251:Gift-exchange game
7246:Prisoner's dilemma
7163:Large Poisson game
7130:Bargaining problem
7035:Backward induction
7007:Subgame perfection
6962:Proper equilibrium
5945:2017-09-21 at the
5932:2015-06-20 at the
5903:. WP Company LLC.
3346:2019-09-25 at the
2096:Arms and Influence
1824:Prisoner's dilemma
1754:Chainstore paradox
1713:Ethical objections
1695:minimal deterrence
1687:minimum deterrence
1677:Minimum deterrence
1665:Stronger deterrent
1619:perfect deterrence
1437:biological weapons
1429:pre-emptive action
1399:Iran-Contra Affair
1377:, support for the
1294:developing nations
855:Interests at stake
722:economic sanctions
598:Arms and Influence
533:air raids on Japan
397:Track II diplomacy
345:Prisoner's dilemma
315:Conflict continuum
310:Conflict avoidance
95:Dispute resolution
53:
7853:Military strategy
7823:Cold War policies
7810:
7809:
7716:Aspiration window
7685:Suzanne Scotchmer
7640:Oskar Morgenstern
7535:Donald B. Gillies
7477:Zermelo's theorem
7406:Induction puzzles
7361:Fair cake-cutting
7336:Public goods game
7266:Coordination game
7140:Intransitive game
7070:Forward induction
6952:Pareto efficiency
6932:Gibbs equilibrium
6902:Berge equilibrium
6850:Simultaneous game
6736:
6735:
6708:International law
6577:Right of conquest
6542:National interest
6485:Deterrence theory
6383:
6382:
6370:League of Nations
6242:Waltz, Kenneth N.
6236:978-0-226-65002-9
6220:Patrick M. Morgan
6178:978-0-8179-1845-3
6151:978-1-4008-6014-2
5862:(30 March 2012).
5747:. June 16, 2011.
5540:978-1-108-90677-7
5519:"The Nuclear Age"
5492:978-1-108-48986-7
5390:978-1-4008-8511-4
5344:978-0-691-18424-1
5298:978-0-8014-2938-5
5161:978-1-107-12760-9
4462:978-0-19-090864-5
4409:Radio Free Europe
4222:978-1-5017-6701-2
4182:978-1-62616-495-6
3948:978-1-107-10694-9
3770:978-0-19-084918-4
3723:on 12 August 2017
3709:Krepon, Michael.
3684:978-0-8014-9565-6
3560:978-0-393-03810-1
3092:978-1-4008-7716-4
2857:978-94-6265-419-8
2776:978-94-6265-418-1
2724:978-1-5017-3783-1
2678:978-1-4422-3306-5
2602:978-1-4008-6202-3
2260:978-1-5017-3783-1
2206:978-1-5017-1325-5
2160:978-0-8014-3134-0
2114:978-0-300-00221-8
2063:978-1-4422-3306-5
2025:978-0-19-090960-4
1972:978-0-8039-0819-2
1929:978-0-19-090960-4
1809:Nuclear terrorism
1789:Nuclear blackmail
1774:Launch on warning
1749:Balance of terror
1707:nuclear deterrent
1699:nuclear stockpile
1423:document called "
1416:Mikhail Gorbachev
1330:Sino-Soviet Split
1166:
1165:
930:Nuclear explosion
899:Flexible response
579:US foreign policy
575:American politics
571:Frederik Logevall
547:nuclear weapons.
436:Deterrence theory
433:
432:
305:Anti-war movement
269:Nuclear blackmail
173:Communal violence
49:Regulus I missile
16:(Redirected from
7885:
7863:Nuclear strategy
7797:Topological game
7792:No-win situation
7690:Thomas Schelling
7670:Robert B. Wilson
7630:Merrill M. Flood
7600:John von Neumann
7510:Ariel Rubinstein
7495:Albert W. Tucker
7346:War of attrition
7306:Matching pennies
6947:Nash equilibrium
6870:Mechanism design
6835:Normal-form game
6790:Cooperative game
6763:
6756:
6749:
6740:
6728:Security studies
6520:Internationality
6515:Internationalism
6314:
6281:
6274:
6267:
6258:
6195:Richard N. Lebow
6172:, Hoover Press,
6156:
6155:
6135:
6129:
6128:
6102:
6093:
6087:
6086:
6069:(4): 1447–1448.
6060:
6051:
6045:
6044:
6018:
6009:
6003:
6002:
5974:
5968:
5956:
5950:
5923:
5917:
5916:
5914:
5912:
5892:
5886:
5885:
5883:
5881:
5872:. Archived from
5856:
5850:
5849:
5847:
5846:
5826:
5820:
5819:
5817:
5816:
5797:
5791:
5790:
5788:
5786:
5767:
5761:
5760:
5758:
5756:
5737:
5731:
5730:
5713:
5693:
5687:
5686:
5684:
5683:
5664:
5658:
5657:
5655:
5654:
5635:
5629:
5628:
5626:
5625:
5569:
5563:
5562:
5561:
5560:
5514:
5508:
5507:
5505:
5504:
5476:
5470:
5469:
5445:
5439:
5438:
5436:
5412:
5406:
5405:
5403:
5402:
5374:
5368:
5367:
5365:
5364:
5320:
5314:
5313:
5311:
5310:
5279:
5273:
5272:
5232:
5226:
5225:
5207:
5183:
5177:
5176:
5174:
5173:
5137:
5131:
5130:
5099:Security Studies
5090:
5084:
5083:
5081:
5080:
5040:
5034:
5033:
5031:
5030:
4982:
4973:
4972:
4970:
4969:
4921:
4915:
4914:
4912:
4911:
4855:
4849:
4848:
4846:
4845:
4797:
4791:
4790:
4780:
4760:
4751:
4750:
4719:Security Studies
4710:
4701:
4700:
4669:Security Studies
4660:
4651:
4650:
4648:
4647:
4599:
4590:
4589:
4558:Security Studies
4549:
4540:
4539:
4537:
4536:
4488:
4477:
4476:
4475:
4474:
4436:
4425:
4418:
4412:
4405:
4399:
4398:
4392:
4384:
4382:
4381:
4361:
4355:
4354:
4352:
4351:
4331:
4322:
4321:
4319:
4318:
4298:
4292:
4291:
4289:
4288:
4269:
4263:
4262:
4257:. Archived from
4251:
4245:
4244:
4243:
4242:
4204:
4198:
4197:
4195:
4194:
4166:
4160:
4159:
4157:
4156:
4100:
4094:
4093:
4061:
4055:
4054:
4030:
4024:
4023:
4002:
3978:
3972:
3971:
3969:
3968:
3924:
3918:
3917:
3915:
3914:
3858:
3852:
3851:
3849:
3848:
3792:
3786:
3785:
3783:
3782:
3754:
3748:
3747:
3739:
3733:
3732:
3730:
3728:
3722:
3715:
3706:
3700:
3699:
3697:
3696:
3668:
3662:
3661:
3659:
3658:
3610:
3604:
3603:
3601:
3600:
3582:
3576:
3575:
3573:
3572:
3544:
3538:
3537:
3535:
3534:
3495:Security Studies
3486:
3480:
3479:
3477:
3476:
3437:Security Studies
3428:
3422:
3421:
3419:
3418:
3399:
3390:
3389:
3361:
3355:
3338:
3332:
3331:
3322:
3311:
3310:
3308:
3307:
3251:
3245:
3244:
3242:
3241:
3185:
3179:
3178:
3170:
3164:
3163:
3162:
3161:
3121:
3108:
3107:
3105:
3104:
3076:
3070:
3069:
3068:
3048:
3033:
3030:
3024:
3023:
2999:
2993:
2992:
2990:
2989:
2933:
2927:
2926:
2924:
2923:
2867:
2861:
2860:
2849:
2833:
2827:
2826:
2824:
2823:
2817:
2806:
2797:
2791:
2790:
2788:
2754:
2748:
2747:
2745:
2744:
2700:
2694:
2693:
2691:
2690:
2662:
2656:
2655:
2653:
2652:
2624:
2618:
2617:
2615:
2614:
2586:
2580:
2579:
2561:
2546:Security Studies
2537:
2531:
2530:
2528:
2527:
2479:
2470:
2469:
2467:
2466:
2410:
2393:
2392:
2390:
2389:
2363:
2331:
2322:
2321:
2319:
2318:
2290:
2284:
2283:
2281:
2280:
2236:
2230:
2229:
2227:
2226:
2190:
2184:
2183:
2181:
2180:
2144:
2138:
2137:
2135:
2134:
2090:
2079:
2078:
2076:
2075:
2047:
2041:
2040:
2038:
2037:
2001:
1988:
1987:
1985:
1984:
1956:
1945:
1944:
1942:
1941:
1905:
1899:
1898:
1880:
1864:
1860:
1834:Security dilemma
1804:Nuclear strategy
1727:Robert L. Holmes
1602:Frozen conflicts
1501:Cyber deterrence
1483:attack on Crimea
1446:-Cold War period
1445:
1310:George F. Kennan
1158:
1151:
1144:
1095:
989:Target selection
917:
903:
887:Nuclear strategy
818:Military balance
794:Thomas Schelling
563:Lesson of Munich
425:
418:
411:
55:
21:
7893:
7892:
7888:
7887:
7886:
7884:
7883:
7882:
7868:Nuclear warfare
7858:Military ethics
7813:
7812:
7811:
7806:
7740:
7726:max^n algorithm
7699:
7695:William Vickrey
7655:Reinhard Selten
7610:Kenneth Binmore
7525:David K. Levine
7520:Daniel Kahneman
7487:
7481:
7457:Negamax theorem
7447:Minimax theorem
7425:
7386:Diner's dilemma
7241:All-pay auction
7207:
7193:Stochastic game
7145:Mean-field game
7116:
7109:
7080:Markov strategy
7016:
6882:
6874:
6845:Sequential game
6830:Information set
6815:Game complexity
6785:Congestion game
6773:
6767:
6737:
6732:
6676:
6667:Postcolonialism
6628:
6557:Non-state actor
6552:Non-belligerent
6547:Neutral country
6532:Interventionism
6465:Co-belligerence
6426:
6379:
6358:
6303:
6290:
6285:
6255:
6199:Janice G. Stein
6165:
6163:Further reading
6160:
6159:
6152:
6137:
6136:
6132:
6117:10.2307/2216042
6100:
6095:
6094:
6090:
6075:10.2307/1961738
6058:
6053:
6052:
6048:
6033:10.2307/2185583
6016:
6011:
6010:
6006:
5991:10.2307/1148862
5976:
5975:
5971:
5959:Nalebuff, Barry
5957:
5953:
5947:Wayback Machine
5934:Wayback Machine
5924:
5920:
5910:
5908:
5894:
5893:
5889:
5879:
5877:
5858:
5857:
5853:
5844:
5842:
5828:
5827:
5823:
5814:
5812:
5799:
5798:
5794:
5784:
5782:
5769:
5768:
5764:
5754:
5752:
5739:
5738:
5734:
5711:10.1.1.335.7353
5695:
5694:
5690:
5681:
5679:
5666:
5665:
5661:
5652:
5650:
5637:
5636:
5632:
5623:
5621:
5590:10.2307/2539178
5571:
5570:
5566:
5558:
5556:
5541:
5516:
5515:
5511:
5502:
5500:
5493:
5478:
5477:
5473:
5447:
5446:
5442:
5414:
5413:
5409:
5400:
5398:
5391:
5376:
5375:
5371:
5362:
5360:
5345:
5322:
5321:
5317:
5308:
5306:
5299:
5281:
5280:
5276:
5234:
5233:
5229:
5185:
5184:
5180:
5171:
5169:
5162:
5139:
5138:
5134:
5092:
5091:
5087:
5078:
5076:
5042:
5041:
5037:
5028:
5026:
4984:
4983:
4976:
4967:
4965:
4923:
4922:
4918:
4909:
4907:
4857:
4856:
4852:
4843:
4841:
4799:
4798:
4794:
4762:
4761:
4754:
4712:
4711:
4704:
4662:
4661:
4654:
4645:
4643:
4601:
4600:
4593:
4551:
4550:
4543:
4534:
4532:
4490:
4489:
4480:
4472:
4470:
4463:
4438:
4437:
4428:
4419:
4415:
4406:
4402:
4385:
4379:
4377:
4363:
4362:
4358:
4349:
4347:
4333:
4332:
4325:
4316:
4314:
4300:
4299:
4295:
4286:
4284:
4271:
4270:
4266:
4253:
4252:
4248:
4240:
4238:
4223:
4206:
4205:
4201:
4192:
4190:
4183:
4168:
4167:
4163:
4154:
4152:
4102:
4101:
4097:
4063:
4062:
4058:
4032:
4031:
4027:
3980:
3979:
3975:
3966:
3964:
3949:
3926:
3925:
3921:
3912:
3910:
3860:
3859:
3855:
3846:
3844:
3794:
3793:
3789:
3780:
3778:
3771:
3756:
3755:
3751:
3741:
3740:
3736:
3726:
3724:
3720:
3713:
3708:
3707:
3703:
3694:
3692:
3685:
3670:
3669:
3665:
3656:
3654:
3631:10.2307/2149629
3612:
3611:
3607:
3598:
3596:
3584:
3583:
3579:
3570:
3568:
3561:
3546:
3545:
3541:
3532:
3530:
3488:
3487:
3483:
3474:
3472:
3430:
3429:
3425:
3416:
3414:
3401:
3400:
3393:
3378:10.2307/2538549
3363:
3362:
3358:
3348:Wayback Machine
3339:
3335:
3325:
3323:
3314:
3305:
3303:
3272:10.2307/2010511
3253:
3252:
3248:
3239:
3237:
3206:10.2307/2010405
3187:
3186:
3182:
3172:
3171:
3167:
3159:
3157:
3126:"Who Won Libya"
3123:
3122:
3111:
3102:
3100:
3093:
3078:
3077:
3073:
3050:
3049:
3036:
3031:
3027:
3001:
3000:
2996:
2987:
2985:
2954:10.2307/2538686
2935:
2934:
2930:
2921:
2919:
2888:10.2307/2538699
2869:
2868:
2864:
2858:
2835:
2834:
2830:
2821:
2819:
2815:
2804:
2799:
2798:
2794:
2777:
2756:
2755:
2751:
2742:
2740:
2725:
2702:
2701:
2697:
2688:
2686:
2679:
2664:
2663:
2659:
2650:
2648:
2626:
2625:
2621:
2612:
2610:
2603:
2588:
2587:
2583:
2539:
2538:
2534:
2525:
2523:
2481:
2480:
2473:
2464:
2462:
2431:10.2307/2010184
2412:
2411:
2396:
2387:
2385:
2333:
2332:
2325:
2316:
2314:
2299:Foreign Affairs
2292:
2291:
2287:
2278:
2276:
2261:
2238:
2237:
2233:
2224:
2222:
2207:
2192:
2191:
2187:
2178:
2176:
2161:
2146:
2145:
2141:
2132:
2130:
2115:
2092:
2091:
2082:
2073:
2071:
2064:
2049:
2048:
2044:
2035:
2033:
2026:
2003:
2002:
1991:
1982:
1980:
1973:
1958:
1957:
1948:
1939:
1937:
1930:
1907:
1906:
1902:
1895:
1882:
1881:
1877:
1872:
1867:
1861:
1857:
1853:
1848:
1829:Reagan Doctrine
1814:Nuclear warfare
1744:
1715:
1679:
1667:
1647:Henry Kissinger
1627:
1625:Suicide attacks
1614:
1593:
1587:
1582:
1573:
1513:
1505:Main articles:
1503:
1471:Black Sea fleet
1469:on the Russian
1448:
1351:
1322:
1286:
1274:
1175:nuclear weapons
1162:
1113:
1093:
1083:
1052:
907:Nuclear weapons
901:
885:Main articles:
883:
870:
857:
844:
838:
829:
820:
807:Washington Post
802:Michael Kinsley
747:
717:
704:
684:
682:Proportionality
587:
525:
445:nuclear weapons
429:
357:Liaison officer
264:Nuclear warfare
248:Multilateralism
188:Just war theory
35:
28:
23:
22:
15:
12:
11:
5:
7891:
7889:
7881:
7880:
7875:
7870:
7865:
7860:
7855:
7850:
7845:
7840:
7835:
7830:
7825:
7815:
7814:
7808:
7807:
7805:
7804:
7799:
7794:
7789:
7784:
7779:
7774:
7769:
7764:
7759:
7754:
7748:
7746:
7742:
7741:
7739:
7738:
7733:
7728:
7723:
7718:
7713:
7707:
7705:
7701:
7700:
7698:
7697:
7692:
7687:
7682:
7677:
7672:
7667:
7662:
7660:Robert Axelrod
7657:
7652:
7647:
7642:
7637:
7635:Olga Bondareva
7632:
7627:
7625:Melvin Dresher
7622:
7617:
7615:Leonid Hurwicz
7612:
7607:
7602:
7597:
7592:
7587:
7582:
7577:
7572:
7567:
7562:
7557:
7552:
7550:Harold W. Kuhn
7547:
7542:
7540:Drew Fudenberg
7537:
7532:
7530:David M. Kreps
7527:
7522:
7517:
7515:Claude Shannon
7512:
7507:
7502:
7497:
7491:
7489:
7483:
7482:
7480:
7479:
7474:
7469:
7464:
7459:
7454:
7452:Nash's theorem
7449:
7444:
7439:
7433:
7431:
7427:
7426:
7424:
7423:
7418:
7413:
7408:
7403:
7398:
7393:
7388:
7383:
7378:
7373:
7368:
7363:
7358:
7353:
7348:
7343:
7338:
7333:
7328:
7323:
7318:
7313:
7311:Ultimatum game
7308:
7303:
7298:
7293:
7291:Dollar auction
7288:
7283:
7278:
7276:Centipede game
7273:
7268:
7263:
7258:
7253:
7248:
7243:
7238:
7233:
7231:Infinite chess
7228:
7223:
7217:
7215:
7209:
7208:
7206:
7205:
7200:
7198:Symmetric game
7195:
7190:
7185:
7183:Signaling game
7180:
7178:Screening game
7175:
7170:
7168:Potential game
7165:
7160:
7155:
7147:
7142:
7137:
7132:
7127:
7121:
7119:
7111:
7110:
7108:
7107:
7102:
7097:
7095:Mixed strategy
7092:
7087:
7082:
7077:
7072:
7067:
7062:
7057:
7052:
7047:
7042:
7037:
7032:
7026:
7024:
7018:
7017:
7015:
7014:
7009:
7004:
6999:
6994:
6989:
6984:
6979:
6977:Risk dominance
6974:
6969:
6964:
6959:
6954:
6949:
6944:
6939:
6934:
6929:
6924:
6919:
6914:
6909:
6904:
6899:
6894:
6888:
6886:
6876:
6875:
6873:
6872:
6867:
6862:
6857:
6852:
6847:
6842:
6837:
6832:
6827:
6822:
6820:Graphical game
6817:
6812:
6807:
6802:
6797:
6792:
6787:
6781:
6779:
6775:
6774:
6768:
6766:
6765:
6758:
6751:
6743:
6734:
6733:
6731:
6730:
6725:
6720:
6715:
6710:
6705:
6700:
6695:
6690:
6684:
6682:
6678:
6677:
6675:
6674:
6669:
6664:
6659:
6654:
6649:
6647:English school
6644:
6642:Constructivism
6638:
6636:
6630:
6629:
6627:
6626:
6621:
6620:
6619:
6614:
6612:Non-aggression
6609:
6604:
6599:
6589:
6584:
6579:
6574:
6569:
6564:
6559:
6554:
6549:
6544:
6539:
6534:
6529:
6528:
6527:
6522:
6512:
6507:
6502:
6497:
6492:
6487:
6482:
6477:
6472:
6467:
6462:
6457:
6456:
6455:
6450:
6445:
6434:
6432:
6428:
6427:
6425:
6424:
6419:
6414:
6409:
6404:
6399:
6393:
6391:
6385:
6384:
6381:
6380:
6378:
6377:
6372:
6366:
6364:
6360:
6359:
6357:
6356:
6351:
6346:
6341:
6336:
6331:
6326:
6320:
6318:
6311:
6305:
6304:
6302:
6301:
6295:
6292:
6291:
6286:
6284:
6283:
6276:
6269:
6261:
6254:
6253:External links
6251:
6250:
6249:
6239:
6224:James J. Wirtz
6213:
6210:Deterrence Now
6206:
6191:Jervis, Robert
6188:
6181:
6164:
6161:
6158:
6157:
6150:
6130:
6111:(4): 559–562.
6088:
6046:
6027:(2): 481–484.
6004:
5979:Foreign Policy
5969:
5951:
5918:
5887:
5860:Hugh Gusterson
5851:
5821:
5792:
5762:
5732:
5704:(2): 107–141,
5688:
5659:
5645:. 2023-02-26.
5630:
5564:
5539:
5509:
5491:
5471:
5440:
5427:(4): 544–560.
5407:
5389:
5369:
5343:
5315:
5297:
5283:Legro, Jeffrey
5274:
5247:(6): 864–887.
5227:
5178:
5160:
5132:
5105:(3): 452–481.
5085:
5035:
4997:(4): 401–417.
4974:
4936:(3): 425–479.
4916:
4870:(3): 425–479.
4850:
4812:(2): 317–347.
4792:
4752:
4725:(2): 316–348.
4702:
4675:(3): 365–404.
4652:
4614:(3): 534–569.
4591:
4564:(3): 452–481.
4541:
4478:
4461:
4426:
4413:
4400:
4356:
4323:
4293:
4279:. 2022-03-09.
4264:
4246:
4221:
4199:
4181:
4161:
4115:(2): 234–257.
4095:
4076:(2): 337–351.
4056:
4025:
3993:(4): 172–215.
3973:
3947:
3919:
3873:(1): 173–195.
3853:
3807:(1): 141–171.
3787:
3769:
3749:
3734:
3701:
3683:
3663:
3625:(4): 617–633.
3605:
3577:
3559:
3539:
3481:
3423:
3409:. 2021-06-02.
3391:
3356:
3333:
3312:
3266:(4): 466–501.
3260:World Politics
3246:
3200:(2): 143–169.
3194:World Politics
3180:
3165:
3109:
3091:
3071:
3034:
3025:
2994:
2928:
2862:
2856:
2828:
2792:
2775:
2749:
2723:
2695:
2677:
2657:
2633:The New Yorker
2619:
2601:
2581:
2552:(5): 761–796.
2532:
2471:
2425:(4): 496–526.
2419:World Politics
2394:
2346:(4): 128–169.
2323:
2285:
2259:
2231:
2205:
2185:
2159:
2139:
2113:
2080:
2062:
2042:
2024:
1989:
1971:
1946:
1928:
1900:
1893:
1874:
1873:
1871:
1868:
1866:
1865:
1854:
1852:
1849:
1847:
1846:
1841:
1839:Tripwire force
1836:
1831:
1826:
1821:
1816:
1811:
1806:
1801:
1796:
1794:Nuclear ethics
1791:
1786:
1781:
1776:
1771:
1766:
1761:
1756:
1751:
1745:
1743:
1740:
1714:
1711:
1678:
1675:
1666:
1663:
1629:Advocates for
1626:
1623:
1613:
1610:
1586:
1583:
1581:
1578:
1572:
1569:
1556:
1555:
1552:
1549:
1546:
1543:
1524:
1523:
1520:
1502:
1499:
1479:Anne Applebaum
1447:
1441:
1389:government in
1367:Saddam Hussein
1361:government of
1350:
1347:
1321:
1318:
1285:
1282:
1273:
1270:
1258:Bernard Brodie
1203:
1202:
1196:
1193:
1164:
1163:
1161:
1160:
1153:
1146:
1138:
1135:
1134:
1133:
1132:
1127:
1122:
1117:
1107:
1106:
1101:
1096:
1087:
1077:
1076:
1071:
1066:
1064:United Kingdom
1061:
1056:
1041:
1040:
1034:
1033:
1032:
1031:
1026:
1021:
1016:
1011:
1006:
1001:
996:
991:
986:
980:
979:
974:
969:
963:
962:
957:
952:
947:
942:
937:
932:
924:
923:
919:
918:
910:
909:
882:
879:
877:of tripwires.
869:
866:
856:
853:
840:Main article:
837:
834:
828:
825:
819:
816:
786:
785:
779:
773:
767:
761:
746:
743:
716:
713:
703:
700:
683:
680:
672:United Kingdom
586:
583:
524:
521:
512:game-theoretic
431:
430:
428:
427:
420:
413:
405:
402:
401:
400:
399:
394:
389:
384:
379:
374:
369:
364:
359:
354:
353:
352:
347:
337:
332:
330:Family therapy
327:
322:
317:
312:
307:
302:
294:
293:
289:
288:
287:
286:
281:
276:
271:
266:
258:
257:
253:
252:
251:
250:
245:
240:
235:
230:
225:
220:
212:
211:
205:
204:
203:
202:
201:
200:
190:
185:
180:
175:
167:
166:
160:
159:
158:
157:
149:
148:
144:
143:
142:
141:
136:
131:
126:
121:
120:
119:
117:Party-directed
109:
108:
107:
102:
97:
87:
82:
77:
69:
68:
62:
61:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
7890:
7879:
7876:
7874:
7871:
7869:
7866:
7864:
7861:
7859:
7856:
7854:
7851:
7849:
7846:
7844:
7841:
7839:
7836:
7834:
7831:
7829:
7826:
7824:
7821:
7820:
7818:
7803:
7800:
7798:
7795:
7793:
7790:
7788:
7785:
7783:
7780:
7778:
7775:
7773:
7770:
7768:
7765:
7763:
7760:
7758:
7755:
7753:
7750:
7749:
7747:
7745:Miscellaneous
7743:
7737:
7734:
7732:
7729:
7727:
7724:
7722:
7719:
7717:
7714:
7712:
7709:
7708:
7706:
7702:
7696:
7693:
7691:
7688:
7686:
7683:
7681:
7680:Samuel Bowles
7678:
7676:
7675:Roger Myerson
7673:
7671:
7668:
7666:
7665:Robert Aumann
7663:
7661:
7658:
7656:
7653:
7651:
7648:
7646:
7643:
7641:
7638:
7636:
7633:
7631:
7628:
7626:
7623:
7621:
7620:Lloyd Shapley
7618:
7616:
7613:
7611:
7608:
7606:
7605:Kenneth Arrow
7603:
7601:
7598:
7596:
7593:
7591:
7588:
7586:
7585:John Harsanyi
7583:
7581:
7578:
7576:
7573:
7571:
7568:
7566:
7563:
7561:
7558:
7556:
7555:Herbert Simon
7553:
7551:
7548:
7546:
7543:
7541:
7538:
7536:
7533:
7531:
7528:
7526:
7523:
7521:
7518:
7516:
7513:
7511:
7508:
7506:
7503:
7501:
7498:
7496:
7493:
7492:
7490:
7484:
7478:
7475:
7473:
7470:
7468:
7465:
7463:
7460:
7458:
7455:
7453:
7450:
7448:
7445:
7443:
7440:
7438:
7435:
7434:
7432:
7428:
7422:
7419:
7417:
7414:
7412:
7409:
7407:
7404:
7402:
7399:
7397:
7394:
7392:
7389:
7387:
7384:
7382:
7379:
7377:
7374:
7372:
7369:
7367:
7364:
7362:
7359:
7357:
7356:Fair division
7354:
7352:
7349:
7347:
7344:
7342:
7339:
7337:
7334:
7332:
7331:Dictator game
7329:
7327:
7324:
7322:
7319:
7317:
7314:
7312:
7309:
7307:
7304:
7302:
7299:
7297:
7294:
7292:
7289:
7287:
7284:
7282:
7279:
7277:
7274:
7272:
7269:
7267:
7264:
7262:
7259:
7257:
7254:
7252:
7249:
7247:
7244:
7242:
7239:
7237:
7234:
7232:
7229:
7227:
7224:
7222:
7219:
7218:
7216:
7214:
7210:
7204:
7203:Zero-sum game
7201:
7199:
7196:
7194:
7191:
7189:
7186:
7184:
7181:
7179:
7176:
7174:
7173:Repeated game
7171:
7169:
7166:
7164:
7161:
7159:
7156:
7154:
7152:
7148:
7146:
7143:
7141:
7138:
7136:
7133:
7131:
7128:
7126:
7123:
7122:
7120:
7118:
7112:
7106:
7103:
7101:
7098:
7096:
7093:
7091:
7090:Pure strategy
7088:
7086:
7083:
7081:
7078:
7076:
7073:
7071:
7068:
7066:
7063:
7061:
7058:
7056:
7055:De-escalation
7053:
7051:
7048:
7046:
7043:
7041:
7038:
7036:
7033:
7031:
7028:
7027:
7025:
7023:
7019:
7013:
7010:
7008:
7005:
7003:
7000:
6998:
6997:Shapley value
6995:
6993:
6990:
6988:
6985:
6983:
6980:
6978:
6975:
6973:
6970:
6968:
6965:
6963:
6960:
6958:
6955:
6953:
6950:
6948:
6945:
6943:
6940:
6938:
6935:
6933:
6930:
6928:
6925:
6923:
6920:
6918:
6915:
6913:
6910:
6908:
6905:
6903:
6900:
6898:
6895:
6893:
6890:
6889:
6887:
6885:
6881:
6877:
6871:
6868:
6866:
6865:Succinct game
6863:
6861:
6858:
6856:
6853:
6851:
6848:
6846:
6843:
6841:
6838:
6836:
6833:
6831:
6828:
6826:
6823:
6821:
6818:
6816:
6813:
6811:
6808:
6806:
6803:
6801:
6798:
6796:
6793:
6791:
6788:
6786:
6783:
6782:
6780:
6776:
6772:
6764:
6759:
6757:
6752:
6750:
6745:
6744:
6741:
6729:
6726:
6724:
6721:
6719:
6716:
6714:
6711:
6709:
6706:
6704:
6701:
6699:
6696:
6694:
6691:
6689:
6686:
6685:
6683:
6679:
6673:
6670:
6668:
6665:
6663:
6660:
6658:
6655:
6653:
6650:
6648:
6645:
6643:
6640:
6639:
6637:
6635:
6631:
6625:
6622:
6618:
6615:
6613:
6610:
6608:
6605:
6603:
6600:
6598:
6595:
6594:
6593:
6590:
6588:
6585:
6583:
6580:
6578:
6575:
6573:
6570:
6568:
6565:
6563:
6560:
6558:
6555:
6553:
6550:
6548:
6545:
6543:
6540:
6538:
6535:
6533:
6530:
6526:
6523:
6521:
6518:
6517:
6516:
6513:
6511:
6508:
6506:
6503:
6501:
6498:
6496:
6493:
6491:
6488:
6486:
6483:
6481:
6478:
6476:
6473:
6471:
6468:
6466:
6463:
6461:
6458:
6454:
6451:
6449:
6446:
6444:
6441:
6440:
6439:
6436:
6435:
6433:
6429:
6423:
6420:
6418:
6415:
6413:
6410:
6408:
6405:
6403:
6400:
6398:
6395:
6394:
6392:
6390:
6386:
6376:
6373:
6371:
6368:
6367:
6365:
6361:
6355:
6352:
6350:
6347:
6345:
6342:
6340:
6337:
6335:
6332:
6330:
6327:
6325:
6322:
6321:
6319:
6315:
6312:
6310:
6309:Organizations
6306:
6300:
6297:
6296:
6293:
6289:
6282:
6277:
6275:
6270:
6268:
6263:
6262:
6259:
6252:
6247:
6243:
6240:
6237:
6233:
6229:
6225:
6221:
6217:
6214:
6211:
6207:
6204:
6200:
6196:
6192:
6189:
6186:
6182:
6179:
6175:
6171:
6167:
6166:
6162:
6153:
6147:
6143:
6142:
6134:
6131:
6126:
6122:
6118:
6114:
6110:
6106:
6099:
6092:
6089:
6084:
6080:
6076:
6072:
6068:
6064:
6057:
6050:
6047:
6042:
6038:
6034:
6030:
6026:
6022:
6015:
6008:
6005:
6000:
5996:
5992:
5988:
5984:
5980:
5973:
5970:
5966:
5965:
5960:
5955:
5952:
5948:
5944:
5941:
5940:
5935:
5931:
5928:
5922:
5919:
5906:
5902:
5898:
5895:Nitze, Paul.
5891:
5888:
5875:
5871:
5870:
5865:
5861:
5855:
5852:
5840:
5836:
5832:
5825:
5822:
5810:
5806:
5802:
5796:
5793:
5780:
5776:
5775:The Economist
5772:
5766:
5763:
5750:
5746:
5745:The Economist
5742:
5736:
5733:
5729:
5725:
5721:
5717:
5712:
5707:
5703:
5699:
5692:
5689:
5677:
5673:
5669:
5663:
5660:
5648:
5644:
5640:
5634:
5631:
5619:
5615:
5611:
5607:
5603:
5599:
5595:
5591:
5587:
5584:(4): 66–107.
5583:
5579:
5575:
5568:
5565:
5554:
5550:
5546:
5542:
5536:
5532:
5528:
5524:
5520:
5513:
5510:
5498:
5494:
5488:
5484:
5483:
5475:
5472:
5467:
5463:
5459:
5455:
5451:
5444:
5441:
5435:
5430:
5426:
5422:
5418:
5411:
5408:
5396:
5392:
5386:
5382:
5381:
5373:
5370:
5358:
5354:
5350:
5346:
5340:
5336:
5332:
5328:
5327:
5319:
5316:
5304:
5300:
5294:
5290:
5289:
5284:
5278:
5275:
5270:
5266:
5262:
5258:
5254:
5250:
5246:
5242:
5238:
5231:
5228:
5223:
5219:
5215:
5211:
5206:
5201:
5197:
5193:
5189:
5182:
5179:
5167:
5163:
5157:
5153:
5149:
5145:
5144:
5136:
5133:
5128:
5124:
5120:
5116:
5112:
5108:
5104:
5100:
5096:
5089:
5086:
5074:
5070:
5066:
5062:
5058:
5054:
5050:
5046:
5039:
5036:
5024:
5020:
5016:
5012:
5008:
5004:
5000:
4996:
4992:
4988:
4981:
4979:
4975:
4963:
4959:
4955:
4951:
4947:
4943:
4939:
4935:
4931:
4927:
4920:
4917:
4905:
4901:
4897:
4893:
4889:
4885:
4881:
4877:
4873:
4869:
4865:
4861:
4854:
4851:
4839:
4835:
4831:
4827:
4823:
4819:
4815:
4811:
4807:
4803:
4796:
4793:
4788:
4784:
4779:
4774:
4770:
4766:
4759:
4757:
4753:
4748:
4744:
4740:
4736:
4732:
4728:
4724:
4720:
4716:
4709:
4707:
4703:
4698:
4694:
4690:
4686:
4682:
4678:
4674:
4670:
4666:
4659:
4657:
4653:
4641:
4637:
4633:
4629:
4625:
4621:
4617:
4613:
4609:
4605:
4598:
4596:
4592:
4587:
4583:
4579:
4575:
4571:
4567:
4563:
4559:
4555:
4548:
4546:
4542:
4530:
4526:
4522:
4518:
4514:
4510:
4506:
4502:
4498:
4494:
4487:
4485:
4483:
4479:
4468:
4464:
4458:
4454:
4450:
4446:
4442:
4435:
4433:
4431:
4427:
4423:
4417:
4414:
4410:
4404:
4401:
4396:
4390:
4375:
4371:
4367:
4360:
4357:
4345:
4341:
4337:
4330:
4328:
4324:
4312:
4308:
4304:
4297:
4294:
4282:
4278:
4274:
4268:
4265:
4260:
4256:
4250:
4247:
4236:
4232:
4228:
4224:
4218:
4214:
4210:
4203:
4200:
4188:
4184:
4178:
4174:
4173:
4165:
4162:
4150:
4146:
4142:
4138:
4134:
4130:
4126:
4122:
4118:
4114:
4110:
4106:
4099:
4096:
4091:
4087:
4083:
4079:
4075:
4071:
4067:
4060:
4057:
4052:
4048:
4044:
4040:
4036:
4029:
4026:
4022:
4018:
4014:
4010:
4006:
4001:
3996:
3992:
3988:
3984:
3977:
3974:
3962:
3958:
3954:
3950:
3944:
3940:
3936:
3932:
3931:
3923:
3920:
3908:
3904:
3900:
3896:
3892:
3888:
3884:
3880:
3876:
3872:
3868:
3864:
3857:
3854:
3842:
3838:
3834:
3830:
3826:
3822:
3818:
3814:
3810:
3806:
3802:
3798:
3791:
3788:
3776:
3772:
3766:
3762:
3761:
3753:
3750:
3745:
3738:
3735:
3719:
3712:
3705:
3702:
3690:
3686:
3680:
3676:
3675:
3667:
3664:
3652:
3648:
3644:
3640:
3636:
3632:
3628:
3624:
3620:
3616:
3609:
3606:
3594:
3590:
3589:
3581:
3578:
3566:
3562:
3556:
3552:
3551:
3543:
3540:
3528:
3524:
3520:
3516:
3512:
3508:
3504:
3500:
3496:
3492:
3485:
3482:
3470:
3466:
3462:
3458:
3454:
3450:
3446:
3442:
3438:
3434:
3427:
3424:
3412:
3408:
3404:
3398:
3396:
3392:
3387:
3383:
3379:
3375:
3371:
3367:
3360:
3357:
3353:
3349:
3345:
3342:
3337:
3334:
3329:
3321:
3319:
3317:
3313:
3301:
3297:
3293:
3289:
3285:
3281:
3277:
3273:
3269:
3265:
3261:
3257:
3250:
3247:
3235:
3231:
3227:
3223:
3219:
3215:
3211:
3207:
3203:
3199:
3195:
3191:
3184:
3181:
3176:
3169:
3166:
3155:
3151:
3147:
3143:
3139:
3135:
3131:
3127:
3120:
3118:
3116:
3114:
3110:
3098:
3094:
3088:
3084:
3083:
3075:
3072:
3067:
3062:
3058:
3054:
3047:
3045:
3043:
3041:
3039:
3035:
3029:
3026:
3021:
3017:
3013:
3009:
3008:World Affairs
3005:
2998:
2995:
2983:
2979:
2975:
2971:
2967:
2963:
2959:
2955:
2951:
2947:
2943:
2939:
2932:
2929:
2917:
2913:
2909:
2905:
2901:
2897:
2893:
2889:
2885:
2881:
2877:
2873:
2866:
2863:
2859:
2853:
2848:
2843:
2839:
2832:
2829:
2814:
2810:
2803:
2796:
2793:
2787:
2782:
2778:
2772:
2768:
2764:
2760:
2753:
2750:
2738:
2734:
2730:
2726:
2720:
2716:
2712:
2708:
2707:
2699:
2696:
2684:
2680:
2674:
2670:
2669:
2661:
2658:
2646:
2642:
2638:
2634:
2630:
2623:
2620:
2608:
2604:
2598:
2594:
2593:
2585:
2582:
2577:
2573:
2569:
2565:
2560:
2555:
2551:
2547:
2543:
2536:
2533:
2521:
2517:
2513:
2509:
2505:
2501:
2497:
2493:
2489:
2485:
2478:
2476:
2472:
2460:
2456:
2452:
2448:
2444:
2440:
2436:
2432:
2428:
2424:
2420:
2416:
2409:
2407:
2405:
2403:
2401:
2399:
2395:
2383:
2379:
2375:
2371:
2367:
2362:
2361:1721.1/118651
2357:
2353:
2349:
2345:
2341:
2337:
2330:
2328:
2324:
2312:
2308:
2304:
2300:
2296:
2289:
2286:
2274:
2270:
2266:
2262:
2256:
2252:
2248:
2244:
2243:
2235:
2232:
2220:
2216:
2212:
2208:
2202:
2198:
2197:
2189:
2186:
2174:
2170:
2166:
2162:
2156:
2152:
2151:
2143:
2140:
2128:
2124:
2120:
2116:
2110:
2106:
2102:
2098:
2097:
2089:
2087:
2085:
2081:
2069:
2065:
2059:
2055:
2054:
2046:
2043:
2031:
2027:
2021:
2017:
2013:
2009:
2008:
2000:
1998:
1996:
1994:
1990:
1978:
1974:
1968:
1964:
1963:
1955:
1953:
1951:
1947:
1935:
1931:
1925:
1921:
1917:
1913:
1912:
1904:
1901:
1896:
1894:9780850451634
1890:
1886:
1879:
1876:
1869:
1859:
1856:
1850:
1845:
1842:
1840:
1837:
1835:
1832:
1830:
1827:
1825:
1822:
1820:
1817:
1815:
1812:
1810:
1807:
1805:
1802:
1800:
1799:Nuclear peace
1797:
1795:
1792:
1790:
1787:
1785:
1782:
1780:
1777:
1775:
1772:
1770:
1767:
1765:
1762:
1760:
1757:
1755:
1752:
1750:
1747:
1746:
1741:
1739:
1736:
1732:
1731:deontological
1728:
1724:
1720:
1712:
1710:
1708:
1703:
1700:
1696:
1692:
1688:
1684:
1676:
1674:
1671:
1664:
1662:
1659:
1658:
1652:
1651:George Shultz
1648:
1644:
1643:William Perry
1640:
1636:
1632:
1624:
1622:
1620:
1611:
1609:
1607:
1603:
1599:
1592:
1584:
1579:
1577:
1570:
1568:
1564:
1562:
1561:Tanisha Fazal
1553:
1550:
1547:
1544:
1541:
1540:
1539:
1536:
1534:
1530:
1521:
1518:
1517:
1516:
1512:
1508:
1500:
1498:
1496:
1492:
1486:
1484:
1480:
1476:
1472:
1468:
1467:drone attacks
1464:
1459:
1457:
1453:
1442:
1440:
1438:
1434:
1430:
1426:
1420:
1417:
1412:
1410:
1409:
1404:
1400:
1396:
1392:
1388:
1384:
1380:
1376:
1375:Iran–Iraq War
1372:
1368:
1364:
1360:
1359:revolutionary
1356:
1355:Ronald Reagan
1348:
1346:
1344:
1340:
1335:
1331:
1327:
1319:
1317:
1315:
1314:Long Telegram
1311:
1307:
1303:
1299:
1295:
1291:
1283:
1281:
1279:
1271:
1269:
1265:
1261:
1259:
1255:
1253:
1249:
1245:
1241:
1237:
1233:
1229:
1225:
1221:
1217:
1216:United States
1213:
1208:
1201:
1197:
1194:
1192:
1191:second strike
1188:
1187:
1186:
1184:
1183:Kenneth Waltz
1181:According to
1179:
1176:
1172:
1159:
1154:
1152:
1147:
1145:
1140:
1139:
1137:
1136:
1131:
1128:
1126:
1123:
1121:
1118:
1116:
1112:
1109:
1108:
1105:
1102:
1100:
1097:
1091:
1088:
1086:
1082:
1079:
1078:
1075:
1072:
1070:
1067:
1065:
1062:
1060:
1057:
1055:
1054:United States
1051:
1049:
1045:
1044:
1043:
1042:
1039:
1035:
1030:
1027:
1025:
1022:
1020:
1017:
1015:
1012:
1010:
1009:Proliferation
1007:
1005:
1002:
1000:
997:
995:
992:
990:
987:
985:
982:
981:
978:
975:
973:
970:
968:
965:
964:
961:
958:
956:
953:
951:
948:
946:
943:
941:
938:
936:
933:
931:
928:
927:
926:
925:
920:
916:
912:
911:
908:
904:
900:
896:
892:
888:
880:
878:
874:
867:
865:
861:
854:
852:
848:
843:
835:
833:
826:
824:
817:
815:
812:
809:
808:
803:
798:
795:
790:
783:
780:
777:
774:
771:
768:
765:
762:
759:
756:
755:
754:
752:
744:
742:
739:
734:
732:
728:
723:
714:
712:
709:
701:
699:
697:
696:regime change
692:
689:
681:
679:
677:
673:
669:
665:
661:
657:
656:United States
653:
652:nuclear triad
649:
648:second-strike
644:
642:
638:
633:
630:
625:
621:
618:
614:
608:
604:
602:
599:
594:
592:
584:
582:
580:
576:
572:
568:
564:
560:
557:
554:
552:
548:
544:
542:
538:
534:
530:
522:
519:
515:
513:
507:
503:
500:
495:
490:
488:
483:
481:
477:
473:
469:
464:
462:
458:
454:
450:
446:
442:
437:
426:
421:
419:
414:
412:
407:
406:
404:
403:
398:
395:
393:
390:
388:
385:
383:
382:Peacebuilding
380:
378:
375:
373:
372:Peace process
370:
368:
365:
363:
360:
358:
355:
351:
348:
346:
343:
342:
341:
338:
336:
333:
331:
328:
326:
323:
321:
318:
316:
313:
311:
308:
306:
303:
301:
298:
297:
296:
295:
290:
285:
282:
280:
277:
275:
272:
270:
267:
265:
262:
261:
260:
259:
254:
249:
246:
244:
241:
239:
236:
234:
231:
229:
226:
224:
221:
219:
216:
215:
214:
213:
210:
206:
199:
196:
195:
194:
191:
189:
186:
184:
183:De-escalation
181:
179:
176:
174:
171:
170:
169:
168:
165:
161:
156:
153:
152:
151:
150:
145:
140:
137:
135:
132:
130:
127:
125:
122:
118:
115:
114:
113:
110:
106:
105:Collaborative
103:
101:
98:
96:
93:
92:
91:
88:
86:
83:
81:
78:
76:
73:
72:
71:
70:
67:
63:
60:
56:
50:
46:
45:
39:
33:
19:
7650:Peyton Young
7645:Paul Milgrom
7560:Hervé Moulin
7500:Amos Tversky
7442:Folk theorem
7153:-player game
7150:
7075:Grim trigger
7059:
6607:Multilateral
6537:Isolationism
6490:Expansionism
6484:
6245:
6227:
6209:
6202:
6184:
6169:
6140:
6133:
6108:
6104:
6091:
6066:
6062:
6049:
6024:
6020:
6007:
5985:(75): 3–33.
5982:
5978:
5972:
5962:
5954:
5938:
5921:
5909:. Retrieved
5900:
5890:
5878:. Retrieved
5874:the original
5867:
5854:
5843:. Retrieved
5834:
5824:
5813:. Retrieved
5804:
5795:
5783:. Retrieved
5774:
5765:
5753:. Retrieved
5744:
5735:
5701:
5697:
5691:
5680:. Retrieved
5671:
5662:
5651:. Retrieved
5642:
5633:
5622:. Retrieved
5581:
5577:
5567:
5557:, retrieved
5522:
5512:
5501:. Retrieved
5481:
5474:
5457:
5453:
5443:
5424:
5420:
5410:
5399:. Retrieved
5379:
5372:
5361:. Retrieved
5325:
5318:
5307:. Retrieved
5287:
5277:
5244:
5240:
5230:
5198:(2): 51–90.
5195:
5191:
5181:
5170:. Retrieved
5142:
5135:
5102:
5098:
5088:
5077:. Retrieved
5055:(3): 46–70.
5052:
5048:
5038:
5027:. Retrieved
4994:
4990:
4966:. Retrieved
4933:
4929:
4919:
4908:. Retrieved
4867:
4863:
4853:
4842:. Retrieved
4809:
4805:
4795:
4768:
4722:
4718:
4672:
4668:
4644:. Retrieved
4611:
4607:
4561:
4557:
4533:. Retrieved
4503:(3): 44–71.
4500:
4496:
4471:, retrieved
4444:
4421:
4416:
4408:
4403:
4378:. Retrieved
4369:
4359:
4348:. Retrieved
4340:The Atlantic
4339:
4315:. Retrieved
4306:
4296:
4285:. Retrieved
4276:
4267:
4259:the original
4249:
4239:, retrieved
4212:
4202:
4191:. Retrieved
4171:
4164:
4153:. Retrieved
4112:
4108:
4098:
4073:
4069:
4059:
4042:
4038:
4028:
4020:
3990:
3986:
3976:
3965:. Retrieved
3929:
3922:
3911:. Retrieved
3870:
3866:
3856:
3845:. Retrieved
3804:
3800:
3790:
3779:. Retrieved
3759:
3752:
3743:
3737:
3725:. Retrieved
3718:the original
3704:
3693:. Retrieved
3673:
3666:
3655:. Retrieved
3622:
3618:
3608:
3597:. Retrieved
3587:
3580:
3569:. Retrieved
3549:
3542:
3531:. Retrieved
3498:
3494:
3484:
3473:. Retrieved
3443:(1): 58–88.
3440:
3436:
3426:
3415:. Retrieved
3406:
3369:
3365:
3359:
3351:
3336:
3327:
3304:. Retrieved
3263:
3259:
3249:
3238:. Retrieved
3197:
3193:
3183:
3174:
3168:
3158:, retrieved
3136:(3): 47–86,
3133:
3129:
3101:. Retrieved
3081:
3074:
3056:
3052:
3028:
3014:(2): 13–26.
3011:
3007:
2997:
2986:. Retrieved
2945:
2941:
2931:
2920:. Retrieved
2882:(3): 32–56.
2879:
2875:
2865:
2837:
2831:
2820:. Retrieved
2808:
2795:
2758:
2752:
2741:. Retrieved
2705:
2698:
2687:. Retrieved
2667:
2660:
2649:. Retrieved
2632:
2622:
2611:. Retrieved
2591:
2584:
2549:
2545:
2535:
2524:. Retrieved
2491:
2487:
2463:. Retrieved
2422:
2418:
2386:. Retrieved
2343:
2339:
2315:. Retrieved
2298:
2288:
2277:. Retrieved
2241:
2234:
2223:. Retrieved
2195:
2188:
2177:. Retrieved
2149:
2142:
2131:. Retrieved
2095:
2072:. Retrieved
2052:
2045:
2034:. Retrieved
2006:
1981:. Retrieved
1961:
1938:. Retrieved
1910:
1903:
1884:
1878:
1858:
1784:N-deterrence
1717:In the post
1716:
1704:
1680:
1668:
1655:
1628:
1618:
1615:
1594:
1574:
1565:
1557:
1537:
1525:
1514:
1507:Cyberwarfare
1487:
1460:
1449:
1421:
1413:
1406:
1352:
1343:New Cold War
1323:
1287:
1275:
1266:
1262:
1256:
1220:Soviet Union
1204:
1180:
1167:
1115:South Africa
1110:
1094:(undeclared)
1080:
1046:
875:
871:
862:
858:
849:
845:
830:
821:
805:
799:
791:
787:
781:
775:
769:
763:
757:
748:
737:
735:
718:
707:
705:
693:
687:
685:
645:
634:
628:
626:
622:
609:
605:
601:
597:
595:
588:
561:
558:
555:
549:
545:
539:that since "
529:Curtis LeMay
526:
517:
509:
505:
498:
493:
491:
484:
465:
456:
435:
434:
377:Peace treaty
242:
228:Brinkmanship
85:Conciliation
43:
7767:Coopetition
7570:Jean Tirole
7565:John Conway
7545:Eric Maskin
7341:Blotto game
7326:Pirate game
7135:Global game
7105:Tit for tat
7040:Bid shading
7030:Appeasement
6880:Equilibrium
6860:Solved game
6795:Determinacy
6778:Definitions
6771:game theory
6703:Geopolitics
6582:Sovereignty
6562:Imperialism
6475:Colonialism
6460:Appeasement
6375:Warsaw Pact
5880:15 November
5785:January 17,
5755:January 17,
5326:Secret Wars
4424:, March 24.
4411:, April 07.
3372:(3): 3–30.
2948:(1): 3–39.
2494:(1): 5–29.
2123:j.ctt5vm52s
1735:prima facie
1635:Global Zero
1511:Cyberweapon
1456:John Bolton
1383:Afghanistan
1373:during the
1326:US drawdown
1290:containment
1284:Containment
1252:third world
1248:Afghanistan
1240:Middle East
1104:North Korea
1014:Disarmament
758:Rationality
751:game theory
702:Reciprocity
617:great power
611:there is a
567:appeasement
472:compellence
392:Rule of man
387:Peacemaking
340:Game theory
218:Appeasement
134:Negotiation
100:Rule of law
75:Arbitration
66:Nonviolence
7817:Categories
7411:Trust game
7396:Kuhn poker
7065:Escalation
7060:Deterrence
7050:Cheap talk
7022:Strategies
6840:Preference
6769:Topics of
6657:Liberalism
6602:Friendship
6587:Suzerainty
6185:Deterrence
5845:2013-11-15
5815:2010-06-10
5682:2023-03-04
5653:2023-03-04
5624:2022-02-14
5559:2021-12-17
5503:2021-11-20
5401:2021-11-20
5363:2021-12-07
5309:2021-12-07
5172:2021-11-07
5079:2021-11-06
5029:2021-11-06
4968:2021-11-06
4910:2021-11-06
4844:2021-11-15
4646:2021-11-06
4535:2021-11-06
4473:2021-11-06
4380:2023-08-11
4350:2023-09-12
4317:2023-09-15
4287:2023-08-11
4241:2023-08-31
4193:2023-08-31
4155:2023-08-31
3967:2022-05-07
3913:2022-05-07
3847:2022-05-07
3781:2022-05-07
3695:2022-01-28
3657:2022-01-28
3599:2022-01-28
3571:2022-02-15
3533:2022-02-21
3501:: 92–117.
3475:2021-06-03
3417:2021-06-03
3306:2021-09-11
3240:2021-09-11
3160:2021-07-14
3103:2021-11-20
2988:2021-09-05
2922:2021-09-05
2822:2021-09-05
2743:2021-09-06
2689:2021-08-28
2651:2023-11-30
2613:2021-09-18
2526:2021-09-06
2465:2021-09-11
2388:2021-09-06
2317:2023-12-01
2279:2021-09-06
2225:2021-09-05
2179:2021-08-30
2133:2021-08-30
2074:2021-08-28
2036:2021-08-30
1983:2021-08-30
1940:2021-08-30
1870:References
1779:Long Peace
1670:Paul Nitze
1633:, such as
1606:aggression
1589:See also:
1387:Sandinista
1379:mujahideen
1349:Reagan era
1306:Korean War
1302:proxy wars
1296:under its
1224:proxy wars
1125:Kazakhstan
1050:recognized
1024:Opposition
922:Background
686:Jentleson
457:Deterrence
243:Deterrence
7595:John Nash
7301:Stag hunt
7045:Collusion
6693:Diplomacy
6597:Bilateral
6495:Grey-zone
6448:Coalition
6407:1919–1939
6402:1814–1919
6397:1648–1814
6216:T.V. Paul
5706:CiteSeerX
5614:153925234
5598:0162-2889
5549:244858515
5460:: 25–43.
5353:240182441
5269:202312573
5261:0140-2390
5222:239770382
5214:0162-2889
5119:0963-6412
5061:1936-1815
5019:238358851
5011:2057-5637
4958:151870657
4950:0002-9300
4900:151870657
4884:0002-9300
4826:0022-0027
4787:2057-2085
4739:0963-6412
4697:154019562
4689:0963-6412
4636:238842794
4628:0140-2390
4578:0963-6412
4517:0162-2889
4422:Quillette
4129:0022-0027
4090:248609130
4017:248723655
4009:0162-2889
3957:157599829
3903:154642193
3887:0020-8183
3837:155075459
3821:0020-8183
3727:12 August
3639:0032-3195
3523:247040733
3515:0963-6412
3465:148987375
3457:0963-6412
3296:154490426
3280:0043-8871
3230:153591618
3214:0043-8871
3059:: 25–48,
2978:154732192
2962:0162-2889
2912:154133787
2896:0162-2889
2733:243305936
2641:0028-792X
2576:246241390
2568:0963-6412
2508:0305-0629
2455:153596965
2439:0043-8871
2370:0162-2889
2307:0015-7120
2269:243305936
1844:Wargaming
1580:Criticism
1463:Elon Musk
1391:Nicaragua
1324:With the
1244:Nicaragua
1019:Terrorism
1004:Espionage
999:Blackmail
994:Arms race
868:Tripwires
514:terms as:
499:immediate
325:Democracy
238:Diplomacy
233:Ceasefire
223:Armistice
147:Workplace
112:Mediation
42:USS
7736:Lazy SMP
7430:Theorems
7381:Deadlock
7236:Checkers
7117:of games
6884:concepts
6652:Feminism
6505:Idealism
6500:Hegemony
6453:Military
6438:Alliance
6431:Concepts
6417:Cold War
6299:Glossary
6201:. 1985.
5943:Archived
5930:Archived
5905:Archived
5839:Archived
5835:The Hill
5809:Archived
5779:Archived
5749:Archived
5728:13900591
5676:Archived
5674:. 2023.
5647:Archived
5618:Archived
5553:archived
5497:Archived
5395:Archived
5357:Archived
5303:Archived
5285:(1995).
5166:Archived
5127:46356854
5073:Archived
5069:26267261
5023:Archived
4962:Archived
4904:Archived
4838:Archived
4834:44364372
4640:Archived
4586:46356854
4529:Archived
4525:29361290
4467:archived
4389:cite web
4374:Archived
4344:Archived
4311:Archived
4281:Archived
4235:archived
4187:Archived
4149:Archived
4145:55200649
4137:20684583
3961:Archived
3907:Archived
3895:43282156
3841:Archived
3829:43282155
3775:Archived
3689:Archived
3651:Archived
3593:Archived
3565:Archived
3527:Archived
3469:Archived
3411:Archived
3344:Archived
3300:Archived
3234:Archived
3154:archived
3150:57572461
3097:Archived
3020:27870285
2982:Archived
2916:Archived
2813:Archived
2737:Archived
2683:Archived
2645:Archived
2607:Archived
2520:Archived
2516:35580738
2459:Archived
2382:Archived
2378:57570578
2311:Archived
2273:Archived
2219:Archived
2173:Archived
2127:Archived
2068:Archived
2030:Archived
1977:Archived
1934:Archived
1742:See also
1719:cold war
1639:Sam Nunn
1433:chemical
1278:Cold War
1218:and the
1212:Cold War
1120:Belarus
1099:Pakistan
984:Arsenals
955:Delivery
565:, where
487:credible
476:coercion
468:dissuade
441:Cold War
164:Violence
129:Pacifism
7488:figures
7271:Chicken
7125:Auction
7115:Classes
6672:Realism
6662:Marxism
6525:Liberal
6443:Entente
6389:History
6317:Present
6180:, 2015.
6125:2216042
6083:1961738
6041:2185583
5999:1148862
5911:July 2,
5807:. NPR.
5805:NPR.org
5643:Lawfare
5606:2539178
4747:4830861
3647:2149629
3386:2538549
3288:2010511
3222:2010405
2970:2538686
2904:2538699
2786:7711749
2447:2010184
1723:ethical
1529:Stuxnet
1395:Contras
1334:détente
1320:DĂ©tente
1232:Vietnam
1130:Ukraine
972:Workers
967:Effects
950:Testing
940:Warfare
935:History
585:Concept
523:History
480:defense
256:Nuclear
198:studies
80:Auction
44:Growler
6634:Theory
6592:Treaty
6480:Crisis
6234:
6176:
6148:
6123:
6081:
6039:
5997:
5726:
5708:
5612:
5604:
5596:
5547:
5537:
5489:
5387:
5351:
5341:
5295:
5267:
5259:
5220:
5212:
5158:
5125:
5117:
5067:
5059:
5017:
5009:
4956:
4948:
4898:
4890:
4882:
4832:
4824:
4785:
4745:
4737:
4695:
4687:
4634:
4626:
4584:
4576:
4523:
4515:
4459:
4229:
4219:
4179:
4143:
4135:
4127:
4088:
4015:
4007:
3955:
3945:
3901:
3893:
3885:
3835:
3827:
3819:
3767:
3681:
3645:
3637:
3557:
3521:
3513:
3463:
3455:
3384:
3294:
3286:
3278:
3228:
3220:
3212:
3148:
3089:
3018:
2976:
2968:
2960:
2910:
2902:
2894:
2854:
2783:
2773:
2731:
2721:
2675:
2639:
2599:
2574:
2566:
2514:
2506:
2453:
2445:
2437:
2376:
2368:
2305:
2267:
2257:
2213:
2203:
2167:
2157:
2121:
2111:
2060:
2022:
1969:
1926:
1891:
1649:, and
1495:SACEUR
1238:, the
1236:Angola
1111:Former
1092:
1090:Israel
1081:Others
1069:France
1059:Russia
1029:Winter
977:Ethics
945:Design
897:, and
738:et al.
708:et al.
688:et al.
676:France
662:, the
660:Russia
629:et al.
459:in an
7226:Chess
7213:Games
6617:Peace
6572:Power
6567:Peace
6324:BRICS
6121:JSTOR
6101:(PDF)
6079:JSTOR
6059:(PDF)
6037:JSTOR
6017:(PDF)
5995:JSTOR
5724:S2CID
5610:S2CID
5602:JSTOR
5545:S2CID
5349:S2CID
5265:S2CID
5218:S2CID
5123:S2CID
5065:JSTOR
5015:S2CID
4954:S2CID
4896:S2CID
4888:JSTOR
4830:S2CID
4743:S2CID
4693:S2CID
4632:S2CID
4582:S2CID
4521:S2CID
4227:JSTOR
4141:S2CID
4133:JSTOR
4086:S2CID
4045:(5).
4013:S2CID
3953:S2CID
3899:S2CID
3891:JSTOR
3833:S2CID
3825:JSTOR
3721:(PDF)
3714:(PDF)
3643:JSTOR
3519:S2CID
3461:S2CID
3382:JSTOR
3292:S2CID
3284:JSTOR
3226:S2CID
3218:JSTOR
3146:S2CID
3016:JSTOR
2974:S2CID
2966:JSTOR
2908:S2CID
2900:JSTOR
2816:(PDF)
2805:(PDF)
2729:S2CID
2572:S2CID
2512:S2CID
2451:S2CID
2443:JSTOR
2374:S2CID
2265:S2CID
2211:JSTOR
2165:JSTOR
2119:JSTOR
1851:Notes
1461:When
1228:Korea
1085:India
1074:China
960:Yield
811:op‑ed
770:Dyads
668:India
664:China
502:that:
494:might
292:Other
6907:Core
6363:Past
6232:ISBN
6197:and
6174:ISBN
6146:ISBN
6105:Noûs
5913:2019
5882:2013
5787:2012
5757:2012
5594:ISSN
5535:ISBN
5487:ISBN
5385:ISBN
5339:ISBN
5293:ISBN
5257:ISSN
5210:ISSN
5156:ISBN
5115:ISSN
5057:ISSN
5007:ISSN
4946:ISSN
4880:ISSN
4822:ISSN
4783:ISSN
4735:ISSN
4685:ISSN
4624:ISSN
4574:ISSN
4513:ISSN
4457:ISBN
4395:link
4370:CEPA
4277:Time
4217:ISBN
4177:ISBN
4125:ISSN
4005:ISSN
3943:ISBN
3883:ISSN
3817:ISSN
3765:ISBN
3729:2017
3679:ISBN
3635:ISSN
3555:ISBN
3511:ISSN
3453:ISSN
3276:ISSN
3210:ISSN
3087:ISBN
2958:ISSN
2892:ISSN
2852:ISBN
2771:ISBN
2719:ISBN
2673:ISBN
2637:ISSN
2597:ISBN
2564:ISSN
2504:ISSN
2435:ISSN
2366:ISSN
2303:ISSN
2255:ISBN
2201:ISBN
2155:ISBN
2109:ISBN
2058:ISBN
2020:ISBN
1967:ISBN
1924:ISBN
1889:ISBN
1509:and
1444:Post
1371:Iraq
1363:Iran
1246:and
1214:the
1205:The
1171:SSBN
731:NATO
674:and
666:and
551:NATO
7486:Key
6624:War
6113:doi
6071:doi
6029:doi
6025:101
5987:doi
5936:."
5716:doi
5586:doi
5527:doi
5462:doi
5429:doi
5331:doi
5249:doi
5200:doi
5148:doi
5107:doi
4999:doi
4938:doi
4934:110
4872:doi
4868:110
4814:doi
4773:doi
4727:doi
4677:doi
4616:doi
4566:doi
4505:doi
4449:doi
4307:CNN
4117:doi
4078:doi
4047:doi
3995:doi
3935:doi
3875:doi
3809:doi
3627:doi
3503:doi
3445:doi
3374:doi
3268:doi
3202:doi
3138:doi
3061:doi
3012:173
2950:doi
2884:doi
2842:doi
2781:PMC
2763:doi
2711:doi
2554:doi
2496:doi
2427:doi
2356:hdl
2348:doi
2247:doi
2101:doi
2012:doi
1916:doi
1435:or
1381:in
1369:of
1226:in
1048:NPT
729:or
193:War
90:Law
7819::
7221:Go
6226:,
6222:,
6218:,
6193:,
6119:.
6109:26
6107:.
6103:.
6077:.
6067:83
6065:.
6061:.
6035:.
6023:.
6019:.
5993:.
5983:75
5981:.
5899:.
5866:.
5837:.
5833:.
5803:.
5773:.
5743:.
5722:,
5714:,
5702:16
5700:,
5670:.
5641:.
5616:.
5608:.
5600:.
5592:.
5582:18
5580:.
5576:.
5551:,
5543:,
5533:,
5521:,
5495:.
5458:46
5456:.
5452:.
5425:44
5423:.
5419:.
5393:.
5355:.
5347:.
5337:.
5301:.
5263:.
5255:.
5245:42
5243:.
5239:.
5216:.
5208:.
5196:46
5194:.
5190:.
5164:.
5154:.
5121:.
5113:.
5103:26
5101:.
5097:.
5071:.
5063:.
5051:.
5047:.
5021:.
5013:.
5005:.
4993:.
4989:.
4977:^
4960:.
4952:.
4944:.
4932:.
4928:.
4902:.
4894:.
4886:.
4878:.
4866:.
4862:.
4836:.
4828:.
4820:.
4810:63
4808:.
4804:.
4781:.
4771:.
4767:.
4755:^
4741:.
4733:.
4723:24
4721:.
4717:.
4705:^
4691:.
4683:.
4673:22
4671:.
4667:.
4655:^
4638:.
4630:.
4622:.
4612:46
4610:.
4606:.
4594:^
4580:.
4572:.
4562:26
4560:.
4556:.
4544:^
4527:.
4519:.
4511:.
4501:41
4499:.
4495:.
4481:^
4465:,
4455:,
4443:,
4429:^
4391:}}
4387:{{
4372:.
4368:.
4342:.
4338:.
4326:^
4309:.
4305:.
4275:.
4233:,
4225:,
4211:,
4185:.
4147:.
4139:.
4131:.
4123:.
4113:53
4111:.
4107:.
4084:.
4074:60
4072:.
4068:.
4043:66
4041:.
4037:.
4019:.
4011:.
4003:.
3991:46
3989:.
3985:.
3959:.
3951:.
3941:.
3905:.
3897:.
3889:.
3881:.
3871:67
3869:.
3865:.
3839:.
3831:.
3823:.
3815:.
3805:67
3803:.
3799:.
3773:.
3687:.
3649:.
3641:.
3633:.
3623:94
3621:.
3617:.
3591:.
3563:.
3525:.
3517:.
3509:.
3499:31
3497:.
3493:.
3467:.
3459:.
3451:.
3441:27
3439:.
3435:.
3405:.
3394:^
3380:.
3368:.
3350:,
3315:^
3298:.
3290:.
3282:.
3274:.
3264:42
3262:.
3258:.
3232:.
3224:.
3216:.
3208:.
3198:41
3196:.
3192:.
3152:,
3144:,
3134:30
3132:,
3128:,
3112:^
3095:.
3055:,
3037:^
3010:.
3006:.
2980:.
2972:.
2964:.
2956:.
2944:.
2940:.
2914:.
2906:.
2898:.
2890:.
2878:.
2874:.
2850:,
2811:.
2807:.
2779:.
2769:.
2735:.
2727:.
2717:.
2681:.
2643:.
2635:.
2631:.
2605:.
2570:.
2562:.
2550:30
2548:.
2544:.
2518:.
2510:.
2502:.
2492:28
2490:.
2486:.
2474:^
2457:.
2449:.
2441:.
2433:.
2423:36
2421:.
2417:.
2397:^
2380:.
2372:.
2364:.
2354:.
2344:42
2342:.
2338:.
2326:^
2309:.
2301:.
2297:.
2271:.
2263:.
2253:.
2217:.
2209:.
2171:.
2163:.
2125:.
2117:.
2107:.
2083:^
2066:.
2028:.
2018:.
1992:^
1975:.
1949:^
1932:.
1922:.
1645:,
1641:,
1608:.
1600:.
1535:.
1477:,
1411:.
1308:.
1254:.
1242:,
1234:,
1230:,
893:,
889:,
804:,
727:UN
658:,
7151:n
6762:e
6755:t
6748:v
6280:e
6273:t
6266:v
6238:.
6154:.
6127:.
6115::
6085:.
6073::
6043:.
6031::
6001:.
5989::
5915:.
5884:.
5848:.
5818:.
5789:.
5759:.
5718::
5685:.
5656:.
5627:.
5588::
5529::
5506:.
5468:.
5464::
5437:.
5431::
5404:.
5366:.
5333::
5312:.
5271:.
5251::
5224:.
5202::
5175:.
5150::
5129:.
5109::
5082:.
5053:6
5032:.
5001::
4995:6
4971:.
4940::
4913:.
4874::
4847:.
4816::
4789:.
4775::
4749:.
4729::
4699:.
4679::
4649:.
4618::
4588:.
4568::
4538:.
4507::
4451::
4397:)
4383:.
4353:.
4320:.
4290:.
4196:.
4158:.
4119::
4092:.
4080::
4053:.
4049::
3997::
3970:.
3937::
3916:.
3877::
3850:.
3811::
3784:.
3731:.
3698:.
3660:.
3629::
3602:.
3574:.
3536:.
3505::
3478:.
3447::
3420:.
3388:.
3376::
3370:7
3309:.
3270::
3243:.
3204::
3140::
3106:.
3063::
3057:2
3022:.
2991:.
2952::
2946:7
2925:.
2886::
2880:8
2844::
2825:.
2789:.
2765::
2746:.
2713::
2692:.
2654:.
2616:.
2578:.
2556::
2529:.
2498::
2468:.
2429::
2391:.
2358::
2350::
2320:.
2282:.
2249::
2228:.
2182:.
2136:.
2103::
2077:.
2039:.
2014::
1986:.
1943:.
1918::
1897:.
1157:e
1150:t
1143:v
424:e
417:t
410:v
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.