首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   570篇
  免费   6篇
  国内免费   5篇
  581篇
  2025年   2篇
  2024年   2篇
  2023年   3篇
  2021年   14篇
  2020年   9篇
  2019年   30篇
  2018年   30篇
  2017年   34篇
  2016年   35篇
  2015年   17篇
  2014年   51篇
  2013年   98篇
  2012年   14篇
  2011年   27篇
  2010年   36篇
  2009年   28篇
  2008年   33篇
  2007年   22篇
  2006年   20篇
  2005年   22篇
  2004年   16篇
  2003年   15篇
  2002年   7篇
  2001年   3篇
  2000年   3篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1995年   2篇
  1994年   1篇
  1993年   1篇
  1991年   1篇
  1990年   1篇
排序方式: 共有581条查询结果,搜索用时 0 毫秒
151.
纳米技术的兴起为全世界带来了一场全新的科技变革。纳米技术在信息、化工、医药、农业、环保、航空航天等众多领域具有重要的应用价值和广阔的发展前景,被誉为21世纪的三大高新技术之一。然而,经过近五十余年的发展,纳米技术的\"双刃剑\"效应逐渐显现,纳米技术的滥用对国家安全可能产生的风险正在日益积聚,集中体现在人类健康与生态环境、国家经济安全、国防安全等领域。  相似文献   
152.
操作系统是紧靠硬件的基础软件,它既是应用软件安全的坚实基础,又是硬件不安全因素的屏蔽器.在操作系统安全隐患和嵌入式操作系统技术特点的基础上,提出信息保护、空间域保护和时间域保护等增强操作系统安全性的几种方法,以提高嵌入式系统抗击系统本身缺陷或敌方恶意攻击等安全威胁的能力.上述几种安全保护技术已在嵌入式Linux中进行验证,并取得满意的结果.  相似文献   
153.
    
Strengthening the United States' ability to prevent adversaries from smuggling nuclear materials into the country is a vital and ongoing issue. The prospect of additional countries, such as Iran, obtaining the know‐how and equipment to produce these special nuclear materials in the near future underscores the need for efficient and effective inspection policies at ports and border crossings. In addition, the reduction of defense and homeland security budgets in recent years has made it increasingly important to accomplish the interdiction mission with fewer funds. Addressing these complications, in this article, we present a novel two‐port interdiction model. We propose using prior inspection data as a low‐cost way of increasing overall interdiction performance. We provide insights into two primary questions: first, how should a decision maker at a domestic port use detection data from the foreign port to improve the overall detection capability? Second, what are potential limitations to the usefulness of prior inspection data—is it possible that using prior data actually harms decision making at the domestic port? We find that a boundary curve policy (BCP) that takes into account both foreign and domestic inspection data can provide a significant improvement in detection probability. This BCP also proves to be surprisingly robust, even if adversaries are able to infiltrate shipments during transit. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 433‐448, 2013  相似文献   
154.
    
From 1964 to 1975 a small group of British officers, advisors, and trainers guided the forces of the Sultanate of Oman to victory in their conflict with the Marxist insurgents of the People's Front for the Liberation of the Occupied Arabian Gulf (PFLOAG). This campaign provides a clear example of how to effectively support an ally's counterinsurgency efforts with a minimal commitment of men and material. In particular, the critical assistance provided by the British consisted of experienced leadership and skilled technical support personnel as well as a viable strategy for victory. However, more important for the ultimate success of the counterinsurgency campaign was the emergence of new progressive leadership with the accession of Sultan Qaboos. The most important lesson from this study is that while security assistance can reinforce positive political efforts, it is not enough on its own to bring about a victory in an unfavourable political environment.  相似文献   
155.
    
  相似文献   
156.
    
The role of the British Army in Northern Ireland during Operation Banner (1969–2007) is an instructive case study of counterinsurgency operations as well as an important chapter in recent British military history. Given troops deployed to the province as aid to the civil power, it is particularly useful in discussions about the principle of minimum force. This article seeks to explore the issue of minimum force through the example of Operation Motorman, the Army's successful attempt to remove the barricades, which had established so-go areas for the security forces in Northern Ireland.  相似文献   
157.
    
This article introduces integro-differential equations as a new technique to study terrorism dynamics. An integro-differential equation is a mathematical expression that contains derivatives of the required function and its integral transforms. The technique is applied to two different dynamic models in terrorism: terrorism and tourism, and terrorist innovations. In the first model the number of tourists that appears in an integral term and also in a derivative term is impacted by the number of terrorists. In the second model the integro-differential equation for terrorist innovations relates them to terrorist attacks. The article shows how to solve, analyze, interpret, and deal with integro-differential equations. Integro-differential equations shed light on aspects of the models ignored when other techniques are used. This is particularly important for the evaluation of current counterterrorist policies, as well as to the formulation of new ones.  相似文献   
158.
    
Though laws have been enacted in different parts of Nigeria to address some aspects of gender-based violence, domestic violence persists with serious consequences for social and economic development. Nigeria has not enacted specific domestic law that is applicable throughout the federation, despite the United Nations mandate to all countries to adopt and enforce such laws by 2015. This article examines the causes and nature of domestic violence in Nigeria, and the legal reform needed to address the situation. In addition to library sources, the study used focus group discussions and individual interviews (involving the general population, key informants, legislators and traditional rulers) to discover that enacting specific national domestic violence legislation is necessary to address the problem in Nigeria, but enacting laws alone is not a magic bullet.  相似文献   
159.
    
Much is made in the security sector reform literature of the role of civil society as an overseer and monitor of the security sector, contributing to improved accountability and governance. This paper looks at how the notion of ‘civil society capacity’ needs to be disaggregated in order to develop meaningful strategies to assist civil society organisations to impact security sector reforms in complex, post-conflict contexts like the Democratic Republic of Congo. It draws on fieldwork conducted with 200 Congolese civil society groups that are attempting to engage in current security sector reform processes, and looks at which capacities are required to improve oversight by civil society groups.  相似文献   
160.
    
ABSTRACT

This article explores the paradox of trust in the largest nuclear smuggling operation involving highly enriched uranium (HEU) discussed in open source literature. In the first effort to understand the type, extent, and role of trust in nuclear smuggling enterprises, it draws from literature on trust development in legitimate businesses as well as criminal enterprises. Observed behavioral patterns in this case challenge traditional notions of the internal dynamics of temporary groups engaged in nuclear smuggling and operational realities of such activities. The article seeks to explain why individuals agree (and continue) to operate in this high-risk environment, unbound by close personal ties, without any effort to verify the background, motives, or qualifications of the fellow conspirators. It offers ways to advance current nonproliferation efforts in non-state actor interdiction by exploiting the environment of shallow trust in temporary groups.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号