首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   386篇
  免费   4篇
  国内免费   5篇
  395篇
  2025年   1篇
  2023年   4篇
  2021年   16篇
  2020年   18篇
  2019年   34篇
  2018年   15篇
  2017年   25篇
  2016年   30篇
  2015年   10篇
  2014年   32篇
  2013年   58篇
  2012年   16篇
  2011年   10篇
  2010年   10篇
  2009年   13篇
  2008年   13篇
  2007年   18篇
  2006年   15篇
  2005年   20篇
  2004年   16篇
  2003年   5篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1999年   3篇
  1998年   3篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
排序方式: 共有395条查询结果,搜索用时 15 毫秒
11.
在联邦式作战仿真平台中,互相通信的主体在进行通信的同时还需要保护其私有的信息。讨论了基于线性方程组“无穷解”条件下的连续信息空间的信息泄漏和保护问题,包括该模型的基本特性和防止泄漏的方法,指出了存在信息的部分泄漏问题,并给出了检测部分泄漏的方法,为提高计算性能,可指定检测子空间,最后,讨论了信息动态改变对信息泄漏的影响。  相似文献   
12.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
13.
ABSTRACT

Discussion surrounding the announcement of a new NATO Maritime Command for the North Atlantic seems to have settled on the assumption that there is again a vital “sea-line of communication” (SLOC) between North America and Europe as there was supposed to be during the Cold War. The Soviet Union had a large fleet of nuclear and conventional submarines and it seemed very clear that Soviet admirals intended to fight a third “Battle of the Atlantic” in the event of war to prevent Western resupply of NATO. However, this scenario bore no resemblance to what the Soviet Navy actually intended to do in case of war. Changes in technology, notably in submarine propulsion, antisubmarine warfare (ASW), and ballistic missile range and accuracy were the real drivers of the Cold War in the Atlantic. Cruise missile-armed submarines that can attack shore-based economic infrastructure are the real threat from the Russian submarine force.  相似文献   
14.
    
ABSTRACT

This article argues that the US Navy’s roles (which have historically been bifurcated between warfighting and political use of force) manifest in its organisational culture as two different concepts of war: the US Navy as diplomatic actor and the US Navy as warfighting force. The conflict between these different concepts of war can be seen in the current debate about the definition and function of presence. The debate about presence is not just theoretical, but represents a deep and enduring conflict within the Navy as an organisation about its concept of war. Since the end of WWII, the Navy has been designing its fleet architecture according to a Mahanian concept of war, despite the preponderance of non-lethal missions and activities. The result is a mismatch between platforms and tasks.  相似文献   
15.
    
《防务技术》2020,16(1):232-241
Operation architecture plays a more important role in Network Centric Warfare (NCW), which involves dynamic operation networks with complex properties. Thus, it is essential to investigate the operation architecture under the informatization condition within NCW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation, i.e., the aerial combat. A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture, where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms. Meanwhile, we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters.  相似文献   
16.
外军无人水面艇发展现状与趋势   总被引:2,自引:0,他引:2  
万接喜 《国防科技》2014,35(5):91-96
文章介绍了美、以等国军用无人水面艇的发展现状,探讨了无人水面艇的典型作战应用,在此基础之上分析了外军无人水面艇的发展特点和趋势。  相似文献   
17.
田成信  张峰  江飞 《国防科技》2014,35(5):103-105
网络战作为一种新的作战形式引入作战领域,越来越受到各国重视,并已成为世界各国争相研究和重点建设的作战样式。文章从网络战的特点入手,针对网络战对作战影响进行了探讨,并从构建网络体系、研发武器装备、重视人才培养和加强训练演练四个方面阐述了强化军队网络战的对策措施。  相似文献   
18.
分布式海战场资源规划是实现海上联合作战的关键。首先分析了海战场资源的分类及战场资源规划特点,建立了基于多智能体的分布式海战场资源规划系统,深入分析了该规划系统的组成和功能,并构造了相应的资源规划结构模型,为实现定性和定量相结合的海战场资源规划与管理提供了一条有效的途径。  相似文献   
19.
舆论战是通过舆论传播平台传递信息,作用于受众的思想或心理,争取人心,实现小战大胜或不战而胜。依据信息加工原理,分析研究信息源、信息、媒介和受众这四个要素,是提升舆论战作战功能的必由之路。  相似文献   
20.
作为一种软杀伤性的政治攻心战,网络舆论战已成为信息化条件下体系作战的一种重要作战样式。和平时期网络舆论战具有其鲜明的特点,即舆论传播的隐秘性和受众的广泛性,信息传递的迅速性和受众的自组织性,信息的海量性和受众注意的易转移性。对此,应积极利用互联网争夺意识形态领域的主导权,积极参与网上讨论并注意引导网络舆论风向,加强网络舆论战技术装备和人才队伍建设,为打赢信息化条件下的网络舆论战打下良好基础。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号