Comprehensive Approach
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries
Fostering a Comprehensive Security Approach: An Exploratory Case Study of CBRN Crisis Management Frameworks in Eleven European Countries." Information & Security: An International Journal 33, no. 1 (2015): 55-80.
" Comprehensive Security: CBRN Crisis Management in Eleven European Countries — Downloaded 6529 times
Comprehensive Security and Some Implemental Limits
Comprehensive Security and Some Implemental Limits." Information & Security: An International Journal 33, no. 1 (2015): 13-34.
" Prezelj_Comprehensive Security and Some Implemental Limits — Downloaded 6969 times
Assessing Comprehensive Security Approaches in Action: An Introduction
Assessing Comprehensive Security Approaches in Action: An Introduction." Information & Security: An International Journal 33, no. 1 (2015): 5-9.
" Assessing Comprehensive Security Approaches in Action — Downloaded 4675 times
A Taxonomy of Essential Services
A Taxonomy of Essential Services." Radioelectronic and Computer Systems, no. 58 (2012): 191-196.
" A Taxonomy of Essential Services — Downloaded 4287 times
A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond
A Comprehensive Approach to Modern Conflict: Afghanistan and Beyond." Connections: The Quarterly Journal 6, no. 2 (2007): 1-66.
" 06.2.01_crawshaw.pdf — Downloaded 6773 times