首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   490篇
  免费   37篇
  国内免费   17篇
  2024年   1篇
  2023年   1篇
  2021年   13篇
  2020年   6篇
  2019年   28篇
  2018年   29篇
  2017年   33篇
  2016年   33篇
  2015年   17篇
  2014年   49篇
  2013年   97篇
  2012年   10篇
  2011年   28篇
  2010年   35篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   18篇
  2005年   20篇
  2004年   13篇
  2003年   15篇
  2002年   4篇
  2001年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有544条查询结果,搜索用时 31 毫秒
281.
随着公安边防检查站信息化建设的不断推进,基层边防检查站暴露出了大量信息安全隐患,并发生了多起信息安全事故。针对边防检查站信息安全建设中普遍存在的问题,提出了提高官兵信息安全意识、构建信息安全技术人才保障体系、健全信息安全管理机构等措施,以期为边防检查站信息安全建设提供借鉴。  相似文献   
282.
为提高资金安全管理与防范能力,必须从加强人员管理、实行合理分工、加强银行账户管理、严格库存现金限额、管好财务印鉴及严格票据管理等方面采取相应措施,以确保部队资金安全、规范有序运行。  相似文献   
283.
消防责任事故罪作为一个多发性犯罪,易与相邻其他类型事故犯罪发生竞合,不利于司法实务中准确地认定犯罪。就消防责任事故罪与重大责任事故罪、重大劳动安全事故罪、危险物品肇事罪和玩忽职守罪的区别和界定问题进行探讨,希望对此类问题的统一处理有所帮助。  相似文献   
284.
公安消防部队群众工作机制建设,应从明确责任,加强对群众工作的组织领导入手;防火部门应着力组织做好消防宣传教育工作;政治机关应着重组织做好拥政爱民工作。  相似文献   
285.
姜波  凌军  万文乾 《国防科技》2021,42(2):138-142
本文通过梳理大数据技术发展及数据资源建设现状,可视化呈现了数据资源建设使用中出现的数据泄露现状及趋势,剖析了数据泄露的根本原因。在分析军队装备大数据建设及规划情况的基础上,建立了装备大数据安全问题分析方法,即在数据采集阶段、数据传输阶段、数据存储阶段和数据使用阶段,分别构建装备大数据不同维度安全要素,包括安全威胁、安全主体和安全保障,并应用于分析装备大数据安全问题。此外,本研究还深入分析了装备大数据建设应用过程中四个阶段存在的安全风险,构建了装备大数据全周期、立体化、协同化的安全防护体系,研究了装备大数据安全保护技术框架,包括以大数据访问控制技术、安全检索技术和安全计算技术为支撑的大数据安全技术和以匿名隐私保护技术和差分隐私保护技术为支撑的大数据保护技术。希翼研究结果能够为装备大数据全寿命周期内的安全防护提供一定借鉴。  相似文献   
286.
随着网络信息技术的更新换代,网络空间日益成为国际安全博弈的新兴领域。网络空间安全博弈的核心在于对国家利益的争夺和维护,关键环节在于如何通过各种策略方式对别国施加影响,进而达成本国利益诉求。对于如何区分和评估网络空间安全博弈策略,当前学界尚未形成统一共识,不同学者之间提出的策略分类存在明显交叉甚至相互矛盾。本文梳理分析了国家行为体在网络空间安全博弈中主要采取的控制、损耗、拒止三种策略,从实施策略的技术可行性、己方实施策略所需付出的代价大小、策略实施后对目标国国家行为造成的影响三方面讨论了各种网络空间安全博弈策略在不同条件以及不同目的下的适用性,最后从各种网络空间安全博弈策略的特征属性出发,结合本国网络安全环境进行深入分析,提出了对加强我国网络安全建设具有借鉴、启发意义的对策建议。  相似文献   
287.
Since 2012, China’s assertion of its sovereignty claim to the contested Senkaku/Diaoyu Islands has significantly raised the risk of a potentially escalatory political-military crisis with Japan. As circumstances worsen, Japanese Prime Minister Shinzo Abe has championed major institutional reforms aimed at centralizing Japanese security policy decision-making and vastly improving crisis management. This article assesses these reforms’ significance for ameliorating Japan’s long-standing internal crisis management weaknesses, and enhancing its ability to communicate with Beijing promptly under challenging conditions. While significant issues remain, recent developments – especially the establishment of Japan’s first-ever National Security Council – demonstrate significant progress. Bilaterally, however, important firebreaks remain conspicuously absent.  相似文献   
288.
A transit vessel traffic scheduling algorithm has been developed to limit the negative effects on cargo volume throughput in two‐way waterways where separation distances between transiting vessels must be maintained and passage restrictions may hold. It runs in time that is polynomial in the number of ships involved in the computation and finds schedules which increase the utilization of waterways. Three examples illustrate its use. The first example is situated in the Sunda Strait where the algorithm is used to enhance the safety of merchant shipping against a terrorist threat. It illustrates important features of the algorithm and demonstrates how it can be used with cross traffic. The second example is situated in the Strait of Istanbul and offers a comparison between the developed algorithm and the transit vessel scheduling algorithm of Ulusçu et al., J Navig 62 (2009), 59–77. This was done using a plausible model of the Strait of Istanbul. The third and last example shows how the algorithm can be used to schedule transit vessel traffic in two‐way waterways with junctions. This feature is especially useful in congested waters with a high risk of collisions like the Inland Sea of Japan. An extreme test case proves that the developed algorithm is a practical algorithm ready for such use. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 225–248, 2017  相似文献   
289.
By drawing on the literature about security regimes, this article posits the idea that a particular type of regime, which can be termed a “tacit security regime” (TSR), has begun to emerge between Israel, on the one hand, and several Gulf Arab states, on the other. It is a regime which, unlike liberal institutional variants that attempt to privilege the promotion of collective norms, remains configured around perceptions of threats to be countered and strategic interests to be realized. By examining the development, scope, and scale of this nascent TSR, this article explores the extent to which Israel, mindful of Washington, DC’s regional retrenchment, sees the emergence of such a regime as redefining the political and strategic contours of Israel’s relations with much of the Middle East.  相似文献   
290.
Declared operationally ready in 2016, the African Standby Force (ASF) has not been deployed in its originally designed form. This is not for the lack of opportunities but rather a demonstration of the power of the Regional Economic Communities/Regional Mechanisms (RECs/RMs) – Africa’s sub-regional security structures – over matters of peace and security. Experience gathered from its short existence suggests that the ASF may never be deployed in its current form. It may instead evolve into a robust framework, adaptable mainly by the RECs/RMs, for addressing varied security challenges. Four things are critical to enhancing the utility of the ASF: the political willingness of the RECs/RMs, the strategic interest of the member states, predictable and sustainable financing, and clarity on the role of the African Capability for Immediate Response to Crisis, the temporary battlegroup that was created to provide the African Union with a rapid response capability, pending the ASF’s operationalization.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号