首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   729篇
  免费   14篇
  2020年   6篇
  2019年   16篇
  2017年   24篇
  2016年   18篇
  2015年   19篇
  2014年   22篇
  2013年   141篇
  2012年   8篇
  2011年   9篇
  2010年   13篇
  2009年   16篇
  2008年   8篇
  2007年   8篇
  2006年   11篇
  2005年   11篇
  2004年   13篇
  2003年   10篇
  2002年   15篇
  2001年   5篇
  2000年   8篇
  1999年   8篇
  1998年   16篇
  1997年   9篇
  1996年   11篇
  1995年   9篇
  1994年   19篇
  1993年   17篇
  1992年   12篇
  1991年   16篇
  1990年   11篇
  1989年   19篇
  1988年   19篇
  1987年   17篇
  1986年   21篇
  1985年   16篇
  1984年   8篇
  1983年   7篇
  1982年   7篇
  1981年   9篇
  1980年   5篇
  1979年   8篇
  1978年   12篇
  1976年   7篇
  1975年   6篇
  1974年   9篇
  1973年   7篇
  1972年   9篇
  1970年   9篇
  1969年   6篇
  1967年   7篇
排序方式: 共有743条查询结果,搜索用时 15 毫秒
91.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
92.
The UK Ministry of Defence is British industry's largest single customer and a number of firms and industries are highly dependent on defence sales. Various hypotheses have been proposed about the impact of defence procurement on firms and these are investigated using four performance indicators: financial structure, investment, productivity and profitability. With regard to the borrowing ratio, capital investment and the rate of return, there is no statistically significant difference between the mean financial ratios for low and high dependence firms. However, non‐dependents appear to have a higher level and rate of growth of labour productivity than dependents.  相似文献   
93.

A nation's wealth is both an object of conquest to covetous aggressors and a resource to its owners for self defense. To maintain autonomy every country must mount a defense which either makes its capture (1) more expensive than any aggressor can afford, or (2) more expensive than it is worth to aggressors. Whether this condition can be satisfied for all countries simultaneously depends as shown in this paper on relative efficacy of military offense versus defense, the aggregate of wealth among nations and its distribution, and the benefits a conqueror may obtain from conquest, including the duration of these benefits. The paper shows how these factors fit together to determine the sustainability and stability of the international distribution of property as embodied in the configuration of sovereign states.  相似文献   
94.
95.
96.
Governments are increasingly recognizing the problem posed by internally weak nuclear-capable states. The problem, however, is under-theorized. This article brings together literature on sovereignty and international order, the nonproliferation regime, and weak states, and introduces new concepts to provide a more structured understanding of this problem. Insight comes from focusing attention on the function and governance of two nuclear estates (termed the production and operational estates), and on their resilience to decay and disorder occurring within the state and society. Drawing on empirical observation, the authors suggest a typology of weakness in nuclear states, involving state fragmentation typified by the former Soviet Union, the “hard weak state” typified by North Korea, and the internally conflicted state typified by Pakistan. Although these types give rise to distinctive difficulties, their alleviation depends heavily on the maintenance of internal authority within the state and estates, the presence or absence of cooperative relations, and the international regulatory framework's vitality.  相似文献   
97.
A large literature has used tests for Granger (1969) non‐causality, GNC, to examine the interaction of military spending with the economy. Such tests answer a specific although quite limited question: can one reject the null hypothesis that one variable does not help predict another? If one can reject, there is said to be Granger causality, GC. Although the limitations of GNC tests are well known, they are often not emphasised in the applied literature and so may be forgotten. This paper considers the econometric and methodological issues involved and illustrates them with data for the US and other countries. There are three main issues. First, the tests may not be informative about the substantive issue, the interaction of military expenditure and the economy, since Granger causality does not correspond to the usual notion of economic causality. To determine the relationship of the two notions of causality requires an identified structural model. Second, the tests are very sensitive to specification. GNC testing is usually done in the context of a vector autoregression, VAR, and the test results are sensitive to the variables and deterministic terms included in the VAR, lag length, sample or observation window used, treatment of integration and cointegration and level of significance. Statistical criteria may not be very informative about these choices. Third, since the parameters are not structural, the test results may not be stable over different time periods or different countries.  相似文献   
98.
Abstract

This paper examines the generation of technological knowledge by leading companies in the defence industry. In particular, we test whether the characteristics of large defence companies are related to both the production of different types of patents (civilian, military and mixed), and the generation of dual-use technologies. To explore these links, we rely on economic data for the top 100 defence companies from the Stockholm International Peace Research Institute database, and patent information from the Worldwide Patent Statistical Database. Our results show that the relationship between the production of civilian patents and the size of the company is positive and significant. However, this relationship does not hold for the production of military patents. Furthermore, the military commercial profile is unrelated to the generation of military patents. Regarding the involvement in dual-use technologies, firms engaged in dual-use are those with higher military sales, a greater number of employees and a larger number of patents (civilian, military and mixed) than those not engaged in dual-use. Furthermore, we found a skill effect (more involvement in dual-use per employee) in European firms compared to US firms. These findings help to identify which firms should be targeted by government policies if increasing dual-use technologies becomes a political objective.  相似文献   
99.
The period after 9/11 can be characterised as the terrorism moment in world history. Every actor in international relations—the state, regional, continental and international as well as civil society organisations—has been mobilised to combat what, apparently has been conceived as a common security threat to humanity. The transformation of the Organisation of African Unity (OAU) into the African Union (AU) was a divine coincidence at a time when multilateralism and international cooperation were being challenged by the threat of terrorism. In the post-9/11 period, the main concern of the Union has been to reinforce and implement existing counter-terrorism instruments adopted at the continental level in coordination with states and regional organisations. This article discusses and appraises the endeavours undertaken by the AU and its precursor organisation, the OAU, in tackling and dealing with the threat of terrorism despite limitations to its human and financial resources. In recognition of the nature of the states in Africa and the challenges facing the Union, we argue that the role of the AU remains critical in order to fill the gaps where its member states or regional mechanisms are lacking. In this regard, we stress that the role of the AU should be complementary and serve as an interface between the continent and the international community, including the United Nations.  相似文献   
100.
After only ten years in existence, the African Union (AU) has already made its mark on the landscape of peace and security in Africa. This paper seeks to explore the relationship between the AU's leading collaborative interstate security policy, the African Peace and Security Architecture (APSA), and sustainable peace in the Horn of Africa. It examines four countries – Djibouti, Eritrea, Ethiopia, and Kenya – and how engaging with the APSA through early warning systems can contribute to developing the elements necessary for sustainable peace, namely regional stability, conflict management, and good governance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号