首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   269篇
  免费   22篇
  国内免费   3篇
电工技术   2篇
综合类   1篇
化学工业   105篇
金属工艺   6篇
机械仪表   4篇
建筑科学   4篇
能源动力   17篇
轻工业   14篇
水利工程   12篇
石油天然气   12篇
无线电   12篇
一般工业技术   64篇
冶金工业   9篇
原子能技术   11篇
自动化技术   21篇
  2023年   4篇
  2022年   7篇
  2021年   11篇
  2020年   8篇
  2019年   12篇
  2018年   21篇
  2017年   14篇
  2016年   21篇
  2015年   11篇
  2014年   12篇
  2013年   24篇
  2012年   10篇
  2011年   20篇
  2010年   20篇
  2009年   19篇
  2008年   17篇
  2007年   9篇
  2006年   6篇
  2005年   8篇
  2004年   6篇
  2003年   6篇
  2002年   5篇
  2001年   1篇
  2000年   2篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1982年   2篇
  1981年   1篇
排序方式: 共有294条查询结果,搜索用时 15 毫秒
291.
292.
Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use different spamming techniques on a cloud server, the attacker will be intercepted through two effective techniques: Cloudflare and K-nearest neighbors (KNN) classification. Cloudflare will block those IP addresses that the attacker will use and prevent spamming attacks. However, the KNN classifiers will determine which area the spammer belongs to. At the end of the article, various prevention techniques for securing cloud servers will be discussed, a comparison will be made with different papers, a conclusion will be drawn based on different results.  相似文献   
293.
Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double encryption algorithm will be implemented to send data in a secure format. First, the XOR function will be applied to plain text, and then salt technique will be used. Finally, a reversing mechanism will be implemented on that data to provide more data security. To decrypt data, the cipher text will be reversed, salt will be removed, and XOR will be implemented. At the end of the paper, the proposed algorithm will be compared with other algorithms, and it will conclude how much better the existing algorithm is than other algorithms.  相似文献   
294.
Clean Technologies and Environmental Policy - Experts are increasingly interested in incorporating environmental and climate action into all projects. Mining projects face a broader range of...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号