首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   484篇
  免费   37篇
  国内免费   16篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   14篇
  2020年   6篇
  2019年   30篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   49篇
  2013年   101篇
  2012年   8篇
  2011年   26篇
  2010年   34篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   17篇
  2005年   18篇
  2004年   11篇
  2003年   13篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有537条查询结果,搜索用时 281 毫秒
31.
以2008年四川“5·12”地震发生后的抗震救灾警卫任务为例,对重大自然灾害警卫任务的特点进行深入剖析,总结抗震救灾警卫工作经验。探求重大自然灾害警卫任务的方式方法,有利于更好地完成警卫任务。  相似文献   
32.
反恐作战心理训练是现代反恐怖作战行动中需要特别研究和解决的问题。阐述公安边防部队实施反恐作战心理训练的意义,分析公安边防部队反恐作战心理训练的基本方式方法,说明实施反恐心理训练必须注意把握的几个关键性问题。  相似文献   
33.
加强公安现役部队文化建设,必须把握文化建设的方向,坚持社会主义核心价值体系,坚持抵制腐朽文化的影响和继承与创新的统一;必须抓住文化建设的关键环节,坚持以人为本,注重结合部队职能任务,建设学习型警营;必须筑牢文化建设的基础支撑,注重队伍建设,加大基础设施建设和制度建设。  相似文献   
34.
世博会的圆满召开,不仅需要强大的军事“硬实力”作后盾,也需要军事“软实力”作支撑。本文从军事“软实力”的基本概念入手,将其分解为感化认同力、形象吸引力、心理威慑力等三个子要素;从各要素出发,以完成世博安保任务为着眼点,提出加强军事“软实力”的具体思路。  相似文献   
35.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
36.
动态差分逻辑是一种典型的电路级差分功耗攻击(DPA)防护技术.这种技术通过使逻辑门保持恒定的翻转率来降低电路功耗与数据信号之间的相关性.介绍了一种新型的、基于查找表(Look-Up-Table,LUT)结构的动态差分逻辑(LBDL),以及基于这种逻辑的集成电路设计方法.该设计方法仅需在传统的半定制设计流程中添加少量的替换操作就可以实现 ,因而比其他完全需要全定制设计的动态差分逻辑具有更好的实用性.而相对同样适用于半定制实现的动态差分逻辑 WDDL(Wave Dynamic Differential Logic),LBDL逻辑解决了逻辑门翻转时刻与数据信号之间的相关性,从而比WDDL逻辑具有更好的功耗恒定性.实验结果表明,该设计方法能够有效实现具有抗DPA攻击性能的电路.  相似文献   
37.
To engage properly with the Somali National Army, to understand it in the hope of improving stability and the lives of over 12 million Somalis, good basic information on its composition and characteristics is necessary. Authoritative accounts on the subject have been scarce for over 25 years. This account seeks to detail the army’s dispositions across southern Somalia, and, more importantly, the brigades’ clan compositions and linkages. Clan ties supersede loyalties to the central government. The army as it stands is a collection of former militias which suffer from ill-discipline and commit crime along with greater atrocities. Estimates of numbers are unreliable, but there might be 13,000 or more fighters in six brigades in the Mogadishu area and five beyond.  相似文献   
38.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability.  相似文献   
39.
There is some consensus in the literature that economic sanctions targeting authoritarian regimes are less effective than those against democratic regimes. This line of research, however, assumes that autocratic regimes are monolithic and that they have similar capacities to resist foreign pressure. This study argues that the success rate of sanctions against dictatorships is contingent on institutional differences across different types of autocracies. I develop a theoretical model indicating that single-party and military regimes are less likely to concede to foreign pressure compared to democracies. This is because they effectively use various repressive tactics and positive inducements to endure the costs of the coercion. Sanctions against personalist regimes, on the other hand, are likely to be as effective as sanctions directed at democracies. Personalist regimes might be inclined to acquiesce to foreign pressure due to their lack of strong institutional capacity to weather the costs of the sanctions. Results from the selection-corrected models show that sanctions against military or single-party regimes are less likely to induce concessions relative to democratic target regimes. The findings also indicate that there is no significant difference in the success rate of sanctions against personalist regimes and democratic governments.  相似文献   
40.
在给出事件驱动系统安全漏洞的基础上,指出了产生漏洞的根本原因是:系统忽视了输入系统的事件序列之间存在的相关性;系统无条件信任任何事件源产生的事件.针对这两个原因,相应提出了事件序列形式安全分析模型及基于事件源的可信度评估模型,依据这两个模型,构建了一种改进的事件驱动系统框架.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号