首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   479篇
  免费   38篇
  国内免费   16篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   13篇
  2020年   6篇
  2019年   28篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   48篇
  2013年   97篇
  2012年   10篇
  2011年   27篇
  2010年   34篇
  2009年   28篇
  2008年   33篇
  2007年   22篇
  2006年   17篇
  2005年   18篇
  2004年   11篇
  2003年   13篇
  2002年   5篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有533条查询结果,搜索用时 125 毫秒
281.
姜波  凌军  万文乾 《国防科技》2021,42(2):138-142
本文通过梳理大数据技术发展及数据资源建设现状,可视化呈现了数据资源建设使用中出现的数据泄露现状及趋势,剖析了数据泄露的根本原因。在分析军队装备大数据建设及规划情况的基础上,建立了装备大数据安全问题分析方法,即在数据采集阶段、数据传输阶段、数据存储阶段和数据使用阶段,分别构建装备大数据不同维度安全要素,包括安全威胁、安全主体和安全保障,并应用于分析装备大数据安全问题。此外,本研究还深入分析了装备大数据建设应用过程中四个阶段存在的安全风险,构建了装备大数据全周期、立体化、协同化的安全防护体系,研究了装备大数据安全保护技术框架,包括以大数据访问控制技术、安全检索技术和安全计算技术为支撑的大数据安全技术和以匿名隐私保护技术和差分隐私保护技术为支撑的大数据保护技术。希翼研究结果能够为装备大数据全寿命周期内的安全防护提供一定借鉴。  相似文献   
282.
随着网络信息技术的更新换代,网络空间日益成为国际安全博弈的新兴领域。网络空间安全博弈的核心在于对国家利益的争夺和维护,关键环节在于如何通过各种策略方式对别国施加影响,进而达成本国利益诉求。对于如何区分和评估网络空间安全博弈策略,当前学界尚未形成统一共识,不同学者之间提出的策略分类存在明显交叉甚至相互矛盾。本文梳理分析了国家行为体在网络空间安全博弈中主要采取的控制、损耗、拒止三种策略,从实施策略的技术可行性、己方实施策略所需付出的代价大小、策略实施后对目标国国家行为造成的影响三方面讨论了各种网络空间安全博弈策略在不同条件以及不同目的下的适用性,最后从各种网络空间安全博弈策略的特征属性出发,结合本国网络安全环境进行深入分析,提出了对加强我国网络安全建设具有借鉴、启发意义的对策建议。  相似文献   
283.
Since 2012, China’s assertion of its sovereignty claim to the contested Senkaku/Diaoyu Islands has significantly raised the risk of a potentially escalatory political-military crisis with Japan. As circumstances worsen, Japanese Prime Minister Shinzo Abe has championed major institutional reforms aimed at centralizing Japanese security policy decision-making and vastly improving crisis management. This article assesses these reforms’ significance for ameliorating Japan’s long-standing internal crisis management weaknesses, and enhancing its ability to communicate with Beijing promptly under challenging conditions. While significant issues remain, recent developments – especially the establishment of Japan’s first-ever National Security Council – demonstrate significant progress. Bilaterally, however, important firebreaks remain conspicuously absent.  相似文献   
284.
A transit vessel traffic scheduling algorithm has been developed to limit the negative effects on cargo volume throughput in two‐way waterways where separation distances between transiting vessels must be maintained and passage restrictions may hold. It runs in time that is polynomial in the number of ships involved in the computation and finds schedules which increase the utilization of waterways. Three examples illustrate its use. The first example is situated in the Sunda Strait where the algorithm is used to enhance the safety of merchant shipping against a terrorist threat. It illustrates important features of the algorithm and demonstrates how it can be used with cross traffic. The second example is situated in the Strait of Istanbul and offers a comparison between the developed algorithm and the transit vessel scheduling algorithm of Ulusçu et al., J Navig 62 (2009), 59–77. This was done using a plausible model of the Strait of Istanbul. The third and last example shows how the algorithm can be used to schedule transit vessel traffic in two‐way waterways with junctions. This feature is especially useful in congested waters with a high risk of collisions like the Inland Sea of Japan. An extreme test case proves that the developed algorithm is a practical algorithm ready for such use. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 225–248, 2017  相似文献   
285.
By drawing on the literature about security regimes, this article posits the idea that a particular type of regime, which can be termed a “tacit security regime” (TSR), has begun to emerge between Israel, on the one hand, and several Gulf Arab states, on the other. It is a regime which, unlike liberal institutional variants that attempt to privilege the promotion of collective norms, remains configured around perceptions of threats to be countered and strategic interests to be realized. By examining the development, scope, and scale of this nascent TSR, this article explores the extent to which Israel, mindful of Washington, DC’s regional retrenchment, sees the emergence of such a regime as redefining the political and strategic contours of Israel’s relations with much of the Middle East.  相似文献   
286.
Declared operationally ready in 2016, the African Standby Force (ASF) has not been deployed in its originally designed form. This is not for the lack of opportunities but rather a demonstration of the power of the Regional Economic Communities/Regional Mechanisms (RECs/RMs) – Africa’s sub-regional security structures – over matters of peace and security. Experience gathered from its short existence suggests that the ASF may never be deployed in its current form. It may instead evolve into a robust framework, adaptable mainly by the RECs/RMs, for addressing varied security challenges. Four things are critical to enhancing the utility of the ASF: the political willingness of the RECs/RMs, the strategic interest of the member states, predictable and sustainable financing, and clarity on the role of the African Capability for Immediate Response to Crisis, the temporary battlegroup that was created to provide the African Union with a rapid response capability, pending the ASF’s operationalization.  相似文献   
287.
The British Military Covenant can be located in and from many sources and from 2011 onwards in primary legislation. This article argues that the provision of military housing amounts to an early test of how the military covenant is understood and used by those involved in defence policy, and those in the armed forces affected by it. It finds that housing was a prominent feature of how service personnel understood how they were valued, but was not explicitly understood as a covenant issue by those personnel or the officials in charge of the Defence Estates. We locate three reasons for this: (1) the covenant has been poorly translated from aspiration into policy practice, (2) the covenant is unevenly understood across its stakeholders which has the effect of generating disappointment through misaligned expectations, (3) those engaged in the reform process surrounding the Defence Infrastructure Organisation (DIO) saw the covenant as a means to energise reform. Ultimately housing was seen as a dry and technocratic business area and thus an issue ripe for being refracted through the covenant was ultimately left outside of its remit.  相似文献   
288.
This paper attempts to build a simple indicator of state power. Military expenditure is the paper’s point of departure, with the definitions given by NATO, SIPRI and others. This definition is discussed and a power version is build, using French budgetary data. Then a defence of the result against traditional or non-traditional critics is presented under an imperative of action. Finally, this concept is enlarged and a new concept of power expenditures is given, one more time using French budgetary data. The conclusion is that this large expenditure concept is an unbiased but imperfect indicator of the will to act, and has to be completed by GDP to indicate the capability to act in the long-run.  相似文献   
289.
Few would disagree that European militaries have experienced dramatic changes since the end of the Cold War. Much of the discussion on these changes to date has referred to the concept of professionalism. However, this approach became outdated as professions in post-industrialist societies entered a state of crisis as a result of growing competition from a variety of competitors. The present study adapts a new framework from the sociology of knowledge literature – sociology of expertise – into one, sociology of security expertise, which is suitable for study of contemporary armed forces. Its utility is demonstrated through analysis of five European professional military education institutions. The analysis shows that European military organisations are transiting, albeit in various degrees, from one form of social organisation of military knowledge production – associated with the military education model common to traditional military colleges – toward another, which is related to the military education model of national defence universities. Hence it is highly probable that European military organisations lose, either voluntary or unintentionally, their professional character and can no longer be unquestionably assumed to be military professions. Hence, they should be analysed hereafter using the sociology of security expertise framework.  相似文献   
290.
This essay outlines a theory of land power. After explaining the absence of such a theory, the article establishes the modern context for such a theory, specifically within the concept of joint interdependence. The analysis defines key terms and premises behind the theory, to include a definition of land power. The argument then outlines the national elements of power that contribute to a theory of land power. The analysis next applies the theory to the fundamental purposes of military power: defeat, deter, compel, assure, shape and support to the nation. The analysis then tests key definitions, supporting premises, and utility of the theory. The essay argues that historical experience validates the applicability and utility of the theory, and offers a solid basis for extrapolating the validity of the theory into the near future.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号