485
Views
0
CrossRef citations to date
0
Altmetric
Editorials

From the editors

Bibliography

  • Boon, H.T., ‘Hardening the Hard, Softening the Soft: Assertiveness and China’s Regional Strategy’, The Journal of Strategic Studies 40/5 (2017), 639–62. doi:10.1080/01402390.2016.1221820.
  • Dossi, Simone, ‘On the Asymmetric Advantages of Cyberwarfare: Western Literature and the Chinese Journal Guofang Keji’, The Journal of Strategic Studies 43/2 (2020).
  • Jackson, Van, ‘Red Teaming the Rebalance: The Theory and Risks of US Asia Strategy’, The Journal of Strategic Studies 39/3 (2016), 365–88. doi:10.1080/01402390.2016.1174113.
  • Kim, M.H., ‘Why Provoke? the Sino-US Competition in East Asia and North Korea’s Strategic Choice’, The Journal of Strategic Studies 39/7 (2016), 979–98. doi:10.1080/01402390.2015.1035433.
  • Layne, Christopher and Robert S. Metzger, ‘Reforming post-Cold War US Arms Sales Policy: The Crucial Link between Exports and the Defense Industrial Base’, The Journal of Strategic Studies 18/4 (1995), 1–32. doi:10.1080/01402399508437617.
  • Meijer, Hugo, Lucie Béraud-Sudreau, Paul Holtom, and Matthew Uttley, ‘ArmingChina: Major Powers’ Arms Transfers to the People’s Republic of China’, The Journal of Strategic Studies 41/6 (2018), 850–86. doi:10.1080/01402390.2017.1288110.
  • Montgomery, Evan Braden, ‘Signals of Strength: Capability Demonstrations and Perceptions of Military Power’, The Journal of Strategic Studies 43/2 (2020).
  • Newmyer, Jacqueline, ‘The Revolution in Military Affairs with Chinese Characteristics’, The Journal of Strategic Studies 33/4 (2010), 483–504. doi:10.1080/01402390.2010.489706.
  • Rovner, Joshua, ‘Two Kinds of Catastrophe: Nuclear Escalation and Protracted War in Asia’, The Journal of Strategic Studies 40/5 (2017), 696–730. doi:10.1080/01402390.2017.1293532.
  • Saunders, P.C. and J.G. Bowie, ‘US-China Military Relations: Competition and Cooperation’, The Journal of Strategic Studies 39/5–6 (2016), 662–84. doi:10.1080/01402390.2016.1221818.
  • Schneider, Jacquelyn, ‘The Capability/vulnerability Paradox and Military Revolutions: Implications for Computing, Cyber, and the Onset of War’, The Journal of Strategic Studies 42/6 (2019), 841–63. doi:10.1080/01402390.2019.1627209.
  • Sechser, T.S., Neil Narang, and Caitlin Talmadge, ‘Emerging Technologies and Strategic Stability in Peacetime, Crisis, and War’, The Journal of Strategic Studies 42/6 (2019), 727–35. doi:10.1080/01402390.2019.1626725.
  • Shifrinson, Joshua, ‘The Rise of China, Balance of Power Theory and US National Security: Reasons for Optimism?’, The Journal of Strategic Studies 43/2 (2020).
  • Smeets, Max, ‘A Matter of Time: On the Transitory Nature of Cyberweapons’, The Journal of Strategic Studies 41/1–2 (2018), 6–32. doi:10.1080/01402390.2017.1288107.
  • Solar, Carlos, ‘China’s Weapons Transfer in the Western Hemisphere’, The Journal of Strategic Studies 43/2 (2020).
  • Thomas, Martin, ‘To Arm an Ally: French Arms Sales to Romania, 1926–1940’, The Journal of Strategic Studies 19/2 (1996), 231–59. doi:10.1080/01402399608437636.
  • Tor, Uri, ‘Cumulative Deterrence’ as a New Paradigm for Cyber Deterrence’, The Journal of Strategic Studies 40/1–2 (2017), 92–117. doi:10.1080/01402390.2015.1115975.
  • Wilner, Alex S., ‘US Cyber Deterrence: Practice Guiding Theory’, The Journal of Strategic Studies 43/2 (2020).
  • Zhengyu, Wu, ‘The Crowe Memorandum, the Rebalance to Asia, and Sino-US Relations’, The Journal of Strategic Studies 39/3 (2016).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.