全文获取类型
收费全文 | 20724篇 |
免费 | 2438篇 |
国内免费 | 1866篇 |
专业分类
电工技术 | 2176篇 |
技术理论 | 5篇 |
综合类 | 2129篇 |
化学工业 | 277篇 |
金属工艺 | 31篇 |
机械仪表 | 326篇 |
建筑科学 | 907篇 |
矿业工程 | 495篇 |
能源动力 | 331篇 |
轻工业 | 330篇 |
水利工程 | 399篇 |
石油天然气 | 149篇 |
武器工业 | 102篇 |
无线电 | 4466篇 |
一般工业技术 | 465篇 |
冶金工业 | 214篇 |
原子能技术 | 44篇 |
自动化技术 | 12182篇 |
出版年
2024年 | 80篇 |
2023年 | 242篇 |
2022年 | 450篇 |
2021年 | 625篇 |
2020年 | 647篇 |
2019年 | 459篇 |
2018年 | 408篇 |
2017年 | 552篇 |
2016年 | 623篇 |
2015年 | 724篇 |
2014年 | 1924篇 |
2013年 | 1468篇 |
2012年 | 1965篇 |
2011年 | 2145篇 |
2010年 | 1569篇 |
2009年 | 1593篇 |
2008年 | 1610篇 |
2007年 | 1763篇 |
2006年 | 1470篇 |
2005年 | 1238篇 |
2004年 | 959篇 |
2003年 | 851篇 |
2002年 | 517篇 |
2001年 | 354篇 |
2000年 | 253篇 |
1999年 | 138篇 |
1998年 | 85篇 |
1997年 | 54篇 |
1996年 | 48篇 |
1995年 | 30篇 |
1994年 | 26篇 |
1993年 | 16篇 |
1992年 | 17篇 |
1991年 | 10篇 |
1990年 | 8篇 |
1989年 | 8篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1986年 | 5篇 |
1985年 | 20篇 |
1984年 | 17篇 |
1983年 | 16篇 |
1982年 | 12篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1958年 | 1篇 |
1957年 | 1篇 |
1956年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 107 毫秒
991.
992.
993.
信息安全检查是目前世界各国保障信息系统安全采取的常用手段。本文首先在重点描述美国使用较为成熟的信息安全检查机制、指标体系,及其各政府部门的得分和评级、列名排序等相关情况和方法的基础上,简单介绍了俄罗斯、英国和德国信息系统安全检查的现状。接着本文在介绍我国电力、保险、电信、税务行业信息系统安全检查状况的基础上,分析了目前国内信息系统安全检查工作中存在的主要问题。最后根据我国政府信息系统安全检查体系建设的现状,对我国下一步信息系统安全检查工作提出了看法。 相似文献
994.
995.
随着网络的普及和发展,信息的安全问题日益突出,使得加强信息安全学科、专业和培训机构体系化建设刻不容缓。信息安全人才的培养需要从培养目标、专业定位、理论教学、实践教学和实验室建设等各个方面综合考虑,制定合理可行的信息安全人才培养模式。 相似文献
996.
Public key certificates (PKCs) are used nowadays in several security protocols and applications, so as to secure data exchange via transport layer security channels, or to protect data at the application level by means of digital signatures. However, many security applications often fail to manage properly the PKCs, in particular when checking their validity status. These failures are partly due to the lack of experience (or training) of the users who configure these applications or protocols, and partly due to the scarce support offered by some common cryptographic libraries to the application developers. This paper describes the design and implementation of a light middleware dealing with certificate validation in a unified way. Our middleware exploits on one side the libraries that have already been defined or implemented for certificate validation, and it constructs a thin layer, which provides flexibility and security features to the upper layer applications. In our current approach, this layer boasts an integrated approach to support various certificate revocation mechanisms, it protects the applications from some common security attacks, and offers several configuration and performance options to the programmers and to the end users. We describe the architecture of this approach as well as its practical implementation in the form of a library based on the famous OpenSSL security library, and that can be easily integrated with other certificate‐aware security applications. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
997.
Secure network coding for wireless mesh networks: Threats, challenges, and directions 总被引:1,自引:0,他引:1
In recent years, network coding has emerged as a new communication paradigm that can significantly improve the efficiency of network protocols by requiring intermediate nodes to mix packets before forwarding them. Recently, several real-world systems have been proposed to leverage network coding in wireless networks. Although the theoretical foundations of network coding are well understood, a real-world system needs to solve a plethora of practical aspects before network coding can meet its promised potential. These practical design choices expose network coding systems to a wide range of attacks.We identify two general frameworks (inter-flow and intra-flow) that encompass several network coding-based systems proposed in wireless networks. Our systematic analysis of the components of these frameworks reveals vulnerabilities to a wide range of attacks, which may severely degrade system performance. Then, we identify security goals and design challenges in achieving security for network coding systems. Adequate understanding of both the threats and challenges is essential to effectively design secure practical network coding systems. Our paper should be viewed as a cautionary note pointing out the frailty of current network coding-based wireless systems and a general guideline in the effort of achieving security for network coding systems. 相似文献
998.
Design of DL-based certificateless digital signatures 总被引:1,自引:0,他引:1
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user’s public key as in the traditional public-key systems, the user’s real identity, such as user’s name or email address, becomes the user’s public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users’ behalf. This nature violates the “non-repudiation” requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user’s private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification. 相似文献
999.
Empirical findings from surveys and in-depth interviews with information security managers and users indicate that a digital divide exists between these groups in terms of their views on and experience of information security practices. Information security professionals mainly regard users as an information security threat, whereas users believe themselves that they are an untapped resource for security work. The limited interaction between users and information security managers results in a lack of understanding for the other's point of view. These divergent views on and interpretations of information security mean that managers tend to base their practical method on unrealistic assumptions, resulting in management approaches that are poorly aligned with the dynamics of the users' working day. 相似文献
1000.
Intrusion Detection System (IDS) is an important and necessary component in ensuring network security and protecting network resources and network infrastructures. How to build a lightweight IDS is a hot topic in network security. Moreover, feature selection is a classic research topic in data mining and it has attracted much interest from researchers in many fields such as network security, pattern recognition and data mining. In this paper, we effectively introduced feature selection methods to intrusion detection domain. We propose a wrapper-based feature selection algorithm aiming at building lightweight intrusion detection system by using modified random mutation hill climbing (RMHC) as search strategy to specify a candidate subset for evaluation, as well as using modified linear Support Vector Machines (SVMs) iterative procedure as wrapper approach to obtain the optimum feature subset. We verify the effectiveness and the feasibility of our feature selection algorithm by several experiments on KDD Cup 1999 intrusion detection dataset. The experimental results strongly show that our approach is not only able to speed up the process of selecting important features but also to yield high detection rates. Furthermore, our experimental results indicate that intrusion detection system with feature selection algorithm has better performance than that without feature selection algorithm both in detection performance and computational cost. 相似文献