全文获取类型
收费全文 | 48732篇 |
免费 | 5197篇 |
国内免费 | 3727篇 |
专业分类
电工技术 | 5393篇 |
技术理论 | 7篇 |
综合类 | 5128篇 |
化学工业 | 3711篇 |
金属工艺 | 905篇 |
机械仪表 | 1617篇 |
建筑科学 | 4226篇 |
矿业工程 | 1566篇 |
能源动力 | 1409篇 |
轻工业 | 2252篇 |
水利工程 | 1514篇 |
石油天然气 | 2682篇 |
武器工业 | 335篇 |
无线电 | 6692篇 |
一般工业技术 | 3433篇 |
冶金工业 | 1551篇 |
原子能技术 | 702篇 |
自动化技术 | 14533篇 |
出版年
2024年 | 208篇 |
2023年 | 618篇 |
2022年 | 1396篇 |
2021年 | 1733篇 |
2020年 | 1608篇 |
2019年 | 1216篇 |
2018年 | 1154篇 |
2017年 | 1448篇 |
2016年 | 1684篇 |
2015年 | 1824篇 |
2014年 | 3574篇 |
2013年 | 3285篇 |
2012年 | 3904篇 |
2011年 | 4351篇 |
2010年 | 3215篇 |
2009年 | 3294篇 |
2008年 | 3179篇 |
2007年 | 3608篇 |
2006年 | 3123篇 |
2005年 | 2655篇 |
2004年 | 2114篇 |
2003年 | 1823篇 |
2002年 | 1390篇 |
2001年 | 1083篇 |
2000年 | 833篇 |
1999年 | 646篇 |
1998年 | 485篇 |
1997年 | 381篇 |
1996年 | 348篇 |
1995年 | 274篇 |
1994年 | 226篇 |
1993年 | 146篇 |
1992年 | 126篇 |
1991年 | 97篇 |
1990年 | 99篇 |
1989年 | 86篇 |
1988年 | 88篇 |
1987年 | 40篇 |
1986年 | 28篇 |
1985年 | 39篇 |
1984年 | 44篇 |
1983年 | 23篇 |
1982年 | 25篇 |
1981年 | 16篇 |
1980年 | 14篇 |
1964年 | 10篇 |
1961年 | 8篇 |
1960年 | 9篇 |
1959年 | 9篇 |
1955年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Preventive measures sometimes fail to defect malicious attacks. With attacks on data-intensive applications becoming an ever more serious threat, intrusion tolerant database systems are a significant concern. The main objective of such systems is to detect attacks, and to assess and repair the damage in a timely manner. This paper focuses on efficient damage assessment and repair in distributed database systems. The complexity caused by data partition, distributed transaction processing, and failures makes intrusion recovery much more challenging than in centralized database systems. This paper identifies the key challenges and presents an efficient algorithm for distributed damage assessment and repair. 相似文献
62.
Design of DL-based certificateless digital signatures 总被引:1,自引:0,他引:1
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user’s public key as in the traditional public-key systems, the user’s real identity, such as user’s name or email address, becomes the user’s public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users’ behalf. This nature violates the “non-repudiation” requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user’s private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification. 相似文献
63.
Loren Paul ReesAuthor VitaeJason K. DeaneAuthor Vitae Terry R. RakesAuthor VitaeWade H. BakerAuthor Vitae 《Decision Support Systems》2011,51(3):493-505
Security countermeasures help ensure the confidentiality, availability, and integrity of information systems by preventing or mitigating asset losses from Cybersecurity attacks. Due to uncertainty, the financial impact of threats attacking assets is often difficult to measure quantitatively, and thus it is difficult to prescribe which countermeasures to employ. In this research, we describe a decision support system for calculating the uncertain risk faced by an organization under cyber attack as a function of uncertain threat rates, countermeasure costs, and impacts on its assets. The system uses a genetic algorithm to search for the best combination of countermeasures, allowing the user to determine the preferred tradeoff between the cost of the portfolio and resulting risk. Data collected from manufacturing firms provide an example of results under realistic input conditions. 相似文献
64.
TIAN Wang-lan 《数字社区&智能家居》2008,(30)
在传感器网络中,电源能量是各个节点最宝贵的资源。为了使传感器网络的使用时间尽可能地长,必须合理有效地利用能量。该文从无线传感器网络的体系结构出发,对影响网络能源消耗的因素进行了研究。 相似文献
65.
入侵检测是保障现代网络安全的关键技术之一。对于像军队这样对安全要求很高的网络,入侵检测技术以及系统将会起到至关重要的作用。本文对入侵检测的基本概念、方法以及发展趋势进行了分析与研究。 相似文献
66.
YAN Wei-guang 《数字社区&智能家居》2008,(22)
该文针对大多数没有计算机专业知识的使用者,探讨了计算机安全问题的原因,并给出计算机安全使用、避免损失的方法。 相似文献
67.
从数据库安全需求着手,提出数据库加密要实现的目标,分析了数据库加密技术中几项关键技术并进行比较,最后对加密后系统产生的影响进行总结。 相似文献
68.
69.
70.