首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   760篇
  免费   116篇
  国内免费   112篇
电工技术   25篇
综合类   49篇
化学工业   5篇
金属工艺   2篇
机械仪表   5篇
建筑科学   6篇
矿业工程   7篇
能源动力   1篇
轻工业   4篇
武器工业   7篇
无线电   194篇
一般工业技术   25篇
冶金工业   34篇
自动化技术   624篇
  2024年   10篇
  2023年   44篇
  2022年   41篇
  2021年   34篇
  2020年   57篇
  2019年   28篇
  2018年   20篇
  2017年   34篇
  2016年   39篇
  2015年   23篇
  2014年   66篇
  2013年   40篇
  2012年   62篇
  2011年   93篇
  2010年   62篇
  2009年   77篇
  2008年   57篇
  2007年   57篇
  2006年   39篇
  2005年   38篇
  2004年   23篇
  2003年   15篇
  2002年   14篇
  2001年   5篇
  2000年   2篇
  1998年   4篇
  1997年   1篇
  1996年   2篇
  1994年   1篇
排序方式: 共有988条查询结果,搜索用时 15 毫秒
101.
伴随网络攻击事件的层出不穷,如何有效防范各类网络攻击、加强网络安全保障是网络安全技术的主要内容。本文在分析其攻击原理的基础上,针对这些网络安全隐患讨论和分析了具体的防御策略。  相似文献   
102.
一种抗几何攻击的视频水印算法   总被引:1,自引:0,他引:1       下载免费PDF全文
提出了一种基于视频序列时空不变信息的视频水印算法。在嵌入水印时生成同步帧,并确定同步帧时空不变特征点位置,检测时根据同步帧时空不变特征点的位置,实现对视频序列几何失真的矫正,对水印信息进行检测和提取。实验表明,该算法能有效地抵抗帧插入和帧丢失等时间轴同步攻击和高强度几何攻击。  相似文献   
103.
A growing body of evidence suggests that most adults exposed to potentially traumatic events are resilient. However, research on the factors that may promote or deter adult resilience has been limited. This study examined patterns of association between resilience and various sociocontextual factors. The authors used data from a random-digit-dial phone survey (N = 2,752) conducted in the New York City area after the September 11, 2001, terrorist attack. Resilience was defined as having 1 or 0 posttraumatic stress disorder symptoms and as being associated with low levels of depression and substance use. Multivariate analyses indicated that the prevalence of resilience was uniquely predicted by participant gender, age, race/ethnicity, education, level of trauma exposure, income change, social support, frequency of chronic disease, and recent and past life stressors. Implications for future research and intervention are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
104.
Rosa  Panayiotis  Christos   《Ad hoc Networks》2007,5(1):87-99
Multipath routing in ad hoc networks increases the resiliency against security attacks of collaborating malicious nodes, by maximizing the number of nodes that an adversary must compromise in order to take control of the communication. In this paper, we identify several attacks that render multipath routing protocols vulnerable to collaborating malicious nodes. We propose an on-demand multipath routing protocol, the secure multipath routing protocol (SecMR), and we analyze its security properties. Finally, through simulations, we evaluate the performance of the SecMR protocol in comparison with existing secure multipath routing protocols.  相似文献   
105.
网络上各种协议的制定最初的目的是为了有一个统一的标准可以使通信更方便和在更广泛的范围内实现互通.但就在这些协议成为标准之后,人们在研究它的过程当中发现了协议本身的一些缺陷.同时就有这样的一些恶意和善意的人们利用协议本身的缺陷并结合它们的工作原理研究出了许多对网络进行攻击的方法.本文主要介绍了在网络中存在的一些攻击现象,并分析了各种攻击现象的实现原理.  相似文献   
106.
In this paper,a new content-based image watermarking scheme is proposed.The Harris-Laplace detector is adopted to extract feature points,which can survive a variety of attacks.The local characteristic regions (LCRs) are adaptively constructed based on scale-space theory.Then,the LCRs are mapped to geometrically invariant space by using image normalization technique.Finally, several copies of the digital watermark are embedded into the nonoverlapped LCRs by quantizing the magnitude vectors of discrete Fourier transform (DFT) coefficients.By binding a watermark with LCR,resilience against desynchronization attacks can be readily obtained.Simulation results show that the proposed scheme is invisible and robust against various attacks which includes common signals processing and desynchronization attacks.  相似文献   
107.
针对污染和重放攻击提出一个新的多源网络编码签名算法,利用同态加密算法构造签名方案来抵御污染攻击,通过引入消息代的序号,防止了代间的重放攻击,并且采用线性计算方法来减少节点的验证时间,降低了对结点计算能力的要求,特别适合于无线传感器网络或自组织网络.  相似文献   
108.
DDoS攻击表现形式有多种,主要造成后果是导致Web服务器无法提供网络服务,最终造成一系列损失。针对通过某一网页端口进行的DDosS攻击,提出了一种预防算法,自定义动态密钥,并采用自定义算法调用,动态改变被攻击端口处的文件名。该算法使得攻击者无法通过加密后的文件来得到原文件名称,从而达到预防此种DDoS攻击的目的。实验证明,此算法有效。  相似文献   
109.
Existing detection methods against SYN flooding attacks are effective only at the later stages when attacking signatures are obvious. In this paper an early stage detecting method (ESDM) is proposed. The ESDM is a simple but effective method to detect SYN flooding attacks at the early stage. In the ESDM the SYN traffic is forecasted by autoregressive integrated moving average model, and non-parametric cumulative sum algorithm is used to find the SYN flooding attacks according to the forecasted traffic. Trace-driven simulations show that ESDM is accurate and efficient to detect the SYN flooding attacks.  相似文献   
110.
Software written in one language often needs to construct sentences in another language, such as SQL queries, XML output, or shell command invocations. This is almost always done using unhygienic string manipulation, the concatenation of constants and client-supplied strings. A client can then supply specially crafted input that causes the constructed sentence to be interpreted in an unintended way, leading to an injection attack. We describe a more natural style of programming that yields code that is impervious to injections by construction. Our approach embeds the grammars of the guest languages (e.g. SQL) into that of the host language (e.g. Java) and automatically generates code that maps the embedded language to constructs in the host language that reconstruct the embedded sentences, adding escaping functions where appropriate. This approach is generic, meaning that it can be applied with relative ease to any combination of context-free host and guest languages.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号