首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   490篇
  免费   37篇
  国内免费   17篇
  2024年   1篇
  2023年   1篇
  2021年   13篇
  2020年   6篇
  2019年   28篇
  2018年   29篇
  2017年   33篇
  2016年   33篇
  2015年   17篇
  2014年   49篇
  2013年   97篇
  2012年   10篇
  2011年   28篇
  2010年   35篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   18篇
  2005年   20篇
  2004年   13篇
  2003年   15篇
  2002年   4篇
  2001年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有544条查询结果,搜索用时 15 毫秒
361.
In the aftermath of 9/11, the USA embarked on a massive global hunt for terrorists and launched its “Operation Enduring Freedom” in Afghanistan. Its failure to control insurgency in Afghanistan spilled over into Pakistan, with disastrous consequences. The resurgence of the Taliban with more formidable tactics and maneuvering skills has become more troublesome for both Afghanistan and Pakistan and for the USA and its allied forces. The fierce comeback of the insurgents has challenged the political and territorial integrity of Pakistan, one that it cannot tolerate. This article analyzes the current situation and its implications for Pakistan's security. Moreover, it looks into the internal and external security complexities that Pakistan faces and the possible implications of the US exit strategy for Pakistan's security. It concludes that the security situation in Pakistan is continuously deteriorating and no part of her territory is immune from terrorists' attacks. To be successful, Pakistan must pursue a broad-based strategy that encompasses military, political, social, economic and informational domains aimed at accomplishing four major objectives: (1) elimination of foreign terrorists and their facilitators; (2) strengthening of the political and administrative institutions in the Federally Administered Tribal Areas (FATA); (3) establishing a safe and secure environment conducive for sustained development and the realization of real socio-economic progress and (4) integrating the FATA into the national mainstream. In the long term, a strategy based on the concept of “Enlightened Moderation” is the right solution, not only to the internal problems of Pakistan but also for the Muslim world and the international community.  相似文献   
362.
在经历了陆权逐鹿、海权争霸、空天对垒以及制网权较量之后,在全球媒体时代,人类战争正在从自然空间、技术空间向认知空间拓展。文章从多学科视角切入,聚焦认知空间的战争与战略问题,剖析了战争制权理论演进背景下,制脑权战争兴起的历史合理性及其攻防对抗律,最后从捍卫国家认知空间安全的高度,对全球媒体时代的国家安全战略提出了对策。  相似文献   
363.
The study shows how ‘strategic military refusal’ in Israel developed as a rational and institutional means to influence security policies. As opposed to the perspective that sees military refusal as a spontaneous individual act, the study illustrates how organizations operate to distribute military refusal in order to pressure decision-makers to change their military policies. This strategy has proven to be effective when the military is involved with groups that threaten it with refusal – which threatens the military's operational ability and its official and apolitical image. These include soldiers whose civilian authorities, rather than their military commanders, are perceived as an epistemic authority regarding security issues. The case study refers to the impact of strategic military refusal in Israel on security policies and the military doctrine. This was influenced by leftist groups, which, although they belonged to the parliamentary opposition, had dominant presence in the military ranks. Furthermore, the study examines the effect of the use of strategic military refusal on the model of military recruitment.  相似文献   
364.
随着高分辨率遥感数据应用的不断扩展,其安全和版权问题也日益突出。利用数字水印技术保护高分辨率遥感数据安全是目前可行、可靠的技术手段。介绍了数字水印基本原理并分析了高分辨率遥感数据数字水印特征,研究了数字水印技术在高分辨率遥感数据安全分发管理、网络发布等方面的应用,探讨了高分辨率遥感数据数字水印系统设计,并对高分辨率遥感数据数字水印技术进行了展望。  相似文献   
365.
This article investigates how US national security planners have envisioned the emerging strategic environment during the early twenty-first century and evaluates how their perceptions of this strategic environment have changed during these years. This conceptual evolution can be seen in how defense planners define threats, identify defense priorities, and design security strategies. Five key strategic planning documents serve as the basis for this analysis and illustrate significant shifts in how the US government has envisioned its own security requirements as well as the context within which its strategic vision will need to be realized. These planning documents are: (1) Joint Vision 2020, (2) the Bush Administration's 2002 National Security Strategy of the United States, (3) the Obama Administration's 2010 National Security Strategy, (4) US Strategic Defense Guidance entitled Sustaining US Global Leadership: Priorities for 21st Century Defense, and (5) the US Chairman of the Joint Chiefs of Staff's Capstone Concept for Joint Operations: Joint Force 2020.  相似文献   
366.
Cyberspace has emerged as a potentially new (and unconventional) domain for warfare. Much debate has focused on understanding cyber conflict. The ability to critically analyse this phenomenon is important; however, the nascent nature of cyberwarfare and the complexity of the systems involved create challenges not met by conventional approaches. As a first step, this requires an analytical construct to frame discussions in a way that highlights distinct characteristics of the cyber domain. An approach proposed is one of the postulating conjectures for debate as a way to achieve this and to demonstrate its use, both at the strategic and operational levels. It is suggested that such an approach provides one component of a mature analytical framework for the analysis of cyber across a range of warfare domains.  相似文献   
367.
In 2002, a Nuclear Security Culture (NSC) Enhancement Program with the mission to raise the level of the NSC at sites and facilities in Russia's nuclear complex was launched under the guidance of the Russian State Corporation “ROSATOM” and with support from the US Department of Energy. A Joint Working Group for NSC with both Russian Federation and US members was formed and charged with the design and implementation of the program. The program was implemented at sites and facilities on a pilot basis. Nine sites participated in the Pilot Project. The key program component was an establishment of Culture Coordinators (CCs) with the authority to coordinate and implement NSC enhancement activities at sites and facilities. The CCs have served as the force that has maintained the momentum of the Pilot Project and continuously steered the site NSC enhancement efforts. The contribution of the CCs in achieving the positive outcomes of the program cannot be overstated.  相似文献   
368.
基于IEEE802.1x协议的体系结构,分析了EAP-TIS认证协议的安全性,详细阐述了EAP-TIS认证协议遭受中间人攻击的过程和原因,并提出了相应的改进方案.通过对Disassociate帧和EAP-Success消息进行加密和数字签名来保证消息的保密性和真实性,从而解决了客户端无法对Disassociate帧和E...  相似文献   
369.
由于某框架结构在施工过程中发生了明显的不均匀沉降,结构体可能存在安全隐患。为此,对该框架结构进行了现场检测,根据检测结果,应用大型有限元软件ANSYS对地基变形后的结构安全性进行分析,合理评价了结构性能,其工程经验可供参考。  相似文献   
370.
直升机野战油料保障模拟优化研究   总被引:1,自引:0,他引:1  
野战条件下,场站通常在前沿阵地开设野战直升机场实施伴随保障,其中油料保障主要采取飞机加油车先对直升机实施加油,后到野战机场油库领取油料这一方式进行。若将野战直升机场油料保障作为一个系统来研究,要实现适时、适量的油料保障,确定合适的飞机加油车及野战机场油库发油鹤位数量是一个关键问题。利用GPSSW语言对这一问题进行模拟,得出模拟结果并进行统计分析,经反复模拟和参数比较得到适合的参数,为部队保障提供依据。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号