

Author: Siegel Adam
Publisher: Routledge Ltd
ISSN: 1475-1801
Source: Defense and Security Analysis, Vol.19, Iss.1, 2003-03, pp. : 15-33
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Deterrence and friction: implications for missile defense
Defense and Security Analysis, Vol. 18, Iss. 3, 2002-09 ,pp. :




A Game Theory View of Preventive Defense Against Ballistic Missile Attack
By Palmore Julian Melese Françoise
Defense Analysis, Vol. 17, Iss. 2, 2001-08 ,pp. :


By Pant Harsh
Defence Studies, Vol. 5, Iss. 2, 2005-06 ,pp. :


Defense and Security Analysis, Vol. 25, Iss. 2, 2009-06 ,pp. :