首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20724篇
  免费   2438篇
  国内免费   1866篇
电工技术   2176篇
技术理论   5篇
综合类   2129篇
化学工业   277篇
金属工艺   31篇
机械仪表   326篇
建筑科学   907篇
矿业工程   495篇
能源动力   331篇
轻工业   330篇
水利工程   399篇
石油天然气   149篇
武器工业   102篇
无线电   4466篇
一般工业技术   465篇
冶金工业   214篇
原子能技术   44篇
自动化技术   12182篇
  2024年   80篇
  2023年   242篇
  2022年   450篇
  2021年   625篇
  2020年   647篇
  2019年   459篇
  2018年   408篇
  2017年   552篇
  2016年   623篇
  2015年   724篇
  2014年   1924篇
  2013年   1468篇
  2012年   1965篇
  2011年   2145篇
  2010年   1569篇
  2009年   1593篇
  2008年   1610篇
  2007年   1763篇
  2006年   1470篇
  2005年   1238篇
  2004年   959篇
  2003年   851篇
  2002年   517篇
  2001年   354篇
  2000年   253篇
  1999年   138篇
  1998年   85篇
  1997年   54篇
  1996年   48篇
  1995年   30篇
  1994年   26篇
  1993年   16篇
  1992年   17篇
  1991年   10篇
  1990年   8篇
  1989年   8篇
  1988年   6篇
  1987年   2篇
  1986年   5篇
  1985年   20篇
  1984年   17篇
  1983年   16篇
  1982年   12篇
  1981年   5篇
  1980年   3篇
  1979年   3篇
  1958年   1篇
  1957年   1篇
  1956年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 107 毫秒
991.
992.
993.
信息安全检查是目前世界各国保障信息系统安全采取的常用手段。本文首先在重点描述美国使用较为成熟的信息安全检查机制、指标体系,及其各政府部门的得分和评级、列名排序等相关情况和方法的基础上,简单介绍了俄罗斯、英国和德国信息系统安全检查的现状。接着本文在介绍我国电力、保险、电信、税务行业信息系统安全检查状况的基础上,分析了目前国内信息系统安全检查工作中存在的主要问题。最后根据我国政府信息系统安全检查体系建设的现状,对我国下一步信息系统安全检查工作提出了看法。  相似文献   
994.
针对信息网日益突出的安全隐患,本文依据国家标准《信息安全技术信息系统等级保护安全设计技术要求》提出一种安全管理的技术平台实施方案。该方案从基础防护建设决策支持、安全有效性监管以及安全事件处理等方面,来满足管理者和技术人员的需求。  相似文献   
995.
随着网络的普及和发展,信息的安全问题日益突出,使得加强信息安全学科、专业和培训机构体系化建设刻不容缓。信息安全人才的培养需要从培养目标、专业定位、理论教学、实践教学和实验室建设等各个方面综合考虑,制定合理可行的信息安全人才培养模式。  相似文献   
996.
Public key certificates (PKCs) are used nowadays in several security protocols and applications, so as to secure data exchange via transport layer security channels, or to protect data at the application level by means of digital signatures. However, many security applications often fail to manage properly the PKCs, in particular when checking their validity status. These failures are partly due to the lack of experience (or training) of the users who configure these applications or protocols, and partly due to the scarce support offered by some common cryptographic libraries to the application developers. This paper describes the design and implementation of a light middleware dealing with certificate validation in a unified way. Our middleware exploits on one side the libraries that have already been defined or implemented for certificate validation, and it constructs a thin layer, which provides flexibility and security features to the upper layer applications. In our current approach, this layer boasts an integrated approach to support various certificate revocation mechanisms, it protects the applications from some common security attacks, and offers several configuration and performance options to the programmers and to the end users. We describe the architecture of this approach as well as its practical implementation in the form of a library based on the famous OpenSSL security library, and that can be easily integrated with other certificate‐aware security applications. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
997.
In recent years, network coding has emerged as a new communication paradigm that can significantly improve the efficiency of network protocols by requiring intermediate nodes to mix packets before forwarding them. Recently, several real-world systems have been proposed to leverage network coding in wireless networks. Although the theoretical foundations of network coding are well understood, a real-world system needs to solve a plethora of practical aspects before network coding can meet its promised potential. These practical design choices expose network coding systems to a wide range of attacks.We identify two general frameworks (inter-flow and intra-flow) that encompass several network coding-based systems proposed in wireless networks. Our systematic analysis of the components of these frameworks reveals vulnerabilities to a wide range of attacks, which may severely degrade system performance. Then, we identify security goals and design challenges in achieving security for network coding systems. Adequate understanding of both the threats and challenges is essential to effectively design secure practical network coding systems. Our paper should be viewed as a cautionary note pointing out the frailty of current network coding-based wireless systems and a general guideline in the effort of achieving security for network coding systems.  相似文献   
998.
Design of DL-based certificateless digital signatures   总被引:1,自引:0,他引:1  
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user’s public key as in the traditional public-key systems, the user’s real identity, such as user’s name or email address, becomes the user’s public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users’ behalf. This nature violates the “non-repudiation” requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user’s private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification.  相似文献   
999.
Eirik  Jan 《Computers & Security》2009,28(6):476-490
Empirical findings from surveys and in-depth interviews with information security managers and users indicate that a digital divide exists between these groups in terms of their views on and experience of information security practices. Information security professionals mainly regard users as an information security threat, whereas users believe themselves that they are an untapped resource for security work. The limited interaction between users and information security managers results in a lack of understanding for the other's point of view. These divergent views on and interpretations of information security mean that managers tend to base their practical method on unrealistic assumptions, resulting in management approaches that are poorly aligned with the dynamics of the users' working day.  相似文献   
1000.
Intrusion Detection System (IDS) is an important and necessary component in ensuring network security and protecting network resources and network infrastructures. How to build a lightweight IDS is a hot topic in network security. Moreover, feature selection is a classic research topic in data mining and it has attracted much interest from researchers in many fields such as network security, pattern recognition and data mining. In this paper, we effectively introduced feature selection methods to intrusion detection domain. We propose a wrapper-based feature selection algorithm aiming at building lightweight intrusion detection system by using modified random mutation hill climbing (RMHC) as search strategy to specify a candidate subset for evaluation, as well as using modified linear Support Vector Machines (SVMs) iterative procedure as wrapper approach to obtain the optimum feature subset. We verify the effectiveness and the feasibility of our feature selection algorithm by several experiments on KDD Cup 1999 intrusion detection dataset. The experimental results strongly show that our approach is not only able to speed up the process of selecting important features but also to yield high detection rates. Furthermore, our experimental results indicate that intrusion detection system with feature selection algorithm has better performance than that without feature selection algorithm both in detection performance and computational cost.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号