全文获取类型
收费全文 | 369篇 |
免费 | 35篇 |
国内免费 | 79篇 |
专业分类
483篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2021年 | 13篇 |
2020年 | 10篇 |
2019年 | 23篇 |
2018年 | 12篇 |
2017年 | 26篇 |
2016年 | 31篇 |
2015年 | 10篇 |
2014年 | 43篇 |
2013年 | 43篇 |
2012年 | 26篇 |
2011年 | 26篇 |
2010年 | 17篇 |
2009年 | 36篇 |
2008年 | 23篇 |
2007年 | 25篇 |
2006年 | 22篇 |
2005年 | 31篇 |
2004年 | 20篇 |
2003年 | 9篇 |
2002年 | 4篇 |
2001年 | 7篇 |
2000年 | 3篇 |
1999年 | 6篇 |
1998年 | 4篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
排序方式: 共有483条查询结果,搜索用时 19 毫秒
31.
舆论战是通过舆论传播平台传递信息,作用于受众的思想或心理,争取人心,实现小战大胜或不战而胜。依据信息加工原理,分析研究信息源、信息、媒介和受众这四个要素,是提升舆论战作战功能的必由之路。 相似文献
32.
33.
34.
Amitai Etzioni 《Defense & Security Analysis》2014,30(4):304-310
A combination of threat analysis and “subterranean forces” (such as proclivities to fight conventional wars as compared to asymmetric ones) leads the USA to prefer focusing on the threats from China rather than those emanating from the Middle East. 相似文献
35.
36.
37.
为了在电子对抗作战仿真系统中真实地复现现实作战过程,设计了基于分层半自治Agent的系统框架。从设计电子对抗作战仿真实体Agent的现实意义出发,提出了基于BDI框架的仿真实体Agent设计方法,着重探讨了半自治Agent技术应用于作战仿真领域的巨大优势,明确了个体Agent的设计方法。根据电子对抗作战仿真系统的实体分类结果提出了一种基于分层半自治Agent的系统结构,并分析了不同层次的Agent的功能,为半自治Agent技术应用于电子对抗作战仿真领域提供了思路,具有一定的借鉴意义。 相似文献
38.
Brendan Sozer 《Small Wars & Insurgencies》2016,27(4):636-658
Proxy warfare is a consistent element in international warfare. However, it is unclear why proxy relationships form in cases where states have multiple options of groups to support. Existing research identifies the presence of transnational constituencies, shared interstate rivalries, and moderate relative strength of militant groups as highly influential on the development of a proxy relationship. This study examines the presence of these variables within the context of the Lebanese Civil War. The results of this demonstrate that each state places greater importance on some variables and ignores others when choosing a proxy. Additionally, this study further demonstrates the presence of new variables that are key to the development of proxy relationships. 相似文献
39.
Shay Shabtai 《Defense & Security Analysis》2016,32(4):312-320
A comprehensive paradigm of future wars can be defined, and is called in this article “Extended conflicts.” These can be characterized by strategic attrition, to which all national resources and all possible international legitimacy are mobilized, in order to achieve a resolution by transformation of the opponent. The use of military force in this kind of conflict is limited. The understanding that we are facing an era of extended conflicts will improve the way it is utilized. 相似文献
40.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article. 相似文献