Registration and Coffee
Prochaine conférence annuelle
European Security Studies Conference 2026
Organisée conjointement par l'Action COST NetSec, l'Initiative européenne pour les études de sécurité (EISS) et l'Université de Stockholm.
11 — 12 juin 2026 Université de Stockholm, Suède
Sessions diffusées en direct
La colonne vertébrale de la conférence — introduction, tables rondes, conférence plénière et clôture — diffusée en ligne. Les liens de connexion apparaissent ici dès leur publication dans Indico.
-
Introduction
Dr Hugo Meijer (Sciences Po CERI) · Sanne Verschuren (Boston University) · Julia Carver (Leiden University) · Magnus Petersson (Stockholm University) · Magnus Petersson (Stockholm University) · Dr Hans Aldolfsson
Salle en ligne à venir -
Table ronde
Taking Stock of European Security in a Rapidly Changing Geopolitical Environment
Sanne Verschuren (Boston University)
Salle en ligne à venir -
Conférence plénière
Salle en ligne à venir -
Salle en ligne à venir
-
Clôture
Julia Carver (Leiden University) · Moritz Weiss (LMU Munich) · Magnus Petersson (Stockholm University) · Magnus Petersson (Stockholm University)
Salle en ligne à venir
Programme
Tiré directement d'Indico. Mis à jour quotidiennement — les modifications à l'approche de la conférence apparaissent ici dans les 24 heures.
Day 1 — 2026-06-11
-
-
War and Peace Abroad: Security Assistance, Multilateral Operations, and Peace-Building
Voir les communications (4)
-
Mapping Plural Visions of Peace: The Peace Cube as an Analytical Framework
Yijun Xu (Free University of Berlin)
Recent debates in peacebuilding have moved beyond the liberal peace paradigm to emphasize plural, locally grounded understandings of peace. However, despite this “local turn,” the field still lacks systematic tools for conceptualizing and comparing diverse visions of peace across actors and contexts. This article addresses this gap by proposing a new… Lire le résumé complet
-
Interpreting Counterterrorism in African Conflict Management
Saurav Narain (Leiden University)
Scholarly attention to the convergence between international conflict management and counterterrorism has expanded significantly, though with an implicit interpretation of the ‘use of force’ logic, and an emphasis on UN peacekeeping’s downsizing of protection and human rights norms in engagement with the concept (Moe, 2021; Geis and Moe, 2023). Furthermore,… Lire le résumé complet
-
Socialized to Cooperate? Foreign Military Training and Coordination in UN Peacekeeping Operations
Ilker Kalin (Stockholm University)
United Nations peacekeeping operations (PKOs) are inherently multinational and rely on coordination among national contingents with diverse military cultures, doctrines, and rules of engagement. While existing research shows that mission composition and prior in-mission experience shape peacekeeping effectiveness, we know far less about whether coordination… Lire le résumé complet
-
From rebels’ to State’s justice: post-conflict justice choices in 2026 Syria
Marie Robin (Université Paris Panthéon-Assas)
How do rebels deliver justice when they reach power? This contribution examines post-conflict justice choices in Syria following the political transition of December 2024, focusing on how the new leadership under Ahmad al-Sharaa needs to address widespread human rights violations committed during the al-Assad era. These violations include crimes perpetrated… Lire le résumé complet
Virtually Transformed? Digital Infrastructures, Competition, and Governance
Voir les communications (4)
-
Knowing cybersecurity: The epistemic infrastructural power of big tech
Tobias Liebetrau (University of Copenhagen)
Big tech companies authoritatively produce data, information, and knowledge about cybersecurity threats to individuals, businesses, and states. But how do they render international cybersecurity phenomena knowable? Through which practices, means, and devices is this knowledge generated? This paper argues that examining the epistemic infrastructural power of… Lire le résumé complet
-
Governing cybersecurity and the politics of state control in the digital age
Moritz Weiss (LMU Munich)
Digital technologies have become deeply entangled with the fabric of contemporary societies. Data infrastructures and cybersecurity practices underpin not only economic activity but also state authority and national security. This growing entanglement gives rise to a central question: how are states reorganizing their authority structures and cybersecurity… Lire le résumé complet
-
A Typology of Small State Agency: Southeast Asian States in US-China Submarine Cable Competition
Barbora Valockova (National University of Singapore) · Ms Mae Chow (National University of Singapore)
How do small and middle powers preserve autonomy amid great-power competition in critical digital infrastructure? This paper addresses this foundational question in International Relations by examining Southeast Asian states' navigation of US-China rivalry in submarine cable governance. Drawing on semi-structured interviews and comparative case analysis of… Lire le résumé complet
-
Do Parliaments Dream of Cyber Power? Parliamentary Scrutiny in the Strategic Domain of Cyberspace
Mattia Sguazzini (University of Genova, Italy)
Cybersecurity has become central to strategic competition and foreign policy, yet research has focused primarily on executive decision-making, military doctrines, and national cyber strategies, marginalising parliamentary roles in this securitised and technically complex domain. This paper examines how legislatures scrutinise cyber policy in democratic… Lire le résumé complet
-
-
Lunch
-
Gender, Politics, and Security
Voir les communications (4)
-
Crystal Whetstone (Bilkent University)
Non-traditional security challenges are on the rise due, in part, to a growing far-right that interlinks with cyber(in)security. This includes the phenomenon of tradwives, or so-called traditional wives, a growing global movement with origins in the west, who actively further male supremacism, militarism and other forms of violence, even as they are seen as… Lire le résumé complet
-
No Woman's Land: Securitisation of Female Forced Migration in Afghanistan
Jéssica da Costa Pereira (NOVA University of Lisbon - School of Social Sciences and Humanities)
Forced migration is a phenomenon present in globalisation’s dynamics, as is the absence of women in the conceptualisation of the processes that shape the lives of citizens. At the intersection of these two realities, we aim to analyse female forced migration as a security issue, analysing the absence of gender in the definition of forced migrant by the… Lire le résumé complet
-
Artistic Resilience-Building in Lithuania’s Local Security Policy
Anna Luisa Reinhardt (Sciences Po, Northern German Lutheran Church, Lithuanian Diakonija)
**Abstract** Lithuanian orphans sing patriotic songs at Šakiai Diakonija, my diaconal workplace, located just a 20-minute drive from the Russian border—and roughly 2 minutes for the medium-range missiles stationed in Kaliningrad. Recentring human security in the investigation of **children’s lives at EU borders**, this contribution offers valuable insights… Lire le résumé complet
-
Teodora Stoicescu (National University of Political Studies and Public Administration)
This paper will focus on the gender-based violence during armed conflicts as a non-traditional security challenge that is affecting the post-conflict development, stability and any peacebuilding effort. The analysis will be situated within feminist studies and will focus on how post-conflict approaches towards policies, reconciliation and reparations need… Lire le résumé complet
Nuclear Weapons in a Changing World: From Deterrence to Arms Control
Voir les communications (4)
-
Upload Pending? Tradeoffs, Uncertainty, and Damage-Limitation in a Multipolar Age
Tyler Bowen (United States Naval War College)
How does China’s nuclear modernization affect U.S. nuclear strategy? What are the crisis bargaining and crisis stability implications of the emerging nuclear balance between the United States and China? How might the nuclear balance evolve over time? This paper addresses these questions. I argue that by building more hardened targets, China is imposing a… Lire le résumé complet
-
Mr Tahir Azad (Department of Politics & IR, University of Reading, UK)
Recent hypersonic weapon technology advances have changed military power, challenging conventional and nuclear warfare distinctions. Hypersonic glide vehicles and cruise missiles, promoted as precision, speed, and deterrence, are compressing decision-making timelines, circumventing missile-defence architectures, and blurring strategic stability-underpinning… Lire le résumé complet
-
Jennifer Erickson
The horrific physical, medical, and environmental effects of nuclear weapons underpin long-standing ideas about nuclear deterrence, as well as challenges to their legitimacy and legality. Yet while US planners anticipated the bomb’s immense physical destruction in Japan 1945, they paid little attention to its probable medical and environmental effects.… Lire le résumé complet
-
Limit to Win It: A Typology of Competitive Arms Control Practices
Samuel Seitz (University of Oxford)
Arms control is traditionally conceptualized as a cooperative undertaking, reducing risk and obviating the need for wasteful expenditure. But arms control can also be employed for competitive ends, shaping competition in ways that asymmetrically advantage certain parties. While previous literature has identified individual examples of competitive arms… Lire le résumé complet
-
-
Coffee break
-
The Conduct of Contemporary and Future War
Voir les communications (4)
-
Learning from Ukraine: The West must be prepared for positional warfare
Baptiste Alloui-Cros (Oxford University) · Giles Moon (Oxford University)
-
Conceptual Inquiry into Military Deep Operations: A Framework for Analysis
Mr Martijn Rouvroije (Netherlands Defence Academy - Faculty of Military Sciences) · Martijn Rouvroije (Netherlands Faculty of Military Sciences)
-
Proliferating Punishment: Assessing the Effectiveness of Russia’s Long-Range Drone Strike Campaign
Andro Mathewson (KCL) · Natalia Henry (UPenn)
-
Working in the Margins: Can Small State Special Operations contribute to Deterrence?
Troels Burchall Henningsen (Royal Danish Defence University)
The Politics of Deterrence in Europe
Panel: The Politics of Deterrence in Europe
Voir les communications (4)
-
Reconceptualizing nuclear deterrence and national identity: the cases of Finland and Sweden
Emma Rosengren (Stockholm University)
-
Ritual deterrence, magic strategies, and nuclear war in Europe
Prof. Matthew Evangelista (Cornell University)
-
Nuclear Futures, Utopias, and the Case for a Renewed ‘Strict Sufficiency’
Benoît Pelopidas (Sciences Po)
-
Plus ca Change: Continuity in the French Nuclear Approach.
july decarpentrie (fhs)
-
Day 2 — 2026-06-12
-
Cofffee Break
-
Geopolitical Power Europe: A Reality Check in Western Balkans and Eastern Neighbourhood
Voir les communications (4)
-
EU’s Ontological Security and Geopolitical Enlargement
Nikolaos Tzifakis (University of the Peloponnese)
-
Marko Kovačević (University of Belgrade) · Milan Varda (University of Belgrade) · Dr Tijana Rečević Krstić (University of Belgrade)
-
Filling the EU’s Identity Void from Without and Within – Forging a Geopolitics of Values
Kurt Bassuener (Democratization Policy Council, Sarajevo)
-
Alexandra Prodromidou ((York Europe Campus, Business School, Southeast European Research Centre (SEERC)) · Faye Ververidou (York Europe Campus, Business School, Southeast European Research Centre (SEERC)) · Filip Ejdus (University of Belgrade) · Sonja Stojanovic Gajic (Center for Advanced Studies Southeast Europe, the University of Rijeka and the Centre for International Security of the Faculty of Political Science, the University of Belgrade3)
-
-
Voir les communications (4)
-
AI-Driven Cloud Monitoring and Cyber Situational Awareness in European Digital Infrastructures
Prof. Daniela Mechkaroska (University of Information Science and Technology “St. Paul the Apostle”, Ohrid, N.Macedonia)
Abstract: Artificial intelligence (AI) and cloud computing, combined with IoT systems through digital interconnection, create virtual environments that merge with physical spaces. The new operational capabilities that these transformations bring to European digital ecosystems create security challenges, governance issues and societal concerns. Existing… Lire le résumé complet
-
Quantum-Resilient SATIN and European Digital Sovereignty
Dr Gürkan Gür (Zurich University of Applied Sciences ZHAW)
This contribution presents and discusses quantum-resilient Space–Aerial–Terrestrial Networks (SATIN) as a crucial enabler of European future-proof digital sovereignty, strengthening secure communications, resilient critical infrastructure, and reinforcing Europe’s leadership across satellite, drone, and terrestrial networking domains.
-
Vladyslav Vilihura
The ongoing armed conflict in Ukraine has served as an unprecedented stress test for national cybersecurity frameworks, exposing both the capabilities and limitations of existing cyber defence architectures under sustained adversarial pressure. This paper examines two interrelated dimensions of cybersecurity governance that have gained acute relevance in… Lire le résumé complet
-
Classical geopolitics in cyberspace: Explaining cyber state behaviour with power position
Lorenz Sommer (Geschwister-Scholl-Institute for Political Science, LMU Munich)
Cyberspace is a new domain of state security competition that differs from the conventional and nuclear realms, most notably because states are constantly engaged in cyberspace operations below the threshold of armed attacks. This inclines many scholars to use new approaches, both theoretically and empirically, to measure and explain cyber state behaviour.… Lire le résumé complet
Stepping into the Future: Military Technology, Innovation Practices, and Contemporary Challenges
Voir les communications (4)
-
Selling the Future of War: Discursive Power and Military Innovation
Nicolas Krieger (Technical University of Munich)
How do ideas about military technology become politically influential? This paper sets out to examines how competing visions of military technology emerge, gain dominance, and shape German defence planning. It focuses on public debates surrounding ‘classic’ (armour, artillery, etc.) and innovative military technologies (autonomous weapon systems, AI… Lire le résumé complet
-
Disclosure and Duplicity: How Technology Influences International Competition
Tristan Volpe (IFSH University of Hamburg / Naval Postgraduate School) · Prof. Jane Vaynman (SAIS Johns Hopkins)
How do states manage information when building military capabilities? Some weapons are developed openly while others are concealed within secret programs or disguised behind civilian cover. This article introduces arming strategy as a new dependent variable, arguing that two technology attributes shape the disclosure and deception choices critical to… Lire le résumé complet
-
Kristen Harkness (University of St. Andrews) · Marc DeVore (University of St. Andrews)
The Russo-Ukrainian War stands out as the first war within decades that drove states to mobilize their industrial and innovative potential. Overwhelmingly, wars since 1945 have either been short or have been fought at lower levels of intensity. As such, they were won or lost based on the equipment already in stock or that could be procured through peacetime… Lire le résumé complet
-
Sending the Wrong Signals: When Armaments Worry Allies
Tim Thies (Institute for Peace Research and Security Policy at the University of Hamburg)
While the role of armaments, and in particular forward-deployed military forces, as signals of reassurance is well-established in the scholarly literature, existing research has not explored when and why armaments may worry allies. In this paper, I consider disagreements between allies about the right armaments by the patron for the defense of a client as… Lire le résumé complet
-
-
Lunch
-
War & Strategy: Strategic Deterrence under Duress
Voir les communications (4)
-
Isabelle Haynes (Charles University)
The deteriorating European security environment underscores the continuing relevance of NATO’s collective defence commitments. Since NATO is a military alliance comprising 32 electoral democracies, the commitment to defend any member relies on the domestic politics of its members. For these commitments to be credible, the alliance requires domestic… Lire le résumé complet
-
The Confidence Trap: Leader-Advisor Deliberations and the Making of (In)Credible Threats
Wendy He (S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University (NTU))
Conventional wisdom holds that states with superior capabilities, clear interests, and strong reputations issue more credible threats, while weaker states struggle to convince. Yet strong states sometimes fail to convince while weaker states occasionally succeed. Why? I argue that credibility is first formed within internal deliberations, shaped by how… Lire le résumé complet
-
Mark Rhinard (Stockholm University) · Dr Niklas Bremberg
Recent debates on transatlantic security cooperation widely assume that renewed political tensions -- most notably driven by the Trump II administration -- have undermined cooperation between NATO and the European Union. Such claims typically rest on assessments of strategic alignment at the political level. This paper argues that these assessments risk… Lire le résumé complet
-
Soft Power as Deterrence: Non-Kinetic Strategy and Alignment Politics in U.S.–China Competition
Mr Joseph Black (Chiang Mai University, King's College London)
Deterrence is conventionally understood as the prevention of unwanted actions through the threat of military retaliation or economic punishment. This paper argues that such a conception is increasingly insufficient for explaining how influence and restraint operate in contemporary strategic competition. Drawing on debates in deterrence theory, grand… Lire le résumé complet
Military Transformation: Innovation and Strategic Change in the Transatlantic Context
Voir les communications (4)
-
The EU as a 21st Century Security State, Formed by Geopolitics and Bellicist Threat
Kaija Schilde (Boston University)
This paper challenges the conventional assumption that EU political development lacks a bellicist foundation. I argue that external threats have been a necessary condition driving EU integration throughout its history, and that the EU can be understood as a 21st century regulatory security state. Drawing on original archival research from the Jean Monnet… Lire le résumé complet
-
Jordan Becker (United States Military Academy, West Point, Brussels School of Governance, Ecole de Guerre (IHEDN, IRSEM))
Following the 2014 Russian invasion of Ukraine and annexation of Crimea, most research examining NATO's response has focused on member state pledges to increase defense spending to at least two percent of GDP. Far less attention has been paid to whether and how NATO members' \textit{military capabilities}--the outputs of defense investment--changed in… Lire le résumé complet
-
From Platforms to Networks: The Political Hurdles of Transitioning to Data-Centric Warfare
Mr Dumitru-Catalin Vasile (National School of Political and Administrative Studies, Bucharest, Romania)
Modern military strategy is undergoing a paradigm shift, moving away from a "platform-centric" model defined by the capabilities of individual assets such as tanks, fighter jets, and carriers toward a "network-centric" model prioritizing connectivity, data fusion, and multi-domain integration. While the operational necessity of this transition is widely… Lire le résumé complet
-
NATO as an Innovation Hub? How Emerging and Disruptive Technologies Are Reshaping Allied Innovation
Vasiliki Plessia Aravani (Diplomatische Academie Wien, University of Vienna)
The literature on military diffusion has traditionally treated alliances as transmission paths through which nationally developed military technologies are disseminated among allies. In this view, NATO is exclusively portrayed as a forum for standardization and doctrinal coordination rather than also a site of military innovation. This paper revisits this… Lire le résumé complet
-
-
Beyond the State: Securitization, Governance, and Private Actors
Voir les communications (4)
-
Beyond the State: Voluntary Civilian Pro-Defence Organisations and Security Governance in Georgia
Rusudan Zabakhidze (Swedish Defence University)
This paper explores how the resurgence of interstate war in Europe following Russia’s full-scale invasion of Ukraine has reconfigured relations between defence and society, with particular attention to the role of voluntary pro-defence organisations in security governance. Over the past decade, states historically alert to Russian imperialism have… Lire le résumé complet
-
Pieter Zhao (Erasmus University Rotterdam)
This paper examines the re-emergence of private maritime security companies (PMSCs) in the late twentieth and early twenty-first centuries, situating their rise within both recent developments in maritime security and a broader historical context. Since the early 2000s, PMSCs have become a visible feature of global shipping security, particularly in… Lire le résumé complet
-
Mia Abdić
Border securitisation, externalisation, and the criminalisation of humanitarian assistance in migration contexts have become increasingly prominent features of European migration governance. This paper explores the phenomenon of the criminalisation of solidarity through a comparative overview of these practices in France, Italy, Greece, and Spain, alongside… Lire le résumé complet
-
The Strategic Logic of Violence During Negotiations
Johannes Lucht (ETH Zurich)
Negotiations are essential to ending armed conflict, yet we know surprisingly little about how violence evolves during the negotiation process itself. While existing research demonstrates that negotiations are essential for ending armed conflicts, most studies treat “negotiations” as a single event rather than a dynamic, multi-round process. This paper… Lire le résumé complet
Extended Nuclear Deterrence through European Eyes
Voir les communications (4)
-
What are tactical nuclear weapons for? The multiple logics of NATO’s theater nuclear posture
Linde Desmaele (Leiden University)
-
'Europe is Not a Country': Nuclear Patronage and Eurodeterrence Concerns in the Frontline States
Christopher David LaRoche (Carnegie Endowment for International Peace, Central European University)
-
Patterns of Foreign Nuclear Deployment: Understanding Host State Refusal in NATO
Jacklyn Majnemer (LSE)
-
Conceptualizing Nuclear Umbrellas
Alexander Sorg (Hertie School)
-
-
Coffee break
-
Regional Security in the Balkans
Voir les communications (4)
-
Western Balkan Criminal Groups and the Transformation of Regional Security
Dr Kire Babanoski (Faculty of Security - Skopje, University "St. Kliment Ohridski" Bitola, North Macedonia)
Criminal groups in the Western Balkans are influential non-state actors which informally regulate illegal markets, provide protection, and establish strategic partnerships with political and economic elites. They operate outside, alongside, and sometimes within state structures, and often through robust cross-border networks. They are quite flexible and… Lire le résumé complet
-
Peace as Stalemate: Bosnia and Herzegovina, Forever Missions and the Strategic Logic of Frozen Peace
Dr SENADA ŠELO ŠABIĆ (Institute for Development and International Relations, Zagreb, Croatia)
More than three decades after the Dayton Peace Agreement, Bosnia and Herzegovina remains subject to a continuous international military presence and extensive external governance, yet without achieving political stability or institutional consolidation. This paper examines Bosnia as a paradigmatic case of forever missions and frozen peace: interventions… Lire le résumé complet
-
Pitfalls of Transitional Justice and (In)Security in the Western Balkans: Case Study of Serbia
Dr SANDRA CVIKIĆ (Institute of Social Sciences Ivo Pilar, Regional Center Vukovar)
Drawing on the author's previous work, this paper offers insight into the implementation of transitional justice policies in the Western Balkans after the violent wars that accompanied the dissolution of socialist Yugoslavia, with a focus on the former Yugoslav state of Serbia. This qualitative sociological analysis explores the paradoxical effects of the… Lire le résumé complet
-
Bosnia and Herzegovina on the Edge of European Stability
Prof. Kenan Hodžić (Assistant Professor)
Bosnia and Herzegovina occupies a critical position in the security architecture of the Western Balkans, serving as a nexus of domestic vulnerabilities, regional dynamics, and broader European security concerns. This paper employs the multi-level security framework (Buzan, Wæver & de Wilde, 1998) to examine the intersection of internal political… Lire le résumé complet
Disruptive Machines: AI, Information Operations, and Cyber Security
Voir les communications (4)
-
Gil Baram (UC Berkeley and Bar Ilan University)
Digital technologies are entangling cyber risk, digital infrastructure, and governance. This paper argues that AI-enabled cybercrime is best understood as a transformation of the cybercrime ecosystem rather than merely as a set of new technical tactics. It draws on UC Berkeley’s “AI-Enabled Cybercrime: Exploring Risks, Building Awareness, and Guiding Policy… Lire le résumé complet
-
Financial (In)Security, TikTok, and the Far-Right Pipeline
Clara Jammot
While the relationship between far-right extremism, libertarianism, and neoliberalism has long been established, algorithmic recommendation as well as the lucrative professionalisation of content creation are leading platforms like TikTok to impact how financial (in)security feeds into the far-right’s proliferation. The rise in influencers promoting an… Lire le résumé complet
-
Cyber risk logics and their implications for cybersecurity
Sarah Backman (Försvarshögskolan)
Cybersecurity in national and international security is frequently discussed in an existential register. However, most cybersecurity activities are normal and routine, including diverse practices of cyber risk management. The intricacies of cyber risk and its connection to security and threat politics have received surprisingly little attention in the cyber… Lire le résumé complet
-
Alexandra Brankova (Swedish Defence University)
The paper explores how Russian geopolitical narratives about the national self and the enemy are constructed and amplified on VKontakte (VK) before and after the start of Russia’s full-scale invasion of Ukraine. VK is the largest social media platform in the Russian Federation, and it is being gradually integrated into a government-led multipurpose… Lire le résumé complet
-
-
Reception & Poster Presentations
Voir les communications (4)
-
State fragility, power sharing institutions and group inequalities
Gulzhan Asylbek kyzy (UNU-MERIT)
-
A Shadow in the Clouds: Where Is Germany’s Missile Posture Heading?
Lucian Bumeder (IFSH)
-
Speak through the Nocturne: Navigating Strategic Interest in Intelligence Diplomacy
Archishman Ray Goswami (DPhil International Relations, University of Oxford)
Indico fait foi pour le programme — cette grille est un instantané quotidien. Voir l'événement sur Indico
Une version provisoire du programme — la grille en direct ci-dessus reflète les dernières modifications.
Université de Stockholm
Chaque année, la European Security Conference est organisée dans un pays européen différent. La conférence 2026 se tiendra à l'Université de Stockholm, dans le cadre de l'Action COST NetSec.
Se déplacer à Stockholm
Le lieu de la conférence, le campus principal de l'Université de Stockholm, est situé le long de la « ligne rouge » du transport public de la ville.
Nous recommandons de chercher un hébergement en ville, dans l'un des quartiers suivants :
Södermalm
Métros Hornstull, Zinkensdamm, Mariatorget, Slussen. Généralement moins cher que les autres quartiers, avec plus d'options d'auberges.
Gamla stan
La vieille ville — le centre historique de Stockholm sur sa propre petite île.
T-centralen
Gare de Stockholm City — le hub central des transports.
Östermalmstorg
Un élégant quartier central au nord-est.
Stadion
Près du stade olympique de Stockholm de 1912 — à deux pas du lieu de la conférence.
L'hébergement est généralement moins cher à Södermalm, où vous trouverez aussi plus d'auberges.
Soutenu par Horizon Europe
L'Action COST Networking European Security Knowledge (NetSec) (CA24154) est soutenue par le programme Horizon de l'Union européenne.