首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   487篇
  免费   42篇
  国内免费   17篇
  2024年   1篇
  2023年   2篇
  2021年   14篇
  2020年   6篇
  2019年   29篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   51篇
  2013年   99篇
  2012年   8篇
  2011年   26篇
  2010年   35篇
  2009年   30篇
  2008年   35篇
  2007年   21篇
  2006年   18篇
  2005年   18篇
  2004年   11篇
  2003年   15篇
  2002年   5篇
  2001年   2篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   2篇
排序方式: 共有546条查询结果,搜索用时 15 毫秒
251.
舰艇近区安全防卫系统分析   总被引:1,自引:0,他引:1  
针对我国舰艇近区安全存在的问题,参照国外舰艇近区自卫装备发展情况,提出了发展具有综合利用观瞄设备和声纳,并集合各种致命和非致命武器特点的舰艇近区安全防卫系统的构想。系统配备的观瞄设备用于探测地面、水上及低空近临目标,而声纳用于探测水下目标,如蛙人,无人水下航行器等。在打击方面,系统配备了可以歼灭目标的致命武器以及用于驱逐目标的非致命武器。并对系统的关键技术进行了初步探讨。 关键词:舰艇近区安全,近区安全防卫系统,非致命武器  相似文献   
252.
随着公安警卫部队信息化建设的全面高速发展,云计算技术将更多地应用于警卫信息化建设。展望云计算在警卫信息化建设中的应用前景,分析当前警卫信息化建设中运用云计算技术所面临的问题及对策。  相似文献   
253.
针对当前在云计算中身份认证机制个人信息容易泄漏的问题,提出了一种云计算中的身份认证协议。协议的安全性是基于离散对数的难解问题。协议模型由用户、云服务提供者和注册实体等三个实体组成;通过先属性注册协议、后身份认证协议两个步骤完成整个认证过程;从用户伪装身份和云服务提供者盗取身份信息两个角度,对协议的安全性进行了分析;通过与云计算中基于公钥生成器的协议进行对比以及实验仿真,证明了该协议在对承诺的注册和认证时间上的优越性。  相似文献   
254.
以专业视野总结了以色列警卫工作的特点,从以色列警卫力量的职责地位、警卫措施、情报信息、选拔训练、后勤保障等方面进行了多角度的剖析,为进一步研究我国警卫理论提供借鉴。  相似文献   
255.
思想政治工作是政治建设中最核心的内容。在新的历史条件下,对警卫部队思想政治工作提出了新的更高的要求,思想政治工作必须不断改革创新,准确把握内在的特点规律,增强时代感、针对性、实效性和主动性。  相似文献   
256.
轻量级接入点协议LWAPP的应用及其安全性分析   总被引:1,自引:0,他引:1  
轻量级接入点协议(Lightweight Access Point Protocol,LWAPP)是一个新的无线局域网协议,该协议被设计用来传输和控制无线接入点和无线局域网控制器之间的通信。LWAPP把一些传统的无线接入点的一些功能移到了无线控制器中,以实现对无线接入点的统一控制和集中管理。简单讲述了LWAPP的功能和作用,同时分析了LWAPP的安全性,列举了一些该协议可能会受到的攻击类型,并提出了一些解决方案。  相似文献   
257.
对某无后端数据库RFID安全认证协议的安全性进行了分析,并针对其安全漏洞,给出了一种新型的无后端数据库的RFID安全认证协议。对新协议的安全性分析表明:该协议能够满足双向认证、匿名性、抗追踪攻击、抗克隆攻击、抗物理攻击、抗窃听、抗拒绝服务攻击以及失同步攻击等要求。最后,给出了新协议的BAN逻辑证明。  相似文献   
258.
This article examines Poland's national potential and its international position within the European Union (EU) with respect to security issues. It presents research results based on a comparison of Poland's national potential as it relates to other EU countries, which is useful when evaluating Poland's power within the EU. The article also evaluates Poland's crisis potential, i.e. it identifies those factors that may potentially be treated as threats to national and regional security. Finally, it enables the identification of challenges to Poland's security in the second decade of the twenty-first century. The research is conducted according to a multidimensional comparative analysis, which is perceived by the author as the best available to measure a country's power despite its weaknesses.  相似文献   
259.
This article explores gender and security sector reform (SSR) in Zimbabwe from 2008 to the present. It firstly postulates that the purpose of gender-sensitive SSR is to transform security services so as to enhance human security, as opposed to having an exclusive focus on state and territorial security. A comprehensive analysis of the policy and legislative framework governing gender and SSR at the global, continental, sub-regional and national levels will be presented, followed by the argument that efforts to reform the partisan and oftentimes non-professional tendencies of the security sector – especially the Zimbabwe Defence Forces, Zimbabwe Republic Police, Central Intelligence Organisation and Zimbabwe Prison Services – to promote democracy have met with firm resistance. However, gender-sensitive SSR has made significant headway in Zimbabwe since it is considered less threatening by the government. It should be noted, nevertheless, that gender-sensitive SSR has the potential to shift levels of professionalism and accountability within the sector as well as change attitudes to enhance security at the personal and communal levels. The process can gradually increase the percentage of women serving in the security sector. In conclusion, recommendations are made to broaden and deepen gender-sensitive SSR as the only viable alternative in the current political environment in Zimbabwe.  相似文献   
260.
Policy research and scholarship on food has rapidly increased in recent decades. The attention to ‘gender' within this work appears to signal important practical and academic efforts to mainstream gendered understandings of food consumption, distribution and production into expansive conceptualisations of human security. This article argues that the gender-related work on food has wide-ranging and often troubling political and theoretical foundations and implications. Often growing out of knowledge regimes for managing social crises and advancing neo-liberal solutions, much gender and food security work provides limited interventions into mainstream gender-blind work on the nexus of power struggles, food resources and globalisation. A careful analysis of knowledge production about gender and food is therefore crucial to understanding how and why feminist food studies often transcends and challenges dominant forms of scholarship and research on food security. This article's critical assessment of what food security studies in South Africa has entailed at the regional level and in global terms also focuses on the methodological and theoretical feminist interventions that can stimulate rigorous conceptual, research and practical attention to what has come to be understood as food sovereignty.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号