全文获取类型
收费全文 | 760篇 |
免费 | 116篇 |
国内免费 | 112篇 |
专业分类
电工技术 | 25篇 |
综合类 | 49篇 |
化学工业 | 5篇 |
金属工艺 | 2篇 |
机械仪表 | 5篇 |
建筑科学 | 6篇 |
矿业工程 | 7篇 |
能源动力 | 1篇 |
轻工业 | 4篇 |
武器工业 | 7篇 |
无线电 | 194篇 |
一般工业技术 | 25篇 |
冶金工业 | 34篇 |
自动化技术 | 624篇 |
出版年
2024年 | 10篇 |
2023年 | 44篇 |
2022年 | 41篇 |
2021年 | 34篇 |
2020年 | 57篇 |
2019年 | 28篇 |
2018年 | 20篇 |
2017年 | 34篇 |
2016年 | 39篇 |
2015年 | 23篇 |
2014年 | 66篇 |
2013年 | 40篇 |
2012年 | 62篇 |
2011年 | 93篇 |
2010年 | 62篇 |
2009年 | 77篇 |
2008年 | 57篇 |
2007年 | 57篇 |
2006年 | 39篇 |
2005年 | 38篇 |
2004年 | 23篇 |
2003年 | 15篇 |
2002年 | 14篇 |
2001年 | 5篇 |
2000年 | 2篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1994年 | 1篇 |
排序方式: 共有988条查询结果,搜索用时 15 毫秒
111.
DeVoe Ellen R.; Klein Tovah P.; Bannon William Jr.; Miranda-Julian Claudia 《Canadian Metallurgical Quarterly》2011,3(1):1
The attacks of September 11, 2001, on the World Trade Center were unprecedented acts of terrorism on U.S. soil. The disaster provides an opportunity to understand the responses of young children to a traumatic event of this proportion. This retrospective study took place within a year of the attacks and examined the relationship of levels of exposure to the World Trade Center disaster and family level predictors to trauma symptoms in a highly exposed sample of 180 young children in New York City. Data were collected through interviews with parents of children five years or younger at the time of the attacks. Primary variables included direct exposure and post 9/11 child and parent functioning, including trauma symptoms. Child trauma symptoms were related to direct exposure to the disaster, previous trauma, negative changes in parenting, and increased couple tension. Findings support the conceptualization that children's responses to traumatic events must be addressed within the caregiving context of family relationships. Clinical and preventive intervention for young children should be aimed at multiple levels of the social ecology. (PsycINFO Database Record (c) 2011 APA, all rights reserved) 相似文献
112.
汪贤锋 《数字社区&智能家居》2008,(6):1230-1233
本文针对TCP/IP在安全领域的应用展开论述,详细分析了TCP/IP在几个关键地方存在的问题.对其安全漏洞进行了研究,给出了一些建设性的解决办法,为今后的进一步研究奠定了基础。 相似文献
113.
针对当前互联网客户端攻击频发的态势,首先阐述了基于本地程序漏洞的客户端攻击概念,着重讲解了网站挂马攻击的特征。其次阐明了客户端蜜罐系统的基本原理,并介绍了一种高效的客户端蜜罐系统HoneyClient。随后通过对网站挂马攻击的特征分析提出了使用HoneyClient对其进行有效检测的方案,并对该方案进行了事实验证。最后通过对实验结果的分析与总结,提出了对网页木马型客户端攻击进行检测的改进策略和展望。 相似文献
114.
115.
恐怖爆炸活动日益猖獗,对周围建筑物造成极大破坏,引起严重的伤亡和财产损失。该文从爆炸荷载的特点及其对建筑物的损伤特性出发,在比较总结普通民用建筑和工业建筑抗爆设计方法的基础上,对建筑结构抗爆设计的原则提出了建议,希望能为建筑结构的防爆抗爆设计提供参考。 相似文献
116.
实现位置及时间绑定的密钥分发——防御传感器网络节点复制攻击的新方法 总被引:2,自引:0,他引:2
提出了一种新的防御思路:通过使复制节点无法与邻居节点建立成对密钥的方式,来达到消除复制节点攻击威胁的目的,由此设计了一种基于多项式的成对密钥分发方法LTB(location and time binding).LTB把每个节点的密钥信息与其部署位置和时间信息绑定起来,使每个节点只能在其部署位置与邻居节点建立成对密钥.由于复制节点的部署位置不同于原捕获节点,因此LTB能够有效阻止其与邻居节点建立成对密钥.LTB相比现有各种周期性复制节点检测机制的优势是它彻底消除了复制节点攻击隐患而且协议开销更低,通信开销从O(pn3/2)下降到O(n),其中,p是检测周期数,n是网络节点个数. 相似文献
117.
《Information Security Journal: A Global Perspective》2013,22(1-3):1-14
ABSTRACTDigital signature is the key issue in a number of innovative processes, such as dematerialization, e-government, e-commerce, and e-banking. Digital signature ensures both the identity of the user and the integrity of the digital document the user signs. However, despite the robustness of the underlying cryptographic primitives, a number of vulnerabilities derive from the radical difference between handwritten signature on papers and signature on digital documents. Indeed, digital documents are not directly observable because humans need a tool to interpret the bits of the document and to represent the corresponding information. The aim of this paper is to focus on the vulnerabilities of digital signature deriving from the “unobservability” of electronic documents. Possible mechanisms to contrast such vulnerabilities are also proposed, highlighting their positive and negative points under a perspective that does not ignore both practical and regulatory aspects. 相似文献
118.
Chong Hee Kim 《Information Processing Letters》2010,110(20):882-886
Fast exponentiation algorithms are central in the implementation of public key cryptography. They should be secure as well as efficient. Nowadays physical attacks such as side channel analysis or fault attacks become big threats in the implementation of cryptographic algorithms. In this article, we propose two new fault attacks using Jacobi symbol. Furthermore we show that Joye's regular right-to-left algorithms are vulnerable to them. 相似文献
119.
120.