首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   229篇
  免费   16篇
  国内免费   46篇
  2023年   1篇
  2021年   9篇
  2020年   9篇
  2019年   23篇
  2018年   10篇
  2017年   17篇
  2016年   18篇
  2015年   4篇
  2014年   27篇
  2013年   38篇
  2012年   9篇
  2011年   10篇
  2010年   6篇
  2009年   13篇
  2008年   13篇
  2007年   17篇
  2006年   14篇
  2005年   19篇
  2004年   15篇
  2003年   5篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1999年   3篇
  1998年   2篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
排序方式: 共有291条查询结果,搜索用时 24 毫秒
191.
Recent counterinsurgency experiences in Iraq and Afghanistan have demonstrated that the local operating environment often is dominated by indigenous power-holders. As counterinsurgents seek to establish control over the local population, collaboration with these agents has become an essential aspect of contemporary counterinsurgency. Although the practice of constructing collaborative relationships with indigenous power-holders might be perceived as unconventional by today's counterinsurgents, the approach itself goes back to the colonial era in which modern counterinsurgency has its roots. This article explores the dynamics, benefits, and dangers of collaborative relationships with indigenous power-holders by analysing an infamous episode in Dutch colonial history, the case of the collaboration between Dutch colonial authorities and warlord Teuku Uma during the Aceh War (1873–1913). This relationship ended in disaster for the Dutch as Uma departed their side at the moment he had become their pivotal asset in the local political landscape. The article explains that the Dutch succeeded to co-opt Uma, but failed to control him as they lacked the will and means to do so. Furthermore this case study provides an insight in the way the Dutch colonial authorities dealt with the complex process of intelligence-gathering in a fragmented indigenous society.  相似文献   
192.
193.
Cyberspace是近年出现的一个新概念,分析了Cyberspace的概念及特性,提出Cyberspace层次概念模型,在此基础上,提出基于多变元网络的Cyber作战建模方法,认为Cyber作战建模可以分为对战争系统静态结构建模和交战行为动态交互建模,并对应分别建立了Cyberspace战争系统的多变元网络模型和Cyber作战交战行为的多变元网络演化模型,最后运用所建立的模型对一个典型Cyber战进行了分析.  相似文献   
194.
Book reviews     
The Political Economy of Military Spending in the United States, Alex Mintz (ed), London and New York: Routledge, 1992, pp x, 334; ISBN 0–415–07595–5

Penser La Guerre, Penser L'Economie, Christian Schmidt, (Paris: Odile Jacob, 1991), 350p.

Military Production and Innovation in Spain, Jordi Molas‐Gallart, Chur (CH): Harwood Academic Publishers, 1992, pp. vii, 212; ISBN 3–7186–5280–3  相似文献   
195.
This brief introduction celebrates the 20th Anniversary of the Journal, Defence and Peace Economics. Suggesting elements of an agenda for the future of this branch of economics, I raise several topics that are new and that seem to indicate that the field will expand and shift focus substantially in future years.  相似文献   
196.
Did participants in small wars in the period 1775–1831 learn from previous or contemporary examples? While this is difficult to prove for participants who left no written records, there is considerable evidence in existing publications by practitioners that they did indeed draw out lessons from recent insurgencies, either from their own experience or from events elsewhere which they studied from afar, especially the Spanish Guerrilla, which had already become legendary. Most authors showed an interest in how to stage insurgencies rather than in how to quell them. Even then, transfer did not come in a package of tactics-cum-values, but in each case in different configurations.  相似文献   
197.
在“零伤亡”作战思想的指引下,随着计算机、人工智能等技术的日臻成熟,无人机的发展风起云涌。近年来,无人机在战术运用方面更是突破了传统的侦察领域,逐步涉足攻击甚至电子攻击等领域。通过回顾无人机在近代历次军事冲突中的运用,分析无人机运用于电子战的优势,探讨无人机在电子战中的运用及可能的运用情况,最后指出无人机运用于电子战后对未来电子战的影响。  相似文献   
198.
电子战仿真数字系统模型及设计方法   总被引:3,自引:0,他引:3  
阐述了在EW 系统建模、仿真和评估中采用电子战数字系统模型(EWDSM)的意义。结合电子战系统仿真评估的特点,讨论了EWDSM 在设计时采用的方法,如面向对象的分析方法的类层次和类结构,以及基于HLA/RTI的分布仿真协议的分布式计算环境的仿真系统设计。  相似文献   
199.
美、俄的太空战准备   总被引:2,自引:0,他引:2  
航天技术的发展,加快了空间军事化的进程,空间已成为维护国家安全和国家利益所关注和占据的战略"制高点"。战场空间已从陆、海、空三维扩展到外层空间,未来战争将是陆、海、空、天一体化的战争,太空战即将来临。防止外空武器化和外空军备竞赛,已成为新世纪国际社会广泛关注的最紧迫、最突出的问题之一。  相似文献   
200.
Why do states make substantial military contributions to coalition operations, while at the same time apply reservations, or caveats, to how the coalition can use the military contributions? Caveats rose to prominence in defense and policy circles with NATO’s campaign in Afghanistan. In the scholarly security literature, the term remains a buzzword for all types of reserved efforts by states in coalition warfare, but there are few theoretical accounts addressing caveats. This article contributes to the knowledge gap on caveats through a comparative case study of Denmark’s, the Netherlands’, and Norway’s contributions to NATO’s intervention in Libya in 2011. It demonstrates that caveats can occur through three different causal pathways: compromises from domestic bargaining, handling of alliance commitments, and implementation and civil–military relations. Insights into the complexity that causes caveats are highly relevant for both political and military decision-makers that are trying to coordinate states’ effort in coalition operations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号