首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6305篇
  免费   1296篇
  国内免费   962篇
电工技术   333篇
综合类   771篇
化学工业   214篇
金属工艺   80篇
机械仪表   134篇
建筑科学   196篇
矿业工程   50篇
能源动力   45篇
轻工业   21篇
水利工程   60篇
石油天然气   22篇
武器工业   223篇
无线电   1649篇
一般工业技术   238篇
冶金工业   73篇
原子能技术   22篇
自动化技术   4432篇
  2024年   22篇
  2023年   130篇
  2022年   231篇
  2021年   244篇
  2020年   251篇
  2019年   212篇
  2018年   216篇
  2017年   241篇
  2016年   235篇
  2015年   320篇
  2014年   491篇
  2013年   471篇
  2012年   564篇
  2011年   624篇
  2010年   508篇
  2009年   498篇
  2008年   563篇
  2007年   587篇
  2006年   467篇
  2005年   436篇
  2004年   306篇
  2003年   257篇
  2002年   185篇
  2001年   107篇
  2000年   101篇
  1999年   60篇
  1998年   44篇
  1997年   40篇
  1996年   37篇
  1995年   23篇
  1994年   17篇
  1993年   21篇
  1992年   7篇
  1991年   8篇
  1990年   9篇
  1989年   3篇
  1988年   9篇
  1986年   3篇
  1985年   1篇
  1984年   3篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1975年   1篇
  1966年   1篇
  1961年   1篇
  1959年   1篇
排序方式: 共有8563条查询结果,搜索用时 31 毫秒
71.
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack.  相似文献   
72.
Olaf Ostwald 《Cryptologia》2017,41(5):395-421
“Breaking German Army Ciphers” is the title of a Cryptologia article from 2005, describing the lucky survival of several hundred authentic Enigma messages of World War II, and an account of a ciphertext-only cryptanalysis of a large number of these messages, leaving only a few (mostly short messages) unbroken. After reviewing the work done, and investigating the reasons for both lucky breaks and close misses, the modern ciphertext-only attack on Enigma messages is improved, especially on genuine ones with short lengths and/or many garbles. The difficulties of a proper measure for the candidate’s closeness to a plaintext are clarified. The influence on the decryption process of an empty plugboard and one with only a few correct plugs is examined. The method is extended by a partial exhaustion of the plugboard combined with an optimized hillclimbing strategy. The newly designed software succeeds in breaking formerly unbroken messages.  相似文献   
73.
随着企业规模的逐步扩大和计算机网络与企业信息技术的飞速发展,大中型企业陆续建立了很多业务系统,对各个系统之间数据同步的安全性提出了更高的需求。针对此需求,基于RabbitMQ消息队列中间件,本文设计并实现基于不可靠通信链路的数据共享模块,解决在企业内部两级数据中心之间的双向数据同步问题,并通过RabbitMQ的消息确认机制和持久化机制,保证数据的安全送达、无丢失。经过实践证明,该数据共享模块功能稳定,可提高两级数据中心的数据传输效率并保证其安全性。  相似文献   
74.
As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field. Specifically, the security of our scheme relies on the computational intractability of an unbalanced sparse polynomial ratio problem (DUSPR). Through theoretical analysis, we prove the correctness of our proposed cryptosystem. Furthermore, we implement our scheme using the NTL library, and conduct a group of experiments to evaluate the capabilities and consuming time of encryption and decryption. Our experiments result demonstrates that the NTRU-type public-key cryptosystem over the binary field is relatively practical and effective.  相似文献   
75.
ABSTRACT

Digital signature is the key issue in a number of innovative processes, such as dematerialization, e-government, e-commerce, and e-banking. Digital signature ensures both the identity of the user and the integrity of the digital document the user signs. However, despite the robustness of the underlying cryptographic primitives, a number of vulnerabilities derive from the radical difference between handwritten signature on papers and signature on digital documents. Indeed, digital documents are not directly observable because humans need a tool to interpret the bits of the document and to represent the corresponding information. The aim of this paper is to focus on the vulnerabilities of digital signature deriving from the “unobservability” of electronic documents. Possible mechanisms to contrast such vulnerabilities are also proposed, highlighting their positive and negative points under a perspective that does not ignore both practical and regulatory aspects.  相似文献   
76.
Road network robustness is the ability of a road network to operate correctly under a wide range of attacks. A structural robustness analysis can describe the survivability of a city road network that is under attack and can help improve functions such as urban planning and emergency response. In this paper, a novel approach is presented to quantitatively evaluate road network robustness based on the community structure derived from a city road network, in which communities refer to those densely connected subsets of nodes that are sparsely linked to the remaining network. First, a road network is reconstructed into a set of connected communities. Then, successive simulated attacks are conducted on the reconstructed road networks to test the performance of the networks under attack. The performance of the networks is represented by efficiency and the occurrence of fragmentation. Three attack strategies, including a random attack and two intentional attacks, are performed to evaluate the survivability of the road network under different situations. Contrary to the traditional road segment-based approach, the community-based robustness analysis on a city road network shows distinct structural diversity between communities, providing greater insight into network vulnerability under intentional attacks. Six typical city road networks on three different continents are used to demonstrate the proposed approach. The evaluation results reveal an important feature of the structure of city road networks from a community-based perspective, i.e., that the structure is robust under random failure but fragile under intentional attack. This result is highly consistent in different city road network forms.  相似文献   
77.
Unaided authentication services provide the flexibility to login without being dependent on any additional device. The power of recording attack resilient unaided authentication services (RARUAS) is undeniable as, in some aspects, they are even capable of offering better security than the biometric based authentication systems. However, high login complexity of these RARUAS makes them far from usable in practice. The adopted information leakage control strategies have often been identified as the primary cause behind such high login complexities. Though recent proposals havemade some significant efforts in designing a usable RARUAS by reducing its login complexity, most of them have failed to achieve the desired usability standard. In this paper, we have introduced a new notion of controlling the information leakage rate. By maintaining a good security standard, the introduced idea helps to reduce the login complexity of our proposed mechanism − named as Textual-Graphical Password-based Mechanism or TGPM, by a significant extent. Along with resisting the recording attack, TGPM also achieves a remarkable property of threat detection. To the best of our knowledge, TGPM is the first RARUAS, which can both prevent and detect the activities of the opportunistic recording attackers who can record the complete login activity of a genuine user for a few login sessions. Our study reveals that TGPM assures much higher session resiliency compared to the existing authentication services, having the same or even higher login complexities. Moreover, TGPM stores the password information in a distributed way and thus restricts the adversaries to learn the complete secret from a single compromised server. A thorough theoretical analysis has been performed to prove the strength of our proposal from both the security and usability perspectives. We have also conducted an experimental study to support the theoretical argument made on the usability standard of TGPM.  相似文献   
78.
介绍了我国开放非点对点消息网间互联互通的背景,并分阶段对我国实现非点对点消息网间互联互通的技术方案进行了介绍和分析。  相似文献   
79.
提出一种MAC漂移检测功能,该功能对端口间的MAC漂移进行实时统计,并根据统计结果作出适当处理,可以有效解决这一问题,并在多种实用场景中发挥重要作用。  相似文献   
80.
Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号