全文获取类型
收费全文 | 627篇 |
免费 | 93篇 |
国内免费 | 53篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2021年 | 20篇 |
2020年 | 9篇 |
2019年 | 29篇 |
2018年 | 30篇 |
2017年 | 39篇 |
2016年 | 51篇 |
2015年 | 23篇 |
2014年 | 61篇 |
2013年 | 111篇 |
2012年 | 26篇 |
2011年 | 46篇 |
2010年 | 44篇 |
2009年 | 46篇 |
2008年 | 46篇 |
2007年 | 31篇 |
2006年 | 39篇 |
2005年 | 39篇 |
2004年 | 21篇 |
2003年 | 23篇 |
2002年 | 5篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 8篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1990年 | 2篇 |
1989年 | 1篇 |
排序方式: 共有773条查询结果,搜索用时 78 毫秒
151.
David J. Karl 《战略研究杂志》2013,36(4):619-641
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies. 相似文献
152.
Galen Roger Perras 《战略研究杂志》2013,36(3):505-528
In 1924, HMCS Thiepval provided logistical support to a British attempt to circumnavigate the world by air. But the ship had another secret mission. Concerned America and Japan were fortifying their north Pacific possessions in violation of the 1922 Washington Treaty, and fearing war might be inevitable, the Canadian navy sent the Thiepval to covertly spy upon American and Japanese facilities. No cheating was discovered, but in the longer run, Canadian concerns about hostilities in the north Pacific were ‘on the mark’ correct. 相似文献
153.
Peter Dahl Thruelsen 《Small Wars & Insurgencies》2013,24(4):619-643
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR. 相似文献
154.
可配置计算系统的优势与系统设计过程的复杂性是一对矛盾,可配置计算框架为此提供了有益的思路。但受限于适用范围与通用性考虑,已有的特别是商业框架仅支持系统的静态重构。本文针对宽带信号侦察这一特定应用领域,提出了一种功能级可配置计算应用框架BSRRCS-RCAF,该框架将领域应用中具有共性的计算与功能模块抽取和集中起来,形成二进制比特流配置文件库,并提供构建此类系统的公共服务体系。基于公共服务体系以及配置文件库,当需要修改或者重新构建宽带信号侦察系统时,只需在现有框架下动态调用配置组件库,或者遵循框架的统一设计接口完善补充组件库中的特定功能部分,整个系统设计框架将得到方便复用,便于实现基于快速重构的多种系统功能。 相似文献
155.
156.
Matthew Stein 《Small Wars & Insurgencies》2013,24(3):394-412
There were several high-profile violent incidents in 2011 in Kazakhstan, including several bombings, shootings that targeted police, and a protest turned clash that resulted in a number of deaths. Some of the perpetrators reportedly had links with radical religious groups. An overlooked aspect of the violence is how it is reported in Kazakhstan. There are active, competent media in Kazakhstan, which are largely unknown in the West. An examination of these incidents using the media in Kazakhstan can provide a unique insight into what took place. While Western sources quickly blamed radical religious groups with international connections, media in Kazakhstan have found that there are other reasons for the violence. 相似文献
157.
Colin Robinson 《Small Wars & Insurgencies》2013,24(3):474-499
Since the peace agreements of 2002–2003 which ended the second war in the Democratic Republic of Congo, reconstruction of the army has been an inherently political process, in common with other attempts to carry out security sector reform (SSR). This article briefly sketches out the Congolese army's history, then attempts to fill a gap in the literature on Congolese SSR by detailing what can be found of the actual structure and shape of the present army. The efforts that have been made to reform the army are then examined, followed by a conclusion which examines the major issues and possible ways forward. 相似文献
158.
黄红梅 《武警工程学院学报》2013,(6):28-31
提出了一种新的三粒子量子安全直接通信协议。通信过程利用decoy光子来检测窃听,保证信道安全。发送方将秘密消息编码在不同幺正操作上,通信双方通过Bell基和Z基测量可直接传递秘密消息。由于所有粒子都用于传输秘密消息,且传输一次可获得两比特信息,该协议具有较高的量子比特及量子密码协议效率;三粒子纠缠态的制备是已实现技术,该协议具有实际操作的意义。此外,该协议在量子信道中也是安全的。 相似文献
159.
为构建一体化的空天作战信息环境,面向大情报系统的信息共享和应用重组集成目标,探讨了以信息服务理念架构大情报系统的总体思路,总结筛选了大情报系统信息服务组件开发与集成应遵循的技术规范与标准.有助于大情报系统的体系结构设计,高效集成多元化的现有或即将建设的关联系统,并逐步过渡到统一的信息技术体制上. 相似文献
160.
随着中美实力差距不断缩小和信息技术的发展与扩散,网络安全成为中美新的竞争点和摩擦点,中美在网络安全问题上展开新一轮的博弈,具体体现为网络空间治理权之争、中美网络安全战略博弈和网络技术优势的夺取。 相似文献