首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   255篇
  免费   17篇
  国内免费   11篇
  2024年   1篇
  2021年   2篇
  2020年   16篇
  2019年   24篇
  2018年   24篇
  2017年   28篇
  2016年   22篇
  2015年   3篇
  2014年   33篇
  2013年   66篇
  2012年   9篇
  2011年   6篇
  2010年   5篇
  2009年   5篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   4篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有283条查询结果,搜索用时 31 毫秒
171.
Boko Haram terrorism has been recognized by Nigerian President Jonathan as the most threatening and complex security issue in Nigeria since independence. In response, the Federal Government of Nigeria has committed itself to different counterterrorism measures, which are largely dominated by “hard politics” and military mobilization. Spending heavily on defense to upgrade military hardware and train personnel in a counterterrorism role, Nigeria has also boosted its strategic importance in the “Global War on Terror”. However, this attempt has become unpopular as it has failed to contain Boko Haram within a short time frame and has made insufficient headway against unabated terror, with human rights costs among the host communities and amidst a surge of stakeholders' discordance. As a matter of concern, this article seeks to assess Boko Haram as an opponent in Nigeria's war on terror (WOT) and to ascertain the challenges the country faces, the alternative measures open to it, and possible ways forward.  相似文献   
172.
My aim in this paper is to reflect on a very narrow question: under what conditions might a cyber-attack provide a just cause for war? I begin by articulating what makes for a just cause, briefly address the problem of attribution, and then discuss three broad categories of cyber-attack: those that clearly do not satisfy the just cause requirement, those that clearly do satisfy the just cause requirement, and three ambiguous cases – the destruction of property, the emplacement of logic bombs, and the failure to prevent cyber-attacks. My conclusions are exploratory and suggestive rather than definitive, partly by virtue of the extreme paucity of literature on the moral assessment of cyberwar.  相似文献   
173.
在分析当前水面舰艇面临的现实威胁基础上,研究了指挥关系及指挥流程对水面舰艇对空防御作战效能的影响,提出利用流程仿真工具进行指挥流程的建模仿真、采用蒙特卡洛模拟方法计算作战效能的指挥关系评估方法,该理论可为指挥关系或指挥流程的优化提供技术参考和研究方向。  相似文献   
174.
魏岳江 《国防科技》2013,(6):89-93,96
文章研究信息化条件下局部战争战法。利用模拟作战实验室实践检验、论证完善战争设计理论,普及电脑游戏开发战争想象力,借虚拟数学方式预测战争结果。强化“战争设计”对训练的牵引作用,落实训战一致。强调加强军事理论研究的针对性、前瞻性.综合考虑武器装备、战争战例、军事训练水平、人员素质、战役战术等因素,对未来可能发生的战争进行准确预测。  相似文献   
175.
From 1965 to the present, Colombia has been confronted by the insurgency of the Revolutionary Armed Forces of Colombia (FARC). The threat reached a new level in 1996 with the advent of mobile warfare, whereby large units sought to neutralize the military in an effort to seize power and institute a Marxist-Leninist regime. Unlike Vietnam, what followed was a regaining of the strategic initiative by the government and a decimation of the insurgent threat. This was accomplished with US assistance but from first to last was driven by Colombian leadership and strategy. The strategy which led to this signal change, ‘Democratic Security’, unfolded under the leadership of President Álvaro Uribe. It was a civil–military partnership, which sought to expand the writ of Colombian democracy to all elements of society. Securing the population provided the shield behind which economic, social, and political life could occur as driven by the will of the people. It was the agreement upon legitimacy as the strategic goal and reform as the route to that goal which allowed the Colombians and the Americans to work so well together.  相似文献   
176.
We know little of the internal governing practices of non-state actors once in control of territory. Some territories have witnessed the establishment of new institutions of public goods remarkably similar to state institutions. This article compares four armed political parties governing territory during the Lebanese civil war. These non-state violent actors established complex political and economic institutions and administrative structures. Despite the wide range of ideologies and identities of these actors, they all converged in their institutional priorities, although not in their capacities or the particular ways of achieving those priorities. Data from interviews and the actions of the armed political parties suggest a combination of ideology and desire for control is causal in generating public institutions, partly attributable to the high degree of citizen activism marking the Lebanese case.  相似文献   
177.
Did participants in small wars in the period 1775–1831 learn from previous or contemporary examples? While this is difficult to prove for participants who left no written records, there is considerable evidence in existing publications by practitioners that they did indeed draw out lessons from recent insurgencies, either from their own experience or from events elsewhere which they studied from afar, especially the Spanish Guerrilla, which had already become legendary. Most authors showed an interest in how to stage insurgencies rather than in how to quell them. Even then, transfer did not come in a package of tactics-cum-values, but in each case in different configurations.  相似文献   
178.
通过构建李雅普诺夫函数,对具有不同拓扑结构的无线网络控制系统的一致性问题进行了研究。利用网络结构的邻接矩阵对网络拓扑结构进行描述,同时构造系统的延迟矩阵,结合复杂网络理论中的聚类系数、耦合强度的概念,对系统进行建模。针对复杂网络中常用的两种结构,构建不同的邻接矩阵和延迟矩阵,利用线性矩阵不等式的方法,给出使系统稳定的一般性条件。最后仿真结果验证了方法的有效性。  相似文献   
179.
直升机攻潜策略是反潜战中值得研究的一个问题。研究攻潜策略实质是确定最优投雷点,即直升机的最优接近航向和投雷时刻。本文研究的结果是:如果目标作等速直线运动,则直升机的最优接近策略为平行接近法。  相似文献   
180.
This paper asks whether Bosnian Serb leaders’ choice to carry out a secession war in 1992–1995 was rational from the point of view of their stated goal of ethnic cleansing. We construct two indexes, one of ethnic purity and another of ethnic Serb concentration, and apply them to a counterfactual estimate of the outcome of ‘peaceful’ ethnic cleansing – what could have been achieved by population exchange based on pre-war territorial Serb power without war – in comparison to the actual outcome of the war. We find that the gross benefits of the chosen strategy of secession and war far exceed anything that could be achieved by the peaceful alternative. A conjectural assessment of perceived costs suggests that also net benefits were maximized by the war strategy. The implication for international deterrence policy is that credible judicial prosecution and punishment is the best way to alter the prospective perpetrators’ calculus.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号