全文获取类型
收费全文 | 9097篇 |
免费 | 1519篇 |
国内免费 | 926篇 |
专业分类
电工技术 | 171篇 |
综合类 | 854篇 |
化学工业 | 3046篇 |
金属工艺 | 274篇 |
机械仪表 | 70篇 |
建筑科学 | 391篇 |
矿业工程 | 302篇 |
能源动力 | 82篇 |
轻工业 | 586篇 |
水利工程 | 70篇 |
石油天然气 | 281篇 |
武器工业 | 214篇 |
无线电 | 1187篇 |
一般工业技术 | 462篇 |
冶金工业 | 458篇 |
原子能技术 | 41篇 |
自动化技术 | 3053篇 |
出版年
2024年 | 67篇 |
2023年 | 201篇 |
2022年 | 369篇 |
2021年 | 387篇 |
2020年 | 361篇 |
2019年 | 317篇 |
2018年 | 312篇 |
2017年 | 366篇 |
2016年 | 370篇 |
2015年 | 434篇 |
2014年 | 653篇 |
2013年 | 661篇 |
2012年 | 767篇 |
2011年 | 813篇 |
2010年 | 633篇 |
2009年 | 606篇 |
2008年 | 569篇 |
2007年 | 637篇 |
2006年 | 533篇 |
2005年 | 498篇 |
2004年 | 373篇 |
2003年 | 345篇 |
2002年 | 259篇 |
2001年 | 211篇 |
2000年 | 192篇 |
1999年 | 154篇 |
1998年 | 102篇 |
1997年 | 72篇 |
1996年 | 62篇 |
1995年 | 46篇 |
1994年 | 40篇 |
1993年 | 27篇 |
1992年 | 17篇 |
1991年 | 18篇 |
1990年 | 15篇 |
1989年 | 6篇 |
1988年 | 10篇 |
1987年 | 7篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1984年 | 6篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1979年 | 2篇 |
1977年 | 2篇 |
1974年 | 1篇 |
1972年 | 1篇 |
1962年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
《Expert systems with applications》2014,41(11):5416-5430
Detecting SQL injection attacks (SQLIAs) is becoming increasingly important in database-driven web sites. Until now, most of the studies on SQLIA detection have focused on the structured query language (SQL) structure at the application level. Unfortunately, this approach inevitably fails to detect those attacks that use already stored procedure and data within the database system. In this paper, we propose a framework to detect SQLIAs at database level by using SVM classification and various kernel functions. The key issue of SQLIA detection framework is how to represent the internal query tree collected from database log suitable for SVM classification algorithm in order to acquire good performance in detecting SQLIAs. To solve the issue, we first propose a novel method to convert the query tree into an n-dimensional feature vector by using a multi-dimensional sequence as an intermediate representation. The reason that it is difficult to directly convert the query tree into an n-dimensional feature vector is the complexity and variability of the query tree structure. Second, we propose a method to extract the syntactic features, as well as the semantic features when generating feature vector. Third, we propose a method to transform string feature values into numeric feature values, combining multiple statistical models. The combined model maps one string value to one numeric value by containing the multiple characteristic of each string value. In order to demonstrate the feasibility of our proposals in practical environments, we implement the SQLIA detection system based on PostgreSQL, a popular open source database system, and we perform experiments. The experimental results using the internal query trees of PostgreSQL validate that our proposal is effective in detecting SQLIAs, with at least 99.6% of the probability that the probability for malicious queries to be correctly predicted as SQLIA is greater than the probability for normal queries to be incorrectly predicted as SQLIA. Finally, we perform additional experiments to compare our proposal with syntax-focused feature extraction and single statistical model based on feature transformation. The experimental results show that our proposal significantly increases the probability of correctly detecting SQLIAs for various SQL statements, when compared to the previous methods. 相似文献
12.
13.
David F. Barrero Julio César Hernández‐Castro Pedro Peris‐Lopez David Camacho María D. R‐Moreno 《Expert Systems》2014,31(1):9-19
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack. 相似文献
14.
15.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent. 相似文献
16.
17.
18.
19.
A field experiment was conducted on an acid sulfate soil in Thailand to determine the effect of N fertilization practices on the fate of fertilizer-N and yield of lowland rice (Oryza sativa L.). A delayed broadcast application of ammonium phosphate sulfate (16-20-0) or urea was compared with basal incorporation of urea, deep placement of urea as urea supergranules (USG), and amendment of urea with a urease inhibitor. Deep placement of urea as USG significantly reduced floodwater urea- and ammoniacal-N concentrations following N application but did not reduce N loss, as determined from an15N balance, in this experiment where runoff loss was prevented. The urease inhibitor, phenyl phosphorodiamidate (PPD), had little effect on floodwater urea- and ammoniacal-N, and it did not reduce N loss. The floodwater pH never exceeded 4.5 in the 7 days following the first N applications, and application of 16-20-0 reduced floodwater pH by 0.1 to 0.3 units below the no-N control. The low floodwater pH indicated that ammonia volatilization was unimportant for all the N fertilization practices. Floodwater ammoniacal-N concentrations following application of urea or 16-20-0 were greater on this Sulfic Tropaquept than on an Andaqueptic Haplaquoll with near neutral pH and alkaline floodwater. The prolonged, high floodwater N concentrations on this Sulfic Tropaquept suggested that runoff loss of applied N might be a potentially serious problem when heavy rainfall or poor water control follow N fertilization. The unaccounted-for15N in the15N balances, which presumably represented gaseous N losses, ranged from 20 to 26% of the applied N and was unaffected by urea fertilization practice. Grain yield and N uptake were significantly increased with applied N, but grain yield was not significantly affected by urea fertilization practice. Yield was significantly lower (P = 0.05) for 16-20-0 than for urea; however, this difference in yield might be due to later application of P and hence delayed availability of P in the 16-20-0 treatment. 相似文献
20.