首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   707篇
  免费   85篇
  国内免费   23篇
  2024年   2篇
  2023年   4篇
  2022年   4篇
  2021年   19篇
  2020年   17篇
  2019年   46篇
  2018年   42篇
  2017年   59篇
  2016年   52篇
  2015年   30篇
  2014年   72篇
  2013年   127篇
  2012年   25篇
  2011年   37篇
  2010年   45篇
  2009年   41篇
  2008年   38篇
  2007年   28篇
  2006年   22篇
  2005年   26篇
  2004年   26篇
  2003年   18篇
  2002年   8篇
  2001年   5篇
  2000年   6篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   2篇
  1995年   5篇
  1993年   3篇
  1992年   1篇
  1990年   2篇
排序方式: 共有815条查询结果,搜索用时 15 毫秒
661.
Harvard professor Samuel P. Huntington has frequently been considered a Vietnam War hawk. His observation that ‘forced-draft urbanization’ might help the United States win the war has come to define his engagement in contemporary strategic debates. This essay argues that both Huntington’s academic work and his private policy advice to the U.S. Government in fact urged a political settlement to the conflict. It argues that in spite of this, Huntington refused to break publicly with the U.S. policy because of his wider concern over what he saw as a crisis of authority in the U.S. foreign policy and governing institutions in the era.  相似文献   
662.
After 15 years of war in Afghanistan and Iraq, many now see ‘small-footprint’ security force assistance (SFA) – training, advising and equipping allied militaries – as an alternative to large US ground-force commitments. Yet, its actual military efficacy has been little studied. This paper seeks to fill this gap. We find important limitations on SFA’s military utility, stemming from agency problems arising from systematic interest misalignment between the US and its typical partners. SFA’s achievable upper bound is modest and attainable only if US policy is intrusive and conditional, which it rarely is. For SFA, small footprints will usually mean small payoffs.  相似文献   
663.
At the core of waging war and strategy is the creation, control and use of force. This article investigates the volunteer battalions that mobilized in Ukraine during the spring of 2014. It contextualizes the volunteer phenomenon and focuses on the state strategies to establish control over these militias. As ambiguous entities arising from a situation characterized by rapid social change – revolution and war – the volunteer battalions threatened existing hierarchies and questioned state authority. The situation was exacerbated by the war, which deviated from the expectations of Ukrainian combatants and Western military observers alike. The state nevertheless enjoyed a modicum of success in reining in the militias through four strategies of undermining, co-option, incorporation and coercion. While predominantly integrated into a more rigid category of paramilitary forces, the volunteers continue to play a role in both the Ukrainian society and security sector to the unforeseeable future.  相似文献   
664.
ABSTRACT

The United States has provided substantial amounts of military assistance and aid since the end of World War Two. During the Cold War, it proved vital in protecting numerous regimes from communist takeovers. Successful outcomes occurred when American leaders made large initial aid commitments, and the states had the capacity and political willpower to use it effectively. However, Vietnam was an example of how U.S. support lagged, as leaders in Saigon preferred political survival instead of creating regime legitimacy. Following 9/11, American security aid focused on making weak countries develop stronger security forces. Unfortunately, this created Fabergé egg militaries: expensive and easily broken by insurgents. This article suggests long-term strategic commitments need to be made alongside more resources for the American State Department and similar organizations to focus on the politics of state-building. Finally, this article suggests strategies, such as “whole-of-government” approaches, to improve long-term security and political institution building.  相似文献   
665.
How do we understand combat effectiveness – soldiers’ performance in battle? Despite the broad consensus that understanding combat effectiveness is important both for scholars and policymakers, there is widespread disagreement about what combat effectiveness is. More specifically, studies of effectiveness tend to focus on either the skill of soldiers in battle, or their will to fight. Yet both skill and will are essential components of an effective fighting force. This article argues that understanding combat effectiveness requires understanding both of these key components of effectiveness. In other words, combat effectiveness requires both the skill and will to engage the enemy in an organized manner. It then demonstrates the usefulness of this conceptualization by applying it to the cases of British, Indian, and Australian forces fighting the Japanese during the Second World War. Only when scholars are talking about the same concept will our understanding of the conditions under which militaries are effective in battle progress. By comparing different units fighting the same opponent under the same material conditions, I demonstrate that units vary both in their combat skill and their will to fight, and that understanding their effectiveness in battle requires analyzing both of these key factors.  相似文献   
666.
Risks are omnipresent in contemporary international security. Despite a long tradition in security studies going at least back to Von Clausewitz, we consider that the topic of risk remains under-examined. This forum seeks to advance the research agenda on risk in security studies by showcasing work of scholars using advanced concepts of risk, based on insights from sociology, biology, psychology, and safety studies, to better understand the role of risk in international security. As a way of introduction, this short article sets out the main debates.  相似文献   
667.
Consider a situation where a single shooter engages, sequentially, a cluster of targets that may vary in terms of vulnerability and value or worth. Following the shooting of a round of fire at a certain target, the latter may either be killed or remain alive. We assume neither partial nor cumulative damage. If the target is killed, there is a possibility that the shooter is not aware of that fact and may keep on engaging that target. If the shooter recognizes a killed target as such, then this target is considered to be evidently killed. If the objective is to maximize the weighted expected number of killed targets, where the weight reflects the value of a target, then it is shown that a certain type of a shooting strategy, called a Greedy Strategy, is optimal under the general assumption that the more a target is engaged, but still not evidently killed, the less is the probability that the next round will be effective. If all weights are equal, then the greedy shooting strategy calls to engage, at each round, the least previously engaged target that is not evidently killed. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 613–622, 1997  相似文献   
668.
孙定宇 《国防科技》2020,41(3):98-103
随着互联网技术的飞速发展,信息传播对国家政治、经济、外交和国防带来巨大冲击和影响。美军意识到传播叙事是政府和军队塑造形象、谋划战略、输出文化价值观的重要手段。美国从"重讲故事"的角度出发,将"叙事"包装成对外战略传播的新型方式,从思维认知、情感操控、舆论引导等方面强化对对手的心理威慑和影响,同时以新媒体为媒介扩大叙事传播的影响受众,进而达到物理打击所难以发挥的影响。  相似文献   
669.
Alex Neads 《战略研究杂志》2019,42(3-4):425-447
Military capacity building (MCB) is as problematic as it is ubiquitous, with the British experience in Sierra Leone providing a rare example of ostensible success. This article critiques the dominant conceptualisation of MCB as purely a principal–agent (PA) problem, using military change scholarship to examine the impact of wartime British intervention on the Sierra Leonean armed forces. Here, indigenous military change was both externally driven and fundamentally adaptive in nature, allowing MCB to bypass some of the difficulties predicted by PA models. However, this adaptive approach nonetheless failed to reconcile Western military values with prevailing Sierra Leonean culture, complicating post-war stabilisation efforts.  相似文献   
670.
随着全球导航卫星系统的广泛应用,其安全性问题也逐渐成为人们关注的焦点。为了对目前最具隐蔽性的诱导式欺骗技术进行检测,提出一种对两路导航信号同时进行处理的combo-signal模型,并提出基于这种信号处理模型来对诱导式欺骗信号进行检测的方法;分析了该方法的检测门限;采用北斗的B1I 和B1C信号在实现了combo-signal处理模型的软件接收机上对该检测方法进行了验证,实验结果证明该方法可以有效地对诱导式欺骗进行检测,统计得到的检测概率跟前面的分析结果一致。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号