首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   293篇
  免费   31篇
各国政治   3篇
工人农民   1篇
世界政治   3篇
外交国际关系   7篇
法律   229篇
中国共产党   1篇
中国政治   28篇
政治理论   17篇
综合类   35篇
  2024年   1篇
  2023年   12篇
  2022年   11篇
  2021年   13篇
  2020年   10篇
  2019年   21篇
  2018年   19篇
  2017年   23篇
  2016年   19篇
  2015年   19篇
  2014年   43篇
  2013年   31篇
  2012年   11篇
  2011年   17篇
  2010年   14篇
  2009年   13篇
  2008年   5篇
  2007年   12篇
  2006年   6篇
  2005年   7篇
  2004年   6篇
  2003年   3篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
排序方式: 共有324条查询结果,搜索用时 31 毫秒
141.
Recent publications underline the interest of using polymers in microelectronics (Li and Wong, 2006a; Cui et al., 2014). Polymers are the ideal interconnect alternative to solder materials containing lead. Electrically Conductive Adhesives [ECAs] (Li and Wong, 2006b), Thermally Conductive Adhesives (TCAs) (Felba et al., 2011) and UV Adhesives (UVAs) (Asif et al., 2005) mainly consist of a polymeric resin (epoxy, silicon, polyurethane or polyimide) that provides physical and mechanical properties such as adhesion, mechanical strength while containing metal fillers (silver, gold, nickel or copper) that conduct electricity (Luo et al., 2016). Currently it is possible to find really cheap polymeric resin. Using these resins for digital forensic purposes is the focus of this paper, that we demonstrate in a hardware reverse engineering prototype case study.When considering new mobile devices, such as secure phones, it is often necessary to spy communication and perform numerous tests on the memory (e.g. by changing some bytes) to understand or modify the implemented security mechanisms (manipulate system time, locate password hashes, observe artefacts of implemented security algorithms, etc.). Traditional techniques use either laser attacks/probing (chip on) or soldering/read/re-soldering (chip off/on) (Heckmann et al., 2016, Jongh, 2014). These two techniques are unsuitable for repeated operations requiring many readings/changes/injections. This paper describes a concrete case study using adhesive properties complementary to chip on and chip off methods.We present the steps using different properties of adhesives (ECA, TCA, UVA) that we will lead to the realisation of a prototype particularly suitable for the repeating of the read phases/changes/injections necessary for reverse engineering secure mobile devices.  相似文献   
142.
吴丽萍 《河北法学》2004,22(2):72-74
分析了中国现行户籍制度的历史沿革,并进行中外户籍制度比较,主要有加拿大、日本、韩国、印度等国,提出应吸收和借鉴外国的有益经验,改革我国现有制度中所存在的弊端,促进我国劳动力的自由流动和市场化。并提出改革的必要性、可行性和完善的具体措施。  相似文献   
143.
移动通信和多媒体通信是当今世界电信业发展最快、市场潜力最大、前景最为可观的两大业务,集移动和多媒体于一身的移动多媒体正越来越引起科研、生产、运营部门的高度重视。本文介绍了利用移动网、GSM、CDMA提供多媒体业务、无线ATM技术,以及如何向移动多媒体网演进,并就如何发展移动多媒体业务提供了建议。  相似文献   
144.
The ability to reconstruct the data stored in a database at an earlier time is an important aspect of database forensics. Past research shows that the log file in a database can be useful for reconstruction. However, in many database systems there are various options that control which information is included in the logs. This paper introduces the notion of the ideal log setting necessary for an effective reconstruction process in database forensics. The paper provides a survey of the default logging preferences in some of the popular database management systems and identifies the information that a database log should contain in order to be useful for reconstruction. The challenges that may be encountered in storing the information as well as ways of overcoming the challenges are discussed. Possible logging preferences that may be considered as the ideal log setting for the popular database systems are also proposed. In addition, the paper relates the identified requirements to the three dimensions of reconstruction in database forensics and points out the additional requirements and/or techniques that may be required in the different dimensions.  相似文献   
145.
In 2012, the United Kingdom actively sought to tackle acts of stalking through amendments to the Protection from Harassment Act 1997. Now, not only is stalking a recognised criminal offence, acts associated with stalking behaviour have finally been properly defined in legislation. Further, the role of technology in digital stalking offences, frequently termed as acts of cyberstalking, has been duly highlighted. The prosecution of such cyberstalking offences is reliant on the forensic analysis of devices capable of communication with a victim, in order to identify the offender and evidence the offending content for presentation to a court of law. However, with the recent proliferation of anonymous communication services, it is becoming increasingly difficult for digital forensic specialists to analyse and detect the origin of stalking messages, particularly those involving mobile devices. This article identifies the legal factors involved, along with a scenario-based investigation of sample anonymous and spoof SMS (Short Message Service) messages, documenting the evidence that remains on a victim's handset for the purpose of locating an offender, which often may be minimal or non-existent.  相似文献   
146.
147.
使用手机媒体已经成为大学生生活的重要组成部分。由于社会大环境以及手机媒体自身的特征、大学对德育的定位和手机媒体管理的局限等多种因素的综合作用,“拇指下的德性”问题受到一定程度的冷落。为此,在德育工作中,一要注重德性伦理培育在大学生手机媒体运用中的导向性;二要将传统与现代相结合,创新德育方式;三要建立制度规范,促进手机媒体长效管理;四要加强校园环境建设,培育良好的校园德育环境。  相似文献   
148.
手机短信和大学生教育的冲突与制衡   总被引:4,自引:0,他引:4  
飞速发展的移动通讯是一条庞大的经济产业链、文化产业链,由其衍生出来的手机短消息 文化功能,给大学校园和大学生的信息传输带来了翻天覆地的变化,使校园文化空前活跃、丰富,并全 时空、全方位地影响着大学生的思想和行为。因此,重视和研究手机短信对大学生教育的影响尤显紧 迫和必要。  相似文献   
149.
随着信息化、网络化程度的加深,"手机依赖"为主要特征的拇指文化已然成为当今高校校园内流行的一大时尚。这一现象是由多种主客观因素综合作用所致,其中既有手机通讯自身的优势,也有学生缓解学习压力、寻求情感归属、建立良好人际关系等心理需求。然而这一现象对学生的心理和行为都产生了一定的负面效应,需要手机运营商、学校、教师和家庭等多方合作,以宽容的态度积极地去引导学生正确认识这种现象。  相似文献   
150.
As digital evidence now features prominently in many criminal investigations, such large volumes of requests for the forensic examination of devices has led to well publicized backlogs and delays. In an effort to cope, triage policies are frequently implemented in order to reduce the number of digital devices which are seized unnecessarily. Often first responders are tasked with performing triage at scene in order to decide whether any identified devices should be seized and submitted for forensic examination. In some cases, this is done with the assistance of software which allows device content to be “previewed”; however, in some cases, a first responder will triage devices using their judgment and experience alone, absent of knowledge of the devices content, referred to as “decision‐based device triage” (DBDT). This work provides a discussion of the challenges first responders face when carrying out DBDT at scene. In response, the COLLECTORS ranking scale is proposed to help first responders carry out DBDT and to formalize this process in an effort to support quality control of this practice. The COLLECTORS ranking scale consists of 10 categories which first responders should rank a given device against. Each devices cumulative score should be queried against the defined “seizure thresholds” which offer support to first responders in assessing when to seize a device. To offer clarify, an example use‐case involving the COLLECTORS ranking scale is included, highlighting its application when faced with multiple digital devices at scene.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号