首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   526篇
  免费   16篇
各国政治   10篇
工人农民   14篇
世界政治   6篇
外交国际关系   13篇
法律   157篇
中国共产党   25篇
中国政治   86篇
政治理论   29篇
综合类   202篇
  2024年   1篇
  2023年   2篇
  2022年   2篇
  2021年   12篇
  2020年   18篇
  2019年   10篇
  2018年   14篇
  2017年   8篇
  2016年   11篇
  2015年   12篇
  2014年   42篇
  2013年   54篇
  2012年   49篇
  2011年   36篇
  2010年   26篇
  2009年   32篇
  2008年   25篇
  2007年   35篇
  2006年   30篇
  2005年   43篇
  2004年   27篇
  2003年   22篇
  2002年   14篇
  2001年   11篇
  2000年   2篇
  1990年   1篇
  1989年   1篇
  1986年   1篇
  1984年   1篇
排序方式: 共有542条查询结果,搜索用时 0 毫秒
541.
Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to be enforced from May 2018). We use the case study of the emergent smart energy supply chain to frame, scope out and consolidate the breadth of security concerns at play, and the regulatory responses. We argue the industrial IoT brings four security concerns to the fore, namely: appreciating the shift from offline to online infrastructure; managing temporal dimensions of security; addressing the implementation gap for best practice; and engaging with infrastructural complexity. Our goal is to surface risks and foster dialogue to avoid the emergence of an Internet of Insecure Industrial Things.  相似文献   
542.
In this study we sought to identify which locations appear more, or less, attractive to a terrorist in planning an attack and to investigate what attributes of those locations influence preferences. A sample of undergraduate university students (N?=?147) were given the role of terrorists, and provided with five potential attack locations, including a pedestrian mall, a shopping center, a train station, a university and an airport. After using the Internet to learn about the target locations, participants placed the locations in rank-order from most to least preferred as targets and indicated why they had selected those targets. Results showed both a clear rank-order of target preferences: locations perceived as being more crowded were more preferred, while locations with a greater security presence were less preferred. Results also demonstrated a moderate positive correlation between the amount of online information viewed for a specific location and the preference for that location as a terrorist target, where participants who viewed more online content for a particular location were more likely to also prefer that location as a terrorist target. Findings from this study can potentially be used to reduce the likelihood of a terrorist attack occurring on specific locations, by altering the publicly available information on that location regarding the security and how crowded that location is.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号