首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   490篇
  免费   37篇
  国内免费   17篇
  2024年   1篇
  2023年   1篇
  2021年   13篇
  2020年   6篇
  2019年   28篇
  2018年   29篇
  2017年   33篇
  2016年   33篇
  2015年   17篇
  2014年   49篇
  2013年   97篇
  2012年   10篇
  2011年   28篇
  2010年   35篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   18篇
  2005年   20篇
  2004年   13篇
  2003年   15篇
  2002年   4篇
  2001年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有544条查询结果,搜索用时 62 毫秒
401.
水下信息对抗是海军信息化建设中需要重点考虑的内容之一.除了现有的声纳侦察之外,在未来的海战中,信息获取和信息对抗将更多地依赖水声网络的作用.因此,水声网络的相关问题必须得到重视.探讨了水声网络的一些关键技术,从信息对抗的角度分析了水声网络面临的挑战及应对措施.  相似文献   
402.
近期发生的新冠病毒疫情引发公众对公共卫生安全话语的极大关注。现阶段自媒体话语滥觞对主流意识形态话语的消解,凸显了构建应急话语体系的必要性。国家安全话语构建离不开语言学话语理论支撑,语言学与大数据分析的融合可为健全国家应急话语体系提供操作思路。本文梳理疫情发生以来人民网、央视新闻等主流媒体网站及微信、微博等自媒体平台涌现的大量疫情多语类相关话语,通过弥补大数据在分析话语整体意义层面的不足,提出应急话语构建和分析的七个维度。本文认为,国防科技应发挥大数据统计分析优势的同时,结合话语分析方法构筑质化的语言学模型,走跨学科之路,构建国家安全话语公共卫生应急话语体系。  相似文献   
403.
人工免疫学是继神经网络、进化计算之后新的智能计算研究领域和研究热点.为探讨人工免疫可运用的军事领域,给相关科研工作者提供新方法、新思路,对生物免疫系统的一些概念进行了介绍,简要分析了生物免疫系统中的免疫机制,人工免疫系统基本特征,然后着重分析了该学科在信息系统安全、防御系统设计、目标识别、故障诊断、优化、火力分配等方面中的应用.  相似文献   
404.
This article analyzes the North Korean nuclear crisis from a balance-of-power perspective. It is in the long-term interests of international peace for a secure and independent North Korea to serve as a buffer between US and Chinese ground forces. However, the conventional military advantage of the South Korean-American alliance over North Korea has grown drastically since the end of the Cold War, threatening North Korea’s survival. Since North Korea lacks any reliable ally, nuclear weapons represent its most cost-effective way to restore a balance of power and thus secure itself. Accepting security guarantees in exchange for its nuclear arsenal is rhetorically appealing but not a viable approach. North Korea’s development of intercontinental ballistic missiles (ICBMs), however, has overcompensated for the post-Cold War imbalance, inviting talk in Washington of waging a preventive war. Persuading North Korea to give up its ICBM capability, not its nuclear arsenal, should therefore be the primary objective of US diplomacy.  相似文献   
405.
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   
406.
Most counterinsurgency campaigns have featured the use of some form of local defense forces. Such forces have had a somewhat mixed record, both in their usefulness in actually countering insurgents and in their longer-term impact on internal security. This article focuses on historical cases that provide lessons for the best operational and strategic uses of local defense forces and measures to control their activities.  相似文献   
407.
While the human rights impact of the deployment of state security agencies in the Chiadzwa diamond fields has been explored, it is important to continue to expose the increasing tendency within the sector to take public resources that should be protected by the state and used for the benefit of the people and channel them for personal gain. The security sector stranglehold of President Robert Mugabe and the ruling political party, the Zimbabwe African National Union Patriotic Front (ZANU-PF), has facilitated the siphoning of Chiadzwa diamond revenue into the pockets of individual security personnel. The unfolding sociopolitical crisis in Zimbabwe has also meant that these security personnel have been deployed beyond conflict zones and into traditionally civilian domains, with dire consequences for the public purse. With this in mind, it is asserted that these issues have driven state security agencies to enrich themselves through what is termed in this article as a ‘goat mentality’. The article thus explores the ways in which state security agencies have been deployed and gone on to promote personal enrichment in the Chiadzwa diamond fields.  相似文献   
408.
Security strategies are important sites for narrating the EU into existence as a security actor. The unveiling of a new global strategy on foreign and security policy for the EU immediately post-Brexit could be conceived as a pledge to remain together as a Union for the purposes of contributing to global security in a particular way. This paper offers a brief stock-taking of the EU’s way of writing security from the European Security Strategy (2003) to the EU Global Strategy (2016). A concise exegesis of these documents exposes an interesting dynamic: as exercises in ordering the world, both strategic guidelines have turned out to be major exercises in ordering the self. The comparative snapshot shows the EU as increasingly anxious to prove its relevance for its own citizens, yet notably less confident about its actual convincingness as an ontological security framework for the EU’s constituent members over time.  相似文献   
409.
While unmanned aerial vehicles (UAVs) have become a standard element of modern armed forces, African countries have been reluctant to acquire remotely piloted aircraft for military purposes until recently. This is mainly due to a lack of industrial capabilities and, for military purposes so far, procurement policies that have concentrated on small arms and light weapons, more prestigious armoured vehicles and combat aircraft. Moreover, counter-insurgency strategies in Africa tend to focus on manoeuvre warfare, co-opting rebels or fighting them using armed proxies. As a consequence, international counterterrorism operations against fanatical and reckless groups like al-Qaeda in the Islamic Maghreb and Boko Haram in sub-Saharan Africa are characterised by a strong dependence on Western forces providing UAV-based reconnaissance and, in some cases for the United States, military strikes by drones. This essay reviews some of the incentives and problems of the use of UAVs in the African context. Given the geographical and military conditions of asymmetric warfare in Africa, and potential problems concerning international law, ethical aspects of the use of arms, and civil–military relations notwithstanding, it is argued that African security forces should develop their own UAV capabilities by intensifying their cooperation with Western armed forces.  相似文献   
410.
针对人机环复杂因素的空管安全性评价难题,基于非对称贴近度,提出一种的多级模糊综合评判方法。首先构建了基于人机环境工程的空管安全影响因素集,包括人的因素、人机关系和环境条件这三大类因素集,然后依据因素评判的等级和标准,建立了基于非对称贴近度的空管安全性的多级模糊综合评判模型,最后以专家系统评价数据为基础,对某实际空管部门的安全性进行了模糊综合评判。研究方法和研究结论为科学评价空管系统的安全性提供了借鉴。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号