咨询与建议

限定检索结果

文献类型

  • 183 篇 期刊文献
  • 5 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 189 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 69 篇 理学
    • 54 篇 生物学
    • 20 篇 生态学
    • 15 篇 化学
    • 4 篇 数学
  • 66 篇 工学
    • 22 篇 计算机科学与技术...
    • 17 篇 环境科学与工程(可...
    • 14 篇 网络空间安全
    • 9 篇 电气工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 信息与通信工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 食品科学与工程(可...
    • 5 篇 软件工程
    • 5 篇 生物工程
    • 3 篇 控制科学与工程
  • 51 篇 农学
    • 35 篇 作物学
    • 26 篇 园艺学
    • 22 篇 植物保护
    • 8 篇 兽医学
    • 6 篇 畜牧学
  • 42 篇 医学
    • 28 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 6 篇 公共卫生与预防医...
    • 4 篇 药学(可授医学、理...
  • 20 篇 法学
    • 10 篇 政治学
    • 5 篇 法学
    • 4 篇 社会学
  • 8 篇 经济学
    • 7 篇 应用经济学
  • 6 篇 军事学
  • 5 篇 文学
    • 5 篇 外国语言文学
  • 3 篇 管理学
  • 1 篇 教育学
  • 1 篇 历史学

主题

  • 189 篇 defense
  • 11 篇 plant
  • 11 篇 security
  • 10 篇 and
  • 8 篇 immunity
  • 8 篇 missile
  • 6 篇 information
  • 6 篇 response
  • 6 篇 in
  • 5 篇 acid
  • 5 篇 mechanism
  • 5 篇 network
  • 5 篇 innate
  • 5 篇 military
  • 5 篇 launch
  • 5 篇 of
  • 5 篇 attack
  • 5 篇 arabidopsis
  • 5 篇 air
  • 4 篇 active

机构

  • 2 篇 ministry of educ...
  • 2 篇 state key labora...
  • 2 篇 institute of pla...
  • 1 篇 school of life s...
  • 1 篇 department of en...
  • 1 篇 the institute of...
  • 1 篇 industry and inf...
  • 1 篇 department of co...
  • 1 篇 national digital...
  • 1 篇 department of co...
  • 1 篇 national key lab...
  • 1 篇 department of ho...
  • 1 篇 ministry of educ...
  • 1 篇 disaster prevent...
  • 1 篇 national digital...
  • 1 篇 departamento de ...
  • 1 篇 albrecht-von-hai...
  • 1 篇 department of ag...
  • 1 篇 united states de...
  • 1 篇 key laboratory o...

作者

  • 4 篇 jianqiang wu
  • 3 篇 lei wang
  • 3 篇 wei liang
  • 2 篇 hong-chao hu
  • 2 篇 ivan galis
  • 2 篇 jiqiang liu
  • 2 篇 gerhard a. wolf
  • 2 篇 canchao yang
  • 2 篇 zixiang yang
  • 2 篇 guo-zhen cheng
  • 2 篇 min zhu
  • 2 篇 rodney alexander
  • 2 篇 tomonori shinya
  • 1 篇 yang guanpin
  • 1 篇 akbar siami nami...
  • 1 篇 liang pei
  • 1 篇 jiayi zheng
  • 1 篇 alexandra jammer
  • 1 篇 jiang junliang h...
  • 1 篇 xue yongbiao

语言

  • 157 篇 英文
  • 32 篇 中文
检索条件"主题词=defense"
189 条 记 录,以下是51-60 订阅
排序:
A Security Transfer Model Based on Active defense Strategy
收藏 引用
Communications and Network 2010年 第3期2卷 187-192页
作者: Ying Zheng 不详
This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network elem... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Determination of Excessive defense by Judicial Practice and Its Rethinking——Based on an Analysis of 722 Criminal Judgments
收藏 引用
Contemporary Social Sciences 2019年 第1期4卷 38-64页
作者: Yin Ziwen Fei Yang(译) School of Law Tsinghua University 不详
Concerning the determination of excessive defense,the main problems are the judicial practice of determining excessive defense only based on the resul of harm inflicted on a perpetrator;identifying excessive harm gene... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Using the Analytical Hierarchy Process Model in the Prioritization of Information Assurance defense In-Depth Measures?—A Quantitative Study
收藏 引用
Journal of Information Security 2017年 第3期8卷 166-173页
作者: Rodney Alexander Hutchinson Community College Hutchinson USA
Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing dev... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Empirical Analysis of defense-Economic Growth Relationship
收藏 引用
Journal of Business Administration Research 2018年 第1期1卷 8-16页
作者: Muhammad Tayyab Sohail Qaiser Jamal Umair Shad School of Management Xi'an Jiaotong UniversityXi'anShaanxi710049China Department of Public Policy National Defence UniversityIslamabad44000 Pakistan
Most of the developing and developed countries try to make peace and promote it but still it is seen that large portion of the overall global GDP is spent on the defense sector. This study surveys defense-growth nexus... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Tentative defense for the Villain Roger Chillingworth in The Scarlet Letter
收藏 引用
Journal of Literature and Art Studies 2020年 第7期10卷 575-583页
作者: ZHANG Bao-cang Beijinng Foreign Studies University Henan Agricultural University HenanChina
The paper makes a tentative defense for the villain Roger Chillingworth in The Scarlet Letter,regarding that the characterization with a devil’s image,cruel and cold-blooded is related to religious and artistic purpo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Features of Developmental Level of defense Mechanisms and Adjustment Status of University Students in Japan
收藏 引用
Health 2015年 第1期7卷 52-57页
作者: Kayo Shichiri Masako Shibuya Kennichi Murayama Chiyoko Sato Kyoko Kaminushi Tomoko Uenoyama Ichiro Mashima Takeshi Kuroda Yoshiki Suzuki Health Administration Center Niigata University Niigata Japan
A person with high-level mental defensive functioning exhibits optimal, effective adaptive states when encountering stressors. This may be an important factor in maintaining a sound campus life. Participants were 47 p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Research on the Analysis and Application of Detecting Underground Civil Air defense with GPR
收藏 引用
World Journal of Engineering and Technology 2015年 第3期3卷 52-58页
作者: Yongqing Yang Xiaohui Sun College of Civil and Transportation Engineering Hohai University Nanjing China College of Construction Engineering Qingdao Huanghai University Qingdao China
On the basis of the principle of Ground Penetrating Radar (GPR) method and geophysical characteristics, this paper discusses in detail detection method of civil air defense distinguished by GPR under the complex geolo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hadoop Based defense Solution to Handle Distributed Denial of Service (DDoS) Attacks
收藏 引用
Journal of Information Security 2013年 第3期4卷 150-164页
作者: Shweta Tripathi Brij Gupta Ammar Almomani Anupama Mishra Suresh Veluru Faculty of Computing and Information Technology North Jeddah Branch King Abdulaziz University Jeddah Saudi Arabia School of Computing Science & Engineering Galgotias Universiy Greater Noida India School of Engineering and Mathematical Sciences City University London London UK
Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Network defense Methodology: A Comparison of defense in Depth and defense in Breadth
收藏 引用
Journal of Information Security 2013年 第3期4卷 144-149页
作者: Lance Cleghorn School of Information Technology and Computer Science East Carolina University Greenville USA
The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many suppo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Chinese FM-80 Air defense Missile System
收藏 引用
Aerospace China 1994年 第1期 25-28页
作者: Yang Cunfu,Chen Guoxin
This paper gives a brief introduction to the FM-80 low and very low altitude air defense missile system.The paper also describes in details its main components characteristics functions tactical specifications,operati... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论