全文获取类型
收费全文 | 202篇 |
免费 | 12篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 1篇 |
综合类 | 15篇 |
化学工业 | 4篇 |
机械仪表 | 3篇 |
建筑科学 | 2篇 |
轻工业 | 2篇 |
水利工程 | 1篇 |
无线电 | 27篇 |
一般工业技术 | 8篇 |
冶金工业 | 5篇 |
自动化技术 | 153篇 |
出版年
2025年 | 2篇 |
2024年 | 7篇 |
2023年 | 4篇 |
2022年 | 5篇 |
2021年 | 8篇 |
2020年 | 7篇 |
2019年 | 6篇 |
2018年 | 8篇 |
2017年 | 6篇 |
2016年 | 16篇 |
2015年 | 9篇 |
2014年 | 14篇 |
2013年 | 20篇 |
2012年 | 22篇 |
2011年 | 30篇 |
2010年 | 12篇 |
2009年 | 9篇 |
2008年 | 8篇 |
2007年 | 6篇 |
2006年 | 8篇 |
2005年 | 4篇 |
2004年 | 5篇 |
2003年 | 1篇 |
2002年 | 3篇 |
2001年 | 1篇 |
排序方式: 共有221条查询结果,搜索用时 0 毫秒
1.
郭萍 《浙江纺织服装职业技术学院学报》2012,11(3):64-69
文章从钓鱼网站的种类和传播途径入手,重点分析了钓鱼网站的鉴别方法和防范措施,最后指出了打击钓鱼网站的难度. 相似文献
2.
随着信息技术的高速发展,越来越多的生产生活逐渐转移到网络空间进行,国民经济对网络空间的依赖也日益凸显.互联网带来便利的同时,越来越多的犯罪从传统线下转移到网络空间中进行,威胁人民群众的日常生活安全.因此,如何理解、评估、预防、打击网络犯罪,成为学术界、工业界和相关执法部门的关注重点.近年来,研究人员持续关注各种网络犯罪及对应的防范、评估、反制技术.但目前针对网络犯罪总体综述研究较少,亟需对网络犯罪产业链组成部分进行全面且详细的梳理.将以钓鱼(phishing)、诈骗(scam)、恶意挖矿(cryptojacking)等经典网络犯罪攻击方式为切入点,深入分析包括黑帽搜索引擎优化(Blackhat SEO)、误植域名(typosquatting)在内的相关支撑技术,详细揭露地下市场(underground market)、僵尸网络(Botnet)和洗钱渠道(money laundering)等网络犯罪基础设施,剖析网络犯罪产业链,最后讨论了网络犯罪研究中仍存在的挑战,并展望未来研究方向. 相似文献
3.
自中本聪提出比特币以来,区块链技术得到了跨越式发展,特别是在数字资产转移及电子货币支付方面。以太坊引入智能合约代码,使其具备了同步及保存智能合约程序执行状态,自动执行交易条件并消除对中介机构需求,Web3.0 开发者可利用以太坊提供的通用可编程区块链平台构建更加强大的去中心化应用。公链系统具备的特点,如无须中央节点控制、通过智能合约保障交互数据公开透明、用户数据由用户个人控制等,使得它在区块链技术发展的过程中吸引了更多的用户关注。然而,随着区块链技术的普及和应用,越来越多的用户将自己的数字资产存储在区块链上。由于缺少权威机构的监管及治理,以太坊等公链系统正逐步成为黑客窃取数字资产的媒介。黑客利用区块链实施诈骗及钓鱼攻击,盗取用户所持有的数字资产来获取利益。帮助读者建立区块链资产安全的概念,从源头防范利用区块链实施的资产窃取攻击。通过整理总结黑客利用区块链环境实施的资产窃取攻击方案,抽象并归纳威胁模型的研究方法,有效研究了各类攻击的特征及实施场景。通过深入分析典型攻击方法,比较不同攻击的优缺点,回答了攻击能够成功实施的根本原因。在防御技术方面,针对性结合攻击案例及攻击实施场景介绍了钓鱼检测、代币授权检测、代币锁定、去中心化代币所属权仲裁、智能合约漏洞检测、资产隔离、供应链攻击检测、签名数据合法性检测等防御方案。对于每一类防御方案,给出其实施的基本流程及方案,明确了各防护方案能够在哪类攻击场景下为用户资产安全提供防护。 相似文献
4.
随着互联网的不断发展,网络钓鱼给人们日常生活带来的威胁与日俱增.网络钓鱼识别技术是对抗钓鱼攻击的核心安全技术,可以帮助人们有效避免钓鱼攻击引起的安全威胁.首先,从网络钓鱼的基本概念入手,详细分析了网络钓鱼识别技术的研究现状,然后,对目前网络钓鱼识别的应用场景进行了归纳和总结,最后,对今后可能的研究方向进行了讨论. 相似文献
5.
Despite the popularity of JavaScript for client‐side web applications, there is a lack of effective software tools supporting JavaScript development and testing. The dynamic characteristics of JavaScript pose software engineering challenges such as program understanding and security. One important feature of JavaScript is that its objects support flexible mechanisms such as property changes at runtime and prototype‐based inheritance, making it difficult to reason about object behavior. We have performed an empirical study on real JavaScript applications to understand the dynamic behavior of JavaScript objects. We present metrics to measure behavior of JavaScript objects during execution (e.g., operations associated with an object, object size, and property type changes). We also investigated the behavioral patterns of observed objects to understand the coding or user interaction practices in JavaScript software. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
6.
This research challenges the presumption that reading online reviews solely affect reader attitudes toward a prospective decision. Instead, readers may strategically select and read reviews after a decision. This research advances and tests hypotheses proposing that: (1) post-decision readers select decision-supportive reviews earlier and more frequently; and (2) the reviews they read affect the subsequent cognitive dissonance they experienced. Two studies employed an original post-decision experiment and demonstrated that readers expressed biased review selection. Interestingly, the reviews they read affected and increased their cognitive dissonance. The findings contributed to understanding the complex dynamic of online reviews in a post-decision context. 相似文献
7.
Taher Habibzadeh 《Information & Communications Technology Law》2016,25(2):150-172
In the modern world, electronic communications play a significant role in national and international electronic transactions. This issue has forced all legal systems to face up to many emerging legal problems in the context of electronic communications, such as the legal status of electronic agents in contracting electronically. Regarding the legal validity of e-contracts made through interactive websites, the legal status of electronic agents which play an important role in this process is questionable to see whether they are akin to real agents in the physical world or they are only a mere tool of communication. The current article tries to analyse this question by criticising a number of theories and some others based on the technical nature of the Internet, the traditional legal rules and principles and the UNCITRAL regulations on e-commerce and also the statues of American, English and EU laws on e-commerce to develop Iranian legal system. 相似文献
8.
Associative classification (AC) is a new, effective supervised learning approach that aims to predict unseen instances. AC effectively integrates association rule mining and classification, and produces more accurate results than other traditional data mining classification algorithms. In this paper, we propose a new AC algorithm called the Fast Associative Classification Algorithm (FACA). We investigate our proposed algorithm against four well-known AC algorithms (CBA, CMAR, MCAR, and ECAR) on real-world phishing datasets. The bases of the investigation in our experiments are classification accuracy and the F1 evaluation measures. The results indicate that FACA is very successful with regard to the F1 evaluation measure compared with the other four well-known algorithms (CBA, CMAR, MCAR, and ECAR). The FACA also outperformed the other four AC algorithms with regard to the accuracy evaluation measure. 相似文献
9.
Shweta Sankhwar Dhirendra Pandey Raees Ahmad Khan Sachi Nandan Mohanty 《SECURITY AND PRIVACY》2021,4(1)
Phishing in an enterprise is serious issue rising in wide scale and complexity, as phishers use email phishing via obfuscated, malicious or phished URLs and continuously adapt or innovate their strategies to lure victims for identity theft for financial benefits. To gain victim's trust and confidence phishers have started using visceral factors and familiarity cues. Phishing is not always money centric; phisher defame the user's goodwill and character. Defamation in enterprise could be much more traumatic than being embarrassed at a social networking site. It is a challenging task to address this issue. It is evident through literature review that single phishing detection filter approaches are insufficient to detect phishing in enterprise environ. Therefore, a novel anti‐phishing model for enterprise using artificial neural network is proposed. In addition, this model effectively identifies whether the phishing email is known phishing or unknown phishing to reduce the trust and familiarity‐based email phishing enterprise environ. The feed‐forward backpropagation and Levenberg‐Marquart methods of ANN are adopted to enhance the URL classification process and with Fuzzy Inference System to get result with imprecise data of social features. The proposed model can accurately classify the known and unknown email phishing via URLs. 相似文献
10.
从包含相关SCI、CPCI-S与BKCI-S等数据库的Web of Science核心合集数据库出发,对数据库中存在的近13年的国内外文献使用Cite Space与Carrot2分析工具进行聚类分析。力求系统客观地得到国际上钓鱼网站检测技术研究领域的关注热点、研究脉络、著名机构以及核心刊物等研究现状。筛选出具有代表性的文章,采取少量顶级文章精读、部分知名文章粗读的方式对目前钓鱼网站检测技术所涉及到的方法做整理与归类。根据上文的分析对钓鱼网站检测技术的发展方向做了规律性展望,以求对此方向下相关研究人员的研究提供一定的参考。 相似文献