首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   65篇
  免费   3篇
  国内免费   5篇
  2021年   6篇
  2020年   2篇
  2019年   3篇
  2017年   6篇
  2016年   5篇
  2015年   3篇
  2014年   5篇
  2013年   28篇
  2012年   2篇
  2010年   1篇
  2006年   1篇
  2005年   1篇
  2004年   2篇
  2002年   1篇
  2001年   2篇
  1999年   2篇
  1998年   1篇
  1996年   1篇
  1991年   1篇
排序方式: 共有73条查询结果,搜索用时 15 毫秒
31.
美军信息体体系架构研究   总被引:3,自引:0,他引:3  
分析了美军信息体体系架构提出的背景,从信体联合信息环境的总体构想、使命任务、能力视图、作战视图等4个方面介绍了美军信体信息体系架构的主要内容,提出了对未来信息服务体系建设的启示。  相似文献   
32.
在信号时序逻辑约束下规划路径是一项具有挑战性的任务,其计算量非常高.提出了一种终点回溯的规划方法,它是一种适用于连续时间系统的抽象化方法.该规划方法分为离线构建阶段和在线规划阶段.离线构建阶段在Transducer理论的指导下,从能够完成任务的合理的终点构造一棵快速随机搜索树,向初始状态空间进行回溯.当采样点足够多时,...  相似文献   
33.
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified.  相似文献   
34.
The anchoring effect is a well-studied subject. This article connects the effect with the rules-in-use within a military intelligence institution. Particularly the rules-in-use that dictate that an analyst takes his or hers starting point from recently conducted assessments of the specific area or threat. The threat assessment as well as the written assessment were affected. The results show that officers have an aversion to lower a previous given threat assessment. This gives that to understand risk assessment we not only need to understand the methods used, we also need to understand the institutions in which they are used. This is especially relevant for military intelligence as the assessments are conducted in an environment of high uncertainty.  相似文献   
35.
论全资产可视性与通用装备保障创新   总被引:3,自引:2,他引:1  
提出了多兵种合同作战和联合作战条件下 ,通用装备保障应实现“全谱支持”的新思路。结合对台军事斗争中对通用装备保障的需求 ,提出了必须在器材请领、储存处理、在运资产、战区内装备管理等四个领域达到联合全资产可视性的要求 ,并给出了联合全资产可视性建设的效益分析  相似文献   
36.
网格技术在战术防空系统网络化作战中的应用   总被引:4,自引:0,他引:4  
“网络中心战”是适应信息化战争发展的军队建设和联合作战的指导思想,网格技术是实现“网络中心战”的基础,利用网格技术在战术防空系统中实现“网络中心战”是信息时代防空作战的必然要求。  相似文献   
37.
Secure second strike nuclear forces are frequently held to be easy to procure. Analysts have long argued that targeting intelligence against relocatable targets like submarine launched and land mobile ballistic missiles is difficult to obtain. However, the scholarly consensus on intelligence for counterforce operations is seriously overdrawn. Both during and after the Cold War, the United States developed substantial intelligence capabilities to track and target submarines and mobile missiles. These efforts achieved important and under-appreciated success. Second strike forces have been far more vulnerable than most analysts are willing to credit.  相似文献   
38.
In the late 1950s, as intercontinental ballistic missiles (ICBMs) replaced bombers, the development of Soviet ICBMs prompted fears of strategic vulnerability in the West. The Eisenhower administration's decision to deploy Intermediate Range Ballistic Missiles (IRBMs) on the territory of NATO allies sought to redress the perceived vulnerability until American ICBMs were ready. British deception planners considered how to enhance the threat posed by the IRBMs. An outline plan codenamed ‘Celestial’ was intended to persuade the Soviets that the otherwise vulnerable missiles could not be readily neutralised. This article explores this deception and how such planning also sought to convey accurate information alongside disinformation. It also suggests that deception planners appear to have given little heed to the potentially counterproductive consequences of such an operation.  相似文献   
39.
As the January 1968 Tet holiday approached, CIA analysts and American commanders in South Vietnam developed more accurate conclusions about communist military strategy than did intelligence analysts at CIA headquarters. Besides valuing different types of intelligence, General William Westmoreland, Lieutenant General Frederick Weyand, and CIA analysts in Saigon also placed greater emphasis on new information about communist military strategy than did CIA analysts at Langley. These different reactions to information highlight reasons why military commanders and intelligence analysts stationed in the theater of operations might develop more accurate conclusions about enemy military strategy than intelligence analysts stationed at their national headquarters.  相似文献   
40.
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号