首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   299篇
  免费   31篇
  国内免费   28篇
  2022年   4篇
  2021年   4篇
  2020年   2篇
  2019年   9篇
  2018年   6篇
  2017年   18篇
  2016年   26篇
  2015年   8篇
  2014年   30篇
  2013年   45篇
  2012年   37篇
  2011年   27篇
  2010年   20篇
  2009年   23篇
  2008年   11篇
  2007年   6篇
  2006年   13篇
  2005年   10篇
  2004年   10篇
  2003年   11篇
  2002年   10篇
  2001年   6篇
  2000年   5篇
  1999年   4篇
  1998年   2篇
  1997年   5篇
  1993年   3篇
  1992年   1篇
  1991年   2篇
排序方式: 共有358条查询结果,搜索用时 15 毫秒
221.
通过对无线传感器网络节点安全定位技术的研究和分析,采用基于跳数的节点定位算法思想获取定位参照信息,提出了一种与硬件无关的基于跳数的节点安全定位算法——HOP-GDSL,该算法用设计的信标节点信息传递协议提供包的认证、保护跳数信息,用现有的锚节点检测虫洞攻击.经仿真实验证明,该算法能有效抵抗恶意节点攻击,实现节点正常定位,并对虫洞攻击有较高的检测率.  相似文献   
222.
大型购物中心结构复杂,人员密集,火灾隐患较多,提前做好防火安全评估工作十分重要.利用现场调查法、实例分析法等,结合费氏曲线防火安全评估法针对大型购物中心的空阃特性和防火对策作探讨,并对某购物中心进行评估,利用疏散允许时间的人员安全曲线,得出该购物中心在发生火灾时的人员安全曲线.通过对防火安全方法进行分析,体现出费氏曲线在大型购物中心防火安全评估应用中的适用性、发展性.  相似文献   
223.
为了检测无线局域网MAC层的6种DOS攻击方式,提出一种基于Hybrid特征选择和支持向量机的入侵检测算法.该算法先用混合器模式的Hybrid特征选择算法提取8个识别攻击的流量统计特征,然后利用支持向量机对待检测对象进行识别分类.通过建立仿真环境对检测模型的检测效果进行统计验证,表明检测模型在具有较高检测准确率和较低的虚警率,能够有效地检测MAC层DOS攻击,具有实用价值.  相似文献   
224.

European defence policy has been dominated by politics. This paper shows how economic principles can be used to derive guidelines for the formulation of European defence policy. The inefficiencies of the EU's existing defence arrangements are identified. It is shown that there is scope for efficiency improvements in the EU's Armed Forces and its defence industries.  相似文献   
225.
This survey article focuses on defence economics issues and provides data and analysis on the Federal Republic of Yugoslavia's (FRY) defence policy, defence spending, the size of its armed forces, its defence industries and the cost of the civil war. The main section is devoted to the period from 1990 to the present and deals with the following aspects: the situation after the break‐up of the former Yugoslavia, general economic data; the cost of the civil war, the defence budget; the armed forces; the manufacture of armaments and the structure of the defence industry.  相似文献   
226.
227.
针对潜艇鱼雷攻击占位问题,建立占位方案分析和优化的微分对策模型,采用影子目标法对问题进行简化。证明了在给定规避速度大小的条件下,潜艇最佳规避策略为直线运动。于是利用定性微分对策理论,给出潜艇可占领攻击阵位条件。以占位时间最短为优化目标,建立可占位情形下的占位方案优化模型,即可占位情形下的最短时间占位方案计算模型,给出最短时间占位方案解析计算公式。  相似文献   
228.
舰艇采用实测舰位法对岸上不可见目标进行远程攻击时,在已获取目标地理信息的情况下,我舰定位误差往往成为影响打击精度的关键因素。针对惯性导航长时间工作产生积累误差,以及卫星导航在战时易受干扰等情况,提出利用对单发弹丸的跟踪与预测,结合提取的岸上目标绝对定位数据和弹丸落点的偏差信息,反向推算发射舰相对岸上目标的位置,可较为精确地修正我舰的绝对定位数据,为后续射击提供修正手段。该方法减少了战时舰炮武器系统对导航的依赖,仅靠对单发弹丸跟踪和预测,即可提高后续对岸射击的精度。  相似文献   
229.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
230.
In the aftermath of 9/11, the USA embarked on a massive global hunt for terrorists and launched its “Operation Enduring Freedom” in Afghanistan. Its failure to control insurgency in Afghanistan spilled over into Pakistan, with disastrous consequences. The resurgence of the Taliban with more formidable tactics and maneuvering skills has become more troublesome for both Afghanistan and Pakistan and for the USA and its allied forces. The fierce comeback of the insurgents has challenged the political and territorial integrity of Pakistan, one that it cannot tolerate. This article analyzes the current situation and its implications for Pakistan's security. Moreover, it looks into the internal and external security complexities that Pakistan faces and the possible implications of the US exit strategy for Pakistan's security. It concludes that the security situation in Pakistan is continuously deteriorating and no part of her territory is immune from terrorists' attacks. To be successful, Pakistan must pursue a broad-based strategy that encompasses military, political, social, economic and informational domains aimed at accomplishing four major objectives: (1) elimination of foreign terrorists and their facilitators; (2) strengthening of the political and administrative institutions in the Federally Administered Tribal Areas (FATA); (3) establishing a safe and secure environment conducive for sustained development and the realization of real socio-economic progress and (4) integrating the FATA into the national mainstream. In the long term, a strategy based on the concept of “Enlightened Moderation” is the right solution, not only to the internal problems of Pakistan but also for the Muslim world and the international community.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号