内容标题
×
内容
绑定机构
扫描成功
请在APP上操作
打开万方数据APP,点击右上角"扫一扫",扫描二维码即可将您登录的个人账号与机构账号绑定,绑定后您可在APP上享有机构权限,如需更换机构账号,可到个人中心解绑。
登录机构账号
登录 / 注册
登录 / 注册
机构登录
学习中心
个人中心
社区
退出
简
繁
学习中心
应用
会员
这是测试提示消息
首页
>
期刊导航
>
网络安全技术与应用
网络安全技术与应用
Network Security Technology & Application 망락안전기술여응용
期刊简介:
本刊由中华人民共和国教育部主管,是国内网络安全技术与应用领域行业内指导性科技月刊。
出版周期:
月刊
语种:
中文
文献量:
16140
被引量:
51122
下载量:
386231
基金论文量:
2177
文章浏览
特色栏目
统计分析
期刊简介
征稿启事
DOI服务
[{"name":"行业与应用安全","count":1916,"id":1},{"name":"技术·应用","count":1625,"id":2},{"name":"操作系统、网络体系与服务器技术","count":1040,"id":3},{"name":"安全模型、算法与编程","count":991,"id":4},{"name":"数据安全与云计算","count":957,"id":5},{"name":"校园网络安全","count":942,"id":6},{"name":"网络·安全","count":895,"id":7},{"name":"网络安全","count":856,"id":8},{"name":"网络安全综述与趋势","count":845,"id":9},{"name":"应用安全","count":726,"id":10},{"name":"理论·广角","count":708,"id":11},{"name":"技术与应用","count":420,"id":12},{"name":"无线通信与移动互联网安全","count":332,"id":13},{"name":"技术应用","count":318,"id":14},{"name":"加解密技术","count":310,"id":15},{"name":"Application Security","count":226,"id":16},{"name":"Network Security","count":215,"id":17},{"name":"计算机·信息","count":202,"id":18},{"name":"网络犯罪、取证与舆情管控","count":178,"id":19},{"name":"企业透视","count":171,"id":20},{"name":"加密技术","count":138,"id":21},{"name":"特别报道","count":138,"id":22},{"name":"权威论坛","count":112,"id":23},{"name":"网络犯罪、取证与网络舆情治理","count":96,"id":24},{"name":"网络犯罪与取证","count":89,"id":25},{"name":"应用与开发","count":75,"id":26},{"name":"咨询·服务","count":74,"id":27},{"name":"学术与技术","count":73,"id":28},{"name":"通信安全","count":69,"id":29},{"name":"行业及应用安全","count":42,"id":30},{"name":"Encryption","count":40,"id":31},{"name":"论坛与综述","count":40,"id":32},{"name":"Enterprise Interview","count":39,"id":33},{"name":"焦点·论坛","count":37,"id":34},{"name":"经验与技巧","count":36,"id":35},{"name":"点击病毒","count":33,"id":36},{"name":"法规与政策","count":32,"id":37},{"name":"Special Report","count":28,"id":38},{"name":"安全管理","count":28,"id":39},{"name":"网管手册","count":27,"id":40},{"name":"市场","count":26,"id":41},{"name":"操作系统、服务器与防火墙技术","count":26,"id":42},{"name":"无线通信及移动互联网安全","count":26,"id":43},{"name":"咨讯·服务","count":24,"id":44},{"name":"安全模型、算法及编程","count":24,"id":45},{"name":"专家论坛","count":22,"id":46},{"name":"学习","count":22,"id":47},{"name":"资讯","count":22,"id":48},{"name":"Enterprise Perspective","count":21,"id":49},{"name":"技术","count":20,"id":50},{"name":"Authority Forum","count":19,"id":51},{"name":"Communication Securyty","count":19,"id":52},{"name":"典型方案","count":18,"id":53},{"name":"网安资讯","count":18,"id":54},{"name":"技术前沿","count":17,"id":55},{"name":"行业聚焦","count":17,"id":56},{"name":"政府信息安全战略高层研讨会专栏","count":15,"id":57},{"name":"应用","count":14,"id":58},{"name":"加解密技术与图像识别","count":13,"id":59},{"name":"市场扫描","count":13,"id":60},{"name":"成功案例","count":13,"id":61},{"name":"技术培训","count":13,"id":62},{"name":"2009PSA专题","count":12,"id":63},{"name":"法制时空","count":12,"id":64},{"name":"灾难备份","count":12,"id":65},{"name":"研究","count":12,"id":66},{"name":"移动互联网安全","count":12,"id":67},{"name":"行业应用","count":12,"id":68},{"name":"企业风采","count":11,"id":69},{"name":"信息快递","count":11,"id":70},{"name":"产品与市场","count":10,"id":71},{"name":"全模型、算法与编程","count":10,"id":72},{"name":"行业","count":10,"id":73},{"name":"备份与恢复","count":9,"id":74},{"name":"法律法规","count":9,"id":75},{"name":"理论广角","count":9,"id":76},{"name":"阳光网吧","count":9,"id":77},{"name":"Resource and Services","count":8,"id":78},{"name":"安全模式、算法与编程","count":8,"id":79},{"name":"研究前沿","count":8,"id":80},{"name":"综述","count":8,"id":81},{"name":"网络警察","count":8,"id":82},{"name":"资源","count":8,"id":83},{"name":"Communication Security","count":7,"id":84},{"name":"业内动态","count":7,"id":85},{"name":"安全法规","count":7,"id":86},{"name":"我国《计算机信息系统安全保护等级制度建设》系列之三","count":7,"id":87},{"name":"政策法规","count":7,"id":88},{"name":"新闻","count":7,"id":89},{"name":"海外传真","count":7,"id":90},{"name":"系统安全","count":7,"id":91},{"name":"网络犯罪及取证","count":7,"id":92},{"name":"防火墙专题","count":7,"id":93},{"name":"专题","count":6,"id":94},{"name":"取证技术","count":6,"id":95},{"name":"电子商务与安全","count":6,"id":96},{"name":"病毒防范","count":6,"id":97},{"name":"管理","count":6,"id":98},{"name":"网安纵横","count":6,"id":99},{"name":"解密技术","count":6,"id":100},{"name":"前沿","count":5,"id":101},{"name":"安全工具","count":5,"id":102},{"name":"工具箱","count":5,"id":103},{"name":"应用开发","count":5,"id":104},{"name":"案例分析","count":5,"id":105},{"name":"法规","count":5,"id":106},{"name":"等级保护","count":5,"id":107},{"name":"经验技巧","count":5,"id":108},{"name":"通密技术","count":5,"id":109},{"name":"360安全客","count":4,"id":110},{"name":"业界人物","count":4,"id":111},{"name":"中英文对照","count":4,"id":112},{"name":"学术技术","count":4,"id":113},{"name":"我国<计算机信息系统安全保护等级划分准则>系列之四","count":4,"id":114},{"name":"我国《计算机信息系统安全保护等级划分准则》--闪亮出台(系列之一)","count":4,"id":115},{"name":"教育与培训","count":4,"id":116},{"name":"新品推介","count":4,"id":117},{"name":"法规解析","count":4,"id":118},{"name":"深度报道","count":4,"id":119},{"name":"移动安全","count":4,"id":120},{"name":"第十八次全国计算机安全学术交流会论文专栏","count":4,"id":121},{"name":"网络安全监察","count":4,"id":122},{"name":"计算机取证","count":4,"id":123},{"name":"计算机犯罪研究","count":4,"id":124},{"name":"访问控制","count":4,"id":125},{"name":"金融行业","count":4,"id":126},{"name":"阿里安全视角","count":4,"id":127},{"name":"Click Virus","count":3,"id":128},{"name":"Enterprise interview","count":3,"id":129},{"name":"专家访谈","count":3,"id":130},{"name":"专题 防火墙","count":3,"id":131},{"name":"产品与案例","count":3,"id":132},{"name":"人物专访","count":3,"id":133},{"name":"企业访谈","count":3,"id":134},{"name":"信息安全法论坛","count":3,"id":135},{"name":"典型案例","count":3,"id":136},{"name":"博士论坛","count":3,"id":137},{"name":"安全实战","count":3,"id":138},{"name":"应急与保障","count":3,"id":139},{"name":"我国《计算机信息系统安全保护等级划分准则》系列之五","count":3,"id":140},{"name":"新闻集萃","count":3,"id":141},{"name":"检测技术专题","count":3,"id":142},{"name":"第十八次全国计算机安全学术交流会论文专拦","count":3,"id":143},{"name":"网络监察","count":3,"id":144},{"name":"课题研究","count":3,"id":145},{"name":"黑客问题研究","count":3,"id":146},{"name":"\"漏洞\"问题探析","count":2,"id":147},{"name":"Disaster Recovery","count":2,"id":148},{"name":"Focus & Forum","count":2,"id":149},{"name":"专题介绍","count":2,"id":150},{"name":"业内风采","count":2,"id":151},{"name":"产业报道","count":2,"id":152},{"name":"人才与成才","count":2,"id":153},{"name":"信息安全与管理","count":2,"id":154},{"name":"华为安全新视野","count":2,"id":155},{"name":"咨询服务","count":2,"id":156},{"name":"安全动态","count":2,"id":157},{"name":"安全组织","count":2,"id":158},{"name":"安全门诊","count":2,"id":159},{"name":"技巧","count":2,"id":160},{"name":"政府信息安全大家谈","count":2,"id":161},{"name":"电子政务与安全","count":2,"id":162},{"name":"综合报道","count":2,"id":163},{"name":"网站","count":2,"id":164},{"name":"网管手册·市场","count":2,"id":165},{"name":"网络犯罪","count":2,"id":166},{"name":"网络知识产权问题研究","count":2,"id":167},{"name":"网络自习室","count":2,"id":168},{"name":"腾讯安全聚焦","count":2,"id":169},{"name":"自习室","count":2,"id":170},{"name":"计算机病毒防范","count":2,"id":171},{"name":"通讯安全","count":2,"id":172},{"name":"高端访谈","count":2,"id":173},{"name":"F8","count":1,"id":174},{"name":"PKI大会主席采访","count":1,"id":175},{"name":"Security Management","count":1,"id":176},{"name":"System Security","count":1,"id":177},{"name":"书架","count":1,"id":178},{"name":"人物志","count":1,"id":179},{"name":"人物访谈","count":1,"id":180},{"name":"企业与安全","count":1,"id":181},{"name":"安全书库","count":1,"id":182},{"name":"安全战略","count":1,"id":183},{"name":"安全控制","count":1,"id":184},{"name":"安全标准","count":1,"id":185},{"name":"安全等级保护","count":1,"id":186},{"name":"安全编程","count":1,"id":187},{"name":"小知识","count":1,"id":188},{"name":"开发","count":1,"id":189},{"name":"我国《计算机信息系统安全保护等级划分准则》系列之二","count":1,"id":190},{"name":"我国《计算机信息系统安全保护等级划分准则》系列之六","count":1,"id":191},{"name":"技术掊训","count":1,"id":192},{"name":"新品发布","count":1,"id":193},{"name":"案例","count":1,"id":194},{"name":"案例评述","count":1,"id":195},{"name":"法规时空","count":1,"id":196},{"name":"灾难存储","count":1,"id":197},{"name":"物理安全","count":1,"id":198},{"name":"笑话与幽默","count":1,"id":199},{"name":"网安书架","count":1,"id":200}]
全部
近一年
近三年
近五年
查看更多栏目
<
1
/
1
>
排序:
年/期
被引
下载
批量选择
(已选择)
0
条
清除
导出
共有
623
篇文献
题名
国际刑事法院管辖网络侵略行为的"能与不能"
文摘阅读
20
下载
3
第三方链接
0
被引
0
作者: 许林逸
年/期:2023/7
被引:0
下载:3
互联网平台自动跳转行为认定和法律规制
文摘阅读
30
下载
3
第三方链接
0
被引
0
作者: 杨晓晞 卢晓彦 杨蕾
年/期:2023/7
被引:0
下载:3
大型央企网络安全攻防演练设计和实践
文摘阅读
37
下载
19
第三方链接
0
被引
0
作者: 杨京晶
年/期:2023/7
被引:0
下载:19
基于多维视角的信息资产智能安全管理实践及技术实现
文摘阅读
20
下载
3
第三方链接
0
被引
0
作者: 吴青松
年/期:2023/7
被引:0
下载:3
"智能化+老龄化"背景下老年群体个入信息法律保护的困境与出路
文摘阅读
30
下载
25
第三方链接
0
被引
0
作者: 高完成 张辰伟
年/期:2023/7
被引:0
下载:25
城市轨道交通综合监控系统的数据安全分析
文摘阅读
27
下载
7
第三方链接
0
被引
2
作者: 刘孟栋
年/期:2023/7
被引:2
下载:7
浅析政府网站信息资源的归档保存
文摘阅读
24
下载
8
第三方链接
0
被引
0
作者: 闫亚琦
年/期:2023/7
被引:0
下载:8
医院网络安全监测预警系统设计与实现
文摘阅读
30
下载
16
第三方链接
0
被引
0
作者: 李昊霖
年/期:2023/7
被引:0
下载:16
医疗设备网络安全管理的分析与探索
文摘阅读
26
下载
5
第三方链接
0
被引
0
作者: 邢洪伟 苏悦洪 麦子铭 李彬
年/期:2023/7
被引:0
下载:5
变电站防病毒管理系统构架及体系建设探讨
文摘阅读
20
下载
2
第三方链接
0
被引
0
作者: 车向北
年/期:2023/7
被引:0
下载:2
首页
上一页
9
10
11
12
13
14
15
下一页
src='', frameborder='0',name='_blank', scrolling='no')
分享到微信朋友圈
打开微信,点击底部的“发现”,使用“扫一扫”即可将网页分享到我的朋友圈。