首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2644篇
  免费   513篇
  国内免费   52篇
化学   508篇
晶体学   2篇
力学   67篇
综合类   26篇
数学   287篇
物理学   228篇
无线电   2091篇
  2024年   10篇
  2023年   46篇
  2022年   85篇
  2021年   105篇
  2020年   133篇
  2019年   106篇
  2018年   100篇
  2017年   129篇
  2016年   163篇
  2015年   179篇
  2014年   271篇
  2013年   227篇
  2012年   221篇
  2011年   249篇
  2010年   179篇
  2009年   138篇
  2008年   157篇
  2007年   138篇
  2006年   99篇
  2005年   102篇
  2004年   79篇
  2003年   59篇
  2002年   46篇
  2001年   29篇
  2000年   42篇
  1999年   25篇
  1998年   10篇
  1997年   9篇
  1996年   12篇
  1995年   12篇
  1994年   6篇
  1993年   6篇
  1992年   12篇
  1991年   5篇
  1990年   4篇
  1989年   1篇
  1988年   2篇
  1986年   1篇
  1985年   2篇
  1984年   2篇
  1982年   1篇
  1979年   1篇
  1977年   2篇
  1976年   3篇
  1974年   1篇
排序方式: 共有3209条查询结果,搜索用时 0 毫秒
1.
概述了因特网上DoS攻击的相应分类及基本特征,评述了包过滤、攻击检测及防御技术的最新成果.前一部分介绍了入口过滤、基于路由的过滤网和有效源地址强制协议.后一方面主要讨论了适合于检测攻击包的技术,介绍了新近提出的频谱分析方法和泛滥检测系统.简要评述了已有的防御SYN泛滥攻击的技术措施,介绍了Cisco的TCP拦截技术,提出了改进策略.  相似文献   
2.
3.
With the recent developments of Machine Learning as a Service (MLaaS), various privacy concerns have been raised. Having access to the user’s data, an adversary can design attacks with different objectives, namely, reconstruction or attribute inference attacks. In this paper, we propose two different training frameworks for an image classification task while preserving user data privacy against the two aforementioned attacks. In both frameworks, an encoder is trained with contrastive loss, providing a superior utility-privacy trade-off. In the reconstruction attack scenario, a supervised contrastive loss was employed to provide maximal discrimination for the targeted classification task. The encoded features are further perturbed using the obfuscator module to remove all redundant information. Moreover, the obfuscator module is jointly trained with a classifier to minimize the correlation between private feature representation and original data while retaining the model utility for the classification. For the attribute inference attack, we aim to provide a representation of data that is independent of the sensitive attribute. Therefore, the encoder is trained with supervised and private contrastive loss. Furthermore, an obfuscator module is trained in an adversarial manner to preserve the privacy of sensitive attributes while maintaining the classification performance on the target attribute. The reported results on the CelebA dataset validate the effectiveness of the proposed frameworks.  相似文献   
4.
SQL解析过程中利用随机化进行SQL注入攻击(SQLIA)防御的有效性是建立在攻击者不了解当前系统采用的具体随机化方法的基础上,因此,攻击者一旦掌握了当前系统的随机化形式,便能够实施有效的SQLIA.为了解决该问题,基于多变体执行设计出一种SQL注入运行时防御系统,多变体间采用互不相同的随机化方法,攻击者注入的非法SQ...  相似文献   
5.
Zhenchuan  Zhenfu  Rongxing   《Ad hoc Networks》2007,5(7):1046-1054
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc network, however, has called for new requirements for designing authentication schemes due to its dynamic nature and vulnerable-to-attack structure, which the traditional schemes overlooked, such as availability and strong security against off line guessing attacks in face of node compromise. In this paper, we propose a threshold password authentication scheme, which meets both availability and strong security requirements in the mobile Ad hoc networks. In our scheme, t out of n server nodes can jointly achieve mutual authentication with a registered user within only two rounds of message exchanges. Our scheme allows users to choose and change their memorable password without subjecting to guessing attacks. Moreover, there is no password table in the server nodes end, which is preferable since mobile nodes are usually memory-restricted devices. We also show that our scheme is efficient to be implemented in mobile devices.  相似文献   
6.
金晨辉 《通信学报》2000,21(8):49-51
本文提出了ε线性结构的概念,研究了其基本性质,给出了多输出函数的ε线性结构与其坐标函数的线性组合的ε线性结构之间的关系,给出了具有ε线性结构的Boole函数的Walsh谱特征。最后证明了利用密码算法的ε线性结构,在选择明文攻击下,可保证成功率不小于1-ε/2有前提下大幅度降低密钥穷举量。  相似文献   
7.
空中制导-攻击匹配(GAM)旨在确定武器单元、制导单元以及目标三者之间的最优匹配关系,以使多作战智能体任务联盟整体作战效能最大。分析了基于混合通信方式的多作战智能体制导-攻击匹配过程,建立制导攻击匹配约束优化问题模型,设计了一种禁忌策略的嵌套遗传算法(TS-NGA)对模型进行求解,算法的外层循环寻求武器单元和制导单元的最优配对,内层循环寻求武器单元和目标的最优配对。针对GAM问题特点,制定了编码与解码策略、交叉、变异规则以及选择、禁忌策略。仿真实验结果表明所设计求解算法能较好地解决三维变量的GAM问题模型。  相似文献   
8.
An open question about the asymptotic cost of connecting many processors to a large memory using three dimensions for wiring is answered, and this result is used to find the full cost of several cryptanalytic attacks. In many cases this full cost is higher than the accepted complexity of a given algorithm based on the number of processor steps. The full costs of several cryptanalytic attacks are determined, including Shanks method for computing discrete logarithms in cyclic groups of prime order n, which requires n1/2+o(1) processor steps, but, when all factors are taken into account, has full cost n2/3+o(1). Other attacks analyzed are factoring with the number field sieve, generic attacks on block ciphers, attacks on double and triple encryption, and finding hash collisions. In many cases parallel collision search gives a significant asymptotic advantage over well-known generic attacks.  相似文献   
9.
The research work presented in this paper is based on the concrete background of the Cooperative Graphics Editor(GGE),allowing two or more persons to remotely deit a graphic document simultaneously.A new concurrency control algorithm based on partial order set is presented,which has fast response and less undo-redo operations as there are no lock mechanisms.It is used to solve inconsistency caused by operation on intersecting graphics concurrently.CGE also possesses a mask strategy to solve inconsistency caused by operation on the same graphic concurrently.  相似文献   
10.
Multivalent interactions can be applied universally for a targeted strengthening of an interaction between different interfaces or molecules. The binding partners form cooperative, multiple receptor–ligand interactions that are based on individually weak, noncovalent bonds and are thus generally reversible. Hence, multi‐ and polyvalent interactions play a decisive role in biological systems for recognition, adhesion, and signal processes. The scientific and practical realization of this principle will be demonstrated by the development of simple artificial and theoretical models, from natural systems to functional, application‐oriented systems. In a systematic review of scaffold architectures, the underlying effects and control options will be demonstrated, and suggestions will be given for designing effective multivalent binding systems, as well as for polyvalent therapeutics.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号