首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   765篇
  免费   54篇
  国内免费   33篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   16篇
  2020年   15篇
  2019年   33篇
  2018年   39篇
  2017年   48篇
  2016年   48篇
  2015年   20篇
  2014年   91篇
  2013年   128篇
  2012年   23篇
  2011年   55篇
  2010年   54篇
  2009年   50篇
  2008年   55篇
  2007年   42篇
  2006年   39篇
  2005年   28篇
  2004年   21篇
  2003年   24篇
  2002年   6篇
  2001年   5篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1995年   2篇
  1994年   1篇
  1993年   1篇
  1990年   1篇
排序方式: 共有852条查询结果,搜索用时 15 毫秒
761.
This article reviews the origins and evolution of the Middle East weapons of mass destruction-free zone (WMDFZ) concept and the proposal for a 2012 conference on the subject, and explores new challenges and opportunities for regional arms control in the current regional environment. It suggests that new models may be necessary to revitalize regional arms control efforts. The establishment of a broad regional security forum could include, but should not be limited to, curtailing weapons of mass destruction through the zone approach. Even if the 2012 conference fails to materialize, or is limited to a one-time event, the proposal for such a conference has provided an important opportunity to rethink future options for a regional arms control and security process.  相似文献   
762.
This article responds to the reviews by Gwinyayi Dzinesa and Elling Tjønneland of Community of insecurity: SADC's struggle for peace and security in southern Africa. It does this by exploring the methodological and analytical challenges in evaluating SADC's peace and security endeavours. It emphasises the need to present explicitly the criteria for assessment, to concentrate on the actual performance of the organisation rather than on its declarations and structures, and to make assessments and predictions on the basis of historical trends and sound analysis.  相似文献   
763.
Concerns about climate change and energy security have prompted some countries to revive dormant nuclear fission power programs to meet growing energy demands and reduce carbon dioxide emissions. However, this so-called nuclear renaissance based on fission would have major drawbacks in the areas of safety, security, and nonproliferation. Nuclear fusion, however, is portrayed by its proponents as mitigating these drawbacks, and scientists continue to pursue fusion's promise with two large-scale projects: the International Thermonuclear Experimental Reactor (ITER), and the Laser Inertial Fusion Engine (LIFE) reactor. Although supporters often hail fusion as proliferation resistant, the technology could be used to create weapons-usable fissile material. This article explains how fissile material could be created in ITER or LIFE and analyzes other nonproliferation implications of fusion; the authors discuss the various challenges faced by ITER and LIFE.  相似文献   
764.
ABSTRACT

Since the end of the Cold War, arms control proponents tried to make the case for deep nuclear reductions and other forms of security cooperation as necessary for strategic stability. While different versions of strategic stability analysis did sometimes produce innovative proposals, constructive negotiations, and successful ratification campaigns in the past, this analytical framework has become more of a hindrance than a help. Treating arms control as a predominantly technical way to make deterrence more stable by changing force structure characteristics, military operations, relative numbers of weapons on either side, or total number of nuclear weapons gives short shrift to political factors, including the fundamental assumptions about world politics that inform different arms control logics, the quality of political relations among leading states, and the political processes that affect negotiation, ratification, and implementation. This article compares two logics for arms control as a means to enhance strategic stability, one developed by the Cambridge community in the 1960s and one used by the Reagan administration and its successors, with current perspectives on strategic stability in which flexibility and freedom of action are preferable to predictability and arms control. It also contrasts what the Barack Obama administration has tried to achieve through strategic stability dialogues with Russia and China with how they envision security cooperation. It then presents an approach developed during the Cold War by Hedley Bull for thinking about both the technical and the political dimensions of arms control, and suggests that the logic of Cooperative Security (which shares important features with Bull's approach) is a more appropriate and productive way to think about arms control in the twenty-first century than strategic stability analysis is.  相似文献   
765.
ABSTRACT

In No Use: Nuclear Weapons and U.S. National Security Policy, Thomas M. Nichols calls for a constructive rethinking about the history of nuclear weapons and the attitudes that have grown up around them. Despite dramatic reductions since the end of the Cold War, the United States still maintains a robust nuclear triad that far exceeds the needs of realistic deterrence in the twenty-first century. Nichols advocates a new strategy of minimum deterrence that includes deep unilateral reductions to the US nuclear arsenal, a no-first-use pledge, withdrawing US tactical nuclear weapons from Europe, and ending extended nuclear deterrence for allies. The weakest part of his argument eschews nuclear retaliation against small nuclear states that attack the United States, opting instead to use only conventional weapons to guarantee regime change. He admits this will entail enormous cost and sacrifice, but cites the “immorality” of retaliating against a smaller power with few targets worthy of nuclear weaponry, which totally ignores the massive underground facilities constructed to shield military facilities in many of these states. Despite this, Nichols's thoughtful approach to post-Cold War deterrence deserves thoughtful consideration.  相似文献   
766.
A comprehensive maritime interdiction strategy to attack the insurgent's logistic system was a key element in the defeat of the Tamil Tigers. The campaign of maritime interdiction required the Sri Lankan Navy (SLN) to attack LTTE arms smuggling, sea piracy, and maritime terrorism. The SLN degraded the insurgency's robust maritime logistical network while also devising tactics to engage the maritime insurgents who reacted with swarm and suicide boat tactics. The efforts of the SLN forced the Tamil Tigers to confront the government's final land offensives with diminished resources, thus collapsing a three decades’ old insurgency in a matter of months.  相似文献   
767.
ABSTRACT

This paper challenges recent claims that competitive market dynamics incentivize Private Military and Security Companies (PMSCs) to fully commit to providing effective services, thereby reducing the duration of civil war. Our assessment of a most-likely case scenario for this argument – Sierra Leone – reveals four critical problems. First, there is rarely direct competition, even if numerous companies are present. Second, the presence of multiple PMSCs usually represents a collaboration among subsidiaries providing distinct services, often under the same corporate umbrella. Third, data aggregation obfuscates the overlap of PMSC presence, inflating the amount of perceived competition. Finally, we raise concerns regarding how quantitative analyses can conflate conflict intensity with conflict termination.  相似文献   
768.
As US counterinsurgency campaigns draw to a close, doctrine for asymmetric warfare written during the War on Terror has come under heavy criticism. While many have argued that this shift to ‘winning hearts and minds’ is evidence that the United States is taking humanitarianism and nation-building seriously, others argue that a wide gap exists between US counterinsurgency doctrine and the protection of civilians afflicted by conflict. In this article, I show that the latter is true by comparing theories of instrumental and communicative action to US doctrine for operational design, stability operations, and counterinsurgency. I argue that these texts treat the people as an object to be manipulated for the achievement of pre-determined self-interested strategic goals rather than members of a community that jointly designs operations to fulfill shared objectives. However, US doctrine does contain communicative elements that, if prioritized, would better support humanitarian and state-building objectives otherwise subordinated in the War on Terror.  相似文献   
769.
分析了传统PKI(Public Key Infrastructure)身份认证模型存在的问题,基于OCSP(Online Certificate Status Protocol)协议的证书状态验证服务和密钥验证服务相分离,造成了传统PKI身份认证模型的信任度下降,增加了身份认证的风险,跨CA(Certificate Authority)认证复杂度高,CA机构提供的身份认证服务不完整等问题。提出了一种开放式PKI身份认证模型,由CA中心独立完成两个验证服务,将OCSP应答机制改进为提供身份证明文件的方式,可有效解决上述问题。通过云信任评估模型对两种认证模型进行了量化评估,证明了本文提出的开放式身份认证模型可有效提高信任度。对该模型进行了原型实现,重点对性能问题进行了优化,实验测试表明,该模型具有实用价值。  相似文献   
770.
将移动代理技术引入电子商务具有很多的优势,同时也对电子商务的安全性问题提出了新的挑战。文中构建了一个基于移动代理的电子商务模型,分析了模型中存在的安全问题,提出了一个改进的电子商务安全方案.改进方案采取分层的结构,从不同的层次保证移动代理的安全和电子商务信息流和资金流的安全.实验结果表明,该方案是切实可行的。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号