Izumikawa, Yasuhiro (2013). "To Coerce or Reward? Theorizing Wedge Strategies in Alliance Politics". Security Studies. 22 (3): 498–531. doi:10.1080/09636412.2013.816121. S2CID145511562.
Crawford, Timothy (2008). "Wedge Strategy, Balancing, and the Deviant Case of Spain, 1940–41". Security Studies. 17 (1): 1–38. doi:10.1080/09636410801894126. S2CID145192143.
Crawford, Timothy (Spring 2011). "Preventing Enemy Coalitions: How Wedge Strategies Shape Power Politics". International Security. 35 (4): 155–189. doi:10.1162/ISEC_a_00036. JSTOR41289683. S2CID57559849.
Sheng Hao Chai, Tommy (2020). "How China attempts to drive a wedge in the U.S.-Australia alliance". Australian Journal of International Affairs. 74 (5): 511–531. doi:10.1080/10357718.2020.1721432.
Joo Yoo, Hyon (January–March 2015). "China's Friendly Offensive Toward Japan in the 1950s: The Theory of Wedge Strategies and International Relations". Asian Perspective. 39 (1): 1–26. doi:10.1353/apr.2015.0007.
Huang, Yuxing (Summer 2020). "An Interdependence Theory of Wedge Strategies". The Chinese Journal of International Politics. 13 (2): 253–286. doi:10.1093/cjip/poaa004.
Chun, Jayhun; Ku, Yangmo (Summer 2020). "Clashing Geostrategic Choices in East Asia, 2009-2015: Re-balancing, Wedge Strategy, and Hedging". The Korean Journal of International Studies. 18 (1): 253–286. doi:10.1093/cjip/poaa004.
Vu, Khang (2023). "External Coercion, Internal Accommodation: China's Wedge Strategies Towards the Vietnam-United States Partnership, 2013–2022". Journal of Contemporary China: 1–21. doi:10.1080/10670564.2023.2228718.
Izumikawa, Yasuhiro (2013). "To Coerce or Reward? Theorizing Wedge Strategies in Alliance Politics". Security Studies. 22 (3): 498–531. doi:10.1080/09636412.2013.816121. S2CID145511562.
Crawford, Timothy (2008). "Wedge Strategy, Balancing, and the Deviant Case of Spain, 1940–41". Security Studies. 17 (1): 1–38. doi:10.1080/09636410801894126. S2CID145192143.
Crawford, Timothy (Spring 2011). "Preventing Enemy Coalitions: How Wedge Strategies Shape Power Politics". International Security. 35 (4): 155–189. doi:10.1162/ISEC_a_00036. JSTOR41289683. S2CID57559849.