首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   484篇
  免费   37篇
  国内免费   16篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   14篇
  2020年   6篇
  2019年   30篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   49篇
  2013年   101篇
  2012年   8篇
  2011年   26篇
  2010年   34篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   17篇
  2005年   18篇
  2004年   11篇
  2003年   13篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有537条查询结果,搜索用时 250 毫秒
151.
Abstract

This article analyses changes and failures in the northern Mali system of security governance, taking into account the period running from the declaration of the Malian Third Republic (1992) to the present. Considering northern Mali as an area of limited statehood, the article develops a comparative diachronic analysis, distinguishing between three phases, namely Militiarisation (1992–2002), Fragmentation (2002–2012) and Multiplication (2013–ongoing). For every phase the focus is on (1) the mechanisms of coordination among actors, (2) the distribution of coercive capacities and ruling power and (3) the forms of authority. Unintended consequences and collective problems are highlighted, in order to understand the current situation of insecurity in the area.  相似文献   
152.
Abstract

The rollback of Daesh’s territorial control during 2017 has (re-)established an area of limited statehood in large parts of Iraq that may endure for many years. The government of Iraq projects its authority into a large geographical and political space that it shares with a multitude of other state, non-state and hybrid actors, competing and collaborating to achieve advantageous security and political outcomes. This paper examines the heterarchy of actors in post-Daesh Iraq to develop a typology and start a critical discussion about post-Westphalian alternatives for security governance in Iraq during the coming period of reconstruction and reconciliation.  相似文献   
153.
侯娜  余明明 《国防科技》2018,39(3):064-070
随着科技的发展和进步,世界各国越来越认识到空间天气的重要性,并对空间天气效应展开深入的理论和实践探索。我国也加快空间天气领域的研究进程,并取得了一定成就。本文系统介绍了空间天气的定义与发展历程,运用总体国家安全观的方法,从国土安全、军事安全、经济安全与核安全等角度分析了灾害性空间天气对国家安全的影响。在对国内外空间天气研究现状和发展趋势分析的基础上,针对灾害性空间天气的国家安全影响提出了政策性建议。  相似文献   
154.
Kenya’s decision to close the Dadaab refugee camp complex highlights structural flaws in the international refugee regime. While much attention has been paid to Kenya’s reasoning, less has been given to the reactions of organisations and states. Given the state’s primacy in the international system and uncertainty about refugees, Kenya’s decision is perhaps unsurprising. It is contended that the stakeholders were unprepared because of path dependence and disbelief that Kenya would repatriate the refugees. While stakeholder reactions arguably demonstrate concern for refugees, the international refugee regime remains unquestioned, sustaining revenue streams that may fuel corruption, encourage lengthy encampment and prolong conflict.  相似文献   
155.
The earlier work on the optimal design of the national security has focused on the opportunity cost of the draft in terms of foregone human capital formation. The current paper introduces the national security into the welfare analysis missing from the earlier work. This creates a trade-off between the private goods and the security as a public good in the social cost–benefit analysis. There are three major results. First, and arising from the intergenerational interaction, it is optimal to introduce a pay to the young generation when in duty even by resorting to a distortive tax. Second, when optimizing the size of the army, the optimal choice between the draft army and the professional army depends on the risk class of the country. A security gradient arises. Third, the choice is linked to the size and the quality of the reserve generated by the two approaches.  相似文献   
156.
针对传统混合模糊测试提升技术多聚焦于利用多种动静态分析手段辅助而忽略了混合符号执行自身性能的问题,提出一种混合模糊测试平衡点模型,并基于该模型对主流混合符号执行方案进行剖析,包括污点分析辅助模糊测试、混合模糊测试以及混合符号执行,归纳了6种符号执行方案,基于混合符号执行引擎Triton复现了6种符号执行方案,并通过10个典型真实程序进行了测试评估。从效率、内存、覆盖率三个维度对各个方案进行性能对比与影响因素分析。实验证明,优化方案都可以消除不必要的约束并减少时间和空间开销,但约束缩减会造成信息丢失,造成覆盖率降低。基于实验数据分析,提出了一个优化方案的性能序列,并提出三种针对不同测试需求的优化方案。  相似文献   
157.
针对典型DES具有密钥短等缺点,提出了一种基于Logistic映射的改进型DES算法,提高了密钥空间,增强了密文输出的混乱特性。同时,将该算法应用于远程装备监控系统中,有效地增强了数据传输的安全性。  相似文献   
158.
What are relationships between epidemics, national security, and US immigration policy? This question is important because it sheds light on transnational or nontraditional security areas, American immigration policy, and a pressing issue for US leaders who have recently faced epidemics such as the West Africa Ebola outbreak that began in 2013. This article answers it and lays ground in the area by reviewing epidemics in world history, using International Relations and Security Studies works to specify dangers of contagions for states, and identifying three general immigration measures that American leaders have utilized from the seventeenth century to the present day to protect against contagions, which are (1) policies restricting entrance of foreigners thought to carry specified diseases, (2) the isolation or quarantining of immigrants with contagious disease, and (3) delegating the President with authority to stop immigration in the event of an epidemic abroad. This study has implications for research and contemporary US immigration policy.  相似文献   
159.
This article examines women's role as combatants in national liberation forces in South Africa. Three categories – guerrilla girls, combative mothers and the in-betweeners – are introduced to underscore the varied ways in which women have participated in combat within the national liberation movements. Factors such as age and one's ability to leave the country affected whether women could participate in combat as ‘guerrilla girls’ or if it limited them to fighting apartheid violence from home, or if there were women who can be defined as having fallen somewhere in between these categories. These categories are used to theorise women's combat roles in the anti-apartheid struggle, thus broadening and challenging the dominant notions of combat that often hide women's contributions in war. In this regard, different periods of struggle, physical location, as well as age, determined the methods of activism available to men and women.  相似文献   
160.
This article highlights and critiques the underlying conceptualisations and assumptions of the women, peace and security (WPS) agenda that emerged with the adoption of United Nations Security Council Resolution 1325 in 2000. The main argument is that we need to rethink the WPS agenda to produce more holistic and groundbreaking responses for the types of challenges encountered, i.e., that gender inequality and insecurity are deep rooted and multi-layered, and thus negate mechanistic responses that do not deal with cultural and structural issues. It specifically focuses on gender and peace-making and gender and peacekeeping to point to the pitfalls in the current conceptions and practices in this arena.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号