Article Title,Year,Volume,Issue,Page Range,Author Blaming the Victim: Refugees and Global Security,2002,58,6,46-53,Loescher Unequal Protection,2002,58,6,56-61,Knight The limited national security implications of civilian nuclear decline,2013,69,2,22-33,Squassoni US nuclear forces 2013,2013,69,2,77-86,Kristensen Slick 'ems glick 'ems Christmas trees and cookie cutters: nuclear language and how we learned to pat the bomb,1987,43,5,17-24,Cohn The dimensions of contemporary war and violence: How to reclaim humanity from a continuing revolution in the technology of killing,2013,69,4,9-17,Lifton The Lavon Affair: How a false-flag operation led to war and the Israeli bomb,2013,69,4,58-68,Weiss Eyes wide shut: The growing threat of cyber attacks on industrial control systems,2013,69,5,15-20,Brenner Are new technologies undermining the laws of war?,2014,70,1,21-31,Allenby The misunderstood acronym: why cyber weapons aren't WMD,2013,69,5,32-37,Carr The psychological effects of cyber terrorism,2016,72,5,284-291,Canetti