全文获取类型
收费全文 | 683篇 |
免费 | 12篇 |
出版年
2021年 | 8篇 |
2019年 | 15篇 |
2018年 | 10篇 |
2017年 | 15篇 |
2016年 | 12篇 |
2015年 | 13篇 |
2013年 | 133篇 |
2011年 | 6篇 |
2010年 | 8篇 |
2008年 | 6篇 |
2007年 | 9篇 |
2006年 | 9篇 |
2005年 | 15篇 |
2004年 | 10篇 |
2003年 | 8篇 |
2000年 | 11篇 |
1999年 | 8篇 |
1998年 | 5篇 |
1997年 | 9篇 |
1996年 | 16篇 |
1995年 | 9篇 |
1994年 | 15篇 |
1993年 | 8篇 |
1992年 | 10篇 |
1991年 | 18篇 |
1990年 | 10篇 |
1989年 | 17篇 |
1988年 | 11篇 |
1987年 | 15篇 |
1986年 | 16篇 |
1985年 | 14篇 |
1984年 | 10篇 |
1983年 | 10篇 |
1982年 | 14篇 |
1981年 | 9篇 |
1980年 | 14篇 |
1979年 | 9篇 |
1978年 | 10篇 |
1977年 | 10篇 |
1976年 | 10篇 |
1975年 | 9篇 |
1974年 | 15篇 |
1973年 | 13篇 |
1972年 | 14篇 |
1971年 | 19篇 |
1970年 | 6篇 |
1969年 | 10篇 |
1968年 | 7篇 |
1967年 | 5篇 |
1948年 | 5篇 |
排序方式: 共有695条查询结果,搜索用时 46 毫秒
111.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article. 相似文献
112.
The (standard) randomization method is an attractive alternative for the transient analysis of continuous time Markov models. The main advantages of the method are numerical stability, well‐controlled computation error, and ability to specify the computation error in advance. However, the fact that the method can be computationally very expensive limits its applicability. In this paper, we develop a new method called split regenerative randomization, which, having the same good properties as standard randomization, can be significantly more efficient. The method covers reliability‐like models with a particular but quite general structure and requires the selection of a subset of states and a regenerative state satisfying some conditions. For a class of continuous time Markov models, model class C2, including typical failure/repair reliability‐like models with exponential failure and repair time distributions and deferred repair, natural selections are available for both the subset of states and the regenerative state and, for those natural selections, theoretical results are available assessing the efficiency of the method in terms of “visible” model characteristics. Those results can be used to anticipate when the method can be expected to be competitive. We illustrate the application of the method using a large class C2 model and show that for models in that class the method can indeed be significantly more efficient than previously available randomization‐based methods. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
113.
114.
Tlohang W. Letsie 《African Security Review》2013,22(3-4):291-307
ABSTRACTThe Kingdom of Lesotho spends around five per cent of its annual budget – some 700 million Maloti ($US52.6 million) in 2017 – on the Lesotho Defence Force (LDF). Lesotho’s geographical position means that the LDF has no meaningful role regarding its primary function of defending the country from external aggression and it hardly engages in its secondary functions. In addition, the LDF has a long history of interference with democratic processes and engaging in human rights abuse. The financial resources currently allocated to the LDF could do far more for security, widely defined, if they were allocated to a number of other government expenditure categories. 相似文献
115.
Chris M.A. Kwaja 《African Security Review》2013,22(2):153-161
This paper examines the rationale and centrality of private military and security companies (PMSCs) in humanitarian assistance operations in Sudan, asking why PMSCs are involved in humanitarian assistance operations in Sudan and what the principles underlying their activities are. To answer this question, the paper draws attention to the link between humanitarian crises and PMSC interventions. Where there is no meaningful alternative intervention, undergirded by humanitarian concerns that are also profit driven, PMSCs come in to provide the needed services. The protracted and complicated internal armed conflicts in Sudan, which have lasted for over two decades, have produced as many as 4,8 million internally displaced persons (IDPs) – the single largest number in the world. The kind of humanitarian assistance operations provided by PMSCs in Sudan have become critical to the provision of much-needed services which were inadequately provided by governmental authorities at both unilateral and multilateral levels. This paper argues that the humanitarian crises in Sudan created a regime that permits humanitarian assistance operations by both state and non-state actors. 相似文献
116.
117.
Greece has regularly ranked as the country with the highest defence burden in NATO and the European Union. Over the past decades she has allocated an averatge 6% of GDP to defence yearly. This study using neural networks examines the external security determinants of Greek military expenditure in the context of the ongoing Greek‐Turkish conflict. 相似文献
118.
Mark A. Boyer 《Defence and Peace Economics》2013,24(3):243-259
The original Olson and Zeckhauser model of alliance burden‐sharing was based on the following four assumptions: (1) alliance defence is a pure public good; (2) allied nations make their security contribution decisions without consulting the other allies; (3) alliances produce only a single public good; and (4) alliance defence is produced with equal degrees of efficiency in all alliance nations. But while the first of these assumptions has received a great deal of attention in the alliance literature, the remaining ones have received comparatively less attention, particularly in terms of empirical analyses. This paper synthesizes a varied literature developed around these four assumptions, both substantively and theoretically, and shows that when these assumptions are brought closer to real world approximations, hypotheses regarding the potential for security cooperation with less free‐riding result. This article also provides a simple test of Western alliance burden‐sharing in the areas of military spending, development resources spending, and research and development spending that supports the hypothesis positing more equitable burden‐sharing. 相似文献
119.
A O Adesoji 《African Security Review》2013,22(3):2-3
Abstract From the 1982 Maitatsine Uprising to the 2009 Kala Kato Riot, Nigeria has been bedevilled by ethno-religious uprisings with devastating human and material losses. In almost all these crises the police and the military have featured prominently as agencies tasked with the responsibility of maintaining law and order and suppressing insurrection. While it was not alleged that they precipitated some of these risings perhaps in their attempts to stem or nip them in the bud, they have been accused of escalating the conflict either by their slow and inadequate responses, their partisanship and their arbitrary responses, or by their slackness in managing the crises and their aftermath. However, but for their efforts the security basis of the Nigerian state would have been considerably compromised by religious fundamentalism given the level of preparedness of the groups involved, their resistance and, more importantly, the recurrent nature of the uprisings. This article reflects on the management of ethno-religious uprisings in Nigeria by the police and the military. It considers the nature of the security agencies' involvement in the crises and examines the factors both within the agencies and in the larger Nigerian society which have aided or hindered their effective management of the conflicts. 相似文献
120.