Corpus ID: 131713749
Counterinsurgency in Yemen: Assessing operations decisive storm, restoring hope, and golden arrow
C. Hanson
Published 2016
Engineering
This project provides a comprehensive assessment of the counter-insurgency (COIN) operations being conducted against the al Huthis. Specifically, how effective the Arab coalition’s Operation Decisive… Expand
Fount.Aucegypt.Edu
Share This Paper




Figures from this paper
Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
References
SHOWING 1-10 OF 87 REFERENCES
Mapping Out a Counterinsurgency Campaign Plan: Critical Considerations in Counterinsurgency Campaigning1
DR Paul Melshen
Political Science
2007
18
Options for Avoiding Counterinsurgencies
David H. Ucko, Robert Egnell
Political Science
2014
6
Making Revolutionary Change: Airpower in COIN Today
C. J. Dunlap
Political Science
2008
A ‘Model Campaign’ Reappraised: The Counter-Insurgency War in Dhofar, Oman, 1965–1975
G. Hughes
Political Science
2009
25
‘The Population Is the Enemy’: Control, Behaviour, and Counter-insurgency in Central Helmand Province, Afghanistan
R. Evans
Geography
2014
2
Government in a Box? Counter-insurgency, State Building, and the Technocratic Conceit
C. Jackson
Engineering
2014
6
The New Counter-insurgency Era in Critical Perspective
C. Gventer, D. M. Jones, M.L.R. Smith
History
2014
Recognizing Systems in Afghanistan: Lessons Learned and New Approaches to Operational Assessments
William P. Upshur, J. Roginski, David J. Kilcullen
Sociology
2012
11
Violent politics : a history of insurgency, terrorism & guerrilla war, from the American Revolution to Iraq
W. Polk
Political Science
2007
49
Minting New COIN: Critiquing Counter-insurgency Theory
C. Gventer, D. M. Jones, M.L.R. Smith
Political Science
2014
4
...
1
2
3
4
5
...
SORT BY
Related Papers
Dynamic security assessment tools
K. Morison, H. Hamadanizadeh, Lei Wang
Engineering
IEEE Power Engineering Society Summer Meeting…
1999
The uncertainty of transaction scheduling and the increased exposure to system failures from operating in highly stresse...
21
Combining Security Risk Assessment and Security Testing Based on Standards
J. Großmann, Fredrik Seehusen
Engineering, Computer ScienceRISK
2015
Managing cyber security has become increasingly important due to the growing interconnectivity of computerized systems a...
12
Show More
2/10
Abstract
Figures
87 References
Related Papers
Stay Connected With Semantic Scholar
About Semantic Scholar
Semantic Scholar is a free, AI-powered research tool for scientific literature, based at the Allen Institute for AI.
Learn More →
Resources
Datasets
Supp.ai
API
Open Corpus
Organization
About Us
Research
Publishing Partners
Data Partners
FAQ
Contact
Proudly built by AI2
Terms of ServicePrivacy Policy
By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy Policy, Terms of Service, and Dataset License
ACCEPT & CONTINUE