标题/作者 | 引用次数 | 年份 |
---|---|---|
N Silove Security Studies 27 (1), 27-57 | 135 | 2018 |
ED Borghard, SW Lonergan Security Studies 26 (3), 452-481 | 118 | 2017 |
MB Altier, E Leonard Boyle, ND Shortland, JG Horgan Security Studies 26 (2), 305-332 | 104 | 2017 |
A Carson, K Yarhi-Milo Security Studies 26 (1), 124-156 | 96 | 2017 |
GJ Ikenberry, DH Nexon Security Studies 28 (3), 395-421 | 86 | 2019 |
D Maliniak, S Peterson, R Powers, MJ Tierney Security Studies 27 (3), 448-484 | 70 | 2018 |
M Abrahms, J Conrad Security Studies 26 (2), 279-304 | 69 | 2017 |
E Goh Security Studies 28 (3), 614-644 | 63 | 2019 |
TA Volpe Security Studies 26 (3), 517-544 | 59 | 2017 |
AI Butt Security Studies 28 (2), 250-285 | 54 | 2019 |
M Mastanduno Security Studies 28 (3), 479-504 | 52 | 2019 |
TH Hall Security Studies 26 (1), 1-29 | 44 | 2017 |
RE Whitlark Security Studies 26 (4), 545-574 | 44 | 2017 |
C Ruffa Security Studies 26 (3), 391-422 | 42 | 2017 |
A Cooley Security Studies 28 (3), 588-613 | 41 | 2019 |
BR Green, A Long Security Studies 26 (4), 606-641 | 41 | 2017 |
PB White Security Studies 26 (4), 575-605 | 40 | 2017 |
M Loken Security Studies 26 (1), 60-92 | 39 | 2017 |
A Ostovar Security Studies 28 (1), 159-188 | 34 | 2019 |
L Simón Security Studies 26 (2), 185-212 | 31 | 2017 |
1 - 20
计算机程序会自动估算并确定日期和引用次数。