首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   152篇
  免费   1篇
  153篇
  2019年   12篇
  2018年   5篇
  2017年   10篇
  2016年   5篇
  2015年   4篇
  2014年   18篇
  2013年   62篇
  2012年   4篇
  2011年   4篇
  2010年   3篇
  2009年   7篇
  2008年   3篇
  2007年   2篇
  2006年   2篇
  2005年   3篇
  2004年   4篇
  2003年   3篇
  2000年   1篇
  1999年   1篇
排序方式: 共有153条查询结果,搜索用时 0 毫秒
51.
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir.  相似文献   
52.
    
This article examines the historical impact of foreign fighters and how the international community has sought to counter this threat. It argues that foreign fighters have contributed significantly to the metastasis of Salafi-jihadism over the past 30 years. They have globalized local conflicts. They have brought advanced skills to battlefields. Further, the logistics infrastructure built by foreign fighters has allowed Salafi-jihadism to expand rapidly. The challenge for security officials today is how to prevent the foreign fighters in Syria and Iraq from expanding the threat of Salafi-jihadism further. To inform this effort, this article derives lessons learned from past efforts against Arab Afghans in Bosnia (1992–1995) and Abu Musab al-Zarqawi’s foreign volunteers in Iraq (2003–2008).  相似文献   
53.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice.  相似文献   
54.
雷达情报综合是电子对抗系统数据处理中的重要环节,它可以有效地消除虚假和重复雷达。结合雷达信号出现的规律和雷达参数分布特点,讨论了雷达信号合批技术,给出了一种合批方法。该方法可以快速高效地对各类辐射源型号识别、定位的结果进行综合处理,实际应用结果表明该方法是有效的。  相似文献   
55.
基于Agent建模与仿真的军事对抗系统   总被引:2,自引:0,他引:2  
军事对抗系统是复杂适应系统.基于Agent建模与仿真较好地克服了传统的建模技术存在的不足,为将军事对抗系统作为复杂适应系统研究提供了新的思路,开辟了军事对抗系统建模仿真的新领域.结合红蓝分队对抗实例,介绍了基于Agent建模与仿真技术建立分队对抗系统的全过程,并对其中的属性集、行为集、规则集、信用分派机制、底层交互、高层交互构建进行了深入的研究.该研究为建立基于Agent建模与仿真的Multi-Agent军事对抗系统提供了思路和参考.  相似文献   
56.
Famous cultural monuments are often regarded as unique icons, making them an attractive target for terrorists. Despite huge military and police outlays, terrorist attacks on important monuments can hardly be avoided. We argue that an effective strategy to discourage terrorist attacks on iconic monuments is for a government to show a firm commitment to swift reconstruction. Using a simple game‐theoretic model, we demonstrate how a credible claim to rebuild any destroyed cultural monument discourages terrorist attacks by altering the terrorists' expectations and by increasing the government's reputation costs if they fail to rebuild.  相似文献   
57.
This paper presents a game‐theoretic model of suicide terrorism containing three agents: the terrorist leader; a targeted government; and potential terrorist supporters. Supporters join the terrorist group if they gain more from their participation than from their economic opportunities. Preemptive measures by the government can result in a backlash that encourages recruitment through new grievances. Suicide attacks can also lead to recruitment. Increases in preemption costs and/or economic opportunities can reduce the overall level of terrorism, while increasing the proportion of suicide to normal attacks. An increase in the effect of preemption on recruitment, or the propaganda effect of suicide bombings has the opposite effect of increasing normal and suicide attacks, but decreasing the proportion of suicide to normal attacks in the terrorist organization’s strategy profile.  相似文献   
58.
从意识形态的角度对恐怖主义进行研究,是一个比较新的研究视域,对恐怖主义意识形态概念的科学界定成为研究的理论起点。本文从对意识形态内涵特征的理解出发,以对恐怖主义概念的把握为桥梁,阐明恐怖主义意识形态概念成立的逻辑合理性。  相似文献   
59.
以色列是世界上第一个遭受国际恐怖主义威胁的国家。但通过明确分工和行之有效的反恐措施,以色列已经能够对付不断升级的恐怖主义威胁。自“9·11”事件以来,全球许多国家都开始向以色列求教国土安全方面的知识和专业技术。  相似文献   
60.
John Brown is usually not considered to have been a terrorist, and even recent analyses of his activities consider him to be a guerrilla fighter or insurgent in his activities in Kansas. Brown, however, meets the criteria of a terrorist more than a guerrilla fighter when his activities in the Kansas Territory are considered. His raid on Harpers Ferry, however, is more in line with guerrilla operations or insurgent activities.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号