首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   229篇
  免费   19篇
  国内免费   3篇
  2022年   1篇
  2021年   2篇
  2020年   8篇
  2019年   12篇
  2018年   22篇
  2017年   22篇
  2016年   22篇
  2015年   10篇
  2014年   12篇
  2013年   64篇
  2012年   9篇
  2011年   7篇
  2010年   5篇
  2009年   5篇
  2008年   9篇
  2007年   7篇
  2006年   7篇
  2005年   4篇
  2004年   4篇
  2003年   3篇
  2001年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1997年   1篇
  1995年   2篇
  1993年   3篇
  1991年   1篇
  1990年   1篇
排序方式: 共有251条查询结果,搜索用时 15 毫秒
31.
在分析基于格理论的信息流控制军用安全模型在实际应用中存在的不足的基础上,从安全类定义和信息流控制策略两个方面对原模型进行了理论扩展和安全性分析.扩展模型安全类在作为对象和主体时具有相同的表达方式,以及在保持原模型信息流关系情况下,允许同职权等级用户交流他们共知的信息,以及高职权等级用户访问低职权等级用户他们之间共知的信息.以数字文档安全管理系统为例对扩展模型应用进行了描述.实例表明扩展模型更适合实际系统对信息流控制的要求.  相似文献   
32.
目前高等教育中存在的种种弊端,迫使高等教育必须改革。高等教育决不能脱离党的教育方针,要强化世界观和价值观教育,远离社会不良风气的干扰,培养出德智体全面发展的人才。  相似文献   
33.
通过对某型无坐力炮弹战斗部的结构分析和功能分析,以弹着目标不爆炸为顶事件建立了失效树,并根据该型弹药的功能构件在储存期间的特点选择了失效树的简化原则,建立了系统可靠度模型。确定了由储存因素导致弹着目标不爆炸这一事件的4种主要失效模式。并通过分析其不同的储存期失效机理和影响因素,提出该型炮弹的储存策略。  相似文献   
34.
设计安全策略模型时应考虑安全策略的时序特性和灰色特性,还应综合考虑保密性、完整性和可用性三方面的需求。已有的安全模型没有描述时序性和灰色特性,而且一般只侧重描述保密性或完整性。为此,本文提出了动态灰色时序系统(简称DGTS)。本文详细描述了DGTS,以及基于DGTS的动态语义设计的灰色时序安全策略规范语言GTSL。  相似文献   
35.
This paper, intended to stimulate debate, suggests that we are at a turning point in the history of the UK military aerospace industry. It argues that there is urgent need for a fresh vision as to how the UK military aerospace industry can both prosper and make its maximum contribution to the defence of Britain. Further, the resulting plans and policies must emphasise the robustness of defence capabilities in a future in which the only thing we can be certain is that it will be very different from the present – especially whenever defence most matters.  相似文献   
36.
The United Arab Emirates (UAE) has laid out an ambitious plan to become the first Arab country to possess a civilian nuclear energy program. Central to that effort has been the Emirati government's ability to obtain foreign nuclear assistance. This article traces the UAE's strategies for overcoming the obstacles that stood in the way of nuclear suppliers providing assistance. It examines the approach taken by the UAE to assuage the safety and security concerns of nuclear suppliers, how the UAE leveraged its alliances with France and the United States to obtain their cooperation, and its strategies for engaging domestic interest groups in supplier states. The generalizable elements of the UAE's strategies are discussed and used to provide insight into the prospects for other Middle Eastern states' bids to obtain similar assistance. The article concludes with a discussion of the potentially transformative aspects of the strategies employed by the UAE in shaping other countries' pursuit of nuclear energy in the region.  相似文献   
37.
This article presents a proposed theory of how war economies are formed and maintained, as well as an integrated policy framework to guide the dismantling of war economies emanating from the proposed theory. Additionally, six potential areas for future research pertaining to the dismantling of war economies are also presented.  相似文献   
38.
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses.  相似文献   
39.
South Africa's military has, since the First World War, been an oft-used and effective tool in the conduct of South African foreign policy, but this role has not always translated into power for Defence Department principals in its formulation. South African Defence Ministers for most of the country's history have played a minor role in the making of foreign policy; despite a change in this dynamic between approximately 1975–1990, the post-apartheid era has once again seen a diminishment of Defence's power in this arena. This article examines why Defence Ministers have generally been such weak players, with an eye toward disaggregating whether this was a product of interpersonal relationships with Cabinet and – most importantly – the Head of State, or whether this influence (or lack thereof) was more a function of South Africa's international standing. While determining who has influence on this process is difficult given the primacy of the national leader in making foreign policy and a lack of insider accounts by participants in the process, this article relies upon several interviews with participants and knowledgeable observers that help illuminate the process and Defence's role in it.  相似文献   
40.
外国旅游团来琼免签政策是目前我国实施时间最长、最宽松的区域性免签便利政策。阐述了外国旅游团来琼免签政策沿革演变历程,从入出境管理和边防检查的角度分析了其施行过程中存在的不足与原因,提出了完善免签政策的措施。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号