Security Studies

Papers
(The TQCC of Security Studies is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Questioning More: RT, Outward-Facing Propaganda, and the Post-West World Order30
Kettles of Hawks: Public Opinion on the Nuclear Taboo and Noncombatant Immunity in the United States, United Kingdom, France, and Israel26
Trivial Tripwires?: Military Capabilities and Alliance Reassurance12
Political Polarization and Political Violence12
Control over Bodies and Territories: Insurgent Territorial Control and Sexual Violence12
Channeling Contraband: How States Shape International Smuggling Routes10
Oust the Leader, Keep the Regime? Autocratic Civil-Military Relations and Coup Behavior in the Tunisian and Egyptian Militaries during the 2011 Arab Spring9
The Logic of Strategic Assets: From Oil to AI9
Norm Diffusion through US Military Training in Tunisia9
Cyber Operations, Accommodative Signaling, and the De-Escalation of International Crises8
Race and Racial Exclusion in Security Studies: A Survey of Scholars8
The Price of Protection: Explaining Success and Failure of US Alliance Burden-Sharing Pressure8
Legacies of Wartime Order: Punishment Attacks and Social Control in Northern Ireland8
Market Size and the Political Economy of European Defense7
Racism by Designation: Making Sense of Western States’ Nondesignation of White Supremacists as Terrorists7
Partnership in Leadership: Why and How Do Leading Powers Extend Managerial Privileges to Junior Partners?7
Balancing Identity: The Sino-Soviet Split, Ontological Security, and North Korean Foreign Policy7
A Reputation versus Prioritization Trade-Off: Unpacking Allied Perceptions of US Extended Deterrence in Distant Regions5
Strategies of Extended Deterrence: How States Provide the Security Umbrella5
How Peacekeepers Fight: Assessing Combat Effectiveness in United Nations Peace Operations5
Racial Hierarchy and Jurisdiction in U.S. Status of Forces Agreements5
Cyber Arms Transfer: Meaning, Limits, and Implications5
Toward a Decolonial Cybersecurity: Interrogating the Racial-Epistemic Hierarchies That Constitute Cybersecurity Expertise5
Barking Without Biting: Understanding Chinese Media Campaigns During Foreign Policy Disputes4
Whose War is it Anyway? Explaining the Black-White Gap in Support for the Use of Force Abroad4
Symbolic Amplification and Suboptimal Weapons Procurement: Explaining Turkey’s S-400 Program4
Pax Petrolica? Rethinking the Oil–Interstate War Linkage4
Rebel Mobilization through Pandering: Insincere Leaders, Framing, and Exploitation of Popular Grievances4
Conceptualizing Civil War Complexity3
Desert Shield of the Republic? A Realist Case for Abandoning the Middle East3
The Effect of Aerial Bombardment on Insurgent Civilian Victimization3
Who Blinked? Performing Resolve (or Lack Thereof) in Face-to-Face Diplomacy3
Perceptions of Leadership Importance: Evidence from the CIA’s President’s Daily Brief3
Uneasy Lies the Crown: External Threats to Religious Legitimacy and Interstate Dispute Militarization3
Terror after the Caliphate: The Effect of ISIS Loss of Control over Population Centers on Patterns of Global Terrorism3
Off the Menu: Post-1945 Norms and the End of War Declarations3
US Strategy and the Rise of Private Maritime Security3
Budget Breaker? The Financial Cost of US Military Alliances3
0.022618055343628