首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   557篇
  免费   80篇
  国内免费   81篇
电工技术   2篇
综合类   48篇
化学工业   4篇
机械仪表   8篇
建筑科学   6篇
矿业工程   1篇
轻工业   2篇
石油天然气   1篇
武器工业   1篇
无线电   156篇
一般工业技术   23篇
冶金工业   4篇
原子能技术   11篇
自动化技术   451篇
  2024年   4篇
  2023年   9篇
  2022年   28篇
  2021年   37篇
  2020年   31篇
  2019年   17篇
  2018年   16篇
  2017年   43篇
  2016年   41篇
  2015年   36篇
  2014年   76篇
  2013年   52篇
  2012年   58篇
  2011年   69篇
  2010年   48篇
  2009年   39篇
  2008年   33篇
  2007年   25篇
  2006年   19篇
  2005年   19篇
  2004年   9篇
  2003年   4篇
  2001年   1篇
  1998年   1篇
  1991年   1篇
  1981年   1篇
  1959年   1篇
排序方式: 共有718条查询结果,搜索用时 31 毫秒
71.
基于远程控制技术的动态取证系统   总被引:1,自引:0,他引:1       下载免费PDF全文
设计了一种新的基于远程控制技术的计算机取证系统,提供了3种不同取证方法动态获取控制目标的电子证据,研究了文件隐藏、进程隐藏、注册表修改隐藏、端口反弹、数据加密等关键技术。实验表明,该系统能动态获取网上不同监控对象的电子证据,是当前取证技术的一种新思路。  相似文献   
72.
基于计算机取证的ID3改进算法   总被引:2,自引:0,他引:2  
随着数据挖掘技术在计算机取证领域的应用,作为分类分析的经典算法ID3也相继出现在一些取证原型系统中,如何让原来不基于任何应用环境的ID3算法更适合计算机取证成为一个值得关注的课题.文章首先介绍了ID3算法,然后基于计算机取证的应用环境,从引入权值和两次信息增益的角度对算法进行了改进,最后通过举例,验证了该算法的先进性.  相似文献   
73.
张颖 《中国通信》2010,7(6):141-144
This paper addresses the issue of face and lip tracking via chromatic detector, CCL algorithm and canny edge detector. It aims to track face and lip region from static color images including frames read from videos, which is expected to be an important part of the robust and reliable person identification in the field of computer forensics. We use the M2VTS face database and pictures took from my colleagues as the test resource. This project is based on the concept of image processing and computer version.  相似文献   
74.
75.
计算机取证过程中,取证人员往往要对涉及MicrosoftOffice文件进行取证分析,以发现线索,获取证据,但是其安全性功能的设置往往对侦查人员的取证活动造成障碍,本文主要介绍一款名为AdvancedOfficePasswordRecovery(AOPR)的软件,该软件使用多种方法破解文件,获取密码,最终成功打开文件,以及在使用中的优点和应当注意的问题。  相似文献   
76.
入侵检测系统研究及其展望   总被引:6,自引:0,他引:6  
对入侵检测系统(IDS)作了简要的分析,把它与防火墙在功能上进行了较为深入的比较;主要阐述了入侵检测系统对计算机安全系统的重要性、入侵检测系统的分类和工作原理,并针对入侵检测系统的发展趋势展开了讨论。  相似文献   
77.
Current approaches to measuring people’s everyday usage of technology-based media and other computer-related activities have proved to be problematic as they use varied outcome measures, fail to measure behavior in a broad range of technology-related domains and do not take into account recently developed types of technology including smartphones. In the present study, a wide variety of items, covering a range of up-to-date technology and media usage behaviors. Sixty-six items concerning technology and media usage, along with 18 additional items assessing attitudes toward technology, were administered to two independent samples of individuals, comprising 942 participants. Factor analyses were used to create 11 usage subscales representing smartphone usage, general social media usage, Internet searching, e-mailing, media sharing, text messaging, video gaming, online friendships, Facebook friendships, phone calling, and watching television in addition to four attitude-based subscales: positive attitudes, negative attitudes, technological anxiety/dependence, and attitudes toward task-switching. All subscales showed strong reliabilities and relationships between the subscales and pre-existing measures of daily media usage and Internet addiction were as predicted. Given the reliability and validity results, the new Media and Technology Usage and Attitudes Scale was suggested as a method of measuring media and technology involvement across a variety of types of research studies either as a single 60-item scale or any subset of the 15 subscales.  相似文献   
78.
针对音频篡改被动取证的问题,提出了一种基于改进离散余弦变换(MDCT)域的盲检测方法.音频信号MDCT系数直方图可用广义高斯分布模型进行拟合.原始音频的广义高斯模型形状参数集中分布在一定的区间内,而篡改后的音频信号在篡改发生边界,其广义高斯模型的形状参数将发生明显变化,通过设置形状参数阈值区分音频信号是否遭受篡改.实验结果表明,对于改变音频内容的删除、替换和拼接操作,该方法在篡改检测和定位方面具备有效性.  相似文献   
79.
Network forensics supports capabilities such as attacker identification and attack reconstruction, which complement the traditional intrusion detection and perimeter defense techniques in building a robust security mechanism. Attacker identification pinpoints attack origin to deter future attackers, while attack reconstruction reveals attack causality and network vulnerabilities. In this paper, we discuss the problem and feasibility of back tracking the origin of a self-propagating stealth attack when given a network traffic trace for a sufficiently long period of time. We propose a network forensics mechanism that is scalable in computation time and space while maintaining high accuracy in the identification of the attack origin. We further develop a data reduction method to filter out attack-irrelevant data and only retain evidence relevant to potential attacks for a post-mortem investigation. Using real-world trace driven experiments, we evaluate the performance of the proposed mechanism and show that we can trim down up to 97% of attack-irrelevant network traffic and successfully identify attack origin.  相似文献   
80.
Older adults are becoming an important market segment for all internet-based services, but few studies to date have considered older adults as online shoppers and users of entertainment media. Utilising the concept of life course, this article investigates the use of mobile technologies for online shopping and entertainment among consumers aged 55 to 74. The data were collected with a web-based survey completed by a panel of respondents representing Finnish television viewers (N = 322). The results reveal that consumers aged 55 to 74 use a smartphone or tablet to purchase products or services online as often as younger consumers. In contrast, listening to internet radio and watching videos or programmes online with a smartphone or tablet are most typical for younger male consumers. The results demonstrate that mobile-based online shopping is best predicted by age, higher education, and household type (children living at home), and use of entertainment media by age and gender.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号