Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Swift, Christopher
.
"
Arc of Convergence: AQAP, Ansar al-Shari’a and the Struggle for Yemen
."
CTC Sentinel
5, no. 6 (2012): 1-6.
Kendall, Elisabeth
.
"
How can al-Qaeda in the Arabian Peninsula be defeated?
"
Wash¬ington Post
(2016).
Lewis, Alexandra
.
"
Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security
."
Perspectives on Terrorism
7, no. 5 (2013): 77-92.
Drone Strikes in Yemen
., 2017.
"
Kill the Imams of Kufr
."
Dabiq
13 (2016): 6-8.
Jocelyn, Thomas
.
"
Analysis: Why AQAP quickly denied any connection to mosque attacks
."
The Long War Journal
(2015).
"
Soldiers of terror
."
Dabiq
8 (2016): 18-19.
Zimmerman, Katherine
, and
Jon Diamond
.
"
Challenging the Yemeni State: ISIS in Aden and al Mukalla
."
Critical Threats
(2016).
Aboudi, Sami
.
Insight – In Yemen Chaos, Islamic State grows to rival al Qaeda
., 2015.
Joscelyn, Thomas
, and
Bill Roggio
.
"
More Islamic State members reject governor of Yemen Province
."
FDD’s Long War Journal
(2015).
"
In the Words of the Enemy
."
Dabiq
, no. 10 (2016): 67.
Lavoix, Helene
.
Understanding the Islamic State system – Wilayat and Wali in Yemen
. The Red (Team) Analysis Society, 2016.
Kendall, Elisabeth
.
"
Al-Qa’ida and Islamic State in Yemen: A Battle for Local Audiences
." In
Jihadism Transformed: Al-Qaeda and Islamic State's Global Battle of Ideas
. London: Hurst Publishers, 2016.
Page, Michael
,
Lara Challita
, and
Alistair Harris
.
"
Al Qaeda in the Arabian Peninsula: Framing Narratives and Prescriptions
."
Terrorism and Political Violence
23, no. 2 (2011): 159.
Bergen, Peter L.
.
Epilogue: The Twilight of Al-Qaeda
In
Manhunt. The Ten-Year Search for Bin Laden from 9/11 to Abbottabad
. New York: Broadway Paperbacks, 2012.
Zimmerman, Katherine L.
.
"
Testimony: AQAP’s Role in the al Qaeda Network: Statement before the House Committee on Homeland Security Subcommittee on Counterterrorism and Intelligence
." In
Understanding the Threat to the Homeland from AQAP
. American Enterprise Institute for Public Policy Research (AEI), 2013.
Lister, Charles
.
The Syrian Jihad. Al-Qaeda, The Islamic State and the Evolution of an Insurgency
. Oxford: Oxford University Press, 2015.
Lahoud, Nelly
,
Stuart Caudill
,
Liam Collins
,
Gabriel Koehler-Derrick
,
Don Rassler
, and
Muhammad al-`Ubaydi
.
Letters from Abbottabad: Bin Laden Sidelined?
. West Point, NY: The Combating Terrorism Center at West Point, 2012.
Al-Nusra leader Jolani announces split from al-Qaeda. Al Jazeera obtains exclusive video of Abu Mohammed al-Jolani, saying group's name has changed to Jabhat Fath al Sham
. Al Jazeera, 2016.
Baram, Amatzia
.
Saddam Husayn and Islam, 1968-2003. Ba’thi Iraq from Secularism to Faith
. Washington DC: Woodrow Wilson Center Press, 2014.
Andersen, Lars Erslev
.
"
The Locals Strike Back: The Anbar Awakening in Iraq and the Rise of Islamic State
." In
Reconfiguring Intervention: Complexity, Resilience and the ‘Local Turn’ in Counterinsurgent Warfare
. Basingstoke: Palgrave Macmillan, 2017.
Gerges, Fawaz A.
.
ISIS. A History
. Princeton, NJ: Princeton University Press, 2016.
Rougier, Bernard
.
The Sunni Tragedy in the Middle East. Northern Lebanon from al-Qaeda to ISIS
. Princeton, NJ: Princeton University Press, 2015.
Stern, Jessica
, and
J.M. Berger
.
ISIS: The State of Terror
. New York: HarperCollins, 2015.
Atwan, Abdel Bari
.
Islamic State − the Digital Caliphate
. London: Saqi Books, 2015.
Pages
« първа
‹ предишна
…
204
205
206
207
208
209
210
211
212
…
следваща ›
последна »
461233 reads
Last updated:
Monday, 01 December 2014
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance