全文获取类型
收费全文 | 5797篇 |
免费 | 168篇 |
国内免费 | 262篇 |
专业分类
系统科学 | 197篇 |
丛书文集 | 154篇 |
教育与普及 | 86篇 |
理论与方法论 | 17篇 |
现状及发展 | 21篇 |
综合类 | 5752篇 |
出版年
2024年 | 11篇 |
2023年 | 32篇 |
2022年 | 41篇 |
2021年 | 36篇 |
2020年 | 47篇 |
2019年 | 51篇 |
2018年 | 50篇 |
2017年 | 48篇 |
2016年 | 59篇 |
2015年 | 99篇 |
2014年 | 242篇 |
2013年 | 182篇 |
2012年 | 303篇 |
2011年 | 387篇 |
2010年 | 303篇 |
2009年 | 367篇 |
2008年 | 462篇 |
2007年 | 547篇 |
2006年 | 564篇 |
2005年 | 524篇 |
2004年 | 405篇 |
2003年 | 398篇 |
2002年 | 331篇 |
2001年 | 229篇 |
2000年 | 152篇 |
1999年 | 98篇 |
1998年 | 69篇 |
1997年 | 54篇 |
1996年 | 37篇 |
1995年 | 31篇 |
1994年 | 23篇 |
1993年 | 8篇 |
1992年 | 15篇 |
1991年 | 7篇 |
1990年 | 6篇 |
1989年 | 3篇 |
1988年 | 5篇 |
1986年 | 1篇 |
排序方式: 共有6227条查询结果,搜索用时 15 毫秒
941.
942.
A quantum secure direct communication and authentication protocol is proposed by using single photons. An information transmission is completed by sending photons once in quantum channel, which improves the efficiency without losing the security. The protocol encodes identity-string of the receiver as single photons sequence, which acts as detection sequence and implements authentication. Before secret message is encoded as single photons sequence, it is encrypted with identity-string of the sender by using XOR operation, which defends quantum teleportation attack efficiently. The base identity-strings of the sender and the re- ceiver are reused unconditionally secure even in noisy channel. Compared with the protocol proposed by Wang et al. (Phys Lett A, 2006, 358: 256--258), the protocol in this study sends photons once in one transmission and defends most attacks including 'man-in-the-middle' attack and quantum teleportation attack efficiently. 相似文献
943.
944.
Wireless Machine to Machine (M2M) communications enable ubiquitous sensing, controlling, and acting via sensors, actuators, and actors. Reliability and security are of foremost importance in wireless M2M systems. A simple, target distinguishing attack can result in M2M’s failure. This paper presents a RelIable and SEcure scheme, RISE, which is a package of policies that guarantee the reliability of data (including sensor reports and actuator instructions) and devices (including sensors, actuators, and actors). The data reliability is improved by four algorithms, ChooseMedian, ChooseMost, ChooseNearest, and Trust-based Enhancement. Report attainability is improved via m repeat-sending and n multiple-reporting algorithms. Device reliability is guaranteed by device-indistinguishability, which comprises data-indistinguishability and behavior-indistinguishability. The security requirements are formally defined, and the security analysis proves the soundness and completeness of the scheme. 相似文献
945.
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud-based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. 相似文献
946.
计算机基础课程是各专业大学生必修课程,为了培养学生的学习兴趣,提高他们的实际应用能力,在不借助于第三方软件的Windows操作系统环境下,设计了三个信息系统安全实验专题:Windows操作系统安全实验专题、文件系统安全实验专题、防火墙与网络诊断实验专题。 相似文献
947.
程裕强 《玉林师范学院学报》2013,(2)
@@@@泄密门事件说明了高校软件开发教育信息安全意识的缺乏。针对这一问题,本文提出在软件开发课程中加入对称加密算法的实现和应用,可以真正让学生了解整个加密过程,可以更好的掌握加密与解密的基本原理与具体语言实现过程,可以培养高校学生软件开发的安全意识。 相似文献
948.
P2P网络具有开放、匿名、节点间松耦合等特性,这些特性导致许多恶意节点提供虚假资源、恶意评价、团伙作案等问题.为解决这一问题,提出了一种新的P2P网络信任模型RCTrust,该模型在将节点根据兴趣等历史信息以簇的形式聚集的基础上,根据节点通信的目标所在簇分为簇内信任和簇外信任两种类型,并根据节点的通信成功率、通信历史相关度、评价诚实度以及评价时效性等行为对节点的信誉进行评价和反馈.仿真分析表明,该信任模型具有抵抗恶意攻击的能力,并提供了较高的通信成功率. 相似文献
949.
王圣镔 《科技情报开发与经济》2013,(19):17-19
高校图书馆期刊阅览室是广大师生进行教学、科研与获取科技信息的重要场所.随着时代的发展,期刊阅览室在工作人员和管理模式方面出现了许多问题.阐述了高校图书馆期刊阅览室存在的若干问题,提出了改进期刊阅览室服务和管理机制的办法. 相似文献
950.
基于最小累积阻力模型的农牧交错带土地利用生态安全格局构建——以鄂尔多斯市准格尔旗为例 总被引:4,自引:0,他引:4
选择位于农牧交错带的鄂尔多斯市准格尔旗,基于自然地理情况、社会经济统计及多年土地覆被数据,在对研究区近30年来土地利用时空动态变化进行分析的基础上,运用GIS空间分析技术,借用最小累积阻力模型,对区域内关键土地利用类型进行分析与模拟,判断各土地单元针对关键土地利用类型的适宜度,据此构建区域土地利用生态安全格局,进而提出土地利用安全格局实施和管理的建议.研究结果对区域土地资源的持续利用具有重要的指导意义,并对最小累积阻力模型的应用进行了扩展. 相似文献