首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   258篇
  免费   11篇
  国内免费   9篇
  2021年   2篇
  2020年   16篇
  2019年   25篇
  2018年   24篇
  2017年   28篇
  2016年   21篇
  2015年   4篇
  2014年   27篇
  2013年   73篇
  2012年   6篇
  2011年   5篇
  2010年   4篇
  2009年   5篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   3篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有278条查询结果,搜索用时 15 毫秒
61.
信息战是现代战争中重要作战样式,网络战是信息战的重要组成部分,分布式、网络化的计算机系统是信息作战中实施攻击与防护首要作战目标。根据网络作战的需求,从技术角度出发,首先对网络战的要素组成进行了分析,在此基础上将网络战划分为两个阶段,并对此进行了深入研究,最后提出了实施网络战的方法与步骤。  相似文献   
62.
目标选择的一个优化模型   总被引:7,自引:3,他引:4       下载免费PDF全文
坦克作战过程中 ,经常出现一个坦克群遭遇对方一个坦克群的情况 ,这时每辆坦克往往向威胁自身最大的目标开火 ,但这种选择的整体效果不一定最优。本文提出一种目标选择方法 ,使得最大限度地减轻了对方对己方的威胁 ,大大提高了作战坦克对敌杀伤效果  相似文献   
63.
对战备物资进行分类是选择储备模式的基础和重要前提。把战备物资分类问题抽象为战备物资的军事性和经济性评价问题,设计了物资分类评价指标体系,并对部分指标进行了说明;利用层次分析法确定各指标的权重,运用专家打分法完成指标打分,并对专家打分程序进行优化,增强战备物资分类的可操作性,由军事性和经济性两方面的得分确定战备物资所属类别;最后通过算例证明了分类方法的有效性。  相似文献   
64.
Abstract

How do warlords build their legitimacy and eventually exert authority? The case of Afghan leader Ahmad Shah Massoud demonstrates that warlords do not only build legitimacy through the internal provision of goods and services to the population under their control, but also build their legitimacy by projecting authority externally, through the development of their own form of diplomacy. In this article, I show that warlords develop complex and complementary legitimisation strategies that extend beyond their territorial realms to include consequential relationships with foreign actors.  相似文献   
65.
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.  相似文献   
66.
Abstract

Terms like ‘support’ and ‘collaboration’ are often used interchangeably to denote a loose set of acts or attitudes that benefit non-state armed groups (NSAGs). However, these terms are seldom defined, and the alternatives available to civilians are rarely identified. Moreover, existing approaches overlook that the interaction between civilians and NSAGs is often one between ruler and ruled, which makes obedience and resistance central. This paper proposes to conceptualize the choices available to civilians as forms of cooperation and non-cooperation, offers a typology, and discusses the implications for theory building on civilian and NSAG behavior, and on the functioning of armed social orders.  相似文献   
67.
Uri Tor 《战略研究杂志》2017,40(1-2):92-117
This article suggests that there is a paradigm crisis in the sub-field of cyber deterrence. Cyber deterrence is evolving slowly and unpromisingly as a strategic tool in both theory and practice, mostly due to the ill-fitting theoretical framework and underlining assumptions it borrows from the absolute-nuclear-deterrence context. Therefore, this article suggests replacing the accepted yet inadequate paradigm of absolute deterrence with a better-fitting restrictive-cumulative-deterrence paradigm that draws on the Israeli approach to deterrence, introducing it into the cyber domain. The article further criticizes the current discourse in the field, including some ‘common knowledge’ (mis)understandings of cyberspace and the ways it affects the possibility of deterrence.  相似文献   
68.
卜江  郑彬  文旆 《国防科技》2014,(1):85-87,95
信息技术的飞速发展和广泛运用为心理战的实施开辟了新的更加广阔的空间。当前,拓展深化军事斗争准备和完成多样化军事任务对军队心理战建设提出了新的任务和要求。研究中国近现代心理战的历史沿革发展,特别是辛亥革命时期、土地革命时期、抗日战争时期、解放战争时期、抗美援朝时期中心理战的演变过程,总结经验教训,对于提高信息时代军队心理作战能力有重要启示作用。  相似文献   
69.
王兴国 《国防科技》2014,35(6):112-114
信息化战争已经登上了当今世界的舞台,这是军事领域发生的革命性变化。在信息化战争条件下,传统的战争制胜机理发生的新的变化。  相似文献   
70.
In the late seventeenth century during the Dutch War (1672–1678) and the Nine Years War (1688–1697), French armies relied on small war for the accomplishment of essential tasks and as part of an overall strategy of exhausting their opponents in the Low Countries. The purposes of small war included the imposition of contributions on enemy populations, the destruction of the enemy base of operations, blockades of fortresses, and the general support of campaign armies. The expression ‘small war’ in the French language appeared with growing frequency in the 1690s. Small war can be viewed as both a cause and consequence of the characteristics of these wars. The limited policy goals of Louis XIV the king of France required a strategy that minimised risk and accomplished the goal of reducing if not eliminating the Spanish presence in the Low Countries that bordered the north of France. As French armies increased in size during this period, the demand for specialists at small increased in order to provide security and ensure supply. Small war in the late seventeenth century was thus not ideologically motivated insurgency, but in the minds of French commanders an essential component of strategy and the nature of war.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号