全文获取类型
收费全文 | 275篇 |
免费 | 7篇 |
出版年
2021年 | 3篇 |
2020年 | 3篇 |
2019年 | 5篇 |
2018年 | 3篇 |
2017年 | 9篇 |
2016年 | 7篇 |
2015年 | 6篇 |
2014年 | 7篇 |
2013年 | 80篇 |
2012年 | 3篇 |
2011年 | 3篇 |
2010年 | 3篇 |
2009年 | 5篇 |
2008年 | 5篇 |
2007年 | 3篇 |
2006年 | 2篇 |
2005年 | 4篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 2篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1996年 | 4篇 |
1995年 | 5篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1987年 | 2篇 |
1986年 | 7篇 |
1985年 | 5篇 |
1983年 | 3篇 |
1982年 | 8篇 |
1981年 | 1篇 |
1980年 | 5篇 |
1979年 | 3篇 |
1978年 | 3篇 |
1977年 | 4篇 |
1976年 | 2篇 |
1975年 | 5篇 |
1974年 | 5篇 |
1973年 | 6篇 |
1972年 | 5篇 |
1971年 | 8篇 |
1970年 | 3篇 |
1969年 | 5篇 |
1968年 | 5篇 |
1967年 | 2篇 |
1966年 | 2篇 |
1948年 | 3篇 |
排序方式: 共有282条查询结果,搜索用时 93 毫秒
31.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article. 相似文献
32.
Tlohang W. Letsie 《African Security Review》2013,22(3-4):291-307
ABSTRACTThe Kingdom of Lesotho spends around five per cent of its annual budget – some 700 million Maloti ($US52.6 million) in 2017 – on the Lesotho Defence Force (LDF). Lesotho’s geographical position means that the LDF has no meaningful role regarding its primary function of defending the country from external aggression and it hardly engages in its secondary functions. In addition, the LDF has a long history of interference with democratic processes and engaging in human rights abuse. The financial resources currently allocated to the LDF could do far more for security, widely defined, if they were allocated to a number of other government expenditure categories. 相似文献
33.
Harald Müller 《The Nonproliferation Review》2013,20(3):545-565
In two landmark articles, longtime scholars Kenneth N. Waltz and Thomas C. Schelling have re-emphasized the utility of nuclear deterrence over nuclear nonproliferation (Waltz) and nuclear disarmament (Schelling). While the thrust of the articles is seemingly different, both are rooted in the same intellectual ground: an epistemology that assumes problem-free inferences, drawn from past experiences, are applicable in future scenarios; a foundational rooting in strategic rationality that entangles them in unsolvable contradictions concerning comparable risks of different nuclear constellations, namely deterrence versus proliferation and disarmament; and a bias in framing the empirical record that makes nuclear deterrence more conducive to security than nuclear disarmament. The common normative-practical denominator, then, is to let a nuclear weapon-free world appear both less desirable and less feasible than it might actually be. 相似文献
34.
35.
36.
37.
J. Brent Wilson Ian F.W. Beckett John T. Fishel Richard Dale 《Small Wars & Insurgencies》2013,24(3):425-432
John Lawrence Tone, The Fatal Knot: The Guerrilla War in Navarre and the Defeat of Napoleon in Spain. Chapel Hill and London; The University of North Carolina Press 1994. Pp.vii + 239, 1 map, biblio., index. $34.95 (cloth). ISBN 0–8078–2169–1. Robert Holland (ed), Emergencies and Disorder in the European Empires after 1945. London: Frank Cass, 1994. Pp.x + 256; index. £32 (cloth); £15 (paper). ISBN 0–7146–4516–8 and 4109 X Deborah L. Norden, Military Rebellion in Argentina: Between Coups and Consolidation. Lincoln, NE: University of Nebraska Press, 1996. Pp.242, index, $35/$17.50 (paper). ISBN 0–8032–8369–5. William M. Minter, Apartheid's Contras: An Inquiry into the Roots of War in Angola and Mozambique. London and Atlantic Highlands, NJ: Zed Books Ltd; Johannesburg: Witwatersrand University Press, 1994. Pp. xii +308, 3 maps, biblio., index. $69.95/£39.95 (cloth); $29.95/£16.95(paper). ISBN 1–85649–266–4 and 266–4. 相似文献
38.
39.
40.
A generalization of the equi-partitioning problem, termed the 2D-Partition Problem, is formulated. The motivation is an aircraft maintenance scheduling problem with the following characteristics. The complete maintenance overhaul of a single aircraft requires the completion of some 350 tasks. These tasks require a varying number of technicians working at the same time. For large subsets of these 350 tasks, the constraining resource is physical space—tasks must be completed in a physical space of limited size such as the cockpit. Furthermore, there is no precedence relationship among the tasks. For each subset, the problem is to schedule the tasks to minimize makespan. Let m denote the maximum number of technicians that can work at the same time in the physical area under consideration. We present optimization algorithms for m = 2 and 3. © 1996 John Wiley & Sons, Inc. 相似文献