首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   503篇
  免费   50篇
  国内免费   23篇
  576篇
  2024年   3篇
  2023年   1篇
  2022年   1篇
  2021年   16篇
  2020年   7篇
  2019年   28篇
  2018年   31篇
  2017年   37篇
  2016年   41篇
  2015年   21篇
  2014年   51篇
  2013年   102篇
  2012年   9篇
  2011年   29篇
  2010年   34篇
  2009年   28篇
  2008年   37篇
  2007年   22篇
  2006年   18篇
  2005年   18篇
  2004年   14篇
  2003年   14篇
  2002年   4篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有576条查询结果,搜索用时 0 毫秒
31.
随着网络中心战的发展,信息安全问题在现代潜艇系统中的重要性日益凸显。首先分析潜艇信息安全问题的背景、总结其研究现状,然后研究了潜艇信息安全需求及属性定义,探讨了潜艇信息系统信息安全防护整体框架,在此基础上提出了一种综合静态安全防护和动态运行安全防护的潜艇信息系统信息安全纵深防护体系结构。以期为解决潜艇系统设计中的安全缺陷、建立潜艇信息安全防护体系,辅助系统维护、保障系统安全提供基础。  相似文献   
32.
为探索信息化作战中指挥控制关键因素,提出改进作战指挥体制的对策措施,采用系统动力学理论,对协同决策的结构、参与者和信息反馈关系等关键因素进行了分析,在此基础上构建了基于系统动力学的协同决策模型并进行了模拟仿真。结果表明,增加指挥控制机构之间的信息共享可以有效提升协同决策的效率,为建立协同决策指挥控制体制提供了借鉴意义。  相似文献   
33.
This paper develops a Dynamic Stochastic General Equilibrium model where national security is an argument in the agent’s utility function and the government chooses optimally the level of military spending to maximize social welfare. National defense depends on military expenditure and on the strategic environment reflecting a potential hostile external threat. We use aggregate data on consumption, investment, and military spending for the US economy to estimate the parameters of the model. Estimation results suggest that consumption and national defense are complements and that military spending variability is mainly explained by external threat shocks although it also depends on the macroeconomic conditions. We compute impulse response functions of the main macroeconomic variables to several shocks: a total factor productivity shock, a defense technology shock, and a strategic environment shock. Surprisingly, we find that the optimal response to an increase in the external threat (a worsening in the strategic environment) will rise output by reducing consumption and increasing investment.  相似文献   
34.
Lobbyists may not share the same interests, but they usually agree to form a link in a network which could eventually be used to spread information, to search for potential partners, to speak with one voice to decision makers. In other words, social links represent value for lobbyists because they may ultimately facilitate access. In this article, we explore the network of the Security and Defense lobbies in the EU and we describe its structure.  相似文献   
35.
Despite its many institutional and political weaknesses and limitations, the African Union (AU) has been developing a variety of tools and mechanisms to respond effectively to complex disasters and emergencies (both natural and manmade) by building up a comprehensive regional security architecture. Furthermore, it has become the first and only regional or international organisation to enshrine the principle of ‘responsibility to protect’ (R2P) in its Constitutive Act. This regional approach to and formal endorsement of the R2P principle allowed it to assume a particular place in the promotion of peace and security in its area. This article aims to critically assess the effectiveness of the AU on the African continent by exploring its real capacity in preventing and responding to emergencies and violent conflicts, and therefore in rendering the principle of R2P operational. The article argues that the formalisation of principles does not necessarily mean their effective implementation. The organisation's use of the R2P principle is also greatly conditioned by internal and external factors.  相似文献   
36.
Africa and for that matter the Gulf of Guinea cannot be indifferent to the global energy politics of the 21st century. The increasing importance of the region has attracted major actors in the energy sector. The competing interests of these actors are played out in various forms. This heightened interest in the region, especially with the discovery of oil in huge commercial quantities, has brought the importance of the area into focus in global oil politics. This paper looks at the importance of the region in light of the huge energy potentials of the Gulf of Guinea and how the institution of proper governance systems could serve as an important factor in ensuring the proper management of the resource.  相似文献   
37.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability.  相似文献   
38.
To engage properly with the Somali National Army, to understand it in the hope of improving stability and the lives of over 12 million Somalis, good basic information on its composition and characteristics is necessary. Authoritative accounts on the subject have been scarce for over 25 years. This account seeks to detail the army’s dispositions across southern Somalia, and, more importantly, the brigades’ clan compositions and linkages. Clan ties supersede loyalties to the central government. The army as it stands is a collection of former militias which suffer from ill-discipline and commit crime along with greater atrocities. Estimates of numbers are unreliable, but there might be 13,000 or more fighters in six brigades in the Mogadishu area and five beyond.  相似文献   
39.
避雷针保护范围的图形仿真与图解法分析   总被引:1,自引:0,他引:1  
针对避雷针设计过程中计算公式过于复杂的问题,提出了利用平面几何作图求解避雷针联合保护范围的方法,给出了单支、双支和四支避雷针保护范围的作图解题步骤,并利用计算机图形仿真,给出了避雷针保护范围的空间结构图形。  相似文献   
40.
刘丽等作者在《装甲兵工程学院学报》第19卷第2期中,利用非齐次线性方程组给出了一种身份认证协议和一种消息认证协议。指出了这2个协议在设计上存在的安全缺陷,并给出了几种可能的攻击方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号