全文获取类型
收费全文 | 212篇 |
免费 | 33篇 |
国内免费 | 15篇 |
专业分类
电工技术 | 1篇 |
综合类 | 29篇 |
化学工业 | 4篇 |
矿业工程 | 1篇 |
武器工业 | 2篇 |
无线电 | 58篇 |
一般工业技术 | 3篇 |
自动化技术 | 162篇 |
出版年
2023年 | 3篇 |
2022年 | 2篇 |
2021年 | 12篇 |
2020年 | 3篇 |
2019年 | 7篇 |
2018年 | 5篇 |
2017年 | 13篇 |
2016年 | 7篇 |
2015年 | 3篇 |
2014年 | 15篇 |
2013年 | 9篇 |
2012年 | 24篇 |
2011年 | 31篇 |
2010年 | 18篇 |
2009年 | 15篇 |
2008年 | 16篇 |
2007年 | 22篇 |
2006年 | 21篇 |
2005年 | 12篇 |
2004年 | 10篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1996年 | 1篇 |
排序方式: 共有260条查询结果,搜索用时 109 毫秒
1.
本文结合HTH电路的复杂性等特征分析与实际应用现状,研究了HTH电路的具体检测技术方法并对当前热点技术进行对比分析,探讨了HTH电路检测方法的技术发展趋势。 相似文献
2.
3.
4.
随着互联网的迅猛发展,网页已经成为人们日常发布和获取信息的重要途径,给人们带来了极大的便利。然而,安全挑战也随之而来,层出不穷的网页入侵手段严重影响着互联网的长远应用和发展,尤其是网页挂马是一个十分泛滥的攻击方式,严重威胁着用户安全。针对此问题,本文提出了一种基于沙箱技术的检测系统,能够动态地检测和抵御网页木马攻击。在安全性上,所提系统通过高交互蜜罐中多个沙箱技术,动态地模拟网页木马攻击过程,进而能够分析和抵御应用层、系统层和内核层的恶意行为,实现了多层检测。在效率上,所提系统采用了轻量级的沙箱技术,在内核层涉及较少调用,着重在应用层HOOK相关API实现检测,提高了效率表现。实验评估分析表明,所提系统能够获得较好的性能。 相似文献
5.
Going vertical as in 3-D IC design, reduces the distance between vertical active silicon dies, allowing more dies to be placed closer to each other. However, putting 2-D IC into three-dimensional structure leads to thermal accumulation due to closer proximity of active silicon layers. Also the top die experiences a longer heat dissipation path. All these contribute to higher and non-uniform temperature variations in 3-D IC; higher temperature exacerbates negative bias temperature instability (NBTI). NBTI degrades CMOS transistor parameters such as delay, drain current and threshold voltage. While the impact of transistor aging is well understood from the device point of view, very little is known about its impact on security. We demonstrated that a hardware intruder could leverage this phenomenon to trigger the payload, without requiring a separate triggering circuit. In this paper we provide a detailed analysis on how tiers of 3-D ICs can be subject to exacerbated NBTI. We proposed to embed threshold voltage extractor circuit in conjunction with a novel NBTI-mitigation scheme as a countermeasure against such anticipated Trojans. We validated through post-layout and Monty Carlo simulations using 45 nm technology that our proposed solution against NBTI effects can compensate the NBTI-effects in the 3-D ICs. With the area overhead of 7% implemented in Mod-3 counter, our proposed solution can completely tolerate NBTI-induced degraded threshold voltage shift of up to 60%. 相似文献
6.
Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive data or modify original functionality, which may lead to huge economic losses and great harm to society. Therefore, it is very important to analyze the specific HT threats existing in the whole life cycle of integrated circuits (ICs), and perform protection against hardware Trojans. In this paper, we elaborate an IC market model to illustrate the potential HT threats faced by the parties involved in the model. Then we categorize the recent research advances in the countermeasures against HT attacks. Finally, the challenges and prospects for HT defense are illuminated. 相似文献
7.
Arash Nejat Seyed Mohammd Hossein Shekarian Morteza Saheb Zamani 《Microprocessors and Microsystems》2014
Hardware Trojan horses (HTHs) are among the most challenging treats to the security of integrated circuits. Path-delay fingerprinting has shown to be a promising HTH detection approach. However, previous work in this area incurs a large hardware cost or requires expensive testing techniques. Moreover, the relation between technology mapping and the efficiency of delay-based HTH detection have not yet been studied. In this paper, we present a HTH detection method which uses an effective test-vector selection scheme and a path-delay measurement structure. Furthermore, we demonstrate the large impact of technology mapping on the effectiveness of delay-based HTH detection. We also show that delay-based detection methods are highly scalable. In case of choosing an area-driven design strategy, the average HTH detection probability of our approach is about 63%, 78% and 90% if false alarm rate is 0%, 2% and 16%, respectively. However, with modifications in the technology mapping, the results show improvements to 85%, 94% and 99%, at the cost of about 20% area overhead. In addition, the efficiency of our method would not decrease for large benchmarks with thousands of gates. 相似文献
8.
信息化时代建设越来越发达,同时随着网络应用的深入网络安全问题也受到人们的重视,网络安全对于政府、军事、研究所等涉及保密工作的单位来说是很重要的,怎么样保证重要资料不被泄密是保密工作的核心重点。文章为大家详细地解析计算机网络泄密的一些方式策略。 相似文献
9.
10.
计算机病毒往往会利用计算机操作系统的弱点进行传播,提高系统的安全性是防病毒的一个重要方面。但完美的系统是不存在的,过于强调提高系统的安全性将使系统多数时间用于病毒检查,系统失去了可用性、实用性和易用性。另一方面,信息保密的要求让人们在泄密和抓住病毒之间无法选择。 相似文献