The 80 Percent Solution:
The Strategic Defeat of bin Laden’s al-Qaeda and Implications for South Asian Security
|
2012
|
AFTER MOSUL:
Enlarging the Context of the Syria-Iraq Conflict(s)
|
2017
|
ALL JIHAD IS LOCAL:
What ISIS’ Files Tell Us About Its Fighters
|
2016
|
Apprenticeship and the Future of Nursing:
An Equity-Based Strategy to Address the Bachelor’s Degree Gap
|
2019
|
The Battle for Afghanistan:
Negotiations with the Taliban: History and Prospects for the Future
|
2011
|
The Battle for Afghanistan:
Militancy and Conflict in Kandahar
|
2010
|
The Battle for Pakistan:
Militancy and Conflict in Balochistan
|
2011
|
Between Al Qaeda and the Syrian Regime:
A Path Out of the Current Crisis
|
2013
|
A BRIEF HISTORY OF LAW ENFORCEMENT HACKING IN THE UNITED STATES
|
2016
|
BUGS IN THE SYSTEM:
A Primer on the Software Vulnerability Ecosystem and its Policy Implications
|
2016
|
CHANGES IN PAKISTAN’S COUNTER-TERRORISM LEGAL REGIME:
CHALLENGES, PROSPECTS, AND RECOMMENDATIONS
|
2015
|
Compilation of Existing Cybersecurity and Information Security Related Definitions
|
2014
|
Countering Domestic Radicalization:
Lessons for Intelligence Collection and Community Outreach
|
2011
|
Countering the New Orthodoxy:
Reinterpreting Counterinsurgency in Iraq
|
2011
|
CYBERSECURITY AND ASIA
|
2015
|
CYBERSECURITY AS AN ENGINE FOR GROWTH
|
2017
|
CYBERSECURITY, SIMPLICITY, AND COMPLEXITY:
The Graphic Guide to Making System More Secure Without Making Them Worse
|
2016
|
THE DECLINING HALF-LIFE OF SECRETS:
And the Future of Signals and Intelligence
|
2015
|
DECRYPTING CYBERSECURITY’S GENDER GAP
|
2015
|
Do NSA's Bulk Surveillance Programs Stop Terrorists?
|
2014
|
THE DRONE PLAYBOOK:
An Essay on the Obama Legacy and Policy Recommendations for the Next President
|
2016
|
Ecological Cooperation in South Asia::
The Way Forward
|
2013
|
Guantanamo::
Who Really ‘Returned to the Battlefield’?
|
2011
|
HOW TO FIX REMEDIATION AT SCALE
|
2016
|
ISIS IN THE WEST:
The Western Militant Flow to Syria and Iraq
|
2016
|
JIHADIST TERRORISM 15 YEARS AFTER 9/11:
A Threat Assessment
|
2016
|
JIHADIST TERRORISM 16 YEARS AFTER 9/11:
A Threat Assessment
|
2017
|
Lashkar-e-Taiba:
Past Operations and Future Prospects
|
2011
|
The Lesson of the Surge::
Defeating ISIS Requires a New Sunni Awakening
|
2014
|
Managing the Danger from Pakistan’s Nuclear Stockpile
|
2010
|
The Militant Pipeline:
Between the Afghanistan-Pakistan Border Region and the West
|
2010
|
Moving Toward Transition:
A Survey of Opinion Leaders in Southern Afghanistan As the United States Begins its Drawdown
|
2011
|
A New Deal::
A Plan for Sustainable Afghan Stability
|
2010
|
Pakistan and the United States:
At a Strategic Crossroads
|
2011
|
PATCON:
The FBI’s Secret War Against the ‘Patriot’ Movement, and How Infiltration Tactics Relate to Radicalizing Influences
|
2012
|
Professor Cy Burr’s Graphic Guide to::
INTERNATIONAL CYBER NORMS
|
2016
|
Redefining the Islamic State:
The Fall and Rise of Al-Qaeda in Iraq
|
2011
|
Russian Roulette:
Corruption, Revenue, and the post-Soviet Precedent for State Failure Afghanistan
|
2012
|
Shared Environmental Concerns between India and Pakistan
|
2014
|
SMART CYBER-LEGISLATION:
What Congress Can Do to Foster America’s Cybersecurity
|
2015
|
TO PAY RANSOM OR NOT TO PAY RANSOM?:
An Examination of Western Hostage Policies
|
2017
|
TOWARD A SAFE AND SECURE INTERNET OF THINGS
|
2016
|
WAR AND TWEETS:
Terrorism in America in the Digital Age
|
2016
|