设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
中国地质文献-英文(4)
Springer电子图书(7)
ProQuest学位论文(120)
Elsevier电子期刊(640)
Wiley电子期刊(18)
SpringerLink电子期刊(1164)
NATURE电子期刊(14)
ACS电子期刊(1)
在“
Wiley电子期刊
”中,
命中:
18
条,耗时:小于0.01 秒
在所有数据库中总计命中:
1,968
条
1.
Correlation found between decreased risk of school shootings, mandatory background
check
s on gun sales
作者:
Halley Sutton
刊名:Campus
Security
Report
出版年:2017
2.
Security
analysis of network protocols through model
check
ing: a case study on mobile IPv6
作者:
Zohreh Saffarian Eidgahi and Vahid Rafe
刊名:
Security
and Communication Networks
出版年:2016
3.
Is It the What or the How? The Roles of High-Policing Tactics and Procedural Justice in Predicting Perceptions of Hostile Treatment: The Case of
Security
Check
s at Ben-Gurion Airport, Israel
作者:
Tal Jonathan-Zamir
;
Badi Hasisi and Yoram Margalioth
刊名:Law & Society Review
出版年:2016
4.
Security
bootstrapping of mobile ad hoc networks using identity-based cryptography
作者:
Kamal Adli Mehr and Javad Musevi Niya
刊名:
Security
and Communication Networks
出版年:2016
5.
A novel self-
check
ing ad hoc routing scheme against active black hole attacks
作者:
Ruo Jun Cai
;
Xue Jun Li and Peter Han Joo Chong
刊名:
Security
and Communication Networks
出版年:2016
6.
The effects of
check
dams and other erosion control structures on the restoration of Andean bofedal ecosystems
作者:
Brett D. Hartman
;
Bodo Bookhagen and Oliver A. Chadwick
刊名:Restoration Ecology
出版年:2016
7.
Efficient and robust user authentication scheme that achieve user anonymity with a Markov chain
作者:
Dongwoo Kang
;
Jaewook Jung
;
Jongho Mun
;
Donghoon Lee
;
Younsung Choi and Dongho Won
刊名:
Security
and Communication Networks
出版年:2016
8.
When it comes to securing patient health information from breaches, your best medicine is a dose of prevention: A cyber
security
risk assessment
check
list
作者:
Sandra J. Blanke and Elizabeth McGrady
刊名:Journal of Healthcare Risk Management
出版年:2016
9.
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
作者:
Suqing Lin
;
Rui Zhang and Mingsheng Wang
刊名:
Security
and Communication Networks
出版年:2016
10.
Survey of return-oriented programming defense mechanisms
作者:
Yefeng Ruan
;
Sivapriya Kalyanasundaram and Xukai Zou
刊名:
Security
and Communication Networks
出版年:2016
1
2
按检索点细分(18)
题名(2)
文摘(12)
按出版年细分(18)
2017年(1)
2016年(17)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.