首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   270篇
  免费   3篇
  2021年   3篇
  2019年   3篇
  2017年   5篇
  2016年   4篇
  2015年   4篇
  2014年   3篇
  2013年   63篇
  2012年   3篇
  2008年   4篇
  2007年   3篇
  2006年   2篇
  2005年   5篇
  2004年   2篇
  2003年   5篇
  2002年   2篇
  2001年   2篇
  2000年   2篇
  1999年   4篇
  1996年   4篇
  1995年   6篇
  1994年   6篇
  1993年   3篇
  1992年   3篇
  1991年   4篇
  1990年   2篇
  1989年   6篇
  1988年   6篇
  1987年   5篇
  1986年   7篇
  1985年   5篇
  1984年   2篇
  1983年   3篇
  1982年   8篇
  1981年   3篇
  1980年   6篇
  1979年   3篇
  1978年   4篇
  1977年   4篇
  1976年   3篇
  1975年   6篇
  1974年   5篇
  1973年   7篇
  1972年   5篇
  1971年   8篇
  1970年   3篇
  1969年   6篇
  1968年   5篇
  1967年   2篇
  1966年   2篇
  1948年   3篇
排序方式: 共有273条查询结果,搜索用时 15 毫秒
151.
152.
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified.  相似文献   
153.
154.
To meet customer demand, delivery companies are offering an increasing number of time‐definite services. In this article, we examine the strategic design of delivery networks which can efficiently provide these services. Because of the high cost of direct connections, we focus on tree‐structured networks. As it may not be possible to identify a tree‐structured network that satisfies all of the delivery guarantees, we allow these guarantees to be violated but seek to minimize the sum of the violations. We establish the complexity of the problem and exploit an empirically identified solution structure to create new neighborhoods which improve solution values over more general neighborhood structures. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
155.
Decades ago, simulation was famously characterized as a “method of last resort,” to which analysts should turn only “when all else fails.” In those intervening decades, the technologies supporting simulation—computing hardware, simulation‐modeling paradigms, simulation software, design‐and‐analysis methods—have all advanced dramatically. We offer an updated view that simulation is now a very appealing option for modeling and analysis. When applied properly, simulation can provide fully as much insight, with as much precision as desired, as can exact analytical methods that are based on more restrictive assumptions. The fundamental advantage of simulation is that it can tolerate far less restrictive modeling assumptions, leading to an underlying model that is more reflective of reality and thus more valid, leading to better decisions. Published 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 293–303, 2015  相似文献   
156.
Up to the present, there is only very little research on how the population perceives terrorism and its threats, even though support from the population is crucial for effective counterterrorism. By eliciting beliefs and subjecting them to content analyses, six factors were found that determine the protection worthiness of a target in the people's view: the potential damage to “people,” “symbolism,” “economy,” “politics,” “nature,” and “image/publicity.” These empirically found factors are in line with factors specified by terrorist target selection models. They differ in the strength of their cognitive representation among participants and, thus, their subjective importance to the people. The first three factors are shared among all participants, whereas the latter ones could only be found in a part of the participant sample. People's judgments of the targets' protection worthiness differ substantially from their judgments of the targets' attractiveness to terrorists, even though the same factors seem to be involved. This study offers an insight into the people's mental model about protection worthiness of targets. Together with classical risk analysis and knowledge about terrorists, these results can form a basis for setting up a holistic scheme for critical infrastructure protection.  相似文献   
157.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
158.
This article investigates the little-known plans formulated by Harold Wilson's Labour government to deploy Polaris submarines in the Indo-Pacific region. The scheme was first proposed in 1965 as a response to several problems faced by British policy-makers, including China's acquisition of a nuclear capability, Britain's wish to maintain a meaningful position ‘East of Suez’ at reduced cost, and German pressure for equal treatment within NATO on nuclear matters. Despite extensive high-level discussion, the plans were finally abandoned in mid-1968, as Labour moved more decisively to forsake the world role.  相似文献   
159.
Strategies that seek to assure other states about their security have the potential to reduce international conflict and dissuade states from seeking nuclear weapons. Yet, relative to other tools of statecraft such as deterrence, assurance remains understudied. To facilitate further empirical research on assurance strategies, this article identifies variations in the terminology scholars and policymakers have used to refer to such strategies and describes the concept of assurance associated with each variant. It seeks to clarify and standardize usage and show that there is a general, overarching concept of assurance that links the different variants. It also summarizes existing bodies of empirical research that are relevant to assessing the utility of different forms of assurance.  相似文献   
160.
Book reviews     
John Horsfield, The Art of Leadership in War. The Royal Navy From the Age of Nelson to the End of World War II. Westport, Conn. and London: Greenwood Press, 1980. Pp. 240; £14.75.

John Joseph Timothy Sweet, Iron Arm: The Mechanization of Mussolini's Army, 1920–1940. Westport, Connecticut &; London: Greenwood Press. 1980. Pp. 207; £15.50.

Peter H. Merkl, The Making of a Stormtrooper. Princeton, N.J: Princeton U.P., 1980. Pp. 328; £8.60.

Greg Herken, The Winning Weapon: The Atomic Bomb in the Cold War 1945–1950. New York: Alfred A. Knopf, 1980. Pp. 425; $15.00.

Geoffrey Smith and Nelson W. Polsby, British Government and its Discontents. New York: Basic Books, and London: Harper and Row, 1981. Pp. 202; £7.95.

Seweryn Bialer (ed.), The Domestic Context of Soviet Foreign Policy. Boulder, Colorado: Westview Press and London: Croom Helm, 1981. Pp. 441; £14.95.

Jerry F. Hough, Soviet Leadership in Transition. Washington, D.C.: Brookings Institution and Oxford, Basil Blackwell, 1981. Pp. 175; £12.00 (hb.) and £3.95 (pb.)

Edward F. Mickolus, Transnational Terrorism: A Chronology of Events 1968–1979. London: Aldwych Press, 1980. Pp. 967; £39.95.

Barry Rubin, The Great Powers in the Middle East, 1941–47; The Road to the Cold War, London: Frank Cass, 1980. Pp. 254; £14.50;

Daniel Heradstveit, The Arab‐Israeli Conflict; Psychological Obstacles to Peace. Oslo: Universittsforlaget, 1979. Pp. 234; £11.60;

Janice Gross Stein, and Raymond Tanter, Rational Decision‐making; Israel's Security Choices 1967. Columbus. Ohio; Ohio State University Press, 1980. Pp. 399; $35.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号