Search
Browse By Time
Browse By Person
Browse By Division
Browse By Session or Event Type
Search Tips
How to Build a Personal Program
Personal Schedule
Change Preferences / Time Zone
I use a variety of methodologies (including unsupervised machine learning and nested case selection) to first typologise non-state security actors and then to understand why states choose to employ these actors in the midst of security crises.