首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   100550篇
  免费   13783篇
  国内免费   9594篇
工业技术   123927篇
  2024年   857篇
  2023年   2200篇
  2022年   4171篇
  2021年   4599篇
  2020年   4633篇
  2019年   3284篇
  2018年   2716篇
  2017年   3198篇
  2016年   3342篇
  2015年   3865篇
  2014年   6731篇
  2013年   5856篇
  2012年   7656篇
  2011年   7997篇
  2010年   6156篇
  2009年   6462篇
  2008年   6730篇
  2007年   7508篇
  2006年   6281篇
  2005年   5568篇
  2004年   4661篇
  2003年   4138篇
  2002年   3201篇
  2001年   2735篇
  2000年   2187篇
  1999年   1782篇
  1998年   1272篇
  1997年   1041篇
  1996年   835篇
  1995年   640篇
  1994年   483篇
  1993年   318篇
  1992年   203篇
  1991年   151篇
  1990年   111篇
  1989年   96篇
  1988年   61篇
  1987年   34篇
  1986年   32篇
  1985年   34篇
  1984年   20篇
  1983年   21篇
  1982年   27篇
  1981年   7篇
  1980年   3篇
  1979年   8篇
  1978年   2篇
  1975年   2篇
  1959年   4篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
802.11n技术在高校的无线校园网的建设规划过程中逐渐成为焦点,本文在对802.11n关键技术介绍的基础上,讨论了在无线校园网规划、无线设备选型、有线无线一体化、电源配套等关键因素。  相似文献   
992.
993.
ABSTRACT

Social engineering is a methodology that allows an attacker to bypass technical controls by attacking the human element in an organization. There are many techniques commonly used in social engineering including but not limited to Trojan and phishing email messages, impersonation, persuasion, bribery, shoulder surfing, and dumpster diving. Hackers rely on social engineering attacks to bypass technical controls by focusing on the human factors. Social engineers often exploit the natural tendency people have toward trusting others who seem likeable or credible, deferring to authority or need to acquiesce to social conformity. Mitigation of social engineering begins with good policy and awareness training, but there are a number of other approaches an organization can take to defend against this type of an attack. Social engineering attacks are likely to increase, and it is becoming increasingly important for organizations to address this issue.  相似文献   
994.
ABSTRACT

Information technology organizations within most corporations are spending significant time and resources securing IT infrastructure. This increased need for security is driven by a number of factors. These factors include increased dependency on the Internet, financial and legal liability, protection of personal identity information and sensitive corporate data, increased numbers and age of legacy systems with limited vendor support, deploying complex systems, and new regulations governing corporate transactions. There a number of technologies on the market today that can mitigate most of these security factors. However, managers in IT organizations need to identify potential future threats and security technologies to assess and potentially mitigate risk through the deployment of those technologies. This article investigates three areas critical to the successful deployment and securing of information technology.  相似文献   
995.
ABSTRACT

Insider threats pose significant challenges to any organization. Many solutions have been proposed in the past to detect insider threats. Unfortunately, given the complexity of the problem and the human factors involved, many solutions which have been proposed face strict constraints and limitations when it comes to the working environment. As a result, many past insider threat solutions have in practice failed in their implementations. In this work, we review some of the recent insider threat detection solutions and explore their benefits and limitations. We also discuss insider threat issues for emerging areas such as cloud computing, virtualization, and social networking.  相似文献   
996.
无线传感器网络能够很好地解决海洋平台结构检测中遇到的很多问题。对无线传感器网络这一无线通信中的热点领域在无线传感器网络体系构架、大规模组网技术及网络管理、环境感知技术、数据采集技术以及信息处理技术等方面进行了应用研究,以期能将该项技术应用于我国海洋平台结构的安全检测中。  相似文献   
997.
ABSTRACT

Firewalls are one of the most widely used security devices to protect a communications network. They help secure it by blocking unwanted traffic from entering or leaving the protected network. Several commercial vendors have extended their firewall capabilities to support SCADA protocols or designed SCADA-specific firewalls. Although open-source firewalls are used successfully in IT networks, their use in SCADA networks has not been properly investigated. In this research we investigate the major open-source firewalls for their use in SCADA networks and identify Linux iptables’ potential as an effective SCADA firewall. Iptables is a powerful open-source firewall solution available as part of most Linux distributions in use today. In general, use of iptables as a network-level firewall for SCADA systems has been limited to basic port and host filtering, without further inspection of control messages. We propose and demonstrate a novel methodology to use iptables as an effective firewall for SCADA systems. This is achieved by utilizing advanced iptables features that allow for dynamic inspection of packet data. It is noteworthy to mention that the proposed solution does not require any modification to the netfilter/iptables framework, making it possible to turn a Linux system into an effective SCADA firewall. The approach has been tested by defining filtering rules for the Modbus TCP protocol and validating its ability to defend against various attacks on the protocol.  相似文献   
998.
给出了采用ADXL335加速度传感器来采集五个手指和手背的加速度三轴信息,并通过ZigBee无线网络传输来提取手势特征量,同时利用BP神经网络算法进行误差分析来实现手势识别的设计方法。最后,通过Matlab验证,结果表明,该系统在测试中识别率较高,系统稳定。  相似文献   
999.
水声网络路由协议是水声网络研究的一个热点问题。水声网络路由协议面临着节点能量有限、带宽窄、高传播延迟等的限制。本文从能量和延迟角度出发,设计了一种能量平衡和延迟约束的路由协议。该协议通过感知周边节点能量和负载,使得节点在选择转发节点时尽量选择剩余能量高的节点,同时在网络负载较高时能有效避开网络拥塞区域,从而在能量均衡的同时降低数据包的端到端延迟。  相似文献   
1000.
无线传感器网络的应用日益广泛,然而在环境恶劣的野外,数据的采集与发送将受到很大的限制。而建立一个基站作为一个中继,可以很好地沟通节点和终端,从而在很大程度上提高数据的可靠性和有效性。此外,对于不同类型的数据,采用自适应方式选择传输网络进行传输,也可以充分利用有限的网络资源来提高效率。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号