首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17篇
  免费   3篇
  国内免费   1篇
综合类   1篇
无线电   3篇
自动化技术   17篇
  2024年   1篇
  2023年   1篇
  2019年   1篇
  2018年   1篇
  2016年   1篇
  2015年   1篇
  2014年   4篇
  2012年   5篇
  2011年   1篇
  2010年   2篇
  2004年   3篇
排序方式: 共有21条查询结果,搜索用时 31 毫秒
1.
Information technology is becoming increasingly important for entrepreneurs. Protecting their technical infrastructure and stored data is, therefore, also becoming more vital. Nevertheless, research into the safety and security of entrepreneurs in general, and online threats targeted at entrepreneurs in particular, is still limited. This study investigates to what extent self-employed entrepreneurs protect themselves against online threats, and what motivates them to do so. Based on secondary analyses on data collected from 1622 Dutch entrepreneurs, we observe that the majority implement technical and personal coping measures. By adopting protection motivation theory as a theoretical basis for our study, we found that coping appraisal explains the adoption of protective measures. Entrepreneurs are likely to implement protective measures when they believe a measure is effective, when they are capable of using internet technology, when their attitude towards online protection is positive and when they believe they are responsible for their own online security. Although the secondary analysis provides some limitations, this study offers new insights into the usage of protective measures and the motivation for taking them. These insights can help to improve information security campaigns.  相似文献   
2.
The Dark Web, and the technology which underpins it, is fundamentally changing how crime is conducted. It is an enabler of cross-border, truly international crime where each of the major actors, evidence, and the proceeds of crime can all be in different jurisdictions. The technologies utilised mask the identity of individuals and the nature of the crimes committed. It is these complexities, and law’s inability to deal with them, which this paper will focus on. It critically analyses six intersecting and overlapping themes in order to highlight the technological challenges posed by the Dark Web to the criminal law. The paper argues that the current approaches, regulatory structures, legislation and investigative methods are all unfit for purpose. There is little to suggest the law is any closer to restricting Dark Web crime, particularly given a substantial amount of the challenges posed are unsolved traditional issues, in a new form.  相似文献   
3.
Case studies suggest a relationship between Asperger syndrome (AS) and computer hacking. The current study examined whether characteristics associated with AS were significantly related to hacking, cyberbullying, identity theft, and virus writing. Two hundred and ninety-six university undergraduate students completed an Internet-based anonymous survey measuring self-reported computer deviant behaviour and characteristics associated with AS (autism-spectrum quotient; AQ). Of the 296 university students, 179 (60%) engaged in some form of computer deviant behaviour, but only 2 (0.01%) yielded clinically significant scores according to the AQ. Contrary to the authors' expectations, hackers did not score higher on the AQ compared to non-computer hackers. However, virus writers, identity thieves, and cyberbullies scored higher on the AQ compared to their computer non-deviant counterparts. In addition, individuals who engaged in hacking, identity theft, cyberbullying, and virus writing scored higher on the AQ and reported poorer social skills, poorer communication, and poorer imagination compared to all other individuals engaging in computer deviant behaviours. Considerations for future research and study limitations are discussed.  相似文献   
4.
5.
乌蓓华 《中国通信》2010,7(6):145-147
With the sharp increase of hacking attacks over the last couple of years, web application security has become a key concern. SQL injection is one of the most common types of web hacking and has been widely written and used in the wild. This paper analyzes the principle of SQL injection attacks on Web sites, presents methods available to prevent IIS+ASP+MSSQL web applications from these kinds of attacks, including secure coding within the web application, proper database configuration, deployment of IIS. The result is verified by WVS report.  相似文献   
6.
Fake news and its significance carried the significance of affecting diverse aspects of diverse entities, ranging from a city lifestyle to a country global relativity, various methods are available to collect and determine fake news. The recently developed machine learning (ML) models can be employed for the detection and classification of fake news. This study designs a novel Chaotic Ant Swarm with Weighted Extreme Learning Machine (CAS-WELM) for Cybersecurity Fake News Detection and Classification. The goal of the CAS-WELM technique is to discriminate news into fake and real. The CAS-WELM technique initially pre-processes the input data and Glove technique is used for word embedding process. Then, N-gram based feature extraction technique is derived to generate feature vectors. Lastly, WELM model is applied for the detection and classification of fake news, in which the weight value of the WELM model can be optimally adjusted by the use of CAS algorithm. The performance validation of the CAS-WELM technique is carried out using the benchmark dataset and the results are inspected under several dimensions. The experimental results reported the enhanced outcomes of the CAS-WELM technique over the recent approaches.  相似文献   
7.
网络犯罪常用的攻击手法研究   总被引:1,自引:0,他引:1  
随着互联网的出现和快速发展,它为全人类建构起一个快捷、便利的虚拟世界。但与此同时,网络犯罪也层出不穷。本文希望通过对网络犯罪的一些常用攻击手法的探讨,能够引起人们对网络安全的足够重视。  相似文献   
8.
随着互联网技术的飞速发展,大量的网络案情信息存在于互联网上,这既给办案人员提供了一定的线索,同时又带来了很大的挑战。设计并实现了一种网络案情分析系统,利用自然语言处理技术识别出海量网络案情文件中网名和网址等信息,并构建它们之间的关系网络。针对不同类型的文件,分别采取结构化分析和以“规则和统计”相结合为主、用户辅助知识库为辅的网名识别技术。实验证明,将该方法应用于网络犯罪案情分析系统中,有助于办案人员快速侦破案情。  相似文献   
9.
信息时代的迅速发展,网络犯罪也随之迅速蔓延,本文介绍了网络犯罪的定义及表现形式,指出了目前我国对网络犯罪的刑法规制方面所存在的问题。并在此基础上提出了加强对网络犯罪的刑法规制的相关建议和措施。  相似文献   
10.
互联网络是把双刃剑,提供方便的同时,也引发了诸多问题。国内外学者从各个视角研究和探讨了网络犯罪,但到目前为止,国内外学者还未对网络犯罪概念形成统一的认识。笔者通过对国内学者的网络犯罪定义进行理解评析和综合概括,认为网络犯罪是指以互联网络为工具或者对象的犯罪形式,并将其分为网络工具型犯罪及网络对象型犯罪。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号