首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   521篇
  免费   37篇
  国内免费   17篇
  2024年   1篇
  2023年   1篇
  2021年   14篇
  2020年   6篇
  2019年   30篇
  2018年   33篇
  2017年   37篇
  2016年   34篇
  2015年   17篇
  2014年   49篇
  2013年   116篇
  2012年   8篇
  2011年   27篇
  2010年   34篇
  2009年   28篇
  2008年   35篇
  2007年   22篇
  2006年   17篇
  2005年   19篇
  2004年   13篇
  2003年   15篇
  2002年   8篇
  2001年   3篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有575条查询结果,搜索用时 31 毫秒
211.
Advocates of the preventive use of force against emerging nuclear, biological, or chemical programs often look to the allegedly successful 1981 Israeli airstrike against Iraqi nuclear facilities at Osiraq. According to the conventional wisdom, this attack may have prevented Iraq from going nuclear before Operation Desert Storm in 1991. This article assesses the claim that the 1981 attack substantially delayed Iraqi acquisition of nuclear weapons, both by revisiting older debates and by introducing new evidence from Iraqi scientists. The article casts doubt on the conclusion that the attack was successful for three reasons: (1) the reactor itself was not well equipped to generate plutonium for a nuclear weapon; (2) illegal plutonium production would likely have caused a cutoff in the supply of nuclear fuel and an end to weapons activities; and (3) the attack may have actually increased Saddam's commitment to acquiring weapons. These conclusions have implications for the Bush Doctrine, as the lack of success in 1981 casts doubt on the possible success of future attacks against nuclear programs.  相似文献   
212.
ABSTRACT

This article explores the paradox of trust in the largest nuclear smuggling operation involving highly enriched uranium (HEU) discussed in open source literature. In the first effort to understand the type, extent, and role of trust in nuclear smuggling enterprises, it draws from literature on trust development in legitimate businesses as well as criminal enterprises. Observed behavioral patterns in this case challenge traditional notions of the internal dynamics of temporary groups engaged in nuclear smuggling and operational realities of such activities. The article seeks to explain why individuals agree (and continue) to operate in this high-risk environment, unbound by close personal ties, without any effort to verify the background, motives, or qualifications of the fellow conspirators. It offers ways to advance current nonproliferation efforts in non-state actor interdiction by exploiting the environment of shallow trust in temporary groups.  相似文献   
213.
Strengthening the United States' ability to prevent adversaries from smuggling nuclear materials into the country is a vital and ongoing issue. The prospect of additional countries, such as Iran, obtaining the know‐how and equipment to produce these special nuclear materials in the near future underscores the need for efficient and effective inspection policies at ports and border crossings. In addition, the reduction of defense and homeland security budgets in recent years has made it increasingly important to accomplish the interdiction mission with fewer funds. Addressing these complications, in this article, we present a novel two‐port interdiction model. We propose using prior inspection data as a low‐cost way of increasing overall interdiction performance. We provide insights into two primary questions: first, how should a decision maker at a domestic port use detection data from the foreign port to improve the overall detection capability? Second, what are potential limitations to the usefulness of prior inspection data—is it possible that using prior data actually harms decision making at the domestic port? We find that a boundary curve policy (BCP) that takes into account both foreign and domestic inspection data can provide a significant improvement in detection probability. This BCP also proves to be surprisingly robust, even if adversaries are able to infiltrate shipments during transit. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 433‐448, 2013  相似文献   
214.
The role of the British Army in Northern Ireland during Operation Banner (1969–2007) is an instructive case study of counterinsurgency operations as well as an important chapter in recent British military history. Given troops deployed to the province as aid to the civil power, it is particularly useful in discussions about the principle of minimum force. This article seeks to explore the issue of minimum force through the example of Operation Motorman, the Army's successful attempt to remove the barricades, which had established so-go areas for the security forces in Northern Ireland.  相似文献   
215.
警卫部队信息化建设为警卫部队在新时期更好地完成党和人民赋予的各项警卫任务提供了更加便捷和有效的服务与保障。分析警卫信息化建设的必要性和重要性,探讨警卫信息化建设中需要建立健全的几个应用性系统。  相似文献   
216.
This article distills insights for the scholarship of deterrence by examining the 1983 nuclear crisis – the moment of maximum danger of the late Cold War. Important contributions notwithstanding, our understanding of this episode still has caveats, and a significant pool of theoretical lessons for strategic studies remain to be learned. Utilizing newly available sources, this article suggests an alternative interpretation of Soviet and US conduct. It argues that the then US deterrence strategy almost produced Soviet nuclear overreaction by nearly turning a NATO exercise into a prelude to a preventive Soviet attack. Building on historical findings, this article offers insights about a mechanism for deterrence effectiveness evaluation, recommends establishing a structure responsible for this endeavor, and introduces a new theoretical term to the strategic studies lexicon – a ‘culminating point of deterrence’.  相似文献   
217.
German grand strategy during World War II included making Europe independent of oil imported from sources controlled by the United Kingdom, the United States, and the USSR. The first step was to wrest control of oilfields. Producing and distributing the oil, however, required the creation of a company capable of replacing the evicted British, American, and Soviet suppliers. Therefore, in 1941, the Third Reich established the Continental Oil Company. Analysis of the company’s foundation and operations sheds light on the objectives of the Third Reich, including the postwar economic development of Axis Europe and the extension of German hegemony beyond the USSR into the Middle East.  相似文献   
218.
219.
From 1964 to 1975 a small group of British officers, advisors, and trainers guided the forces of the Sultanate of Oman to victory in their conflict with the Marxist insurgents of the People's Front for the Liberation of the Occupied Arabian Gulf (PFLOAG). This campaign provides a clear example of how to effectively support an ally's counterinsurgency efforts with a minimal commitment of men and material. In particular, the critical assistance provided by the British consisted of experienced leadership and skilled technical support personnel as well as a viable strategy for victory. However, more important for the ultimate success of the counterinsurgency campaign was the emergence of new progressive leadership with the accession of Sultan Qaboos. The most important lesson from this study is that while security assistance can reinforce positive political efforts, it is not enough on its own to bring about a victory in an unfavourable political environment.  相似文献   
220.
针对信息化战争中信息处理对网络安全、平台安全、应用安全的需求,在分析军事栅格安全设施核心功能的基础上,从密码服务、数字证书、安全态势感知、安全管理、安全防护等方面提出了军事栅格安全设施的组成、总体结构、关键技术,以及在实际应用中的部署模式,为未来研制具备主动防御、自主响应、动态保护等特征的体系化、低时延、高可靠的军事栅格安全设施提供支撑。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号