全文获取类型
收费全文 | 521篇 |
免费 | 36篇 |
国内免费 | 17篇 |
出版年
2023年 | 1篇 |
2021年 | 14篇 |
2020年 | 6篇 |
2019年 | 30篇 |
2018年 | 33篇 |
2017年 | 37篇 |
2016年 | 34篇 |
2015年 | 17篇 |
2014年 | 49篇 |
2013年 | 116篇 |
2012年 | 8篇 |
2011年 | 27篇 |
2010年 | 34篇 |
2009年 | 28篇 |
2008年 | 35篇 |
2007年 | 22篇 |
2006年 | 17篇 |
2005年 | 19篇 |
2004年 | 13篇 |
2003年 | 15篇 |
2002年 | 8篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有574条查询结果,搜索用时 15 毫秒
81.
Colin Robinson 《Small Wars & Insurgencies》2013,24(3):474-499
Since the peace agreements of 2002–2003 which ended the second war in the Democratic Republic of Congo, reconstruction of the army has been an inherently political process, in common with other attempts to carry out security sector reform (SSR). This article briefly sketches out the Congolese army's history, then attempts to fill a gap in the literature on Congolese SSR by detailing what can be found of the actual structure and shape of the present army. The efforts that have been made to reform the army are then examined, followed by a conclusion which examines the major issues and possible ways forward. 相似文献
82.
黄红梅 《武警工程学院学报》2013,(6):28-31
提出了一种新的三粒子量子安全直接通信协议。通信过程利用decoy光子来检测窃听,保证信道安全。发送方将秘密消息编码在不同幺正操作上,通信双方通过Bell基和Z基测量可直接传递秘密消息。由于所有粒子都用于传输秘密消息,且传输一次可获得两比特信息,该协议具有较高的量子比特及量子密码协议效率;三粒子纠缠态的制备是已实现技术,该协议具有实际操作的意义。此外,该协议在量子信道中也是安全的。 相似文献
83.
随着中美实力差距不断缩小和信息技术的发展与扩散,网络安全成为中美新的竞争点和摩擦点,中美在网络安全问题上展开新一轮的博弈,具体体现为网络空间治理权之争、中美网络安全战略博弈和网络技术优势的夺取。 相似文献
84.
海上方向是强敌对我实施战略围堵和遏制的主要方向。随着美国国防战略重回大国竞争,其遏制中国的手段推陈出新,尤其是在海空方向对我施压强度频度与日俱增。文章运用SWOT方法对我国海上方向空中安全形势进行了全面分析,认为优势体现在联合作战指挥体制、国防动员能力、列装新型防空武器等方面,劣势体现在战场建设滞后、预警探测拦截打击能力不足等方面,机遇体现在中美共识与相对稳定的周边环境,威胁体现在强敌对我的侦察威慑、空天打击、海空封锁。通过构建我国海上方向空中安全的SWOT分析矩阵,提出要进一步深化改革,加强军队与地方、平时与战时、作战力量和作战环节的“三个统筹”,发展新型防空、预警装备,以及加强沿海防空战场建设等。 相似文献
85.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability. 相似文献
86.
Colin D. Robinson 《Defense & Security Analysis》2019,35(2):211-221
To engage properly with the Somali National Army, to understand it in the hope of improving stability and the lives of over 12 million Somalis, good basic information on its composition and characteristics is necessary. Authoritative accounts on the subject have been scarce for over 25 years. This account seeks to detail the army’s dispositions across southern Somalia, and, more importantly, the brigades’ clan compositions and linkages. Clan ties supersede loyalties to the central government. The army as it stands is a collection of former militias which suffer from ill-discipline and commit crime along with greater atrocities. Estimates of numbers are unreliable, but there might be 13,000 or more fighters in six brigades in the Mogadishu area and five beyond. 相似文献
87.
The article examines the findings of the Commission of Inquiry established by the Norwegian government in 2014 to evaluate all aspects of Norway’s civilian and military contribution to the international operation in Afghanistan from 2001 to 2014. Concerned with the wider implications of the Commission’s findings, it focuses on two issues in particular: (1) Norway’s relations with the US, a close and long-standing strategic ally whose resources, capabilities and dominance of decision-making dwarfed that of all other coalition partners in Afghanistan; and (2) Norway’s record in the province of Faryab, where, from 2005 to 2012, a Norwegian-led Provincial Reconstruction Team was charged with bringing security, good governance and development to the province. How Norway prioritised and managed relations with the US highlights and helps to problematise the challenges – political, practical and moral – facing small and medium-sized powers operating in a coalition alongside the US. Norwegian efforts in Faryab are revealing of the dilemmas and contradictions that plagued and, ultimately, fatally undermined the international intervention as a whole. As such, Norway’s experience provides a microcosm through which the inherent limitations of the attempt to transfer the structures of modern statehood and Western democracy to Afghanistan can be better understood. 相似文献
88.
Stan Jagger 《Small Wars & Insurgencies》2018,29(2):316-343
Armed groups are usually seen as threats to humanitarian action but less attention has been paid where they provide assistance to constituent populations. Ethnic armed groups (EAGs) in Myanmar have developed associated welfare organisations that perform this role. This article argues this is due to EAG social embeddedness and flexibility to changes in sources of funding and support, and the influence of their relations with international humanitarian organisations. This article further contends a subset of advocacy, health and education organisations have evolved to form a nascent civil society within the political and social non-state sphere of some established EAGs. 相似文献
89.
互联网的发展加速了权力分散,对我国的国家安全尤其是文化安全维护提出了新的问题。当前,我国社会进入新时代发展阶段,社会主要矛盾发生重要变化。与互联网尤其是网络文化安全有关的风险和挑战不断增多,互联网已经成为文化安全斗争的主战场。如何直面挑战,着力维护网络文化安全,提出队伍建设、舆论阵地和平台建设、维护手段、思维和素养、机制和法规建设的对策方法。 相似文献
90.