全文获取类型
收费全文 | 577篇 |
免费 | 63篇 |
国内免费 | 15篇 |
出版年
2023年 | 1篇 |
2022年 | 5篇 |
2021年 | 8篇 |
2020年 | 16篇 |
2019年 | 7篇 |
2018年 | 12篇 |
2017年 | 29篇 |
2016年 | 20篇 |
2015年 | 14篇 |
2014年 | 50篇 |
2013年 | 50篇 |
2012年 | 39篇 |
2011年 | 50篇 |
2010年 | 35篇 |
2009年 | 37篇 |
2008年 | 43篇 |
2007年 | 40篇 |
2006年 | 28篇 |
2005年 | 39篇 |
2004年 | 22篇 |
2003年 | 29篇 |
2002年 | 17篇 |
2001年 | 19篇 |
2000年 | 9篇 |
1999年 | 10篇 |
1998年 | 5篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 4篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 5篇 |
1989年 | 2篇 |
排序方式: 共有655条查询结果,搜索用时 140 毫秒
151.
国家间的对抗与合作是国际关系中的最常见的问题,通过引入博弈论中的讨价还价模型和差分方程,分析了联盟的形成机制,并对三国合作、三国竞争以及三国部分合作对抗的情况进行了比较,通过数值仿真对模型分析过程进行了验证,仿真结果表明,不同类型国家的策略选择对博弈结果影响很大,研究内容较好地揭示了国家间矛盾与利益的变化规律,为深入理解国际关系提供了参考。 相似文献
152.
153.
154.
针对舰船装备维修保障领域维修保障知识缺乏有效统一管理、共享和重用程度低等问题,将领域本体理论引入维修保障知识管理中,提出了基于全寿命周期的舰船装备维修保障知识本体建模方法。分析舰船装备维修保障领域知识的来源、分类和构成,构建了装备维修保障领域的顶层本体及其概念关系。重点介绍了维修保障知识中故障案例知识的本体建模表示,并提出了基于预检索的全局故障案例知识检索算法,建立了原型系统并应用验证。结果表明:该方法能够解决目前维修保障知识管理中存在的问题,提高了知识检索效率。 相似文献
155.
156.
157.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
158.
Michael Robillard 《Journal of Military Ethics》2017,16(3-4):205-219
The profession of arms is distinct from other professions for many reasons. One reason which is not so obvious is that, unlike members of other professions, soldiers may go their entire careers preparing for a day that never arrives. All things considered, we should think this to be a very good thing. For soldiers, however, this can feel somewhat odd, since there is a natural desire to want to feel useful and to see one’s role and purpose find realization. Accordingly, the common soldier is forced to adopt a rather paradoxical mindset, one of longing for peace, and therefore for uselessness, while at the same time longing to be useful, which would entail that there be a war. This latter desire to be useful and to vindicate one’s identity as a soldier can sometimes take on an unhealthy life of its own. The pull of wanting too strongly to live up to a warrior identity, I argue, can sometimes skew a soldier’s ability to assess risk rationally. This article will therefore investigate how a soldier’s concept of self influences his or her overall capacity to evaluate risk in war and when such influence might become morally problematic. 相似文献
159.
Paul Kallender 《战略研究杂志》2017,40(1-2):118-145
Japan has been overlooked as a ‘cyber power’ but it now becoming a serious player in this new strategic domain. Japanese policy-makers have forged a consensus to move cybersecurity to the very core of national security policy, to create more centralized frameworks for cybersecurity, and for Japan’s military institutions to build dynamic cyberdefense capabilities. Japan’s stance has moved rapidly toward the securitization and now militarization of responses to cyber challenges. Japan’s cybersecurity stance has bolstered US–Japan alliance responses to securing all dimensions of the ‘global commons’ and extended its defense perimeter to further deter but potentially raise tensions with China. 相似文献
160.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy. 相似文献