首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   99篇
  免费   1篇
  国内免费   1篇
  2022年   1篇
  2021年   1篇
  2020年   3篇
  2019年   2篇
  2018年   6篇
  2017年   7篇
  2016年   8篇
  2015年   3篇
  2014年   13篇
  2013年   47篇
  2011年   3篇
  2010年   3篇
  2009年   1篇
  2008年   1篇
  2005年   1篇
  1991年   1篇
排序方式: 共有101条查询结果,搜索用时 15 毫秒
31.
The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.  相似文献   
32.
The mounting challenge posed by China's military modernization has highlighted the need for the United States to analyze its ability to execute a naval blockade. A blockade strategy is viable, but it would be limited to a narrow context: the United States would have to be engaged in a protracted conflict over vital interests, and it would need the support of key regional powers. The United States would also need to implement a mix between a close and distant blockade in order to avoid imperiling the conflict's strategic context. If enacted, a blockade could exact a ruinous cost on the Chinese economy and state.  相似文献   
33.
A striking difference between the EU’s 2016 Global Strategy and its 2003 predecessor is the ubiquity of resilience as a new leitmotif, understood as the ability of states and societies to reform, thus withstanding and recovering from internal and external crisis. Resilience provides a middle ground between over-ambitious liberal peace-building and under-ambitious stability, (re)directs attention to local resources and practices, and is ambiguous enough to be acceptable to everyone. The Global Strategy’s leitmotif is an example of the rise and spread of resilience in international discourses about crisis management and humanitarian emergencies. Although there are risks inherent to the way in which resilience reframes risks and crises, its added value lies in its power as convening concept, opening up international organizations to new ways of thinking and working, and providing a common ground for engagement.  相似文献   
34.
为深入研究信息化战场信息安全保障,提高保障效能,利用OODA环理论对信息化战场信息安全保障过程进行了分析与研究,明确了观察、判断、决策和行动每个阶段的任务与事件,并运用系统动力学方法对基于OODA环的信息化战场信息安全保障过程进行建模分析和模拟仿真,仿真结果表明随着时间推移,保障方得到的信息增多,判断和决策的正确率也随之增加,OODA环周期开始减小,保障效能随之大幅提升。研究结果对于提升信息化战场信息安全保障效能具有一定的参考价值。  相似文献   
35.
ABSTRACT

Scholars and practitioners of grand strategy agree that the use of military force should be supplemented by appropriate economic policies. However, strangely few accounts of economic complements to military grand strategies have been presented in recent discourse on US grand strategy. This paper takes a first step to fill this information gap. I first assess the role that could be played by economic measures under two types of grand strategies – one focusing on the balance of power and the other emphasising influence and order. Second, I introduce what I call ‘the influence-capability dilemma’ and discuss tradeoffs in adopting certain economic policies in order to help the US sustain pre-eminence in the international system. Third, I discuss how the US should address this dilemma of economic means in dealing with the rising China.  相似文献   
36.
本文首先分析了有关数据库安全所需要解决的几个问题,并基于 discretion 和mandatory 存取策略,以及完整性和数据库加密策略,提出了一个较完整的数据库系统的安全模型。  相似文献   
37.
Private security companies (PSCs) currently receive a great deal of attention in the news media, in sensationalist reporting, and increasingly in scholarly books and articles. While the scholarly books and articles make significant contributions to our understanding of this global phenomenon, there are several impediments to analysis that must be recognized and overcome if analysis is to be improved. Three of these impediments are reviewed in this article. The author suggests that US government material is currently available to minimize impediments and offers a framework to make analytical sense of it. Since contracting out is based on contracts, and unless the complexities of awarding and managing contracts are understood, recommendations made to reform the process of contracting out security are unrealistic.  相似文献   
38.
From 1956 to 1960, the French Army developed a force of Muslim auxiliaries (supplétifs) as a major component of its strategy to combat the National Liberation Front (FLN) insurgency in Algeria. Aside from their military utility in hunting down the guerrillas in the mountains and forests, the supplétifs were instrumental in undermining FLN legitimacy in the countryside. The rapid growth and employment of the supplétif force dismantled FLN political control in the villages, undermined the enemy's unity, and critically weakened the revolutionaries' claim to represent all of Algeria's Muslims. The military and political activities of France's Muslim soldiers also projected an image of Muslim–European unity behind the French cause, and portrayed the French Army as the only legitimate political force in numerous villages. These political successes, however, were limited to the local, tactical level of revolutionary warfare, and the Army was never able to convert the supplétifs into a force of decisive, strategic political significance. They thus had little ultimate impact on the outcome of the conflict.  相似文献   
39.
While the success of Colombia's fight against illegal armed groups, led by Fuerzas armadas revolucionarias de Colombia – ejército del pueblo (FARC-EP), is generally lauded as evidence of the effectiveness of both COIN doctrine and security assistance, the configuration of Colombia's counter-insurgency effort remains largely unstudied. This article will explain the success of one of those campaigns carried out principally by the Colombian marines (Colmar) in an area of northern Colombia known as the Montes de María. Contingent factors shaped the success of this campaign, beginning with the fact that the Montes de María forms an area where insurgents, relative late comers to the region, found it difficult to put down deep roots. However, operations to eradicate them were complicated by the inexperience of the Colmar, and by constraints placed by Colombia's Constitutional Court on COIN methods modeled on those successfully applied by the British in Malaya and Kenya. Therefore, Colmar officers initiated their five-year campaign by building up a base of popular support in the towns and targeting insurgent logistical networks. This bought time to strengthen the Colmar's combat and intelligence capabilities, and take the offensive that eventually isolated and killed the leader of the FARC in the Montes de María, Martín Caballero. Unfortunately, the failure of the Colombian government to follow up the Colmar victory by installing a regional and local governments viewed as legitimate by the population, and to resolve long standing land tenure issues, has meant that, so far, the Colmar looks to have delivered a tactical victory in a strategic vacuum.  相似文献   
40.
ABSTRACT

The present international standard allows non-nuclear weapon states (NNWS) to forego safeguards when nuclear material is used in a “non-proscribed military activity,” though no criteria have been established to determine when NNWS can remove naval nuclear material from safeguards. Though at present, only nuclear-armed states possess nuclear submarines, the global nuclear naval landscape may soon change with the advancement of Brazil's fledgling program and the possible precedent it would set for other NNWS. A framework is needed to shore up nuclear security and prevent nuclear material diversion from the nuclear naval sector. Proposed and existing nonproliferation frameworks, including a Fissile Material Cut-off Treaty and commitments through the nuclear security summits, are insufficient to close this loophole. A Naval Use Safeguards Agreement (NUSA), modeled after the Additional Protocol of the International Atomic Energy Agency, would provide a framework to remove the opacity surrounding nuclear material in the naval sector. Designed for NNWS and encouraged as confidence-building measures for nuclear weapon states, NUSA would explicitly outline those stages in the naval nuclear fuel cycle where safeguards are to be applied and in what context. This viewpoint also further provides direction for targeted research and development in technical naval nuclear safeguards solutions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号