首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   765篇
  免费   54篇
  国内免费   33篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   16篇
  2020年   15篇
  2019年   33篇
  2018年   39篇
  2017年   48篇
  2016年   48篇
  2015年   20篇
  2014年   91篇
  2013年   128篇
  2012年   23篇
  2011年   55篇
  2010年   54篇
  2009年   50篇
  2008年   55篇
  2007年   42篇
  2006年   39篇
  2005年   28篇
  2004年   21篇
  2003年   24篇
  2002年   6篇
  2001年   5篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1995年   2篇
  1994年   1篇
  1993年   1篇
  1990年   1篇
排序方式: 共有852条查询结果,搜索用时 31 毫秒
681.
在研究图像编解码理论和计算图像相似性参数的基础上,提出了基于图像编码技术的网络信息安全传输方法,通过在网络上传输经过编码的参照图像和相似性参数约定,达到图像通信保密的目的,保障了需要传输的图像在网络上的安全性.  相似文献   
682.
This article explains why Singapore, despite its small size and semi-authoritarian regime, retains one of the best military forces in the Indo-Pacific. It unpacks Singapore’s ability to continuously innovate since the 1960s – technologically, organizationally, and conceptually – and even recently joined the Revolution in Military Affairs bandwagon. Drawing from the broader military innovation studies literature, this article argues evolutionary peacetime military innovation is more likely to occur in a state with a unified civil–military relation and whose military faces a high-level diverse set of threats. This argument explains how the civil–military fusion under the People’s Action Party-led government since Singapore’s founding moment has been providing coherent and consistent strategic guidance, political support, and financial capital, allowing the Singapore Armed Forces to continuously innovate in response to high levels and diversity of threats.  相似文献   
683.
Humanitarian operations may pose challenges to which armed forces prepared for warfighting seem rather ill-equipped. It is the aim of this article to examine in what way military ethics should be adapted to humanitarian tasks. Two ideal types of military ethics are defined here: warfighting and humanitarian. The warfighting ethic is supposed to maximise the utility of the military in war and combat and to that end utilises the virtues of loyalty and honour. In contrast, humanitarian obligations require to a larger extent the development of personal integrity and an ability to follow one’s own conscience. The adaptation of military ethics is demonstrated in the case studies of the UK armed forces and the German Bundeswehr. Whereas the moral code of the UK armed forces remains anchored in the principles of the warfighting ethic, the case of the Bundeswehr presents a military ethic closely approximating the humanitarian ideal type.  相似文献   
684.
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.  相似文献   
685.
Recent elections in Latin America, such as those of Mauricio Macri in Argentina, Horacio Cartes in Paraguay, and the impeachment process of Dilma Rousseff in Brazil, point to a new direction in Latin American politics and away from the “hard left;” they also point to a new momentum in the security relationship between the US and Latin American countries. Former US President Obama’s 2016 trip to Cuba and Argentina was a clear demonstration of this new security paradigm and also a clear indication that there is a new momentum brewing in the US towards a rethinking and reshaping of security strategies and mindsets. This article will explore the multidimensional security relationship between the US and Latin American countries in light of recent changes in the US’ posture toward the region.  相似文献   
686.
Mark Erbel 《Defence Studies》2017,17(2):135-155
This article reappraises the two most-studied country cases of military outsourcing: the USA and the UK. It argues that the contemporary wave of military contracting stretches back to the beginning of the cold war and not only to the demobilisation of armies in the 1990s or the neoliberal reforms introduced since the 1980s. It traces the political, technological and ideational developments that laid the groundwork for these reforms and practices since the early cold war and account for its endurance today. Importantly, it argues that a persistent gap between strategic objectives and resources, i.e. the challenge to reconcile ends and means, is an underlying driver of military contracting in both countries. Contemporary contracting is thus most closely tied to military support functions in support of wider foreign and defence political objectives. Security services in either state may not have been outsourced so swiftly, if at all, without decades of experience in outsourcing military logistics functions and the resultant vehicles, processes and familiarities with public-private partnerships. The article thus provides a wider and deeper understanding of the drivers of contractualisation, thereby improving our understanding of both its historical trajectory and the determinants of its present and potential futures.  相似文献   
687.
Postmodern contradictions in postcolonial Nigeria have led to the fetishisation of alternative local security measures often labelled as vigilante activities. The profiling of these groups as ethnic militia often undermines their essential bid to provide security while delimiting security needs to the physical. The fallouts of such profiling are frictions between federal security agents and ethnic-based security groups, often resulting in violence, as exemplified by the 7 May 2013 incident between the Nigerian federal security agents and the Ombatse. This study focuses on the emergence and activities of the Ombatse as an alternative security apparatus of the Eggon. It presents three years of field research which entailed the use of ethnography, key informant interviews and observation. The findings reveal that the Ombatse emerged to assert historical legitimacy for both the physical and spiritual securitisation of the Eggon through a return to the ancestral ways of social engineering. The study considers the security challenges in Nigeria, and also situates the Eggon historical context within political, religious, sociocultural and economic intersections of securitisation. It concludes that the Ombatse situates its legitimacy within the Eggon past and retains its relevance through the holistic focus of providing both physical and spiritual security.  相似文献   
688.
仰斐  廖东升 《国防科技》2017,38(2):043-048
从网络空间侦察能力、指挥控制能力、精确攻击能力、防御能力和评估能力等五个方面,对网络空间支援力量的核心支援能力进行了系统论述,提出建设军队网络支援力量、应对网络空间安全威胁的新思考和新观点。研究认为,当前我军在网络空间的安全意识、核心技术、均衡发展等方面面临严峻困难。为实现网络强国的奋斗目标,需要加强国家网络安全的顶层设计,增强网络技术自主创新能力,强化军民融合式建设和系统常态的攻防训练等。  相似文献   
689.
美军在军事人才培养的体系构筑、目标设定、课目设置等方面有着众多独到之处。《军官职业军事教育政策》是美军规范军官职业军事教育的指导性文件,研究掌握其核心内容的发展演变,从中提取美军职业教育改革的先进理念和成熟做法,可为我军军事职业教育建设提供经验借鉴。  相似文献   
690.
郭力萌  朱勤 《国防科技》2017,38(5):050-054
在美国大力推动下,韩日政府于2016年11月签署《军事情报保护协定》。本文对韩日签署《军事情报保护协定》的背景和过程进行了梳理,指出了韩日政府关于该协定所存在的主要分歧,分析了该协定签署对东北亚乃至亚太地缘政治安全形势产生的深远影响。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号