首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   250篇
  免费   13篇
  国内免费   9篇
  2021年   1篇
  2020年   14篇
  2019年   24篇
  2018年   26篇
  2017年   28篇
  2016年   20篇
  2015年   3篇
  2014年   28篇
  2013年   66篇
  2012年   6篇
  2011年   5篇
  2010年   4篇
  2009年   5篇
  2008年   5篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   3篇
  2002年   4篇
  2001年   3篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有272条查询结果,搜索用时 16 毫秒
161.
This survey article focuses on defence economics issues and provides data and analysis on the Federal Republic of Yugoslavia's (FRY) defence policy, defence spending, the size of its armed forces, its defence industries and the cost of the civil war. The main section is devoted to the period from 1990 to the present and deals with the following aspects: the situation after the break‐up of the former Yugoslavia, general economic data; the cost of the civil war, the defence budget; the armed forces; the manufacture of armaments and the structure of the defence industry.  相似文献   
162.
‘Greed’ vs. ‘grievance’ is weighed using a generally applicable methodology as motivations in the American War of Independence. Greed is quantified as the expected economic benefit of Independence – escaping colonial trade burdens and expected increased economic growth rates. Grievance is measured as willingness to pay to escape perceived political burdens. Quantification of the relative contributions is made possible by using estimates of expected war-costs. To the extent that the economic burden was insufficient to explain the War, the residual is ascribed to the grievance motivation. Both motives are shown to have contributed to the War, but grievance dominates.  相似文献   
163.
Boko Haram terrorism has been recognized by Nigerian President Jonathan as the most threatening and complex security issue in Nigeria since independence. In response, the Federal Government of Nigeria has committed itself to different counterterrorism measures, which are largely dominated by “hard politics” and military mobilization. Spending heavily on defense to upgrade military hardware and train personnel in a counterterrorism role, Nigeria has also boosted its strategic importance in the “Global War on Terror”. However, this attempt has become unpopular as it has failed to contain Boko Haram within a short time frame and has made insufficient headway against unabated terror, with human rights costs among the host communities and amidst a surge of stakeholders' discordance. As a matter of concern, this article seeks to assess Boko Haram as an opponent in Nigeria's war on terror (WOT) and to ascertain the challenges the country faces, the alternative measures open to it, and possible ways forward.  相似文献   
164.
My aim in this paper is to reflect on a very narrow question: under what conditions might a cyber-attack provide a just cause for war? I begin by articulating what makes for a just cause, briefly address the problem of attribution, and then discuss three broad categories of cyber-attack: those that clearly do not satisfy the just cause requirement, those that clearly do satisfy the just cause requirement, and three ambiguous cases – the destruction of property, the emplacement of logic bombs, and the failure to prevent cyber-attacks. My conclusions are exploratory and suggestive rather than definitive, partly by virtue of the extreme paucity of literature on the moral assessment of cyberwar.  相似文献   
165.
魏岳江 《国防科技》2013,(6):89-93,96
文章研究信息化条件下局部战争战法。利用模拟作战实验室实践检验、论证完善战争设计理论,普及电脑游戏开发战争想象力,借虚拟数学方式预测战争结果。强化“战争设计”对训练的牵引作用,落实训战一致。强调加强军事理论研究的针对性、前瞻性.综合考虑武器装备、战争战例、军事训练水平、人员素质、战役战术等因素,对未来可能发生的战争进行准确预测。  相似文献   
166.
在分析当前水面舰艇面临的现实威胁基础上,研究了指挥关系及指挥流程对水面舰艇对空防御作战效能的影响,提出利用流程仿真工具进行指挥流程的建模仿真、采用蒙特卡洛模拟方法计算作战效能的指挥关系评估方法,该理论可为指挥关系或指挥流程的优化提供技术参考和研究方向。  相似文献   
167.
ABSTRACT

The Kargil conflict was a limited war between India and Pakistan fought along the Kashmir Line of Control during the spring/summer of 1999. Named for the principal town in the combat zone on the Indian side, it was the first open warfare between India and Pakistan as declared nuclear weapons states and included the first combat employment of the Indian Air Force since 1971. Despite its intensity, it was also characterised by considerable restraint on both sides. The potential for conventional escalation, however, was high and the possibility of nuclear confrontation could not be excluded. It had significant long-term ramifications for both countries and constitutes an important part of the backdrop to their relations today.  相似文献   
168.
从关于国防和军队重大改革的重要论述入手,系统地阐述了武警部队重大改革必须向“能打胜仗”的战斗力聚焦。主要从三个层面进行分析:一是向提高部队整体素质及优化规模结构聚焦;二是向提高部队武器装备保障效能聚焦;三是向增强部队以执勤处突为中心的军事能力聚焦。  相似文献   
169.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
170.
根据战备物资储备工作的特点和要求,分析了统筹工作的目的和意义,用于指导战备物资的储备工作。构建了战备物资储备统筹模型,运用定性和定量相结合的方法,综合考虑各种因素对储备的影响,对各方向的战备物资消耗需求量进行多层次的统筹,最终获得战备物资的储备限额量。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号