排序方式: 共有200条查询结果,搜索用时 15 毫秒
121.
大气层高层作战的动能拦截器多采用侧窗探测的结构布局,侧窗定向方位对其拦截效果有重要的影响,但定向方位的选择却受诸多因素制约.在一定理想化假设的基础上,研究了末段交战过程中视线转率的变化规律,从理论上分析了由侧窗定向产生的攻角对拦截结果的影响,得到了只考虑气动力影响下的最佳定向方位;然后综合考虑气动力、轨控系统、姿控系统的影响,给出了不同作战高度下侧窗定向方位的选择方法.数字仿真结果表明,此种方法能够满足侧窗探测的要求,且在大多数情况下只需一次定向即可完成拦截. 相似文献
122.
结合量子计算算子提出一种基于极化单光子的量子秘密共享协议.该方案可以将全部量子态用于密钥共享,借助量子置换算子和量子纠缠特性证明了方案能够有效抵抗中间人攻击,利用辅助量子态进行监视,方案能够以高概率检测特洛伊木马攻击.通过对置换算子进行高维推广,证明了方案推广到(n,n)的可行性和实用性. 相似文献
123.
124.
125.
Erik J Dahl 《战略研究杂志》2013,36(1):31-55
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism. 相似文献
126.
127.
128.
129.
130.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity. 相似文献