全文获取类型
收费全文 | 519篇 |
免费 | 45篇 |
国内免费 | 28篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 16篇 |
2020年 | 9篇 |
2019年 | 29篇 |
2018年 | 31篇 |
2017年 | 34篇 |
2016年 | 34篇 |
2015年 | 19篇 |
2014年 | 58篇 |
2013年 | 107篇 |
2012年 | 13篇 |
2011年 | 30篇 |
2010年 | 37篇 |
2009年 | 30篇 |
2008年 | 33篇 |
2007年 | 21篇 |
2006年 | 19篇 |
2005年 | 20篇 |
2004年 | 12篇 |
2003年 | 15篇 |
2002年 | 7篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1991年 | 1篇 |
1990年 | 2篇 |
排序方式: 共有592条查询结果,搜索用时 15 毫秒
161.
倪谷炎 《国防科技大学学报》2002,24(5):53-56
RSA是目前最成熟的一种公钥密码体系 ,RSA加解密算法的速度依赖于模幂算法 ,因而快速模幂算法一直是人们感兴趣的课题。该文提出了一种基于分块的模幂算法 ,对算法复杂性进行了讨论 ,并与其他模幂算法作了比较 ,从理论上论证了它具有更快的模幂速度 相似文献
162.
网络流量特性是人们深刻理解整个网络体系的架构及网络控制机制的切入点,所以有必要深入探究网络流量的特性。通过小波技术对某校园网络流量数据进行全面分析,细致地刻画了流量到达过程的自相似性与多重分形特性。 相似文献
163.
针对传统混合模糊测试提升技术多聚焦于利用多种动静态分析手段辅助而忽略了混合符号执行自身性能的问题,提出一种混合模糊测试平衡点模型,并基于该模型对主流混合符号执行方案进行剖析,包括污点分析辅助模糊测试、混合模糊测试以及混合符号执行,归纳了6种符号执行方案,基于混合符号执行引擎Triton复现了6种符号执行方案,并通过10个典型真实程序进行了测试评估。从效率、内存、覆盖率三个维度对各个方案进行性能对比与影响因素分析。实验证明,优化方案都可以消除不必要的约束并减少时间和空间开销,但约束缩减会造成信息丢失,造成覆盖率降低。基于实验数据分析,提出了一个优化方案的性能序列,并提出三种针对不同测试需求的优化方案。 相似文献
164.
165.
Robbie J. Totten 《Defense & Security Analysis》2015,31(3):199-212
What are relationships between epidemics, national security, and US immigration policy? This question is important because it sheds light on transnational or nontraditional security areas, American immigration policy, and a pressing issue for US leaders who have recently faced epidemics such as the West Africa Ebola outbreak that began in 2013. This article answers it and lays ground in the area by reviewing epidemics in world history, using International Relations and Security Studies works to specify dangers of contagions for states, and identifying three general immigration measures that American leaders have utilized from the seventeenth century to the present day to protect against contagions, which are (1) policies restricting entrance of foreigners thought to carry specified diseases, (2) the isolation or quarantining of immigrants with contagious disease, and (3) delegating the President with authority to stop immigration in the event of an epidemic abroad. This study has implications for research and contemporary US immigration policy. 相似文献
166.
Siphokazi Magadla 《African Security Review》2015,24(4):390-402
This article examines women's role as combatants in national liberation forces in South Africa. Three categories – guerrilla girls, combative mothers and the in-betweeners – are introduced to underscore the varied ways in which women have participated in combat within the national liberation movements. Factors such as age and one's ability to leave the country affected whether women could participate in combat as ‘guerrilla girls’ or if it limited them to fighting apartheid violence from home, or if there were women who can be defined as having fallen somewhere in between these categories. These categories are used to theorise women's combat roles in the anti-apartheid struggle, thus broadening and challenging the dominant notions of combat that often hide women's contributions in war. In this regard, different periods of struggle, physical location, as well as age, determined the methods of activism available to men and women. 相似文献
167.
Cheryl Hendricks 《African Security Review》2015,24(4):364-375
This article highlights and critiques the underlying conceptualisations and assumptions of the women, peace and security (WPS) agenda that emerged with the adoption of United Nations Security Council Resolution 1325 in 2000. The main argument is that we need to rethink the WPS agenda to produce more holistic and groundbreaking responses for the types of challenges encountered, i.e., that gender inequality and insecurity are deep rooted and multi-layered, and thus negate mechanistic responses that do not deal with cultural and structural issues. It specifically focuses on gender and peace-making and gender and peacekeeping to point to the pitfalls in the current conceptions and practices in this arena. 相似文献
168.
Pascal Vennesson 《战略研究杂志》2017,40(3):358-391
Critical security advocates commonly portray strategic studies as crippled by its narrow focus on Cold War-era military issues, as state-centric and as Western-centric. I argue that this conception of the scope of strategy is flawed and I offer a comprehensive rebuttal by working out the logic of the theories advanced by Carl von Clausewitz and Thomas Schelling. The proponents of critical security overlook the striking expansion of strategy during the Cold War, its longstanding inclusion of competing political actors not just states, as well as its capacity to put Western and non-Western actors in a common analytic frame. By breaking out of the conceptual jails in which strategy has been incarcerated, I seek to reconnect International Relations to strategic thought from which it has become increasingly estranged. 相似文献
169.
170.