首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   854篇
  免费   45篇
  国内免费   21篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   15篇
  2020年   10篇
  2019年   37篇
  2018年   35篇
  2017年   48篇
  2016年   49篇
  2015年   22篇
  2014年   93篇
  2013年   157篇
  2012年   42篇
  2011年   71篇
  2010年   53篇
  2009年   55篇
  2008年   56篇
  2007年   30篇
  2006年   25篇
  2005年   27篇
  2004年   27篇
  2003年   24篇
  2002年   14篇
  2001年   10篇
  2000年   2篇
  1999年   3篇
  1998年   4篇
  1997年   2篇
  1995年   3篇
  1993年   1篇
  1992年   1篇
  1990年   1篇
排序方式: 共有920条查询结果,搜索用时 15 毫秒
211.
可生存技术及其实现框架研究   总被引:10,自引:0,他引:10       下载免费PDF全文
提出用多样化动态漂移的技术途径实现网络生存设计的方法。分析该技术对网络安全、网络生存的影响 ,并给出了该技术的体系框架。指出这个研究具有前瞻性、全面性和实际性的特色  相似文献   
212.
分块模幂算法   总被引:10,自引:0,他引:10       下载免费PDF全文
RSA是目前最成熟的一种公钥密码体系 ,RSA加解密算法的速度依赖于模幂算法 ,因而快速模幂算法一直是人们感兴趣的课题。该文提出了一种基于分块的模幂算法 ,对算法复杂性进行了讨论 ,并与其他模幂算法作了比较 ,从理论上论证了它具有更快的模幂速度  相似文献   
213.
任务分配方式优化问题研究   总被引:3,自引:0,他引:3  
从军事指挥与管理工作的实际需求出发,利用概率论和军事运筹学理论,描述了统一、自主、混合等任务分配方式的概念、特点及其相互关系,论述了任务分配方式定量分析的基本方法、主要依据和基本指标,建立了完成任务效果的评估模型,在对多种任务分配方式进行定量比较的基础上,揭示了任务分配过程中具有普遍意义的、潜在的实用规则。  相似文献   
214.
针对传统混合模糊测试提升技术多聚焦于利用多种动静态分析手段辅助而忽略了混合符号执行自身性能的问题,提出一种混合模糊测试平衡点模型,并基于该模型对主流混合符号执行方案进行剖析,包括污点分析辅助模糊测试、混合模糊测试以及混合符号执行,归纳了6种符号执行方案,基于混合符号执行引擎Triton复现了6种符号执行方案,并通过10个典型真实程序进行了测试评估。从效率、内存、覆盖率三个维度对各个方案进行性能对比与影响因素分析。实验证明,优化方案都可以消除不必要的约束并减少时间和空间开销,但约束缩减会造成信息丢失,造成覆盖率降低。基于实验数据分析,提出了一个优化方案的性能序列,并提出三种针对不同测试需求的优化方案。  相似文献   
215.
针对典型DES具有密钥短等缺点,提出了一种基于Logistic映射的改进型DES算法,提高了密钥空间,增强了密文输出的混乱特性。同时,将该算法应用于远程装备监控系统中,有效地增强了数据传输的安全性。  相似文献   
216.
What are relationships between epidemics, national security, and US immigration policy? This question is important because it sheds light on transnational or nontraditional security areas, American immigration policy, and a pressing issue for US leaders who have recently faced epidemics such as the West Africa Ebola outbreak that began in 2013. This article answers it and lays ground in the area by reviewing epidemics in world history, using International Relations and Security Studies works to specify dangers of contagions for states, and identifying three general immigration measures that American leaders have utilized from the seventeenth century to the present day to protect against contagions, which are (1) policies restricting entrance of foreigners thought to carry specified diseases, (2) the isolation or quarantining of immigrants with contagious disease, and (3) delegating the President with authority to stop immigration in the event of an epidemic abroad. This study has implications for research and contemporary US immigration policy.  相似文献   
217.
Although soft power is now seen as an indispensable foreign policy tool, its efficacy has rarely been put to a rigorous empirical test. Using data from HARMONIOUS MISSIONs 2010, 2011 and 2013, this article seeks to examine the degree to which the soft power engagement missions of the Chinese hospital ship, the Peace Ark, has advanced Chinese interests. Although any conclusions drawn must be considered preliminary, as so little time has passed between the ship's visits and the current analysis, this research indicates that these missions’ impact on advancing Chinese interests was at best limited. Although observations from a single set of cases are unlikely to settle the debate between soft power advocates and detractors, it is hoped that this research will serve as a catalyst to further empirically based research on this topic.  相似文献   
218.
This article examines women's role as combatants in national liberation forces in South Africa. Three categories – guerrilla girls, combative mothers and the in-betweeners – are introduced to underscore the varied ways in which women have participated in combat within the national liberation movements. Factors such as age and one's ability to leave the country affected whether women could participate in combat as ‘guerrilla girls’ or if it limited them to fighting apartheid violence from home, or if there were women who can be defined as having fallen somewhere in between these categories. These categories are used to theorise women's combat roles in the anti-apartheid struggle, thus broadening and challenging the dominant notions of combat that often hide women's contributions in war. In this regard, different periods of struggle, physical location, as well as age, determined the methods of activism available to men and women.  相似文献   
219.
This article highlights and critiques the underlying conceptualisations and assumptions of the women, peace and security (WPS) agenda that emerged with the adoption of United Nations Security Council Resolution 1325 in 2000. The main argument is that we need to rethink the WPS agenda to produce more holistic and groundbreaking responses for the types of challenges encountered, i.e., that gender inequality and insecurity are deep rooted and multi-layered, and thus negate mechanistic responses that do not deal with cultural and structural issues. It specifically focuses on gender and peace-making and gender and peacekeeping to point to the pitfalls in the current conceptions and practices in this arena.  相似文献   
220.
Critical security advocates commonly portray strategic studies as crippled by its narrow focus on Cold War-era military issues, as state-centric and as Western-centric. I argue that this conception of the scope of strategy is flawed and I offer a comprehensive rebuttal by working out the logic of the theories advanced by Carl von Clausewitz and Thomas Schelling. The proponents of critical security overlook the striking expansion of strategy during the Cold War, its longstanding inclusion of competing political actors not just states, as well as its capacity to put Western and non-Western actors in a common analytic frame. By breaking out of the conceptual jails in which strategy has been incarcerated, I seek to reconnect International Relations to strategic thought from which it has become increasingly estranged.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号