咨询与建议

限定检索结果

文献类型

  • 16,272 篇 期刊文献
  • 1,064 篇 会议
  • 1 册 图书

馆藏范围

  • 17,337 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,556 篇 工学
    • 5,435 篇 材料科学与工程(可...
    • 4,878 篇 计算机科学与技术...
    • 3,723 篇 电气工程
    • 2,498 篇 机械工程
    • 2,447 篇 电子科学与技术(可...
    • 2,280 篇 信息与通信工程
    • 1,998 篇 化学工程与技术
    • 1,695 篇 控制科学与工程
    • 1,370 篇 力学(可授工学、理...
    • 1,236 篇 动力工程及工程热...
    • 1,195 篇 环境科学与工程(可...
    • 1,194 篇 网络空间安全
    • 980 篇 冶金工程
    • 851 篇 仪器科学与技术
    • 781 篇 生物医学工程(可授...
    • 605 篇 水利工程
    • 554 篇 软件工程
    • 496 篇 土木工程
    • 456 篇 建筑学
    • 436 篇 地质资源与地质工...
  • 9,396 篇 理学
    • 3,504 篇 物理学
    • 3,374 篇 化学
    • 1,952 篇 数学
    • 1,568 篇 生物学
    • 723 篇 天文学
    • 520 篇 地球物理学
    • 378 篇 地质学
  • 1,359 篇 医学
    • 968 篇 临床医学
  • 738 篇 农学
  • 658 篇 管理学
  • 341 篇 经济学
  • 286 篇 法学
  • 188 篇 教育学
  • 93 篇 文学
  • 48 篇 艺术学
  • 26 篇 军事学
  • 13 篇 历史学
  • 12 篇 哲学

主题

  • 311 篇 security
  • 219 篇 deep learning
  • 129 篇 blockchain
  • 113 篇 internet of thin...
  • 100 篇 machine learning
  • 84 篇 network
  • 82 篇 analysis
  • 81 篇 power
  • 65 篇 mechanical prope...
  • 64 篇 optimization
  • 63 篇 mechanism
  • 63 篇 simulation
  • 55 篇 alloy
  • 55 篇 physical layer s...
  • 54 篇 iot
  • 51 篇 control
  • 50 篇 properties
  • 50 篇 surface
  • 49 篇 corrosion
  • 49 篇 adsorption

机构

  • 107 篇 university of ch...
  • 86 篇 shanghai institu...
  • 70 篇 department of ph...
  • 68 篇 university of mi...
  • 68 篇 institute for pa...
  • 68 篇 nikhef p.o.box 4...
  • 68 篇 fysikum stockhol...
  • 68 篇 michigan state u...
  • 68 篇 institut fur the...
  • 68 篇 dept.of physics ...
  • 68 篇 compas group ins...
  • 68 篇 rudolf peierls c...
  • 68 篇 department of ph...
  • 68 篇 school of physic...
  • 68 篇 ludwig-maximilia...
  • 68 篇 cea/saclay dsm/i...
  • 67 篇 national researc...
  • 67 篇 nstitucio catala...
  • 67 篇 department of ph...
  • 67 篇 kobayashi-maskaw...

作者

  • 89 篇 v.i.belousov
  • 86 篇 h.murayama
  • 86 篇 j.d.jackson
  • 86 篇 m.white
  • 86 篇 p.de jong
  • 86 篇 v.burkert
  • 86 篇 y.hayato
  • 86 篇 a.v.gritsan
  • 86 篇 a.gurtu
  • 86 篇 m.carena
  • 86 篇 a.masoni
  • 85 篇 s.rolli
  • 83 篇 a.d.martin
  • 82 篇 b.heltsley
  • 81 篇 s.r.klein
  • 81 篇 d.h.weinberg
  • 79 篇 u.f.katz
  • 71 篇 m.titov
  • 70 篇 g.d'ambrosio
  • 66 篇 kavli ipmu

语言

  • 15,673 篇 英文
  • 1,664 篇 中文
检索条件"机构=Security Engineering Lab"
17337 条 记 录,以下是11-20 订阅
排序:
MRm-DLDet:a memory-resident malware detection framework based on memory forensics and deep neural network
收藏 引用
Cybersecurity 2024年 第1期7卷 88-109页
作者: Jiaxi Liu Yun Feng Xinyu Liu Jianjun Zhao Qixu Liu Institute of Information engineering Chinese Academy of SciencesBeijing 100085China School of Cyber security University of Chinese Academy of SciencesBeijing 100049China
Cyber attackers have constantly updated their attack techniques to evade antivirus software detection in recent years.One popular evasion method is to execute malicious code and perform malicious actions only in memor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第8期140卷 1669-1687页
作者: So-Eun Jeon Ye-Sol Oh Yeon-Ji Lee Il-Gu Lee Department of Future Convergence Technology engineering Sungshin Women’s UniversitySeoul02844Korea Department of Convergence security engineering SungshinWomen’s UniversitySeoul02844Korea
With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated.While signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI College of Liberal Arts and Sciences National University of Defense Technology Hunan engineering Research Center of Commercial Cryptography Theory and Technology Innovation State Key laboratory of Information security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high parallelism.Impossible differential attack is one of the powerful cryptanalytic approaches for word-oriented block... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and engineering Xi'an University of Technology Shaanxi Key laboratory for Network Computing and security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile terminal.But with it comes the securi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Biohythane production from two-stage anaerobic digestion of food waste:A review
收藏 引用
Journal of Environmental Sciences 2024年 第5期139卷 334-349页
作者: Xiaona An Ying Xu Xiaohu Dai State Key laboratory of Pollution Control and Resource Reuse School of Environmental Science and EngineeringTongji UniversityShanghai 200092China Shanghai Institute of Pollution Control and Ecological security Shanghai 200092China
The biotransformation of food waste(FW)to bioenergy has attracted considerable research attention as a means to address the energy crisis and waste disposal problems.To this end,a promising technique is two-stage anae... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Numerical Study on the Aerodynamic and Fluid−Structure Interaction of An NREL-5MW Wind Turbine
收藏 引用
China Ocean engineering 2024年 第3期38卷 363-378页
作者: ZHAO Mi YU Wan-li WANG Pi-guang QU Yang DU Xiu-li Key laboratory of Urban security and Disaster engineering of Ministry of Education Beijing University of TechnologyBeijing 100124China State Key laboratory of Bridge engineering Safety and Resilience Beijing University of TechnologyBeijing 100124China
A 5-MW wind turbine has been modeled and analyzed for fluid-structure interaction and aerodynamic performance.In this study,a full-scale model of a 5-MW wind turbine is first developed based on a computational fluid d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Neurotoxicity of tetramethylammonium ion on larval and juvenile zebrafish:Effects on neurobehaviors and multiple biomarkers
收藏 引用
Journal of Environmental Sciences 2024年 第9期143卷 138-147页
作者: Ruixin Zhang Rui Wang Jiajun Chang GDaniel Sheng Daqiang Yin Key laboratory of Yangtze River Water Environment Ministry of EducationCollege of Environmental Science and EngineeringTongji UniversityShanghai 200092China Shanghai Institute of Pollution Control and Ecological security Shanghai 200092China
Tetramethylammonium hydroxide(TMAH)is an important compound that utilized and released by the rapidly expanding semiconductor industry,which could hardly be removed by the conventional wastewater treatment techniques.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Identity-based searchable attribute signcryption in lattice for a blockchain-based medical system
收藏 引用
Frontiers of Information Technology & Electronic engineering 2024年 第3期25卷 461-471页
作者: Huifang YU Xiaoping BAI School of Cyberspace security Xi'an University of Posts&TelecommunicationsXi'an 710121China School of Information engineering Qinghai Communications Technical CollegeXining 810003China
Electronic healthcare systems can offer convenience but face the risk of data forgery and information leakage.To solve these issues,we propose an identity-based searchable attribute signcryption in lattice for a block... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 635-644页
作者: Wenxiao QIAO Siwei SUN Lei HU State Key laboratory of Information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences School of Cryptology University of Chinese Academy of Sciences State Key laboratory of Cryptology
The rapid development of modern cryptographic applications such as zero-knowledge,secure multiparty computation,fully homomorphic encryption has motivated the design of new so-called arithmetization-oriented symmetric... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Analytical Solution and Simplified Formula for Added Mass of Horizontal and Vertical Motions of Truncated Cylinders Under Earthquake Action
收藏 引用
China Ocean engineering 2024年 第1期38卷 54-67页
作者: WANG Pi-guang LYU Si-yu QU Yang ZHAO Mi DU Xiu-li State Key laboratory of Bridge engineering Safety and Resilience Beijing University of TechnologyBeijing 100124China Key laboratory of Urban security and Disaster engineering of Ministry of Education Beijing University of Tech-nologyBeijing 100124China
This paper investigates the hydrodynamic characteristics of floating truncated cylinders undergoing horizontal and vertical motions due to earthquake excitations in the finite water depth.The governing equation of the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论