首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   244篇
  免费   11篇
  国内免费   9篇
  2021年   1篇
  2020年   14篇
  2019年   24篇
  2018年   24篇
  2017年   27篇
  2016年   20篇
  2015年   3篇
  2014年   27篇
  2013年   66篇
  2012年   6篇
  2011年   5篇
  2010年   4篇
  2009年   5篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   3篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有264条查询结果,搜索用时 15 毫秒
161.
从关于国防和军队重大改革的重要论述入手,系统地阐述了武警部队重大改革必须向“能打胜仗”的战斗力聚焦。主要从三个层面进行分析:一是向提高部队整体素质及优化规模结构聚焦;二是向提高部队武器装备保障效能聚焦;三是向增强部队以执勤处突为中心的军事能力聚焦。  相似文献   
162.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
163.
根据战备物资储备工作的特点和要求,分析了统筹工作的目的和意义,用于指导战备物资的储备工作。构建了战备物资储备统筹模型,运用定性和定量相结合的方法,综合考虑各种因素对储备的影响,对各方向的战备物资消耗需求量进行多层次的统筹,最终获得战备物资的储备限额量。  相似文献   
164.
根据战备物资储备工作的特点和要求,分析了统筹工作的目的和意义,用于指导战备物资的储备工作。构建了战备物资储备统筹模型,运用定性和定量相结合的方法,综合考虑各种因素对储备的影响,对各方向的战备物资消耗需求量进行多层次的统筹,最终获得战备物资的储备限额量。  相似文献   
165.
From 1965 to the present, Colombia has been confronted by the insurgency of the Revolutionary Armed Forces of Colombia (FARC). The threat reached a new level in 1996 with the advent of mobile warfare, whereby large units sought to neutralize the military in an effort to seize power and institute a Marxist-Leninist regime. Unlike Vietnam, what followed was a regaining of the strategic initiative by the government and a decimation of the insurgent threat. This was accomplished with US assistance but from first to last was driven by Colombian leadership and strategy. The strategy which led to this signal change, ‘Democratic Security’, unfolded under the leadership of President Álvaro Uribe. It was a civil–military partnership, which sought to expand the writ of Colombian democracy to all elements of society. Securing the population provided the shield behind which economic, social, and political life could occur as driven by the will of the people. It was the agreement upon legitimacy as the strategic goal and reform as the route to that goal which allowed the Colombians and the Americans to work so well together.  相似文献   
166.
We know little of the internal governing practices of non-state actors once in control of territory. Some territories have witnessed the establishment of new institutions of public goods remarkably similar to state institutions. This article compares four armed political parties governing territory during the Lebanese civil war. These non-state violent actors established complex political and economic institutions and administrative structures. Despite the wide range of ideologies and identities of these actors, they all converged in their institutional priorities, although not in their capacities or the particular ways of achieving those priorities. Data from interviews and the actions of the armed political parties suggest a combination of ideology and desire for control is causal in generating public institutions, partly attributable to the high degree of citizen activism marking the Lebanese case.  相似文献   
167.
Did participants in small wars in the period 1775–1831 learn from previous or contemporary examples? While this is difficult to prove for participants who left no written records, there is considerable evidence in existing publications by practitioners that they did indeed draw out lessons from recent insurgencies, either from their own experience or from events elsewhere which they studied from afar, especially the Spanish Guerrilla, which had already become legendary. Most authors showed an interest in how to stage insurgencies rather than in how to quell them. Even then, transfer did not come in a package of tactics-cum-values, but in each case in different configurations.  相似文献   
168.
ABSTRACT

This article aims to identify and elaborate the causes and ramifications of applying transitional justice, in particular accountability measures, to situations of war. It focuses on the correlations between peace and justice – and hence an important perspective on the question ‘how do wars end’. The article seeks to understand some of the main challenges associated with pursuing accountability for crimes committed in contemporary forms of conflict, including civil wars and abuses committed by major powers in armed conflict.  相似文献   
169.
专家意见能否达成共识是战争设计工程中的一个关键问题.首先从复杂理论视角对专家思维过程的适应性、聚集性、非线性进行分析,接着将专家群体划分为两类并且运用马尔科夫转移矩阵对研讨过程建模,提出并证明了两类专家群体思维收敛的充分必要条件,得到群体思维收敛不仅与研讨过程中专家之间的关系影响矩阵有关,而且与专家的初始意见有关.最后通过计算机仿真进一步探索了群体思维收敛过程的影响因素.  相似文献   
170.
根据网络战的要求,提出了一种网络安全主动防护系统,该系统把一种新型防火墙和网络监测系统结合起来,做到了对黑客入侵及病毒攻击的实时监测、捕获和主动防护,克服了传统网络防护系统的不足,如能开发研制,将有利于我军在未来的网络战中取得主动地位。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号