全文获取类型
收费全文 | 475篇 |
免费 | 36篇 |
国内免费 | 16篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2021年 | 13篇 |
2020年 | 6篇 |
2019年 | 28篇 |
2018年 | 29篇 |
2017年 | 33篇 |
2016年 | 32篇 |
2015年 | 17篇 |
2014年 | 48篇 |
2013年 | 97篇 |
2012年 | 8篇 |
2011年 | 26篇 |
2010年 | 34篇 |
2009年 | 28篇 |
2008年 | 33篇 |
2007年 | 21篇 |
2006年 | 17篇 |
2005年 | 18篇 |
2004年 | 11篇 |
2003年 | 13篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有527条查询结果,搜索用时 15 毫秒
191.
Egle Murauskaite 《The Nonproliferation Review》2013,20(3-4):321-339
ABSTRACTThis article explores the paradox of trust in the largest nuclear smuggling operation involving highly enriched uranium (HEU) discussed in open source literature. In the first effort to understand the type, extent, and role of trust in nuclear smuggling enterprises, it draws from literature on trust development in legitimate businesses as well as criminal enterprises. Observed behavioral patterns in this case challenge traditional notions of the internal dynamics of temporary groups engaged in nuclear smuggling and operational realities of such activities. The article seeks to explain why individuals agree (and continue) to operate in this high-risk environment, unbound by close personal ties, without any effort to verify the background, motives, or qualifications of the fellow conspirators. It offers ways to advance current nonproliferation efforts in non-state actor interdiction by exploiting the environment of shallow trust in temporary groups. 相似文献
192.
Strengthening the United States' ability to prevent adversaries from smuggling nuclear materials into the country is a vital and ongoing issue. The prospect of additional countries, such as Iran, obtaining the know‐how and equipment to produce these special nuclear materials in the near future underscores the need for efficient and effective inspection policies at ports and border crossings. In addition, the reduction of defense and homeland security budgets in recent years has made it increasingly important to accomplish the interdiction mission with fewer funds. Addressing these complications, in this article, we present a novel two‐port interdiction model. We propose using prior inspection data as a low‐cost way of increasing overall interdiction performance. We provide insights into two primary questions: first, how should a decision maker at a domestic port use detection data from the foreign port to improve the overall detection capability? Second, what are potential limitations to the usefulness of prior inspection data—is it possible that using prior data actually harms decision making at the domestic port? We find that a boundary curve policy (BCP) that takes into account both foreign and domestic inspection data can provide a significant improvement in detection probability. This BCP also proves to be surprisingly robust, even if adversaries are able to infiltrate shipments during transit. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 433‐448, 2013 相似文献
193.
Andrew Sanders 《Small Wars & Insurgencies》2013,24(3):465-492
The role of the British Army in Northern Ireland during Operation Banner (1969–2007) is an instructive case study of counterinsurgency operations as well as an important chapter in recent British military history. Given troops deployed to the province as aid to the civil power, it is particularly useful in discussions about the principle of minimum force. This article seeks to explore the issue of minimum force through the example of Operation Motorman, the Army's successful attempt to remove the barricades, which had established so-go areas for the security forces in Northern Ireland. 相似文献
194.
警卫部队信息化建设为警卫部队在新时期更好地完成党和人民赋予的各项警卫任务提供了更加便捷和有效的服务与保障。分析警卫信息化建设的必要性和重要性,探讨警卫信息化建设中需要建立健全的几个应用性系统。 相似文献
195.
Dmitry Dima Adamsky 《战略研究杂志》2013,36(1):4-41
This article distills insights for the scholarship of deterrence by examining the 1983 nuclear crisis – the moment of maximum danger of the late Cold War. Important contributions notwithstanding, our understanding of this episode still has caveats, and a significant pool of theoretical lessons for strategic studies remain to be learned. Utilizing newly available sources, this article suggests an alternative interpretation of Soviet and US conduct. It argues that the then US deterrence strategy almost produced Soviet nuclear overreaction by nearly turning a NATO exercise into a prelude to a preventive Soviet attack. Building on historical findings, this article offers insights about a mechanism for deterrence effectiveness evaluation, recommends establishing a structure responsible for this endeavor, and introduces a new theoretical term to the strategic studies lexicon – a ‘culminating point of deterrence’. 相似文献
196.
197.
Walter C. Ladwig III 《Small Wars & Insurgencies》2013,24(1):62-88
From 1964 to 1975 a small group of British officers, advisors, and trainers guided the forces of the Sultanate of Oman to victory in their conflict with the Marxist insurgents of the People's Front for the Liberation of the Occupied Arabian Gulf (PFLOAG). This campaign provides a clear example of how to effectively support an ally's counterinsurgency efforts with a minimal commitment of men and material. In particular, the critical assistance provided by the British consisted of experienced leadership and skilled technical support personnel as well as a viable strategy for victory. However, more important for the ultimate success of the counterinsurgency campaign was the emergence of new progressive leadership with the accession of Sultan Qaboos. The most important lesson from this study is that while security assistance can reinforce positive political efforts, it is not enough on its own to bring about a victory in an unfavourable political environment. 相似文献
198.
199.
极端民族宗教分裂势力恐怖活动已严重危害我国领土主权完整、威胁社会政治稳定,对国家安全构成严重威胁,必须采取相应对策予以打击。 相似文献
200.
多级安全实时数据库系统安全性与实时性需求的冲突分析 总被引:2,自引:0,他引:2
一个多级安全实时数据库系统不仅需要有安全限制,同时也要有时间约束.由于安全性与实时性需求之间冲突的存在而不可避免地产生隐蔽通道和优先倒置问题,文中首先分析多级安全实时数据库系统中实时性与安全性需求之间的冲突,而后基于HP 2PL协议,结合安全因素给出了一种解决冲突的算法. 相似文献