全文获取类型
收费全文 | 888篇 |
免费 | 136篇 |
国内免费 | 152篇 |
专业分类
电工技术 | 40篇 |
综合类 | 62篇 |
化学工业 | 5篇 |
金属工艺 | 2篇 |
机械仪表 | 6篇 |
建筑科学 | 22篇 |
矿业工程 | 7篇 |
能源动力 | 1篇 |
轻工业 | 4篇 |
石油天然气 | 1篇 |
武器工业 | 7篇 |
无线电 | 232篇 |
一般工业技术 | 28篇 |
冶金工业 | 35篇 |
自动化技术 | 724篇 |
出版年
2024年 | 13篇 |
2023年 | 47篇 |
2022年 | 45篇 |
2021年 | 41篇 |
2020年 | 68篇 |
2019年 | 33篇 |
2018年 | 27篇 |
2017年 | 42篇 |
2016年 | 46篇 |
2015年 | 27篇 |
2014年 | 72篇 |
2013年 | 52篇 |
2012年 | 82篇 |
2011年 | 111篇 |
2010年 | 70篇 |
2009年 | 89篇 |
2008年 | 67篇 |
2007年 | 70篇 |
2006年 | 45篇 |
2005年 | 51篇 |
2004年 | 31篇 |
2003年 | 15篇 |
2002年 | 15篇 |
2001年 | 7篇 |
2000年 | 2篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1994年 | 1篇 |
排序方式: 共有1176条查询结果,搜索用时 8 毫秒
161.
162.
谭俊中 《信息安全与通信保密》2007,(5):158-160
文章描述了代数攻击的一般原理和可攻击的流密码类型,针对带记忆非线性组合流密码的代数攻击,基于Courtios等人的工作,给出了一种新的寻找可用于代数攻击的低阶多元方程的方法。 相似文献
163.
164.
无线传感器网络(WSN)容易受到恶意攻击,而现有的基于身份的密码体制带来了私钥托管问题,对此提出了一种基于身份的分簇认证(IDC)算法。首先,算法没有私钥生成中心(PRKG),只有一个公钥生成中心(PUKG)用来生成申请者的公钥,而由用户单独选定自己的私钥,真正解决了基于身份的密码体制中存在的密钥托管问题。同时,算法动态生成的伪秘矩阵可以杜绝合谋攻击,保证了算法的安全性。最后,针对节点自身拥有资源的差异,采用分层分级处理,一次完成(解)签密,降低了节点的计算量和存储量。在时间消耗和能量消耗两个方面,新提出的IDC算法比同类型的三种算法减少20%以上;在算法鲁棒性方面,当网络数据包快速增大时,IDC算法表现更加平稳,即能量消耗介于1 mJ到10 mJ之间,跨度不大于1.3 mJ;而该算法的时间消耗一直保持在0.002~0.006 s。模拟实验表明,新提出的IDC算法更加适用于对安全性和能量消耗要求严格的WSN。 相似文献
165.
Secure routing in mobile wireless ad hoc networks 总被引:3,自引:0,他引:3
We discuss several well known contemporary protocols aimed at securing routing in mobile wireless ad hoc networks. We analyze each of these protocols against requirements of ad hoc routing and in some cases identify fallibilities and make recommendations to overcome these problems so as to improve the overall efficacy of these protocols in securing ad hoc routing, without adding any significant computational or communication overhead. 相似文献
166.
Eidelson Roy J.; D'Alessio Gerard R.; Eidelson Judy I. 《Canadian Metallurgical Quarterly》2003,34(2):144
A variety of recent research studies have investigated the psychological impact on victims of the devastating events of September 11, 2001. The present study adopted a different approach, instead focusing on the experience of caregivers through a brief survey of state psychological association members. Overall, practitioners described modest but significant changes in both their professional work and their personal lives. Not surprisingly, those respondents working closest to Ground Zero reported the greatest changes. The sample also reported more positive than negative feelings regarding their work in the post-9/11 environment. Although the survey return rate was only 15%, the findings shed light on several important professional issues related to disaster relief, including service utilization, preparedness, and vicarious traumatization. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
167.
Can expatriates witnessing the attack of their country from afar develop acute and posttraumatic stress reactions? In Brussels 50 expatriate Americans were surveyed in the 10 weeks following September 11. Of the sample, 10% (n=5) showed acute stress disorder in the 1st week, and 4% (n=2) persisted with traumatic stress indications in the following weeks. All participants showed symptoms of distress, including derealization, reexperiencing the event, avoidance, heightened arousal, trouble working, and assault on world assumptions. For most, symptoms diminished over time. Increased psychological readiness in terms of assessment, prevention, and treatment methods is called for in response to mass terrorism. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
168.
Watermarking,as a technique for copyright pro-tection,has drawn significant attention from manyresearchers and there has been intensive research inthis areainrecent years.Robustness of watermarkingstill remains one of the key issues for practical appli-cations.Aserious problemconstrainingsome practicalexplorations of watermarking technologyis the insuf-ficient robustness of existing watermarking algorithmsagainst geometric distortionsuch as rotation,scaling,and translation(RST),etc[1].Designi… 相似文献
169.
The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the attack, timing information on encryption processing is used to select and collect effective plaintexts for attack. Then the collected plaintexts are utilized to infer the expanded key differences of the secret key, from which most bits of the expanded secret key are recovered. The remaining bits of the expanded secret key are deduced by the correlations between Hamming weight values of the input of the S-boxes in the first-round. Finally, from the linear relation of the encryption time and the secret key's Hamming weight, the entire 56 bits of the secret key are thoroughly recovered. Using the attack, the minimal cost encryption scheme can be broken with 223 known plaintexts and about 221 calculations at a success rate a>99%. The attack has lower computing complexity, and the method is more effective than other previous methods. 相似文献
170.
现代社会,互联网成为了人民生活的基础设施,网络安全就显得尤为重要。DDOS攻击给网络服务的正常运行会带来不可估量的损失,而现有的DDOS攻击防御方法以保护服务器为初衷,使得过度保护而影响了用户使用权益。文章设计并提出在以用户访问权益为优先考虑的情况下,通过网络数据包捕获、分析与功能限制模组、验证码、黑名单四大模块实现,缓解DDos攻击对服务器造成的过大伤害并使服务器维持运行持续提高服务的方法,通过实验可以有效保障服务器运行的同时抵抗DDOS攻击带来的风险。 相似文献