全文获取类型
收费全文 | 763篇 |
免费 | 9篇 |
国内免费 | 14篇 |
专业分类
786篇 |
出版年
2025年 | 1篇 |
2024年 | 1篇 |
2023年 | 7篇 |
2021年 | 20篇 |
2020年 | 10篇 |
2019年 | 30篇 |
2018年 | 31篇 |
2017年 | 39篇 |
2016年 | 51篇 |
2015年 | 23篇 |
2014年 | 61篇 |
2013年 | 111篇 |
2012年 | 28篇 |
2011年 | 46篇 |
2010年 | 45篇 |
2009年 | 46篇 |
2008年 | 46篇 |
2007年 | 31篇 |
2006年 | 39篇 |
2005年 | 39篇 |
2004年 | 21篇 |
2003年 | 23篇 |
2002年 | 5篇 |
2001年 | 6篇 |
2000年 | 4篇 |
1999年 | 4篇 |
1998年 | 8篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1990年 | 3篇 |
1989年 | 1篇 |
排序方式: 共有786条查询结果,搜索用时 0 毫秒
551.
Habu Shuaibu Galadima 《African Security Review》2018,27(2):158-176
Since the mid-twentieth century, the East and Southern African regions have been mired in complex and overlapping security and development challenges, including ethnopolitical conflicts, terrorist insurgencies, the proliferation of small arms and light weapons (SALWs), and overwhelming economic crisis. These challenges have had implications for human security, socio-economic development, territorial authority, sovereignty and the stability and legitimacy of political regimes in the affected states. The adequacy and relevance of the regional responses to these challenges is the subject of ongoing debate, to which this paper now adds. Among other factors, this paper identifies competition for regional dominance and institutional inadequacies as accounting for the inability of regional governance bodies to respond adequately to the challenges they face. Consequently, it recommends the expansion of the mandate of the Regional Economic Communities (RECs) beyond regional economic integration to include peacebuilding and a deepening of the institutional efforts focused on security cooperation and conflict management. 相似文献
552.
讨论了一种避雷针保护范围的计算方法,给出了图例和计算公式。利用危险球心法可以对复杂结构建筑物的防雷设计与校核提供一种简便的解题思路和方法。 相似文献
553.
李京陵 《中国人民武装警察部队学院学报》2003,19(2):71-72
警卫队伍建设必须以十六大精神为统领 ,抓好思想政治工作 ,加强文化育警 ,优化队伍的力量配备 ,明确防范重点 ,促进警卫队伍建设再上一个新台阶 相似文献
554.
刘冬 《中国人民武装警察部队学院学报》2008,24(5):26-29
警卫人员良好的心理品质是圆满完成警卫任务至关重要的因素。一个优秀的警卫人员,必须具有警卫兴趣浓厚、性格特征良好、情绪控制适度、意志力坚强、感知敏锐、记忆力强、思维敏捷、注意力集中、动作反应迅速、空间定位能力好等良好的心理品质。 相似文献
555.
针对基于广义随机Petri网GSPN的动态系统安全性建模与分析方法进行了系统研究。基于Petri网、GSPN模型的基本原理,提出了关键状态搜索算法,并进行了安全性仿真分析.将广义随机Petri网的扩展模型应用于安全性分析领域,丰富了动态系统安全性问题的研究手段。 相似文献
556.
由于嵌入式应用环境的多样性,单纯软件或硬件安全技术或者安全产品的功能和性能都有其局限性,只能满足某类系统的特定安全需求。因此,如何有效利用软硬件技术特点,通过协同防护来保障系统的安全已成为当前信息安全领域的研究热点。通过对嵌入式系统安全威胁和隐患的分析,在此基础上提出一种可以提高嵌入式系统安全性的软硬协同安全防护技术。该技术通过硬件检测、软件处理、综合治理的方法,可以有效地增强嵌入式系统抗击本身缺陷和恶意攻击的能力。 相似文献
557.
针对电子战系统的特点,介绍了电子战系统开发与测试的一般过程。分析基于高层体系结构的电子战仿真测试与评估包括两个方面,HLA各组成部分性能以及电子战系统自身效能的测试与评估。在分析美国电子战仿真测试的基础上,将基于HLA的电子战系统应用于指挥自动化体系对抗仿真中,设计了对应的框架结构。分别对运行支撑系统KD-RTI和DMSORTI1.3v6在不同传输方式下的传输时延和丢包率进行了比较。进一步以信息的完备性为指标,对电子战系统的作战效能进行了评估。 相似文献
558.
Ralph Rotte 《African Security Review》2016,25(1):85-94
While unmanned aerial vehicles (UAVs) have become a standard element of modern armed forces, African countries have been reluctant to acquire remotely piloted aircraft for military purposes until recently. This is mainly due to a lack of industrial capabilities and, for military purposes so far, procurement policies that have concentrated on small arms and light weapons, more prestigious armoured vehicles and combat aircraft. Moreover, counter-insurgency strategies in Africa tend to focus on manoeuvre warfare, co-opting rebels or fighting them using armed proxies. As a consequence, international counterterrorism operations against fanatical and reckless groups like al-Qaeda in the Islamic Maghreb and Boko Haram in sub-Saharan Africa are characterised by a strong dependence on Western forces providing UAV-based reconnaissance and, in some cases for the United States, military strikes by drones. This essay reviews some of the incentives and problems of the use of UAVs in the African context. Given the geographical and military conditions of asymmetric warfare in Africa, and potential problems concerning international law, ethical aspects of the use of arms, and civil–military relations notwithstanding, it is argued that African security forces should develop their own UAV capabilities by intensifying their cooperation with Western armed forces. 相似文献
559.
While the human rights impact of the deployment of state security agencies in the Chiadzwa diamond fields has been explored, it is important to continue to expose the increasing tendency within the sector to take public resources that should be protected by the state and used for the benefit of the people and channel them for personal gain. The security sector stranglehold of President Robert Mugabe and the ruling political party, the Zimbabwe African National Union Patriotic Front (ZANU-PF), has facilitated the siphoning of Chiadzwa diamond revenue into the pockets of individual security personnel. The unfolding sociopolitical crisis in Zimbabwe has also meant that these security personnel have been deployed beyond conflict zones and into traditionally civilian domains, with dire consequences for the public purse. With this in mind, it is asserted that these issues have driven state security agencies to enrich themselves through what is termed in this article as a ‘goat mentality’. The article thus explores the ways in which state security agencies have been deployed and gone on to promote personal enrichment in the Chiadzwa diamond fields. 相似文献
560.
Maria Mälksoo 《Contemporary Security Policy》2016,37(3):374-388
Security strategies are important sites for narrating the EU into existence as a security actor. The unveiling of a new global strategy on foreign and security policy for the EU immediately post-Brexit could be conceived as a pledge to remain together as a Union for the purposes of contributing to global security in a particular way. This paper offers a brief stock-taking of the EU’s way of writing security from the European Security Strategy (2003) to the EU Global Strategy (2016). A concise exegesis of these documents exposes an interesting dynamic: as exercises in ordering the world, both strategic guidelines have turned out to be major exercises in ordering the self. The comparative snapshot shows the EU as increasingly anxious to prove its relevance for its own citizens, yet notably less confident about its actual convincingness as an ontological security framework for the EU’s constituent members over time. 相似文献