全文获取类型
收费全文 | 3009篇 |
免费 | 73篇 |
国内免费 | 1篇 |
出版年
2021年 | 37篇 |
2019年 | 88篇 |
2018年 | 55篇 |
2017年 | 82篇 |
2016年 | 84篇 |
2015年 | 62篇 |
2014年 | 66篇 |
2013年 | 733篇 |
2012年 | 25篇 |
2011年 | 24篇 |
2010年 | 35篇 |
2009年 | 37篇 |
2008年 | 49篇 |
2007年 | 52篇 |
2006年 | 36篇 |
2005年 | 43篇 |
2004年 | 56篇 |
2003年 | 43篇 |
2002年 | 58篇 |
2001年 | 32篇 |
2000年 | 32篇 |
1999年 | 42篇 |
1998年 | 47篇 |
1997年 | 48篇 |
1993年 | 25篇 |
1991年 | 34篇 |
1990年 | 25篇 |
1989年 | 32篇 |
1987年 | 23篇 |
1986年 | 72篇 |
1985年 | 64篇 |
1984年 | 37篇 |
1983年 | 42篇 |
1982年 | 43篇 |
1981年 | 45篇 |
1980年 | 51篇 |
1979年 | 46篇 |
1978年 | 49篇 |
1977年 | 45篇 |
1976年 | 46篇 |
1975年 | 47篇 |
1974年 | 53篇 |
1973年 | 50篇 |
1972年 | 52篇 |
1971年 | 43篇 |
1970年 | 41篇 |
1969年 | 40篇 |
1968年 | 35篇 |
1967年 | 33篇 |
1966年 | 27篇 |
排序方式: 共有3083条查询结果,搜索用时 595 毫秒
981.
Michael Barletta Clay Bowen Kimber Cramer R. Adam Moody 《The Nonproliferation Review》2013,20(2):132-145
The material in this overview is drawn from selected abstracts that appear in the Center for Nonproliferation Studies’ nuclear and missile databases. Transactions of nuclear and missile technologies, parts, and materials are listed according o the recipient country. Other developments are listed according to the country where the event or development took place. 相似文献
982.
983.
984.
985.
Automated responses are an inevitable aspect of cyberwarfare, but there has not been a systematic treatment of the conditions in which they are morally permissible. We argue that there are three substantial barriers to the moral permissibility of an automated response: the attribution, chain reaction, and projection bias problems. Moreover, these three challenges together provide a set of operational tests that can be used to assess the moral permissibility of a particular automated response in a specific situation. Defensive automated responses will almost always pass all three challenges, while offensive automated responses typically face a substantial positive burden in order to overcome the chain reaction and projection bias challenges. Perhaps the most interesting cases arise in the middle ground between cyber-offense and cyber-defense, such as automated cyber-exploitation responses. In those situations, much depends on the finer details of the response, the context, and the adversary. Importantly, however, the operationalizations of the three challenges provide a clear guide for decision-makers to assess the moral permissibility of automated responses that could potentially be implemented. 相似文献
986.
987.
988.
989.
Shireen K. Burki 《Defense & Security Analysis》2013,29(3):234-252
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir. 相似文献
990.
Strategic terrorism: The framework and its fallacies 总被引:1,自引:0,他引:1
Dr Peter R. Neumann 《战略研究杂志》2013,36(4):571-595
This article seeks to lay out a comprehensive framework by which those who utilize a campaign of strategic terrorism seek to attain their ends. It identifies a distinctive modus operandi: 1) disorientation: to alienate the authorities from their citizens, reducing the government to impotence in the eyes of the population; 2) target response: to induce a target to respond in a manner that is favorable to the insurgent cause; 3) gaining legitimacy: to exploit the emotional impact of the violence to insert an alternative political message. By elucidating the strategy of terrorism, the analysis also reveals its inherent limitations. Resting on the premise that a militarily more powerful adversary will in some way feel restrained from bringing the full force of its military superiority to bear, the strategy relies exclusively on the exploitation of the psychological effects of armed action, thereby rendering it vulnerable to those who are willing to view the resolution of clashes of interest principally in terms of the tangibles of military power. 相似文献