
Identity & cognitive vulnerabilities
Social identities and democratic vulnerabilities: Learning from examples of targeted disinformation

Maritime
Protecting maritime infrastructure from hybrid threats: legal options

Non-state actors
Countering state-sponsored proxies: Designing a robust policy

China
Strings attached: China’s narrative influence in Sub-Saharan Africa

Aviation & Space
Cross-cutting technologies in Chinese space activities: Raising the risk of hybrid threats

Aviation & Space
Hybrid CoE Paper 21: China and space: How space technologies boost China’s intelligence capabilities as part of hybrid threats

Maritime
Hybrid CoE Working Paper 34: Uncrewed maritime vessels: Shaping naval power in hybrid threat operations

Russia
Hybrid CoE Strategic Analysis 35: Lessons learned from Western sanctions on Russia: Knowing your target well

Russia
Hybrid CoE Paper 20: Ukraine’s position in Russia’s strategic thinking: Domestic, regional and international order

Hybrid warfare
Hybrid CoE Working Paper 33: State, non-state or chimera? The rise and fall of the Wagner Group and recommendations for countering Russia’s employment of complex proxy networks

Nordic-Baltic region
Hybrid CoE Working Paper 32: Russia’s hybrid threat tactics against the Baltic Sea region: From disinformation to sabotage

Resilience
Hybrid CoE Working Paper 31: Building Resilience to hybrid threats: Best practices in the Nordics

Arctic region
Hybrid CoE Working Paper 30: Security and geopolitics in the Arctic: The increase of hybrid threat activities in the Norwegian High North

Election interference
Hybrid CoE Research Report 12: Countering hybrid threats to elections: From updating legislation to establishing collaboration networks

Disinformation
Hybrid CoE Working Paper 29: Cause for concern: The continuing success and impact of Kremlin disinformation campaigns

Cyber