全文获取类型
收费全文 | 609篇 |
免费 | 3篇 |
国内免费 | 5篇 |
专业分类
617篇 |
出版年
2025年 | 1篇 |
2024年 | 1篇 |
2023年 | 1篇 |
2021年 | 15篇 |
2020年 | 8篇 |
2019年 | 28篇 |
2018年 | 31篇 |
2017年 | 37篇 |
2016年 | 38篇 |
2015年 | 19篇 |
2014年 | 55篇 |
2013年 | 102篇 |
2012年 | 15篇 |
2011年 | 33篇 |
2010年 | 43篇 |
2009年 | 33篇 |
2008年 | 38篇 |
2007年 | 24篇 |
2006年 | 21篇 |
2005年 | 22篇 |
2004年 | 15篇 |
2003年 | 17篇 |
2002年 | 4篇 |
2001年 | 3篇 |
2000年 | 4篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1995年 | 2篇 |
1993年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有617条查询结果,搜索用时 0 毫秒
161.
162.
Andrew Sanders 《Small Wars & Insurgencies》2013,24(3):465-492
The role of the British Army in Northern Ireland during Operation Banner (1969–2007) is an instructive case study of counterinsurgency operations as well as an important chapter in recent British military history. Given troops deployed to the province as aid to the civil power, it is particularly useful in discussions about the principle of minimum force. This article seeks to explore the issue of minimum force through the example of Operation Motorman, the Army's successful attempt to remove the barricades, which had established so-go areas for the security forces in Northern Ireland. 相似文献
163.
João Ricardo Faria 《Defence and Peace Economics》2013,24(6):595-605
This article introduces integro-differential equations as a new technique to study terrorism dynamics. An integro-differential equation is a mathematical expression that contains derivatives of the required function and its integral transforms. The technique is applied to two different dynamic models in terrorism: terrorism and tourism, and terrorist innovations. In the first model the number of tourists that appears in an integral term and also in a derivative term is impacted by the number of terrorists. In the second model the integro-differential equation for terrorist innovations relates them to terrorist attacks. The article shows how to solve, analyze, interpret, and deal with integro-differential equations. Integro-differential equations shed light on aspects of the models ignored when other techniques are used. This is particularly important for the evaluation of current counterterrorist policies, as well as to the formulation of new ones. 相似文献
164.
Jonathan Chukwuemeka Madu 《African Security Review》2013,22(3):279-290
Though laws have been enacted in different parts of Nigeria to address some aspects of gender-based violence, domestic violence persists with serious consequences for social and economic development. Nigeria has not enacted specific domestic law that is applicable throughout the federation, despite the United Nations mandate to all countries to adopt and enforce such laws by 2015. This article examines the causes and nature of domestic violence in Nigeria, and the legal reform needed to address the situation. In addition to library sources, the study used focus group discussions and individual interviews (involving the general population, key informants, legislators and traditional rulers) to discover that enacting specific national domestic violence legislation is necessary to address the problem in Nigeria, but enacting laws alone is not a magic bullet. 相似文献
165.
Much is made in the security sector reform literature of the role of civil society as an overseer and monitor of the security sector, contributing to improved accountability and governance. This paper looks at how the notion of ‘civil society capacity’ needs to be disaggregated in order to develop meaningful strategies to assist civil society organisations to impact security sector reforms in complex, post-conflict contexts like the Democratic Republic of Congo. It draws on fieldwork conducted with 200 Congolese civil society groups that are attempting to engage in current security sector reform processes, and looks at which capacities are required to improve oversight by civil society groups. 相似文献
166.
Egle Murauskaite 《The Nonproliferation Review》2013,20(3-4):321-339
ABSTRACTThis article explores the paradox of trust in the largest nuclear smuggling operation involving highly enriched uranium (HEU) discussed in open source literature. In the first effort to understand the type, extent, and role of trust in nuclear smuggling enterprises, it draws from literature on trust development in legitimate businesses as well as criminal enterprises. Observed behavioral patterns in this case challenge traditional notions of the internal dynamics of temporary groups engaged in nuclear smuggling and operational realities of such activities. The article seeks to explain why individuals agree (and continue) to operate in this high-risk environment, unbound by close personal ties, without any effort to verify the background, motives, or qualifications of the fellow conspirators. It offers ways to advance current nonproliferation efforts in non-state actor interdiction by exploiting the environment of shallow trust in temporary groups. 相似文献
167.
This article concerns scheduling policies in a surveillance system aimed at detecting a terrorist attack in time. Terrorist suspects arriving at a public area are subject to continuous monitoring, while a surveillance team takes their biometric signatures and compares them with records stored in a terrorist database. Because the surveillance team can screen only one terrorist suspect at a time, the team faces a dynamic scheduling problem among the suspects. We build a model consisting of an M/G/1 queue with two types of customers—red and white—to study this problem. Both types of customers are impatient but the reneging time distributions are different. The server only receives a reward by serving a red customer and can use the time a customer has spent in the queue to deduce its likely type. In a few special cases, a simple service rule—such as first‐come‐first‐serve—is optimal. We explain why the problem is in general difficult and we develop a heuristic policy motivated by the fact that terrorist attacks tend to be rare events. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
168.
169.
介绍了一种用于指挥自动化网络中进行身份认证的U SB安全钥安全管理系统,给出了使用U SB安全钥进入网络终端时的认证机制,调用与浏览服务器信息时的认证流程,以及U SB安全钥软、硬件的设计要点。在该安全钥管理系统中可运行重要软件的关键程序和查询关键信息,有效增强保密强度,安全钥采用U SB接口,具有支持热插拔、携带方便等优点。 相似文献
170.
计算机网络攻击效果评估技术研究 总被引:32,自引:0,他引:32
计算机网络攻击效果评估技术是信息系统安全评估中一个重要而具有挑战性的课题。目前 ,相关的理论尚不成熟 ,有关的研究报道较少。简要总结了当前已经存在的主要信息安全的评估方法 ,在此基础上 ,从便于实际度量和计算的角度出发 ,提出了基于网络信息熵的评估技术、基于系统安全层次分析的安全评估框架和基于指标分析的网络攻击效果综合评估技术等三种评估模型 ,并分析了各自在使用中应注意的问题 相似文献