全文获取类型
收费全文 | 484篇 |
免费 | 37篇 |
国内免费 | 16篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 14篇 |
2020年 | 6篇 |
2019年 | 30篇 |
2018年 | 29篇 |
2017年 | 33篇 |
2016年 | 32篇 |
2015年 | 17篇 |
2014年 | 49篇 |
2013年 | 101篇 |
2012年 | 8篇 |
2011年 | 26篇 |
2010年 | 34篇 |
2009年 | 28篇 |
2008年 | 33篇 |
2007年 | 21篇 |
2006年 | 17篇 |
2005年 | 18篇 |
2004年 | 11篇 |
2003年 | 13篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有537条查询结果,搜索用时 15 毫秒
371.
Nikolai Sokov 《The Nonproliferation Review》2013,20(2):207-226
This article explores Russia's increasing reliance on nuclear weapons from three perspectives. First, it seeks to demonstrate that the phenomenon is not exclusively limited to Russia and represents a broader trend, which is ultimately rooted in the nature of the contemporary international system or, more precisely, the uncertainties of the transitional period between the Cold War system and a new emerging one. Second, it analyzes the role assigned to nuclear weapons in Russia's doctrinal documents, in particular the emergence of a new mission—limited-use of nuclear weapons to deter or, if deterrence fails, to de-escalate large-scale conventional conflicts. Discussions of the new doctrine, which have begun recently, suggest that this new mission will likely remain unchanged. Finally, this article looks at the apparent discrepancy between Russia's nuclear modernization programs and the roles assigned to nuclear weapons in the military doctrine, as well as the causes of that discrepancy. 相似文献
372.
IPSec是目前适合所有Internet通信的惟一一种安全技术。通过分析IPSec的处理过程,指出网络安全处理器的使用是IPSec协议高效实现的关键,并详细介绍了目前典型安全处理器的结构和应用。由于目前的网络安全处理器无法满足OC 48及其以上速率接口的处理要求,对下一代高速网络安全处理器的体系结构进行了分析和预测。 相似文献
373.
Udi Lebel 《Small Wars & Insurgencies》2014,25(2):297-328
The study shows how ‘strategic military refusal’ in Israel developed as a rational and institutional means to influence security policies. As opposed to the perspective that sees military refusal as a spontaneous individual act, the study illustrates how organizations operate to distribute military refusal in order to pressure decision-makers to change their military policies. This strategy has proven to be effective when the military is involved with groups that threaten it with refusal – which threatens the military's operational ability and its official and apolitical image. These include soldiers whose civilian authorities, rather than their military commanders, are perceived as an epistemic authority regarding security issues. The case study refers to the impact of strategic military refusal in Israel on security policies and the military doctrine. This was influenced by leftist groups, which, although they belonged to the parliamentary opposition, had dominant presence in the military ranks. Furthermore, the study examines the effect of the use of strategic military refusal on the model of military recruitment. 相似文献
374.
Håkon Lunde Saxi 《Defence Studies》2017,17(2):171-197
At NATO’s 2014 Wales Summit, the UK and Germany unveiled two new initiatives for European defence cooperation, known, respectively, as the Joint Expeditionary Force (JEF) and the Framework Nations Concept (FNC). Both were the result of economic pressures and the need to exercise intra-alliance leadership, but they represented very different approaches to cooperation. The JEF was to be a UK-led contingency force for short-notice operations, selectively incorporating forces from allies and partners. The FNC sought to coordinate capability development between groups of allies, centred on larger framework nations, to develop coherent capability-clusters available to meet NATO’s force requirements. The common denominator and novelty of the initiatives was the building of forces and capabilities multinationally by having major states act as framework nations for groups of smaller allies. The UK and Germany have ownership and continue to provide leadership to these initiatives. This is one key reason why they continue to evolve to accommodate changing circumstances and are likely to endure. 相似文献
375.
Katja Lindskov Jacobsen 《African Security Review》2017,26(3):237-256
It is widely acknowledged that maritime security in the Gulf of Guinea is a highly complex phenomenon involving a variety of issues (legal deficiencies, inadequate military equipment, and challenges like corruption, political unrest and youth unemployment) as well as a multiplicity of external responders. To make sense of the impact that external actors have when they address this complex problem through various maritime capacity building endeavours, this article argues that there is a need to understand the attractiveness of capacity building vis-à-vis the widely acknowledged need for a comprehensive approach, as well as the difficulties of translating the potential for comprehensiveness into practice (as important aspects of the problem remain largely unaddressed). Further, it is argued that it is important to appreciate that even if these gaps – i.e. the aspects that maritime capacity building currently leaves unaddressed – represent a ‘failure’ to deliver a comprehensive response, they are at the same time illustrative of how the maritime capacity building activities of various external actors also ‘succeed’ in having an impact on this regional security landscape – for instance, by influencing how certain aspects of this multifaceted problem are prioritised, whilst others are only marginally addressed, if at all. 相似文献
376.
377.
传统通信系统安全风险评估方法获取的判断矩阵是个体专家的意见,无法处理不确定问题,得到的评估结果较为主观、准确度差,为了解决该问题,提出了基于证据理论的通信系统安全风险评价模型。采用证据理论融合规则调整通信设备和光缆一级指标的判断矩阵,综合多位专家的意见,获取设备和光缆各指标的状态评分和指标权重,构建通信系统风险评估模型,最后通过仿真实验测试其性能,结果表明,该模型可以准确评估通信系统的风险等级。 相似文献
378.
一种提高正横布置潜艇发射装置发射安全性的方法 总被引:3,自引:1,他引:2
正横布置的潜艇发射装置在发射鱼雷诱饵时,由于受潜艇航行带来的水流作用力的影响,鱼雷诱饵出管后将向潜艇的尾部方向回转,如果潜艇发射鱼雷诱饵时的航速较高,则这种回转将十分严重,有可能与发射艇的尾部相碰撞,这将给发射艇及鱼雷诱饵带来安全性问题.文中提出了一种鱼雷诱饵发射装置在艇上作向前倾斜的斜置式布置结构.数值仿真结果表明:此种布置方式可以削弱鱼雷诱饵出管以后的回转趋势,从而可以避免较高航速时鱼雷诱饵与发射艇的回转碰撞. 相似文献
379.
由于某框架结构在施工过程中发生了明显的不均匀沉降,结构体可能存在安全隐患。为此,对该框架结构进行了现场检测,根据检测结果,应用大型有限元软件ANSYS对地基变形后的结构安全性进行分析,合理评价了结构性能,其工程经验可供参考。 相似文献
380.
In the aftermath of the tragic events of 11 September 2001, numerous changes have been made to aviation security policy and operations throughout the nation's airports. The allocation and utilization of checked baggage screening devices is a critical component in aviation security systems. This paper formulates problems that model multiple sets of flights originating from multiple stations (e.g., airports, terminals), where the objective is to optimize a baggage screening performance measure subject to a finite amount of resources. These measures include uncovered flight segments (UFS) and uncovered passenger segments (UPS). Three types of multiple station security problems are identified and their computational complexity is established. The problems are illustrated on two examples that use data extracted from the Official Airline Guide. The examples indicate that the problems can provide widely varying solutions based on the type of performance measure used and the restrictions imposed by the security device allocations. Moreover, the examples suggest that the allocations based on the UFS measure also provide reasonable solutions with respect to the UPS measure; however, the reverse may not be the case. This suggests that the UFS measure may provide more robust screening device allocations. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献