全文获取类型
收费全文 | 310篇 |
免费 | 40篇 |
国内免费 | 17篇 |
出版年
2022年 | 1篇 |
2021年 | 10篇 |
2020年 | 12篇 |
2019年 | 12篇 |
2018年 | 15篇 |
2017年 | 21篇 |
2016年 | 11篇 |
2015年 | 7篇 |
2014年 | 33篇 |
2013年 | 40篇 |
2012年 | 16篇 |
2011年 | 14篇 |
2010年 | 17篇 |
2009年 | 22篇 |
2008年 | 17篇 |
2007年 | 19篇 |
2006年 | 28篇 |
2005年 | 18篇 |
2004年 | 15篇 |
2003年 | 10篇 |
2002年 | 3篇 |
2001年 | 4篇 |
2000年 | 3篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 1篇 |
1995年 | 1篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 4篇 |
排序方式: 共有367条查询结果,搜索用时 15 毫秒
81.
82.
Stefano Musco 《Defense & Security Analysis》2017,33(4):380-394
The building of reliable covers has always been of the utmost importance for clandestine Humint. Using both primary and secondary sources, this study seeks to examine how classical authors and modern scholars have dealt with this topic, and which kind of covers have been the most used throughout history in different sociopolitical contexts, and what are the new perspectives for today’s challenges. Findings suggest that a careful reading of the political milieu in which intelligence officers are required to work, and a certain degree of creativity, are the essential premises for the construction of a plausible cover; that some apparently outdated disguises such as merchants, itinerant monks and philosophers should be understood more broadly today to include business people, humanitarian NGOs and academics; that undercover practices have been theoretically and historically recognized as necessary and convenient by a great number of societies, often with scant regard for ethical considerations. 相似文献
83.
Namrata Panwar 《Small Wars & Insurgencies》2017,28(1):233-258
Do ceasefires or peace talks create fragmentation in the insurgent groups? Rather than proposing claims that can offer predictions about armed groups behaviour under ceasefires or peace processes, the analysts tend to focus largely on the dynamics between state and non-state actor. The experts pay little attention to overtime changes in social and local political context which might contribute to propelling a rebel group towards fragmentation and factionalism. The present study intends to fill this gap by exploring the shifting role of public opinion and ethnic support for the peace talks to ascertain whether it can increase the likelihood of factionalism in rebel groups or not. This article applies this approach to the case of Naga National Movement (1947–2015) in India, and finds that the proposed variable appears to have increased the frequency of factionalism in the movement. 相似文献
84.
随着《关于大力推进幼儿园与小学科学衔接的指导意见》的印发,首次从国家层面提出幼儿园和小学之间要实现双向衔接,而儿童入学准备也成为研究的关注点。文章采用文献计量学的方法从发文趋势、高被引文献、核心作者和发文机构的共现图中,直观地呈现出当前学前儿童入学准备研究的热点领域。对未来入学准备领域研究的发展提出了展望:评价工具需要增加评加项目和扩大研究范围;研究群体需要研究作者和机构之间要提高合作意识;研究内容需要从借鉴其他国家到逐渐本土化;研究对象需要多关注社会经济地位不利儿童的入学准备。 相似文献
85.
Henry Prunckun 《Defense & Security Analysis》2014,30(2):176-184
Covert operations by underground groups, such as transnational terrorists, are not new and neither are the methods members of these groups use to communicate in their shadowy world. In this regard, one of the enduring myths is that the main means these covert operatives use to communicate within their cell structure are telephones and emails in their various manifestations. This article critically discusses the possible use of wireless transmissions by transnational terrorists as a reliable form of communications. To critically discuss this proposition, a force field analysis was used to assess the theory that radio is a viable option. Implications of this study's findings are considered in terms of the ramifications they have for defence and security policy. 相似文献
86.
Olive Emil Wetter 《Defense & Security Analysis》2014,30(2):92-105
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted. 相似文献
87.
文章分析了3G无线视音频系统具有的优势,对3G视音频传输系统组网方式和功能进行了描述,探讨了非战争军事行动中通信保障面临的主要问题。 相似文献
88.
TRL(Technology Readiness Level)评价是用以评价某项特定技术的成熟程度,以及比较不同技术的成熟程度的系统性、定量化工具,其对象是装备研制的关键技术,目的是把握技术成熟状况、工程化决策支持以及装备研制技术风险管理。推广使用这项工具,就是希望通过TRL评价,能够准确把握装备预研攻关的进展情况和技术状态,综合分析存在的问题和差距,为提高装备预研的科学决策和项目管理水平提供支撑。立足于TRL评价在装备预研中的实际应用场景,本课题针对TRL评价的适用性,工作结构分解(WBS)与项目技术分解之间关系、关键技术遴选原则和关键技术评价细则四个难点问题进行了讨论,以期回答如何使TRL评价这项工具在实际应用中能得以更好运用的问题。 相似文献
89.
姜中元 《中国人民武装警察部队学院学报》2014,(5):75-77
遂行非战争军事行动训练是公安现役部队教育训练的重要内容。近年来其训练效果在公安现役部队履职实践中得到了良好的体现。但面对日益复杂的斗争形势,公安现役部队在进行常规训练的同时,应更加突出应急训练、联合训练和心理训练,以更好地完成党和人民赋予的神圣使命。 相似文献
90.
刘颖璇 《中国人民武装警察部队学院学报》2014,(11):27-30
当前,警卫情报工作的范围已经扩展到警卫实战、预警、决策、管理等各个方面,但从总体上看,警卫情报工作仍需进一步优化,以满足日益增长的警卫实践需求。针对警卫情报工作的特点,采用SWOT分析法对警卫情报工作的内外部条件进行客观分析,提出针对性的优化策略,以提升警卫情报工作能力。 相似文献