首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   279篇
  免费   4篇
  国内免费   50篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   3篇
  2019年   9篇
  2018年   2篇
  2017年   9篇
  2016年   17篇
  2015年   10篇
  2014年   21篇
  2013年   125篇
  2012年   9篇
  2011年   7篇
  2010年   6篇
  2009年   14篇
  2008年   9篇
  2007年   14篇
  2006年   17篇
  2005年   17篇
  2004年   8篇
  2003年   5篇
  2002年   1篇
  2001年   4篇
  2000年   2篇
  1999年   1篇
  1998年   5篇
  1997年   3篇
  1996年   3篇
  1995年   1篇
  1994年   3篇
  1993年   4篇
排序方式: 共有333条查询结果,搜索用时 0 毫秒
331.
ABSTRACT

India is advancing slowly toward operationalizing its nuclear triad. Its first nuclear-propelled ballistic-missile submarine (SSBN), the INS Arihant, conducted its maiden deterrent patrol in November 2018. However, doubts exist around the capability of India’s SSBN, the effectiveness of its command and control, and its effects on regional stability in South Asia. This article examines the history and future trajectory of India’s sea-based nuclear forces and describes how India seeks to maintain robust command and control over its undersea nuclear weapons.  相似文献   
332.
ABSTRACT

Under what conditions are cyber-weapons effective in nuclear counter-proliferation? With continued interest in nuclear proliferation professed by Iran, North Korea, and Saudi Arabia, a discussion of the effectiveness of counter-proliferation measures remains relevant. Cyber-attacks as military option in a state-on-state conflict still requires additional corroborating evidence to make conclusions about its long-term effectiveness. This work analyses the general applicability of cyber-weapons and their usefulness in nuclear counter-proliferation. Through a comparative case study of Operation Orchard, Stuxnet, and recent “Left-of-Launch” operations against North Korea, the essay finds that cyber-operations are not particularly effective against nuclear programmes that are in the later stages of their development. They can disrupt and delay a nuclear programme temporarily, if the attack remains clandestine, but cannot halt nuclear proliferation all together. However, effectiveness increases if they are used in combination with conventional weapons. The article addresses a topic of interest to national-level decision-makers: whether cyber-operations can and should play a role in nuclear counter-proliferation.  相似文献   
333.
ABSTRACT

This article focuses on the final years of South Africa’s nuclear-weapon program, particularly on the decision-making process leading up to the signature of the 1968 Treaty on the Non-Proliferation of Nuclear Weapons (NPT) by the South African government in 1991. In August 1988, after two decades of defiance, negotiations between the apartheid government and the NPT depository powers (the United Kingdom, the United States, and the Soviet Union) ensued at the International Atomic Energy Agency (IAEA) in Vienna. Despite South Africa being the only state to give up its indigenously developed nuclear weapons and subsequently join the nonproliferation regime, little is known about how the national position on NPT accession and IAEA safeguards evolved. Research carried out in multiple archives using hitherto untapped primary sources and interviews with key actors from several countries show how domestic and regional political dynamics influenced Pretoria’s position on entering the nonproliferation regime. In the process, the F.W. de Klerk government managed to skillfully exploit international proliferation fears to advance its own agenda, thereby connecting South African NPT accession with that of the neighboring Frontline States coalition of Angola, Mozambique, Tanzania, Zambia, and Zimbabwe.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号