首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   484篇
  免费   37篇
  国内免费   16篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   14篇
  2020年   6篇
  2019年   30篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   49篇
  2013年   101篇
  2012年   8篇
  2011年   26篇
  2010年   34篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   17篇
  2005年   18篇
  2004年   11篇
  2003年   13篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有537条查询结果,搜索用时 15 毫秒
451.
ABSTRACT

German security and defence policy has undergone substantial transformation. This transformation requires an unprecedented level of political leadership, suggesting that Germany needs to solve the dilemma of how to supply leadership to increasingly demanding partners. What are the conditions under which German leadership can unfold in security and defence policy? To what degree do German role-conceptions of international agency and role-expectations of German leadership coincide? What kind of leadership outputs are produced? This study offers a comprehensive analysis of German security and defence policy in terms of supply (role conceptions) and demand (role expectations). We outline three leadership role conceptions present in the German strategic debate, which we then assess in the context of the Wendtian theory of cultures of anarchy. We then analyse Berlin's leadership in terms of outputs via the case study on Anchor Army and the Framework Nations Concept. We conclude that while Germany has tried to match leadership role expectations both rhetorically and in action, Berlin's leadership inputs have so far been insufficient. This has led to an imbalance in terms of role conceptions and expectations hampering effective German leadership in security and defence policy.  相似文献   
452.
众所周知,Vo IP技术在未来语音通信中所占的比重越来越大。随着Vo IP的不断发展,基于SIP协议的Vo IP应用也不断增多。但是,由于SIP协议高度依赖于开放的IP网络,使得其安全性逐渐成为关注和探讨的焦点。主要分析了SIP协议网络面临的一些安全威胁,包括典型的外部攻击技术和协议自身存在的漏洞等。探讨了为应对SIP安全威胁提出的加密、认证等安全策略并且分析了这些安全策略的优缺点,提出了针对SIP安全策略进一步改进的方向,旨在不断提高和完善基于SIP协议的安全性能。  相似文献   
453.
飞机再次出动保障活动所需时间长短对提升飞机的作战效能至关重要,针对当前在飞机保障资源有限约束条件下,再次出动保障活动工期最短难以实现的难题,提出了基于分支切割法的再次出动保障活动时间优化方法。该方法以飞机再次出动保障活动所需时间最短为目标,以有限的保障人员和保障作业间逻辑关系为约束条件,可计算出时间最短的飞机再次出动保障活动具体流程,并用VB6.0编制成计算机程序,开发了飞机再次出动保障活动分析系统。最后,对某型飞机真实保障活动进行了实例分析,结果表明,使用该方法计算得到的结果准确、可靠,与实际保障情况相符,可为飞机再次出动保障与决策提供指导,提升保障活动的自动化水平,具有很好的工程应用价值。  相似文献   
454.
The article analyses the Spanish military transformation. This process started in 2004 as a means to adapt the force structure, organization and capabilities of the Spanish military to meet present and future threats in compliance with NATO’s initiatives, thus ensuring the continuity of the equipment modernization, professionalization and the adjustment of the country’s defence architecture to the post-cold war environment. A decade later, although transformation is still a priority for the Ministry of Defence, limited political will, a lack of strategic guidance, poor resource management and the effects of the economic crisis are compromising its development. This article describes the Spanish military transformation and assesses its value in adapting the country’s armed forces to the current and prospective security environment.  相似文献   
455.
Attitudes towards a regional military force are of paramount importance when exploring public support for regional integration. Until now, however, scholarly research has not considered the influence of attitudes towards a regional military mechanism in the sub-Saharan African context. Using Afrobarometer data, we demonstrate that military concerns are vital when exploring Tanzanian attitudes towards the proposed political federation of the East African Community (EAC), the East African Federation (EAF). More specifically, opposition to military cooperation strongly influences Tanzanian scepticism of the EAF. This finding is highly relevant given that referendums in the participating member states must be passed to facilitate political integration. Heightened opposition towards military cooperation raises the possibility of the public rejecting a politically integrated EAC. This poses a potential obstacle to the implementation of joint security policies and crucial mechanisms to provide a more stable region at large. We account for alternative explanations of Tanzanian opinion formation and reflect on the strength of military-orientated concerns for investigating public support for the East African project specifically and regional integration in sub-Saharan Africa more widely.  相似文献   
456.
The EU Global Strategy (EUGS) is a broad and ambitious document in terms of its geographic scope and thematic priorities. However, the EU cannot devote equal attention to all aspects of the EUGS; so there is still scope for more clarity regarding the EU’s core strategic aims. This article argues that in addition to fostering internal cohesion, the EU’s strategic priority must involve stabilizing its own neighbourhood. This task has challenged the EU for decades because of an inherent credibility deficit regarding the EU’s own capabilities, yet the EUGS does not diagnose and remedy this problem as effectively as it could have. Therefore much more work will need to be done in terms of reforming EU institutions and developing common capabilities if the EU hopes to achieve its central internal and external security goals as outlined in the EUGS and related policy statements.  相似文献   
457.
EU High Representative Federica Mogherini presented her EU Global Strategy (EUGS) in June 2016. Encircled by security crises, it is difficult to think of something more important for Europe than collective action with the aim of weathering the storm. The EUGS, in this respect, seeks to define common ends and identify means. So what do we make of the EUGS? What does the EUGS tell us about the current role of the EU in global affairs? And how will the withdrawal of the UK from the EU affect foreign and security policy? As a way of introduction to the forum, this article notes that the EUGS focuses on the neighbourhood, puts the interests of European citizens first, identifies civilian means, and has created momentum on security policy. The key question, however, remains whether there is any interest in the EUGS beyond the foreign policy elites.  相似文献   
458.
鉴于美军的太空作战走在世界前列,从顶层设计、信息网络、态势感知、作战应用等方面分析了美军太空安全体系的建设现状,重点指出了其在太空安全应急响应方面的发展趋势和启示,对我国太空安全研究具有参考作用。  相似文献   
459.
The US role in the North Atlantic Treaty Organization (NATO) Alliance is a 65-year history of retrenchment and renewal. When Washington has sought a retrenchment from the world, it traditionally increased burden sharing pressure on Europe to do more. During times of increased global ambition, the USA reaffirmed its traditional leadership role in the Alliance and its commitment to NATO effectiveness and relevance. This cycle of NATO retrenchment and renewal, however, is halting. Though the USA will continue to go through periods of relative increases and decreases in security policy ambition, signs point to a permanent defense and security retrenchment in Europe. Germany is the ally singularly capable of filling the resulting security gap. If NATO is to avoid the drift toward irrelevance many critics have predicted, Germany will need to cast off old inhibitions toward security and defense leadership. These trends and their implications for NATO's future are explored through historical case studies and the shifting contemporary security environment.  相似文献   
460.
India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy – which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security – but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号