<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1909-3063</journal-id>
<journal-title><![CDATA[Revista de Relaciones Internacionales, Estrategia y Seguridad]]></journal-title>
<abbrev-journal-title><![CDATA[rev.relac.int.estrateg.segur.]]></abbrev-journal-title>
<issn>1909-3063</issn>
<publisher>
<publisher-name><![CDATA[Universidad Militar Nueva Granada]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1909-30632022000100101</article-id>
<article-id pub-id-type="doi">10.18359/ries.5793</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Military Power and Conventional Deterrence: A Literature Review]]></article-title>
<article-title xml:lang="es"><![CDATA[Poder militar y disuasión convencional: revisión de la literatura]]></article-title>
<article-title xml:lang="pt"><![CDATA[Poder militar e dissuasão convencional: uma revisão da literatura]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Dall'Agnol]]></surname>
<given-names><![CDATA[Augusto C.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Duarte]]></surname>
<given-names><![CDATA[Érico E.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Institute for Politics and Strategy  ]]></institution>
<addr-line><![CDATA[Porto Alegre ]]></addr-line>
<country>Brazil</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Federal University of Rio Grande do Sul  ]]></institution>
<addr-line><![CDATA[Porto Alegre ]]></addr-line>
<country>Brazil</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2022</year>
</pub-date>
<volume>17</volume>
<numero>1</numero>
<fpage>101</fpage>
<lpage>118</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1909-30632022000100101&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1909-30632022000100101&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1909-30632022000100101&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: This literature review explains how strategies of deterrence and compellence relate to military power. Such an inquiry is relevant as much of the literature on military power diffusion focuses exclusively on military platforms and weapons systems. Hence, we advance a more political and strategic approach rather than a more technological approach while assessing military power. The article uses "costs" and "probability of success" to assess conventional deterrence. Although both compellence and deterrence are coercive strategies, they have different implications for the diffusion of military power, especially because of the costs associated with each one. We argue that countries should not replicate or pursue a carbon copy of all the top platforms and advanced weapons systems of a leading state to catch up or to deny the advantages of technological innovation. Hence, denial strategies are much cheaper than control strategies. Finally, denial strategies often result in a decrease in the probability of success in the battlefield of an expeditionary force offensive. The review concludes that military power should relate much more to deterrence than compellence, countering the conventional Dahl's notion that power is the ability of "A" to cause "B" to do something that "B" otherwise would not do. In other words, military power must be seen as "A" convincing "B" not to initiate a specific action because the perceived benefits to "B" do not justify the potential costs and risks.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: Esta revisión de la literatura explica la forma en que las estrategias de disuasión y coacción (compellence) se relacionan con el poder militar. Tal investigación es pertinente, puesto que gran parte de la literatura sobre la difusión del poder militar se centra exclusivamente en las plataformas militares y en los sistemas de armas. Por lo tanto, se promueve un enfoque más político y estratégico en lugar de un enfoque más tecnológico al evaluar el poder militar. En el artículo, se utiliza "costos" y "probabilidad de éxito" para evaluar la disuasión convencional. Aunque tanto la coacción como la disuasión son estrategias coercitivas, tienen diferentes implicaciones para la difusión del poder militar, en especial por los costos asociados a cada una. También se argumenta que los países no deberían replicar o copiar todas las plataformas principales y sistemas de armas avanzados de un estado líder para actualizarse o negar las ventajas de la innovación tecnológica. En consecuencia, las estrategias de negación son mucho más económicas que las estrategias de control. Por último, las estrategias de negación a menudo disminuyen la probabilidad de éxito en el campo de batalla de una ofensiva de la fuerza expedicionaria. Se concluye que el poder militar debe relacionarse mucho más con la disuasión que con la coacción para contrarrestar la noción convencional de Dahl de que el poder es la capacidad de "A" para hacer que "B" haga algo que "B" de otro modo no haría. En otras palabras, el poder militar debe verse como "A" convenciendo a "B" de no iniciar una acción específica porque los beneficios percibidos para "B" no justifican los costos y riesgos potenciales.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo: Esta revisão de literatura explica como as estratégias de dissuasão e compulsão se relacionam com o poder militar. Tal investigação é relevante, pois grande parte da literatura sobre difusão de poder militar se concentra exclusivamente em plataformas militares e sistemas de armas. Assim, avançamos uma abordagem mais política e estratégica em vez de uma abordagem mais tecnológica ao avaliar o poder militar. O artigo usa "custos" e "probabilidade de sucesso" para avaliar a dissuasão convencional. Embora tanto a compulsão quanto a dissuasão sejam estratégias coercitivas, elas têm implicações diferentes para a difusão do poder militar, especialmente pelos custos associados a cada uma delas. Argumentamos que os países não devem replicar ou buscar uma cópia carbono de todas as principais plataformas e sistemas avançados de armas de um estado líder para recuperar o atraso ou negar as vantagens da inovação tecnológica. Assim, as estratégias de negação são muito mais baratas do que as estratégias de controle. Finalmente, as estratégias de negação muitas vezes resultam em uma diminuição na probabilidade de sucesso no campo de batalha de uma ofensiva de força expedicionária. A revisão conclui que o poder militar deve se relacionar muito mais à dissuasão do que à compulsão, contrariando a noção convencional de Dahl de que poder é a capacidade de "A" de fazer "B" fazer algo que "B" de outra forma não faria. Em outras palavras, o poder militar deve ser visto como "A" convencendo "B" a não iniciar uma ação específica porque os benefícios percebidos para "B" não justificam os custos e riscos potenciais.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Military power]]></kwd>
<kwd lng="en"><![CDATA[coercion]]></kwd>
<kwd lng="en"><![CDATA[conventional deterrence]]></kwd>
<kwd lng="en"><![CDATA[compellence]]></kwd>
<kwd lng="en"><![CDATA[South America]]></kwd>
<kwd lng="es"><![CDATA[poder militar]]></kwd>
<kwd lng="es"><![CDATA[coerción]]></kwd>
<kwd lng="es"><![CDATA[disuasión convencional]]></kwd>
<kwd lng="es"><![CDATA[coacción]]></kwd>
<kwd lng="es"><![CDATA[Sudamérica]]></kwd>
<kwd lng="pt"><![CDATA[poder militar]]></kwd>
<kwd lng="pt"><![CDATA[coerção]]></kwd>
<kwd lng="pt"><![CDATA[dissuasão convencional]]></kwd>
<kwd lng="pt"><![CDATA[competência]]></kwd>
<kwd lng="pt"><![CDATA[América do Sul]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Adamsky]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Moscow's Aerospace Theory of Victory: Western Assumptions and Russian Reality]]></source>
<year>2021</year>
<publisher-name><![CDATA[CNA]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ajili]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[and Rouhi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Iran's Military Strategy]]></article-title>
<source><![CDATA[Survival]]></source>
<year>2019</year>
<volume>61</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>139-52</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Altman]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[By Fait Accompli, Not Coercion: How States Wrest Territory from Their Adversaries]]></article-title>
<source><![CDATA[International Studies Quarterly]]></source>
<year>2017</year>
<volume>61</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>881-91</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anthony]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[The role of deterrence in future NATO strategy]]></source>
<year>2009</year>
<publisher-name><![CDATA[Stockholm International Peace Research Institute]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aust]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Modernized Deterrence and Revitalized Dialogue: Adapting the Harmel Report to Post-2014 Europe]]></source>
<year>2018</year>
<publisher-name><![CDATA[NATO Defense College]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beckley]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Emerging Military Balance in East Asia: How China's Neighbors Can Check Chinese Naval Expansion]]></article-title>
<source><![CDATA[International Security]]></source>
<year>2017</year>
<volume>42</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>78-119</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biddle]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Oelrich]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Future Warfare in the Western Pacific: Chinese A2/AD, U.S. ASB, and Command of the Commons in East Asia]]></article-title>
<source><![CDATA[International Security]]></source>
<year>2016</year>
<volume>41</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>7-48</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biddle]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Military Power: Explaining Victory and Defeat in Modern Battle]]></source>
<year>2006</year>
<publisher-name><![CDATA[Princeton University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borresen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The seapower of the coastal state]]></article-title>
<source><![CDATA[Journal of Strategic Studies]]></source>
<year>1994</year>
<volume>17</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>148-75</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bowen]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[War in Space: Strategy, Spacepower, Geopolitics]]></source>
<year>2020</year>
<publisher-name><![CDATA[Edinburgh University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bowers]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Kirchberger]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Not so disruptive after all: The 4IR, navies and the search for sea control]]></article-title>
<source><![CDATA[Journal of Strategic Studies]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bowers]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Small State Deterrence in the Contemporary World]]></source>
<year>2018</year>
<publisher-name><![CDATA[Norwegian Institute for Defence Studies]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bredesen]]></surname>
<given-names><![CDATA[M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Friis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Missiles, Vessels and Active Defence]]></article-title>
<source><![CDATA[The RUSI Journal]]></source>
<year>2020</year>
<volume>165</volume>
<numero>5-6</numero>
<issue>5-6</issue>
<page-range>68-78</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Caverley]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Dombrowski]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cruising for a Bruising: Maritime Competition in an Anti-Access Age]]></article-title>
<source><![CDATA[Security Studies]]></source>
<year>2020</year>
<volume>29</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>671-700</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cepik]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bertol]]></surname>
<given-names><![CDATA[F. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Defense policy in Brazil: Bridging the gap between ends and means?]]></article-title>
<source><![CDATA[Defense Studies]]></source>
<year>2016</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>229-47</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chin]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Technology, War and the State: Past, Present and Future]]></article-title>
<source><![CDATA[International Affairs]]></source>
<year>2019</year>
<volume>95</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>765-83</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Colby]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Solomon]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Facing Russia: Conventional Defence and Deterrence in Europe]]></article-title>
<source><![CDATA[Survival]]></source>
<year>2015</year>
<volume>57</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>21-50</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Covarrubias]]></surname>
<given-names><![CDATA[J. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Significance of Conventional Deterrence in Latin America]]></article-title>
<source><![CDATA[Military Review]]></source>
<year>2004</year>
<page-range>36-9</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dahl]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Concept of Power]]></article-title>
<source><![CDATA[Behavioral Science]]></source>
<year>1957</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>201-15</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Davis]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Toward Theory for Dissuasion (or Deterrence) by Denial: Using Simple Cognitive Models of the Adversary to Inform Strategy]]></source>
<year>2014</year>
<page-range>121</page-range><publisher-name><![CDATA[RAND Corporation]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duarte]]></surname>
<given-names><![CDATA[É.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Conduta da Guerra na Era Digital e suas Implicações para o Brasil: Uma Análise de Conceitos, Políticas e Práticas de Defesa]]></source>
<year>2012</year>
<publisher-name><![CDATA[Texto Para Discussão (IPEA)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duarte]]></surname>
<given-names><![CDATA[É.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securing the South Atlantic: In Favour of a Revised Brazilian Maritime Strategy]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Smith-Windsor]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Enduring NATO, Rising Brazil]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Rome ]]></publisher-loc>
<publisher-name><![CDATA[NATO Defence College]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dunnigan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[How to Make War: A Comprehensive Guide To Modern Warfare In The Twenty-First Century]]></source>
<year>2003</year>
<publisher-name><![CDATA[HarperCollins]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fravel]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Active Defense: China's Military Strategy since 1949]]></source>
<year>2019</year>
<publisher-name><![CDATA[Princeton University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Freedman]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deterrence]]></source>
<year>2004</year>
<publisher-name><![CDATA[Polity Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Freedman]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ukraine and the Art of Limited War]]></article-title>
<source><![CDATA[Survival]]></source>
<year>2014</year>
<volume>56</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>7-38</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Galbreath]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Western European Armed Forces and the Modernisation Agenda: Following or Falling Behind?]]></article-title>
<source><![CDATA[Defence Studies]]></source>
<year>2014</year>
<volume>14</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>394-413</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gallagher]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[State of (Deterrence by) Denial]]></article-title>
<source><![CDATA[The Washington Quarterly]]></source>
<year>2019</year>
<volume>42</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>31-45</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gartzke]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Lindsay]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Influence of Sea Power on Politics: Domain- and Platform-Specific Attributes of Material Capabilities]]></article-title>
<source><![CDATA[Security Studies]]></source>
<year>2020</year>
<volume>29</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>601-36</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gilli]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gilli]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Diffusion of Drone Warfare? Industrial, Organizational, and Infrastructural Constraints]]></article-title>
<source><![CDATA[Security Studies]]></source>
<year>2016</year>
<volume>25</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>50-84</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gilli]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gilli]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage]]></article-title>
<source><![CDATA[International Security]]></source>
<year>2019</year>
<volume>43</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>141-89</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goldman]]></surname>
<given-names><![CDATA[E.O.]]></given-names>
</name>
<name>
<surname><![CDATA[Eliason]]></surname>
<given-names><![CDATA[L.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Diffusion of Military Technology and Ideas]]></source>
<year>2003</year>
<publisher-name><![CDATA[Stanford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gordon]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Army Fires Capabilities for 2025 and Beyond]]></source>
<year>2020</year>
<publisher-name><![CDATA[RAND Corporation]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gormley]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Missile Contagion]]></article-title>
<source><![CDATA[Survival]]></source>
<year>2008</year>
<volume>50</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>137-54</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gray]]></surname>
<given-names><![CDATA[C. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Definitions and Assumptions of Deterrence: Questions of Theory and Practice]]></article-title>
<source><![CDATA[Journal of Strategic Studies]]></source>
<year>1990</year>
<volume>13</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gray]]></surname>
<given-names><![CDATA[C. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Hard Power and Soft Power: The Utility of Military Force as an Instrument of Policy in the 21st Century]]></source>
<year>2011</year>
<publisher-name><![CDATA[US Army War College]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Green]]></surname>
<given-names><![CDATA[B. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Long]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Conceal or Reveal? Managing Clandestine Military Capabilities in Peacetime Competition]]></article-title>
<source><![CDATA[International Security]]></source>
<year>2020</year>
<volume>44</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>48-83</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gruselle]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cruise Missiles &amp; Anti-Access Strategies]]></source>
<year>2006</year>
<publisher-name><![CDATA[Fondation pour la Recherche Stratégique]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Harvey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Conventional Deterrence and National Security]]></source>
<year>1997</year>
<publisher-name><![CDATA[Edited by Air Power Studies Centre. Commonwealth of Australia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dawood]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lage]]></surname>
<given-names><![CDATA[V. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Nuclear Submarine in the South Atlantic: The Framing of Threats and Deterrence]]></article-title>
<source><![CDATA[Contexto Internacional]]></source>
<year>2017</year>
<volume>39</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>329-50</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Horowitz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Diffusion of Military Power: Causes and Consequences for International Politics]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Princeton ]]></publisher-loc>
<publisher-name><![CDATA[Princeton University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hughes]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Girrier]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fleet Tactics and Naval Operations]]></source>
<year>2018</year>
<edition>3rd</edition>
<publisher-name><![CDATA[Naval Institute Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[China's "Guam Express" and "Carrier Killers": The anti-ship asymmetric challenge to the U.S. in the Western Pacific]]></article-title>
<source><![CDATA[Comparative Strategy]]></source>
<year>2017</year>
<volume>36</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>319-32</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kashin]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Raska]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Countering the U.S. Third Offset Strategy: Russian Perspectives, Responses and Challenges]]></source>
<year>2017</year>
<publisher-name><![CDATA[RSIS Policy Papers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kelly]]></surname>
<given-names><![CDATA[T. Gompert]]></given-names>
</name>
<name>
<surname><![CDATA[D.]]></surname>
<given-names><![CDATA[Long D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Smart Power, Stronger Partners: Exploiting U.S. Advantages to Prevent Aggression]]></source>
<year>2016</year>
<publisher-name><![CDATA[RAND Corporation]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Klein]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Corbett in Orbit]]></article-title>
<source><![CDATA[Naval War College Review]]></source>
<year>2004</year>
<volume>57</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>59-74</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Knopf]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Three Items in One: Deterrence as Concept, Research Program, and Political Issue]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Paul]]></surname>
<given-names><![CDATA[T. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Morgan]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wirtz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Complex Deterrence: Strategy in the Global Age]]></source>
<year>2009</year>
<page-range>31-57</page-range><publisher-name><![CDATA[The University of Chicago Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kofman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Getting the Fait Accompli Problem Right in U.S. Strategy]]></source>
<year>2020</year>
<publisher-name><![CDATA[War on The Rocks]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kulesa]]></surname>
<given-names><![CDATA[t.]]></given-names>
</name>
<name>
<surname><![CDATA[Frear]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[NATO'S Evolving Modern Deterrence Posture: Challenges and Risks (Deterrence) [ELN Issue Brief]]]></source>
<year>2017</year>
<publisher-name><![CDATA[European Leadership Network]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kuo]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Military Innovation and Technological Determinism: British and US Ways of Carrier Warfare, 1919-1945]]></article-title>
<source><![CDATA[Journal of Global Security Studies]]></source>
<year>2020</year>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lanoszka]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hunzeker]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Conventional Deterrence and Landpower in Northeastern Europe]]></source>
<year>2019</year>
<publisher-name><![CDATA[Strategic Studies Institute]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Long]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deterrence From Cold War to Long War: Lessons from Six Decades of RAND Research]]></source>
<year>2008</year>
<publisher-name><![CDATA[Rand Publishing]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mahken]]></surname>
<given-names><![CDATA[T. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Weapons: The Growth &amp; Spread of the Precision-Strike Regime]]></article-title>
<source><![CDATA[D&#339;dalus]]></source>
<year>2011</year>
<volume>140</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>45-57</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mearsheimer]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Theory and Practice of Conventional Deterrence]]></source>
<year>1981</year>
<publisher-loc><![CDATA[Ithaca ]]></publisher-loc>
<publisher-name><![CDATA[Cornell University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mearsheimer]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Strategic Misstep: The Maritime Strategy and Deterrence in Europe]]></article-title>
<source><![CDATA[International Security]]></source>
<year>1986</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>3-57</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Michaels]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Visions of the next war or reliving the last one? Early alliance views of war with the Soviet Bloc]]></article-title>
<source><![CDATA[Journal of Strategic Studies]]></source>
<year>2020</year>
<volume>43</volume>
<numero>6-7</numero>
<issue>6-7</issue>
<page-range>990-1013</page-range></nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mishra]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cruise missiles: evolution, proliferation, and future]]></source>
<year>2011</year>
<publisher-name><![CDATA[Centre for Air Power Studies]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montgomery]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Contested Primacy in the Western Pacific China's Rise and the Future of U.S. Power Projection]]></article-title>
<source><![CDATA[International Security]]></source>
<year>2014</year>
<volume>38</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>115-49</page-range></nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilner]]></surname>
<given-names><![CDATA[A.S]]></given-names>
</name>
<name>
<surname><![CDATA[Wegner]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deterrence by Denial from the Cold War to the 21st Century."]]></article-title>
<source><![CDATA[Deterrence by Denial: Theory and Practice]]></source>
<year>2021</year>
<publisher-loc><![CDATA[Amherst ]]></publisher-loc>
<publisher-name><![CDATA[Cambria Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mueller]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[trategy, Asymmetric Deterrence, and Accommodation: Middle Powers and Security in Modern Europe]]></source>
<year>1991</year>
<publisher-name><![CDATA[Princeton University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nicholls]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cruise Missiles and Modern War: Strategic and Technological Implications]]></source>
<year>2000</year>
<publisher-name><![CDATA[Center for Strategy and Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ochmanek]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Role of Maritime and Air Power in DoD's Third Offset Strategy]]></source>
<year>2014</year>
<publisher-name><![CDATA[US House of Representatives: RAND Corporation]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paul]]></surname>
<given-names><![CDATA[TV.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Complex Deterrence: An Introduction]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Paul]]></surname>
<given-names><![CDATA[T.V]]></given-names>
</name>
<name>
<surname><![CDATA[Morgan]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wirtz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Complex Deterrence: Strategy in the Global Age]]></source>
<year>2009</year>
<publisher-name><![CDATA[University of Chicago Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Posen]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Command of the Commons: the Military Foundation of U.S. Hegemony]]></article-title>
<source><![CDATA[International Security]]></source>
<year>2003</year>
<volume>28</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>5-46</page-range></nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Petersen]]></surname>
<given-names><![CDATA[M. B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Strategic Deterrence, Critical Infrastructure, and the Aspiration-Modernization Gap in the Russian Navy]]></source>
<year>2020</year>
<publisher-name><![CDATA[Center for Strategic and International Studies]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rogers]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Diffusion of Innovations]]></source>
<year>1983</year>
<publisher-name><![CDATA[The Free Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rogovoy]]></surname>
<given-names><![CDATA[A. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Giles]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Russian View On Landpower]]></source>
<year>2015</year>
<publisher-name><![CDATA[US Army War College]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schelling]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Arms and Influence]]></source>
<year>2008</year>
<publisher-name><![CDATA[Yale University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schenoni]]></surname>
<given-names><![CDATA[L. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bipolarity or Hegemony? Latin America's Dilemma for the 21st Century]]></source>
<year>2019</year>
<publisher-name><![CDATA[E-IR]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B70">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmid]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Diffusion of Military Technology]]></article-title>
<source><![CDATA[Defence &amp; Peace Economics]]></source>
<year>2018</year>
<volume>29</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>595-613</page-range></nlm-citation>
</ref>
<ref id="B71">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shugart]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Gonzalez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[First Strike: China's Missile Threat to U.S. Bases in Asia]]></source>
<year>2017</year>
<publisher-name><![CDATA[Center for New American Century]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B72">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Snyder]]></surname>
<given-names><![CDATA[G. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deterrence and Defense]]></source>
<year>1961</year>
<publisher-name><![CDATA[Princeton University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B73">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Snyder]]></surname>
<given-names><![CDATA[G. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deterrence: A Theoretical Introduction]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Garnett]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Theories of Peace and Security]]></source>
<year>1970</year>
<page-range>106-12</page-range><publisher-name><![CDATA[Macmillan]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B74">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tangredi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Anti-Access Warfare CounteringA2/AD Strategies]]></source>
<year>2013</year>
<publisher-name><![CDATA[Naval Institute Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B75">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Teixeira]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Existe um sistema A2/AD na Venezuela?]]></article-title>
<source><![CDATA[Revista de Geopolítica]]></source>
<year>2020</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>28-42</page-range></nlm-citation>
</ref>
<ref id="B76">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tripp]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deterrence and Drones: Are Militaries Becoming Addicted and What Is the Prognosis?]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Filippidou]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deterrence: Concepts And Approaches For Current And Emerging Threats]]></source>
<year>2020</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B77">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilkinson]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Resilience and Deterrence: Exploring Correspondence Between the Concepts]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Filippidou]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deterrence: Concepts And Approaches For Current And Emerging Threats]]></source>
<year>2020</year>
<publisher-name><![CDATA[Sportverlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B78">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilner]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wenger]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Introduction]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Wilner]]></surname>
<given-names><![CDATA[A. S]]></given-names>
</name>
<name>
<surname><![CDATA[Wegner]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deterrence by Denial: Theory and Practice]]></source>
<year>2021</year>
<publisher-name><![CDATA[Cambria Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B79">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yoshihara]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Holmes]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Red Star over Pacific: China's Rise and the Challenge to US Maritime Strategy]]></source>
<year>2018</year>
<edition>2nd</edition>
<publisher-name><![CDATA[Naval Institute Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B80">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Conventional long-range strike weapons of US allies and China's concerns of strategic instability]]></article-title>
<source><![CDATA[The Nonproliferation Review]]></source>
<year>2020</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
