首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   103500篇
  免费   14317篇
  国内免费   10342篇
电工技术   15786篇
技术理论   9篇
综合类   12129篇
化学工业   3915篇
金属工艺   2079篇
机械仪表   5295篇
建筑科学   4136篇
矿业工程   2558篇
能源动力   2276篇
轻工业   1491篇
水利工程   2056篇
石油天然气   1841篇
武器工业   1008篇
无线电   21074篇
一般工业技术   4486篇
冶金工业   1854篇
原子能技术   282篇
自动化技术   45884篇
  2024年   903篇
  2023年   2377篇
  2022年   4403篇
  2021年   4745篇
  2020年   4802篇
  2019年   3448篇
  2018年   2841篇
  2017年   3275篇
  2016年   3424篇
  2015年   3895篇
  2014年   6664篇
  2013年   5990篇
  2012年   7575篇
  2011年   7904篇
  2010年   6157篇
  2009年   6607篇
  2008年   6864篇
  2007年   7644篇
  2006年   6470篇
  2005年   5839篇
  2004年   4907篇
  2003年   4358篇
  2002年   3462篇
  2001年   2930篇
  2000年   2451篇
  1999年   2006篇
  1998年   1493篇
  1997年   1209篇
  1996年   990篇
  1995年   744篇
  1994年   540篇
  1993年   370篇
  1992年   240篇
  1991年   150篇
  1990年   119篇
  1989年   94篇
  1988年   57篇
  1987年   30篇
  1986年   35篇
  1985年   33篇
  1984年   20篇
  1983年   20篇
  1982年   27篇
  1981年   7篇
  1980年   3篇
  1979年   8篇
  1975年   3篇
  1963年   3篇
  1959年   4篇
  1951年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
802.11n技术在高校的无线校园网的建设规划过程中逐渐成为焦点,本文在对802.11n关键技术介绍的基础上,讨论了在无线校园网规划、无线设备选型、有线无线一体化、电源配套等关键因素。  相似文献   
992.
993.
ABSTRACT

Social engineering is a methodology that allows an attacker to bypass technical controls by attacking the human element in an organization. There are many techniques commonly used in social engineering including but not limited to Trojan and phishing email messages, impersonation, persuasion, bribery, shoulder surfing, and dumpster diving. Hackers rely on social engineering attacks to bypass technical controls by focusing on the human factors. Social engineers often exploit the natural tendency people have toward trusting others who seem likeable or credible, deferring to authority or need to acquiesce to social conformity. Mitigation of social engineering begins with good policy and awareness training, but there are a number of other approaches an organization can take to defend against this type of an attack. Social engineering attacks are likely to increase, and it is becoming increasingly important for organizations to address this issue.  相似文献   
994.
ABSTRACT

Information technology organizations within most corporations are spending significant time and resources securing IT infrastructure. This increased need for security is driven by a number of factors. These factors include increased dependency on the Internet, financial and legal liability, protection of personal identity information and sensitive corporate data, increased numbers and age of legacy systems with limited vendor support, deploying complex systems, and new regulations governing corporate transactions. There a number of technologies on the market today that can mitigate most of these security factors. However, managers in IT organizations need to identify potential future threats and security technologies to assess and potentially mitigate risk through the deployment of those technologies. This article investigates three areas critical to the successful deployment and securing of information technology.  相似文献   
995.
ABSTRACT

Insider threats pose significant challenges to any organization. Many solutions have been proposed in the past to detect insider threats. Unfortunately, given the complexity of the problem and the human factors involved, many solutions which have been proposed face strict constraints and limitations when it comes to the working environment. As a result, many past insider threat solutions have in practice failed in their implementations. In this work, we review some of the recent insider threat detection solutions and explore their benefits and limitations. We also discuss insider threat issues for emerging areas such as cloud computing, virtualization, and social networking.  相似文献   
996.
无线传感器网络能够很好地解决海洋平台结构检测中遇到的很多问题。对无线传感器网络这一无线通信中的热点领域在无线传感器网络体系构架、大规模组网技术及网络管理、环境感知技术、数据采集技术以及信息处理技术等方面进行了应用研究,以期能将该项技术应用于我国海洋平台结构的安全检测中。  相似文献   
997.
ABSTRACT

Firewalls are one of the most widely used security devices to protect a communications network. They help secure it by blocking unwanted traffic from entering or leaving the protected network. Several commercial vendors have extended their firewall capabilities to support SCADA protocols or designed SCADA-specific firewalls. Although open-source firewalls are used successfully in IT networks, their use in SCADA networks has not been properly investigated. In this research we investigate the major open-source firewalls for their use in SCADA networks and identify Linux iptables’ potential as an effective SCADA firewall. Iptables is a powerful open-source firewall solution available as part of most Linux distributions in use today. In general, use of iptables as a network-level firewall for SCADA systems has been limited to basic port and host filtering, without further inspection of control messages. We propose and demonstrate a novel methodology to use iptables as an effective firewall for SCADA systems. This is achieved by utilizing advanced iptables features that allow for dynamic inspection of packet data. It is noteworthy to mention that the proposed solution does not require any modification to the netfilter/iptables framework, making it possible to turn a Linux system into an effective SCADA firewall. The approach has been tested by defining filtering rules for the Modbus TCP protocol and validating its ability to defend against various attacks on the protocol.  相似文献   
998.
给出了采用ADXL335加速度传感器来采集五个手指和手背的加速度三轴信息,并通过ZigBee无线网络传输来提取手势特征量,同时利用BP神经网络算法进行误差分析来实现手势识别的设计方法。最后,通过Matlab验证,结果表明,该系统在测试中识别率较高,系统稳定。  相似文献   
999.
水声网络路由协议是水声网络研究的一个热点问题。水声网络路由协议面临着节点能量有限、带宽窄、高传播延迟等的限制。本文从能量和延迟角度出发,设计了一种能量平衡和延迟约束的路由协议。该协议通过感知周边节点能量和负载,使得节点在选择转发节点时尽量选择剩余能量高的节点,同时在网络负载较高时能有效避开网络拥塞区域,从而在能量均衡的同时降低数据包的端到端延迟。  相似文献   
1000.
无线传感器网络的应用日益广泛,然而在环境恶劣的野外,数据的采集与发送将受到很大的限制。而建立一个基站作为一个中继,可以很好地沟通节点和终端,从而在很大程度上提高数据的可靠性和有效性。此外,对于不同类型的数据,采用自适应方式选择传输网络进行传输,也可以充分利用有限的网络资源来提高效率。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号