全文获取类型
收费全文 | 386篇 |
免费 | 4篇 |
国内免费 | 5篇 |
专业分类
395篇 |
出版年
2025年 | 1篇 |
2023年 | 4篇 |
2021年 | 16篇 |
2020年 | 18篇 |
2019年 | 34篇 |
2018年 | 15篇 |
2017年 | 25篇 |
2016年 | 30篇 |
2015年 | 10篇 |
2014年 | 32篇 |
2013年 | 58篇 |
2012年 | 16篇 |
2011年 | 10篇 |
2010年 | 10篇 |
2009年 | 13篇 |
2008年 | 13篇 |
2007年 | 18篇 |
2006年 | 15篇 |
2005年 | 20篇 |
2004年 | 16篇 |
2003年 | 5篇 |
2002年 | 1篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1999年 | 3篇 |
1998年 | 3篇 |
1997年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
排序方式: 共有395条查询结果,搜索用时 15 毫秒
11.
在联邦式作战仿真平台中,互相通信的主体在进行通信的同时还需要保护其私有的信息。讨论了基于线性方程组“无穷解”条件下的连续信息空间的信息泄漏和保护问题,包括该模型的基本特性和防止泄漏的方法,指出了存在信息的部分泄漏问题,并给出了检测部分泄漏的方法,为提高计算性能,可指定检测子空间,最后,讨论了信息动态改变对信息泄漏的影响。 相似文献
12.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article. 相似文献
13.
Steve Wills 《Defense & Security Analysis》2020,36(1):30-41
ABSTRACTDiscussion surrounding the announcement of a new NATO Maritime Command for the North Atlantic seems to have settled on the assumption that there is again a vital “sea-line of communication” (SLOC) between North America and Europe as there was supposed to be during the Cold War. The Soviet Union had a large fleet of nuclear and conventional submarines and it seemed very clear that Soviet admirals intended to fight a third “Battle of the Atlantic” in the event of war to prevent Western resupply of NATO. However, this scenario bore no resemblance to what the Soviet Navy actually intended to do in case of war. Changes in technology, notably in submarine propulsion, antisubmarine warfare (ASW), and ballistic missile range and accuracy were the real drivers of the Cold War in the Atlantic. Cruise missile-armed submarines that can attack shore-based economic infrastructure are the real threat from the Russian submarine force. 相似文献
14.
Montgomery McFate 《Defense & Security Analysis》2020,36(1):42-64
ABSTRACTThis article argues that the US Navy’s roles (which have historically been bifurcated between warfighting and political use of force) manifest in its organisational culture as two different concepts of war: the US Navy as diplomatic actor and the US Navy as warfighting force. The conflict between these different concepts of war can be seen in the current debate about the definition and function of presence. The debate about presence is not just theoretical, but represents a deep and enduring conflict within the Navy as an organisation about its concept of war. Since the end of WWII, the Navy has been designing its fleet architecture according to a Mahanian concept of war, despite the preponderance of non-lethal missions and activities. The result is a mismatch between platforms and tasks. 相似文献
15.
《防务技术》2020,16(1):232-241
Operation architecture plays a more important role in Network Centric Warfare (NCW), which involves dynamic operation networks with complex properties. Thus, it is essential to investigate the operation architecture under the informatization condition within NCW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation, i.e., the aerial combat. A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture, where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms. Meanwhile, we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters. 相似文献
16.
外军无人水面艇发展现状与趋势 总被引:2,自引:0,他引:2
文章介绍了美、以等国军用无人水面艇的发展现状,探讨了无人水面艇的典型作战应用,在此基础之上分析了外军无人水面艇的发展特点和趋势。 相似文献
17.
18.
19.
舆论战是通过舆论传播平台传递信息,作用于受众的思想或心理,争取人心,实现小战大胜或不战而胜。依据信息加工原理,分析研究信息源、信息、媒介和受众这四个要素,是提升舆论战作战功能的必由之路。 相似文献
20.