全文获取类型
收费全文 | 570篇 |
免费 | 6篇 |
国内免费 | 5篇 |
专业分类
581篇 |
出版年
2025年 | 2篇 |
2024年 | 2篇 |
2023年 | 3篇 |
2021年 | 14篇 |
2020年 | 9篇 |
2019年 | 30篇 |
2018年 | 30篇 |
2017年 | 34篇 |
2016年 | 35篇 |
2015年 | 17篇 |
2014年 | 51篇 |
2013年 | 98篇 |
2012年 | 14篇 |
2011年 | 27篇 |
2010年 | 36篇 |
2009年 | 28篇 |
2008年 | 33篇 |
2007年 | 22篇 |
2006年 | 20篇 |
2005年 | 22篇 |
2004年 | 16篇 |
2003年 | 15篇 |
2002年 | 7篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有581条查询结果,搜索用时 0 毫秒
151.
152.
操作系统是紧靠硬件的基础软件,它既是应用软件安全的坚实基础,又是硬件不安全因素的屏蔽器.在操作系统安全隐患和嵌入式操作系统技术特点的基础上,提出信息保护、空间域保护和时间域保护等增强操作系统安全性的几种方法,以提高嵌入式系统抗击系统本身缺陷或敌方恶意攻击等安全威胁的能力.上述几种安全保护技术已在嵌入式Linux中进行验证,并取得满意的结果. 相似文献
153.
Strengthening the United States' ability to prevent adversaries from smuggling nuclear materials into the country is a vital and ongoing issue. The prospect of additional countries, such as Iran, obtaining the know‐how and equipment to produce these special nuclear materials in the near future underscores the need for efficient and effective inspection policies at ports and border crossings. In addition, the reduction of defense and homeland security budgets in recent years has made it increasingly important to accomplish the interdiction mission with fewer funds. Addressing these complications, in this article, we present a novel two‐port interdiction model. We propose using prior inspection data as a low‐cost way of increasing overall interdiction performance. We provide insights into two primary questions: first, how should a decision maker at a domestic port use detection data from the foreign port to improve the overall detection capability? Second, what are potential limitations to the usefulness of prior inspection data—is it possible that using prior data actually harms decision making at the domestic port? We find that a boundary curve policy (BCP) that takes into account both foreign and domestic inspection data can provide a significant improvement in detection probability. This BCP also proves to be surprisingly robust, even if adversaries are able to infiltrate shipments during transit. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 433‐448, 2013 相似文献
154.
Walter C. Ladwig III 《Small Wars & Insurgencies》2013,24(1):62-88
From 1964 to 1975 a small group of British officers, advisors, and trainers guided the forces of the Sultanate of Oman to victory in their conflict with the Marxist insurgents of the People's Front for the Liberation of the Occupied Arabian Gulf (PFLOAG). This campaign provides a clear example of how to effectively support an ally's counterinsurgency efforts with a minimal commitment of men and material. In particular, the critical assistance provided by the British consisted of experienced leadership and skilled technical support personnel as well as a viable strategy for victory. However, more important for the ultimate success of the counterinsurgency campaign was the emergence of new progressive leadership with the accession of Sultan Qaboos. The most important lesson from this study is that while security assistance can reinforce positive political efforts, it is not enough on its own to bring about a victory in an unfavourable political environment. 相似文献
155.
156.
Andrew Sanders 《Small Wars & Insurgencies》2013,24(3):465-492
The role of the British Army in Northern Ireland during Operation Banner (1969–2007) is an instructive case study of counterinsurgency operations as well as an important chapter in recent British military history. Given troops deployed to the province as aid to the civil power, it is particularly useful in discussions about the principle of minimum force. This article seeks to explore the issue of minimum force through the example of Operation Motorman, the Army's successful attempt to remove the barricades, which had established so-go areas for the security forces in Northern Ireland. 相似文献
157.
João Ricardo Faria 《Defence and Peace Economics》2013,24(6):595-605
This article introduces integro-differential equations as a new technique to study terrorism dynamics. An integro-differential equation is a mathematical expression that contains derivatives of the required function and its integral transforms. The technique is applied to two different dynamic models in terrorism: terrorism and tourism, and terrorist innovations. In the first model the number of tourists that appears in an integral term and also in a derivative term is impacted by the number of terrorists. In the second model the integro-differential equation for terrorist innovations relates them to terrorist attacks. The article shows how to solve, analyze, interpret, and deal with integro-differential equations. Integro-differential equations shed light on aspects of the models ignored when other techniques are used. This is particularly important for the evaluation of current counterterrorist policies, as well as to the formulation of new ones. 相似文献
158.
Jonathan Chukwuemeka Madu 《African Security Review》2013,22(3):279-290
Though laws have been enacted in different parts of Nigeria to address some aspects of gender-based violence, domestic violence persists with serious consequences for social and economic development. Nigeria has not enacted specific domestic law that is applicable throughout the federation, despite the United Nations mandate to all countries to adopt and enforce such laws by 2015. This article examines the causes and nature of domestic violence in Nigeria, and the legal reform needed to address the situation. In addition to library sources, the study used focus group discussions and individual interviews (involving the general population, key informants, legislators and traditional rulers) to discover that enacting specific national domestic violence legislation is necessary to address the problem in Nigeria, but enacting laws alone is not a magic bullet. 相似文献
159.
Much is made in the security sector reform literature of the role of civil society as an overseer and monitor of the security sector, contributing to improved accountability and governance. This paper looks at how the notion of ‘civil society capacity’ needs to be disaggregated in order to develop meaningful strategies to assist civil society organisations to impact security sector reforms in complex, post-conflict contexts like the Democratic Republic of Congo. It draws on fieldwork conducted with 200 Congolese civil society groups that are attempting to engage in current security sector reform processes, and looks at which capacities are required to improve oversight by civil society groups. 相似文献
160.
Egle Murauskaite 《The Nonproliferation Review》2013,20(3-4):321-339
ABSTRACTThis article explores the paradox of trust in the largest nuclear smuggling operation involving highly enriched uranium (HEU) discussed in open source literature. In the first effort to understand the type, extent, and role of trust in nuclear smuggling enterprises, it draws from literature on trust development in legitimate businesses as well as criminal enterprises. Observed behavioral patterns in this case challenge traditional notions of the internal dynamics of temporary groups engaged in nuclear smuggling and operational realities of such activities. The article seeks to explain why individuals agree (and continue) to operate in this high-risk environment, unbound by close personal ties, without any effort to verify the background, motives, or qualifications of the fellow conspirators. It offers ways to advance current nonproliferation efforts in non-state actor interdiction by exploiting the environment of shallow trust in temporary groups. 相似文献