全文获取类型
收费全文 | 532篇 |
免费 | 37篇 |
国内免费 | 16篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2021年 | 13篇 |
2020年 | 7篇 |
2019年 | 31篇 |
2018年 | 33篇 |
2017年 | 36篇 |
2016年 | 33篇 |
2015年 | 19篇 |
2014年 | 53篇 |
2013年 | 128篇 |
2012年 | 11篇 |
2011年 | 27篇 |
2010年 | 36篇 |
2009年 | 29篇 |
2008年 | 33篇 |
2007年 | 21篇 |
2006年 | 17篇 |
2005年 | 18篇 |
2004年 | 11篇 |
2003年 | 14篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有585条查询结果,搜索用时 15 毫秒
401.
Following the 11 September 2001 attacks, the US government increased its counterterrorism (CT) funding and created several Federal Agencies such as the Department of Homeland Security; Transportation Security Administration; and National Counterterrorism Center. Similarly, the 7 July 2005, London bombings also compelled the British government to increase its CT funding. These examples illustrate a phenomenon that when states experience terrorism, they dramatically increase public safety spending in order to reduce or eliminate the incidents of and casualties resulting from acts of terror. Using statistical data collected from 34 countries covering nine years, this article examines recent CT spending increases. Critically, the authors explore whether recent public safety expenditures can measurably reduce the number of domestic and international terrorist attacks. The implications of their findings should be salient for policy-makers’ assessments of their countries’ current CT strategies and policies concerning their respective Intelligence and Security Communities. 相似文献
402.
Nikolai Sokov 《The Nonproliferation Review》2013,20(2):207-226
This article explores Russia's increasing reliance on nuclear weapons from three perspectives. First, it seeks to demonstrate that the phenomenon is not exclusively limited to Russia and represents a broader trend, which is ultimately rooted in the nature of the contemporary international system or, more precisely, the uncertainties of the transitional period between the Cold War system and a new emerging one. Second, it analyzes the role assigned to nuclear weapons in Russia's doctrinal documents, in particular the emergence of a new mission—limited-use of nuclear weapons to deter or, if deterrence fails, to de-escalate large-scale conventional conflicts. Discussions of the new doctrine, which have begun recently, suggest that this new mission will likely remain unchanged. Finally, this article looks at the apparent discrepancy between Russia's nuclear modernization programs and the roles assigned to nuclear weapons in the military doctrine, as well as the causes of that discrepancy. 相似文献
403.
IPSec是目前适合所有Internet通信的惟一一种安全技术。通过分析IPSec的处理过程,指出网络安全处理器的使用是IPSec协议高效实现的关键,并详细介绍了目前典型安全处理器的结构和应用。由于目前的网络安全处理器无法满足OC 48及其以上速率接口的处理要求,对下一代高速网络安全处理器的体系结构进行了分析和预测。 相似文献
404.
Udi Lebel 《Small Wars & Insurgencies》2014,25(2):297-328
The study shows how ‘strategic military refusal’ in Israel developed as a rational and institutional means to influence security policies. As opposed to the perspective that sees military refusal as a spontaneous individual act, the study illustrates how organizations operate to distribute military refusal in order to pressure decision-makers to change their military policies. This strategy has proven to be effective when the military is involved with groups that threaten it with refusal – which threatens the military's operational ability and its official and apolitical image. These include soldiers whose civilian authorities, rather than their military commanders, are perceived as an epistemic authority regarding security issues. The case study refers to the impact of strategic military refusal in Israel on security policies and the military doctrine. This was influenced by leftist groups, which, although they belonged to the parliamentary opposition, had dominant presence in the military ranks. Furthermore, the study examines the effect of the use of strategic military refusal on the model of military recruitment. 相似文献
405.
Ian Bowers 《战略研究杂志》2014,37(3):442-464
AbstractUnderstanding the development of Republic of Korea (ROK) seapower is central in exploring the evolution and nature of its security consciousness. This article aims to examine how the wider East Asian maritime sphere has influenced ROK perceptions of its own security and how such perceptions have come into conflict with the needs of maintaining its deterrent capabilities within the peninsular context. In doing so it concludes that for the ROK seapower has been an expression of wider engagement and international developing security concerns but that it is curtailed and influenced by the realities of the threat from the North. 相似文献
406.
Jean-Loup Samaan 《Defence Studies》2017,17(2):156-170
Over the last three decades, Hezbollah adapted its military strategy and the operational function conferred to its missiles. Starting in 1992, rocket warfare became one of the primary tactics of the group to compel Israeli Forces in Lebanon. After the Israeli withdrawal in 2000, the strategy evolved into a deterrence posture to support the Party’s objective to remain the primary military power inside Lebanon. Hezbollah’s posture could serve as a template for smaller terrorist groups. It would broaden the array of strategic options for violent non-state actors, allowing them to implement military postures that could be described as rudimentary and low-cost denial of access strategies. However, this scenario would require the same level of state support that Hezbollah currently enjoys from Iran, and that other non-state actors (Hamas, Houthi insurgents) do not at this stage. 相似文献
407.
Håkon Lunde Saxi 《Defence Studies》2017,17(2):171-197
At NATO’s 2014 Wales Summit, the UK and Germany unveiled two new initiatives for European defence cooperation, known, respectively, as the Joint Expeditionary Force (JEF) and the Framework Nations Concept (FNC). Both were the result of economic pressures and the need to exercise intra-alliance leadership, but they represented very different approaches to cooperation. The JEF was to be a UK-led contingency force for short-notice operations, selectively incorporating forces from allies and partners. The FNC sought to coordinate capability development between groups of allies, centred on larger framework nations, to develop coherent capability-clusters available to meet NATO’s force requirements. The common denominator and novelty of the initiatives was the building of forces and capabilities multinationally by having major states act as framework nations for groups of smaller allies. The UK and Germany have ownership and continue to provide leadership to these initiatives. This is one key reason why they continue to evolve to accommodate changing circumstances and are likely to endure. 相似文献
408.
Katja Lindskov Jacobsen 《African Security Review》2017,26(3):237-256
It is widely acknowledged that maritime security in the Gulf of Guinea is a highly complex phenomenon involving a variety of issues (legal deficiencies, inadequate military equipment, and challenges like corruption, political unrest and youth unemployment) as well as a multiplicity of external responders. To make sense of the impact that external actors have when they address this complex problem through various maritime capacity building endeavours, this article argues that there is a need to understand the attractiveness of capacity building vis-à-vis the widely acknowledged need for a comprehensive approach, as well as the difficulties of translating the potential for comprehensiveness into practice (as important aspects of the problem remain largely unaddressed). Further, it is argued that it is important to appreciate that even if these gaps – i.e. the aspects that maritime capacity building currently leaves unaddressed – represent a ‘failure’ to deliver a comprehensive response, they are at the same time illustrative of how the maritime capacity building activities of various external actors also ‘succeed’ in having an impact on this regional security landscape – for instance, by influencing how certain aspects of this multifaceted problem are prioritised, whilst others are only marginally addressed, if at all. 相似文献
409.
410.
传统通信系统安全风险评估方法获取的判断矩阵是个体专家的意见,无法处理不确定问题,得到的评估结果较为主观、准确度差,为了解决该问题,提出了基于证据理论的通信系统安全风险评价模型。采用证据理论融合规则调整通信设备和光缆一级指标的判断矩阵,综合多位专家的意见,获取设备和光缆各指标的状态评分和指标权重,构建通信系统风险评估模型,最后通过仿真实验测试其性能,结果表明,该模型可以准确评估通信系统的风险等级。 相似文献