全文获取类型
收费全文 | 4141篇 |
免费 | 967篇 |
国内免费 | 736篇 |
专业分类
电工技术 | 124篇 |
综合类 | 508篇 |
化学工业 | 286篇 |
金属工艺 | 75篇 |
机械仪表 | 41篇 |
建筑科学 | 174篇 |
矿业工程 | 37篇 |
能源动力 | 38篇 |
轻工业 | 39篇 |
水利工程 | 29篇 |
石油天然气 | 14篇 |
武器工业 | 209篇 |
无线电 | 1087篇 |
一般工业技术 | 191篇 |
冶金工业 | 32篇 |
原子能技术 | 12篇 |
自动化技术 | 2948篇 |
出版年
2024年 | 21篇 |
2023年 | 120篇 |
2022年 | 196篇 |
2021年 | 217篇 |
2020年 | 205篇 |
2019年 | 169篇 |
2018年 | 165篇 |
2017年 | 198篇 |
2016年 | 170篇 |
2015年 | 232篇 |
2014年 | 361篇 |
2013年 | 337篇 |
2012年 | 400篇 |
2011年 | 456篇 |
2010年 | 375篇 |
2009年 | 341篇 |
2008年 | 370篇 |
2007年 | 376篇 |
2006年 | 287篇 |
2005年 | 247篇 |
2004年 | 154篇 |
2003年 | 138篇 |
2002年 | 72篇 |
2001年 | 60篇 |
2000年 | 52篇 |
1999年 | 33篇 |
1998年 | 15篇 |
1997年 | 14篇 |
1996年 | 13篇 |
1995年 | 11篇 |
1994年 | 8篇 |
1993年 | 7篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1985年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
排序方式: 共有5844条查询结果,搜索用时 62 毫秒
41.
《Expert systems with applications》2014,41(11):5416-5430
Detecting SQL injection attacks (SQLIAs) is becoming increasingly important in database-driven web sites. Until now, most of the studies on SQLIA detection have focused on the structured query language (SQL) structure at the application level. Unfortunately, this approach inevitably fails to detect those attacks that use already stored procedure and data within the database system. In this paper, we propose a framework to detect SQLIAs at database level by using SVM classification and various kernel functions. The key issue of SQLIA detection framework is how to represent the internal query tree collected from database log suitable for SVM classification algorithm in order to acquire good performance in detecting SQLIAs. To solve the issue, we first propose a novel method to convert the query tree into an n-dimensional feature vector by using a multi-dimensional sequence as an intermediate representation. The reason that it is difficult to directly convert the query tree into an n-dimensional feature vector is the complexity and variability of the query tree structure. Second, we propose a method to extract the syntactic features, as well as the semantic features when generating feature vector. Third, we propose a method to transform string feature values into numeric feature values, combining multiple statistical models. The combined model maps one string value to one numeric value by containing the multiple characteristic of each string value. In order to demonstrate the feasibility of our proposals in practical environments, we implement the SQLIA detection system based on PostgreSQL, a popular open source database system, and we perform experiments. The experimental results using the internal query trees of PostgreSQL validate that our proposal is effective in detecting SQLIAs, with at least 99.6% of the probability that the probability for malicious queries to be correctly predicted as SQLIA is greater than the probability for normal queries to be incorrectly predicted as SQLIA. Finally, we perform additional experiments to compare our proposal with syntax-focused feature extraction and single statistical model based on feature transformation. The experimental results show that our proposal significantly increases the probability of correctly detecting SQLIAs for various SQL statements, when compared to the previous methods. 相似文献
42.
43.
David F. Barrero Julio César Hernández‐Castro Pedro Peris‐Lopez David Camacho María D. R‐Moreno 《Expert Systems》2014,31(1):9-19
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack. 相似文献
44.
X-ray microtomography (microCT) of the progression of sulfate attack of cement paste 总被引:2,自引:0,他引:2
High-resolution X-ray computed tomography (i.e., microCT or microtomography) was used to study the sulfate attack of cylinders of Type I cement paste cast with water-cement (w/c) ratios of 0.45, 0.50 and 0.60. Damage levels in samples exposed to a Na2SO4 solution with 10,000 ppm sulfate ion concentration were qualitatively rated from 0 (no damage) to 4 (extreme damage) based upon visual examination of the samples' exteriors and microtomography of the samples' interiors. The greater the w/c ratio, the more rapid the onset of sulfate damage. The corners of the cylinders appeared to be particularly susceptible to spalling, and damage may have continued into the cement paste by formation of subsurface cracks. 相似文献
45.
格式化文本水印性能评估基准研究 总被引:2,自引:0,他引:2
针对目前没有测试基准对格式化文本水印算法鲁棒性进行评估和比较,提出了格式化文本水印性能评估基准.回顾了水印系统通用的框架,分析并确定了影响水印系统性能的参数和文本文档的视觉质量评级标准.借鉴图像水印性能评估基准的攻击分类,提出了Word特有的去除攻击、几何攻击、密码攻击和协议攻击的攻击分类方法,同时阐述了Word特有的攻击模式.对两种不同的文本水印算法进行了攻击强度—鲁棒性、攻击强度—视觉质量和嵌入数据量—鲁棒性测试,实验结果表明,该系统在文本水印算法评估和设计中具有有效性和实用性. 相似文献
46.
47.
48.
针对传统可信网络中存在会话密钥协商过程易受中间人攻击的不足,提出改进的可信网络连接机制。该机制基于椭圆曲线Diffie-Hellman( ECDH)算法实现会话密钥的安全协商,用户与节点使用私钥和随机数完成会话密钥的计算。分析表明改进的密钥协商协议具有抗中间人攻击、高效性等特点,会话密钥具有前向安全性及较强的新鲜性和保密性。 相似文献
49.
对新近提出的两个高效无证书签名方案进行安全性分析,指出这两个签名方案都能受到替换公钥攻击。任意攻击者都可以通过替换签名人的公钥从而达到对任意选择的消息成功伪造签名,分析这两个签名方案能受到替换公钥攻击的根本原因。最后通过这两个攻击总结分析了无证书签名方案设计过程需要注意的要点,这对无证书签名方案的设计具有借鉴意义。 相似文献
50.