首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   639篇
  免费   61篇
  国内免费   45篇
  2023年   3篇
  2022年   4篇
  2021年   15篇
  2020年   9篇
  2019年   29篇
  2018年   31篇
  2017年   39篇
  2016年   38篇
  2015年   23篇
  2014年   67篇
  2013年   106篇
  2012年   20篇
  2011年   45篇
  2010年   44篇
  2009年   46篇
  2008年   49篇
  2007年   36篇
  2006年   27篇
  2005年   28篇
  2004年   22篇
  2003年   18篇
  2002年   8篇
  2001年   6篇
  2000年   9篇
  1999年   4篇
  1998年   4篇
  1997年   3篇
  1995年   5篇
  1994年   3篇
  1993年   3篇
  1990年   1篇
排序方式: 共有745条查询结果,搜索用时 15 毫秒
741.
ABSTRACT

The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare.  相似文献   
742.
ABSTRACT

Bagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state.  相似文献   
743.
ABSTRACT

Over a decade of security force assistance (SFA) initiatives to build an effective Somali National Army (SNA) failed because of the interrelated effects of political, contextual and operational challenges. The key political challenges were interest asymmetry between international actors and Somali elites, insufficient focus on institution-building and a lack of donor coordination. The principal contextual challenges in Somalia were the legacies of two decades of state collapse and the negative effects of clan dynamics. The main operational challenges were building an army while simultaneously fighting a war, the complexities of military integration, and the severe capability gaps afflicting the SNA.  相似文献   
744.
相对固定的军力部署会提前暴露军事意图。为避免此种情况,美军在2018年《国防战略报告》中提出要实现作战的不可预见性。未来美军不可预见的动态军事力量部署一定程度上增加了军事斗争准备难度。为提升军队机场阵地战场生存能力,有必要针对性地调整应对策略,增强对抗“不可预见作战”的能力。本文着眼军用机场阵地,从三个方面分析对抗不可预见作战的伪装策略:首先阐述不可预见作战的特点,其次分析在“不可预见作战”条件下,现有机场阵地在伪装方面的短板,最后提出对抗“不可预见作战”的伪装策略。通过分析认为,为对抗美军新的作战构想,军事机场阵地伪装策略应从战时应用调整为平战结合,应更加侧重平时的伪装训练和伪装工程建设。  相似文献   
745.
ABSTRACT

The rising trend of kidnapping targeting women has shown that counterinsurgency does not begin and end with the strategic advantage of state security providers in the security market and the field. Kidnapping of females by Boko Haram insurgents threatens human security and hinders sustainable development goals in Northeastern Nigeria. With primary and secondary sources, this qualitative study examines how Boko Haram insurgents target women in Northeastern Nigeria. The paper argues that community driven security strategy achievable through the collaboration between state and traditional security providers, can prevent the entry and easy escape of the insurgents. It concludes that the forces of order should sustain a policy of stop and searches until insurgents are defeated along with a programme of community-based human rights education and insurgency emergency response system for quick response to security threats.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号