首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   247篇
  免费   12篇
  国内免费   7篇
  2021年   1篇
  2020年   14篇
  2019年   24篇
  2018年   24篇
  2017年   27篇
  2016年   20篇
  2015年   3篇
  2014年   28篇
  2013年   66篇
  2012年   6篇
  2011年   6篇
  2010年   4篇
  2009年   5篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   3篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有266条查询结果,搜索用时 46 毫秒
41.
Combat in near-Earth orbit is emerging as a more realistic possibility. The argument here is that changes in space technologies combined with a sea change in political rhetoric is bringing the possibility of military conflict in space technologies. This movement reflects a generational shift as the original decisions regarding military conflict in space are now being reassessed by a generation who did not experience World War II or the Cold War. For these, the sanctuary approach to space activities is not as persuasive and new enhanced space technologies bring the possibility of victory or at least survival possible during a conflict in space.  相似文献   
42.
卫星导航系统作为重要的战场传感器,已经成为现代战争不可或缺的重要组成部分,围绕卫星导航系统的攻防博弈由此兴起。针对美国首先提出的导航战概念,俄罗斯为进一步提升导航战作战实力,有针对性地采取了应对举措。文章介绍了导航战概念及相关作战案例,具体分析了俄罗斯应对导航战威胁的主要举措,并结合美俄围绕导航战开展的攻防博弈,得出掌握现代战争制导航权的改进方向。  相似文献   
43.
随着科学技术的发展,军事战争形态已从传统的战争形态进入信息化战争形态,结合信息化战争的特点,重点研究了速度、精度和跨度在信息化战争中的主要体现,并给出了在信息化战争中加快速度、提高精度和扩大跨度需要解决的问题。  相似文献   
44.
本文通过对典型高技术条件下局部战争的分析,指出了装甲机械化部队所面临的挑战及应战的对策.  相似文献   
45.
Using a new set of data from Greek Army sources, US military archives, and Communist Party documents, the paper provides a quantitative analysis of the armed confrontation that took place in Greece during 1946–1949. A dynamic Lotka–Volterra model is estimated, pointing to the existence of a conflict trap that explains the prolongation of the civil war and its dire consequences for the country. A regional analysis finds that the mobilization of guerrilla forces was crucially affected by morphology and the local persecutions of political rivals. Using neoclassical growth-accounting, the economic cost of the conflict is estimated to surpass an annual GDP, in line with similar findings in contemporary civil wars. The same framework is employed to assess the outcome in counterfactual situations discussed in this paper.  相似文献   
46.
战争复杂系统研究现状分析   总被引:1,自引:1,他引:0  
分析了经典复杂系统理论、仿真建模方法、综合集成方法以及作战实验室等方法在战争复杂系统研究中的应用,在此基础上,分析了国内外对战争复杂系统分析方法的共同特点,指出了分析方法中存在的问题,进一步给出了战争复杂系统分析方法中需要深入研究和完善的内容.  相似文献   
47.
信息战是现代战争中重要作战样式,网络战是信息战的重要组成部分,分布式、网络化的计算机系统是信息作战中实施攻击与防护首要作战目标。根据网络作战的需求,从技术角度出发,首先对网络战的要素组成进行了分析,在此基础上将网络战划分为两个阶段,并对此进行了深入研究,最后提出了实施网络战的方法与步骤。  相似文献   
48.
对战备物资进行分类是选择储备模式的基础和重要前提。把战备物资分类问题抽象为战备物资的军事性和经济性评价问题,设计了物资分类评价指标体系,并对部分指标进行了说明;利用层次分析法确定各指标的权重,运用专家打分法完成指标打分,并对专家打分程序进行优化,增强战备物资分类的可操作性,由军事性和经济性两方面的得分确定战备物资所属类别;最后通过算例证明了分类方法的有效性。  相似文献   
49.
Abstract

How do warlords build their legitimacy and eventually exert authority? The case of Afghan leader Ahmad Shah Massoud demonstrates that warlords do not only build legitimacy through the internal provision of goods and services to the population under their control, but also build their legitimacy by projecting authority externally, through the development of their own form of diplomacy. In this article, I show that warlords develop complex and complementary legitimisation strategies that extend beyond their territorial realms to include consequential relationships with foreign actors.  相似文献   
50.
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号