首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   707篇
  免费   85篇
  国内免费   23篇
  2024年   2篇
  2023年   4篇
  2022年   4篇
  2021年   19篇
  2020年   17篇
  2019年   46篇
  2018年   42篇
  2017年   59篇
  2016年   52篇
  2015年   30篇
  2014年   72篇
  2013年   127篇
  2012年   25篇
  2011年   37篇
  2010年   45篇
  2009年   41篇
  2008年   38篇
  2007年   28篇
  2006年   22篇
  2005年   26篇
  2004年   26篇
  2003年   18篇
  2002年   8篇
  2001年   5篇
  2000年   6篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   2篇
  1995年   5篇
  1993年   3篇
  1992年   1篇
  1990年   2篇
排序方式: 共有815条查询结果,搜索用时 15 毫秒
171.
1978年以来的改革开放,提高了非公经济在国民经济和社会发展中的地位,随之滋生的包括行贿受贿、偷税漏税、国资流失、假冒伪劣、非法获取各种信息在内的现代版“五毒”,如果泛滥于西部大开发的战略展开中,必然会影响西部地区少数民族的利益,成为各民族共同繁荣之路上的隐患。1952年旨在整治资本主义工商业的“五反”运动,为经管西部大开发中的各类非公经济实体提供了有益借鉴。  相似文献   
172.
假设市场为无套利市场,而且市场上只有两种证券:一种是无风险债券;一种是有风险的股票。通过自筹资策略,得到期权价格所满足的倒向随机微分方程(BSDE),利用倒向随机微分方程给出欧式期权价格概率表示;并证明欧式期权的完全套期保值性。  相似文献   
173.
操作系统是紧靠硬件的基础软件,它既是应用软件安全的坚实基础,又是硬件不安全因素的屏蔽器.在操作系统安全隐患和嵌入式操作系统技术特点的基础上,提出信息保护、空间域保护和时间域保护等增强操作系统安全性的几种方法,以提高嵌入式系统抗击系统本身缺陷或敌方恶意攻击等安全威胁的能力.上述几种安全保护技术已在嵌入式Linux中进行验证,并取得满意的结果.  相似文献   
174.
通过对学院学科建设现状与问题的分析,探讨了学院学科建设与发展的策略,提出了学院学科设置与调整的发展性、需求性、层次性、整合性及开放性等原则,讨论了学科发展与建设中应注意解决好的几个突出问题,研究了如何突出学科特色、提高学科建设水平的途径和方法.  相似文献   
175.
刘楝  孟宪民  李阳 《国防科技》2020,41(3):76-79,85
5G作为当今先进的通信技术,其广泛应用将给整个社会生产生活带来全新变革,相关技术和应用的安全问题,事关社会公共安全和军事利益安全,应纳入总体国家安全观视角下重点考量。本文主要梳理5G关键技术可能带来的网络安全风险,以及相关应用可能给网络监管带来的挑战,并从牢牢把控核心知识产权、综合构建安全保障体系、紧跟推进行业法律规范以及着力完善高效应急措施这四方面探讨相关的应对措施。  相似文献   
176.
针对容器技术在网络层面缺乏控制的问题,设计一套面向大规模容器集群的网络控制架构,分别从容器集群网络的灵活组网、智能适配以及安全隔离三个方向进行研究,主要解决大规模容器集群部署中的网络适配和隔离控制等关键问题。实验结果表明,设计的网络控制架构可以根据网络特点有针对性地实现虚拟局域网的快速划分、网络节点的稳定迁移和节点通信的精确隔离控制。  相似文献   
177.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice.  相似文献   
178.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   
179.
A dynamic multi-stage decision-theoretic approach is introduced to establish the optimal offset and its incidence, the contract price arising from bargaining, and the scale of the acquisition. A new rationale is suggested for offsets in terms of their role as an insurance devise. Results are derived for the pricing of delivery contracts subject to offset claims and their national security implications. It is shown that the national security is strictly convex in the offset transaction. As to the incidence of the offset, the offset claim is shown to be capitalised in the delivery price. The bargaining price is shown to depend on the value of the product to be delivered for the national security, the relative negotiation power of the contracting partners and the social cost of public funds. The analysis highlights the expectation effects of offsets on the bargaining price and the scale of delivery. The results aid in explaining why offsets are widely used in procurement contracts for defence materiel. As they contribute to the national security, they should be allowed to survive and not be denied under competition laws.  相似文献   
180.
Between 2014 and 2017, no less than 10 different non-governmental organizations (NGOs) conducted maritime Search and Rescue (SAR) operations off the coast of Libya. By rescuing over 100,000 migrants in three years, these NGOs became the largest provider of SAR in the Mediterranean. The theory of institutionalism suggests that organizations conducting similar activities are likely to converge in a process of mimetic isomorphism, deliberately imitating one another to increase their effectiveness and cope with uncertainty. These 10 SAR NGOs, however, developed two different rescue models: While some rescued migrants and disembarked them in Italian ports, others only simply assisted those in distress until the arrival of another ship transporting them to land. They also cooperated with Italian and European authorities to different degrees. Why did SAR NGOs imitated many elements of existing non-governmental rescue models, but discarded some others? This article argues that differences in material capabilities and organizational role conceptions are crucial to explain why newer SAR NGOs have imitated most but not all of their predecessors’ policies, engaging in a process of “selective emulation.”  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号