全文获取类型
收费全文 | 2591篇 |
免费 | 144篇 |
国内免费 | 11篇 |
专业分类
化学 | 7篇 |
力学 | 7篇 |
综合类 | 44篇 |
数学 | 40篇 |
物理学 | 87篇 |
无线电 | 2561篇 |
出版年
2024年 | 20篇 |
2023年 | 70篇 |
2022年 | 68篇 |
2021年 | 60篇 |
2020年 | 66篇 |
2019年 | 65篇 |
2018年 | 24篇 |
2017年 | 96篇 |
2016年 | 87篇 |
2015年 | 94篇 |
2014年 | 164篇 |
2013年 | 126篇 |
2012年 | 152篇 |
2011年 | 115篇 |
2010年 | 186篇 |
2009年 | 219篇 |
2008年 | 205篇 |
2007年 | 166篇 |
2006年 | 157篇 |
2005年 | 161篇 |
2004年 | 165篇 |
2003年 | 133篇 |
2002年 | 83篇 |
2001年 | 30篇 |
2000年 | 16篇 |
1999年 | 5篇 |
1998年 | 4篇 |
1997年 | 2篇 |
1996年 | 4篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1989年 | 1篇 |
排序方式: 共有2746条查询结果,搜索用时 0 毫秒
51.
在互联网时代,计算机数据在各个行业中有着广泛的应用,改变人们的工作和生活方式.计算机数据库入侵检测技术引起了人们越来越多的重视.本文将介绍计算机数据库入侵技术的相关概念和功能,并探讨目前比较流行的防范技术,指出相关技术存在的问题,并给出了优化方案. 相似文献
52.
An information hiding algorithm is proposed, which hides information by embedding secret data into the palette of bitmap resources of portable executable (PE) files. This algorithm has higher security than some traditional ones because of integrating secret data and bitmap resources together. Through analyzing the principle of bitmap resources parsing in an operating system and the layer of resource data in PE files, a safe and useful solution is presented to solve two problems that bitmap resources are incorrectly analyzed and other resources data are confused in the process of data embedding. The feasibility and effectiveness of the proposed algorithm are confirmed through computer experiments. 相似文献
53.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors. 相似文献
54.
Currently, few general methods have been suggested to quantitate the imperceptibility among var- ious hiding algorithms. Especially, it is a challenge to quantitate the imperceptibility of the hiding-vector, which is consisted of orthogonal hiding algorithms in the multi- dimensional hiding space. In this paper, a novel model of general imperceptibility quantitation was proposed. Ac- cording to this model, a quantitation method based on the relative entropy was designed. It is proved under this quantitation method that there exists the global maximal imperceptibility for any specified hiding-vector capacity. An optimization algorithm was proposed to approach this maximum by adjusting the allocation of secret message into each components of the hiding-vector. Experiments with VoIP and bitmap multi-dimensional hiding space validated the effectiveness of the designed quantitation method and the proposed optimization algorithm. 相似文献
55.
网络安全问题是所有网络用户都面临的问题,而且随着计算机网络技术的发展,网络入侵技术自动化、智能化和多样化程度越来越高,严重影响网络用户的信息安全。做好网络安全防御工作刻不容缓。本文首先对网络入侵关键技术中的信息收集技术和攻击技术进行简要介绍,再结合当前网络防御技术的现状,分析主动防御技术体系中的两个关键防御技术:入侵检测技术和入侵预测技术。 相似文献
56.
本文为了阻止Android手机恶意软件病毒的危害,分析了入侵病毒的类型,提出了一个基于Android平台的安全检测软件的设计方案,并实现了该方案。该软件基于Android的体系机构,结合Android体系自身的特点,实现了查杀病毒、检测支付环境、监听电话短信、检测流量等功能,保障了用户的安全。经过真机和模拟机测试,该软件能够有效查杀病毒、检测到潜在的病毒危害并及时采取措施,达到了设计目的。 相似文献
57.
提出了一种G.729A自适应码本分组基音调制信息隐藏的检测算法.对语音码流的分析发现,通过基音预测进行信息隐藏将改变相邻语音帧中基音周期估计值的共生特性.通过量化这种共生特性,并经过PCA(Principal Component Analysis,主成分分析)降维获得对隐写检测敏感的特征向量.最后基于特征向量和SVM (Support Vector Machine,支持向量机)构建隐写检测器.对不同语音样本数据集的检测表明,当语音长度在2s及以上时,检测正确率均超过96%.此检测算法是一种有效的压缩域信息隐藏检测方法. 相似文献
58.
59.