内容标题
×
内容
绑定机构
扫描成功
请在APP上操作
打开万方数据APP,点击右上角"扫一扫",扫描二维码即可将您登录的个人账号与机构账号绑定,绑定后您可在APP上享有机构权限,如需更换机构账号,可到个人中心解绑。
登录机构账号
登录 / 注册
登录 / 注册
机构登录
学习中心
个人中心
社区
退出
简
繁
学习中心
应用
会员
这是测试提示消息
首页
>
期刊导航
>
网络安全技术与应用
网络安全技术与应用
Network Security Technology & Application 망락안전기술여응용
期刊简介:
本刊由中华人民共和国教育部主管,是国内网络安全技术与应用领域行业内指导性科技月刊。
出版周期:
月刊
语种:
中文
文献量:
16140
被引量:
51122
下载量:
386231
基金论文量:
2177
文章浏览
特色栏目
统计分析
期刊简介
征稿启事
DOI服务
[{"name":"行业与应用安全","count":1916,"id":1},{"name":"技术·应用","count":1625,"id":2},{"name":"操作系统、网络体系与服务器技术","count":1040,"id":3},{"name":"安全模型、算法与编程","count":991,"id":4},{"name":"数据安全与云计算","count":957,"id":5},{"name":"校园网络安全","count":942,"id":6},{"name":"网络·安全","count":895,"id":7},{"name":"网络安全","count":856,"id":8},{"name":"网络安全综述与趋势","count":845,"id":9},{"name":"应用安全","count":726,"id":10},{"name":"理论·广角","count":708,"id":11},{"name":"技术与应用","count":420,"id":12},{"name":"无线通信与移动互联网安全","count":332,"id":13},{"name":"技术应用","count":318,"id":14},{"name":"加解密技术","count":310,"id":15},{"name":"Application Security","count":226,"id":16},{"name":"Network Security","count":215,"id":17},{"name":"计算机·信息","count":202,"id":18},{"name":"网络犯罪、取证与舆情管控","count":178,"id":19},{"name":"企业透视","count":171,"id":20},{"name":"加密技术","count":138,"id":21},{"name":"特别报道","count":138,"id":22},{"name":"权威论坛","count":112,"id":23},{"name":"网络犯罪、取证与网络舆情治理","count":96,"id":24},{"name":"网络犯罪与取证","count":89,"id":25},{"name":"应用与开发","count":75,"id":26},{"name":"咨询·服务","count":74,"id":27},{"name":"学术与技术","count":73,"id":28},{"name":"通信安全","count":69,"id":29},{"name":"行业及应用安全","count":42,"id":30},{"name":"Encryption","count":40,"id":31},{"name":"论坛与综述","count":40,"id":32},{"name":"Enterprise Interview","count":39,"id":33},{"name":"焦点·论坛","count":37,"id":34},{"name":"经验与技巧","count":36,"id":35},{"name":"点击病毒","count":33,"id":36},{"name":"法规与政策","count":32,"id":37},{"name":"Special Report","count":28,"id":38},{"name":"安全管理","count":28,"id":39},{"name":"网管手册","count":27,"id":40},{"name":"市场","count":26,"id":41},{"name":"操作系统、服务器与防火墙技术","count":26,"id":42},{"name":"无线通信及移动互联网安全","count":26,"id":43},{"name":"咨讯·服务","count":24,"id":44},{"name":"安全模型、算法及编程","count":24,"id":45},{"name":"专家论坛","count":22,"id":46},{"name":"学习","count":22,"id":47},{"name":"资讯","count":22,"id":48},{"name":"Enterprise Perspective","count":21,"id":49},{"name":"技术","count":20,"id":50},{"name":"Authority Forum","count":19,"id":51},{"name":"Communication Securyty","count":19,"id":52},{"name":"典型方案","count":18,"id":53},{"name":"网安资讯","count":18,"id":54},{"name":"技术前沿","count":17,"id":55},{"name":"行业聚焦","count":17,"id":56},{"name":"政府信息安全战略高层研讨会专栏","count":15,"id":57},{"name":"应用","count":14,"id":58},{"name":"加解密技术与图像识别","count":13,"id":59},{"name":"市场扫描","count":13,"id":60},{"name":"成功案例","count":13,"id":61},{"name":"技术培训","count":13,"id":62},{"name":"2009PSA专题","count":12,"id":63},{"name":"法制时空","count":12,"id":64},{"name":"灾难备份","count":12,"id":65},{"name":"研究","count":12,"id":66},{"name":"移动互联网安全","count":12,"id":67},{"name":"行业应用","count":12,"id":68},{"name":"企业风采","count":11,"id":69},{"name":"信息快递","count":11,"id":70},{"name":"产品与市场","count":10,"id":71},{"name":"全模型、算法与编程","count":10,"id":72},{"name":"行业","count":10,"id":73},{"name":"备份与恢复","count":9,"id":74},{"name":"法律法规","count":9,"id":75},{"name":"理论广角","count":9,"id":76},{"name":"阳光网吧","count":9,"id":77},{"name":"Resource and Services","count":8,"id":78},{"name":"安全模式、算法与编程","count":8,"id":79},{"name":"研究前沿","count":8,"id":80},{"name":"综述","count":8,"id":81},{"name":"网络警察","count":8,"id":82},{"name":"资源","count":8,"id":83},{"name":"Communication Security","count":7,"id":84},{"name":"业内动态","count":7,"id":85},{"name":"安全法规","count":7,"id":86},{"name":"我国《计算机信息系统安全保护等级制度建设》系列之三","count":7,"id":87},{"name":"政策法规","count":7,"id":88},{"name":"新闻","count":7,"id":89},{"name":"海外传真","count":7,"id":90},{"name":"系统安全","count":7,"id":91},{"name":"网络犯罪及取证","count":7,"id":92},{"name":"防火墙专题","count":7,"id":93},{"name":"专题","count":6,"id":94},{"name":"取证技术","count":6,"id":95},{"name":"电子商务与安全","count":6,"id":96},{"name":"病毒防范","count":6,"id":97},{"name":"管理","count":6,"id":98},{"name":"网安纵横","count":6,"id":99},{"name":"解密技术","count":6,"id":100},{"name":"前沿","count":5,"id":101},{"name":"安全工具","count":5,"id":102},{"name":"工具箱","count":5,"id":103},{"name":"应用开发","count":5,"id":104},{"name":"案例分析","count":5,"id":105},{"name":"法规","count":5,"id":106},{"name":"等级保护","count":5,"id":107},{"name":"经验技巧","count":5,"id":108},{"name":"通密技术","count":5,"id":109},{"name":"360安全客","count":4,"id":110},{"name":"业界人物","count":4,"id":111},{"name":"中英文对照","count":4,"id":112},{"name":"学术技术","count":4,"id":113},{"name":"我国<计算机信息系统安全保护等级划分准则>系列之四","count":4,"id":114},{"name":"我国《计算机信息系统安全保护等级划分准则》--闪亮出台(系列之一)","count":4,"id":115},{"name":"教育与培训","count":4,"id":116},{"name":"新品推介","count":4,"id":117},{"name":"法规解析","count":4,"id":118},{"name":"深度报道","count":4,"id":119},{"name":"移动安全","count":4,"id":120},{"name":"第十八次全国计算机安全学术交流会论文专栏","count":4,"id":121},{"name":"网络安全监察","count":4,"id":122},{"name":"计算机取证","count":4,"id":123},{"name":"计算机犯罪研究","count":4,"id":124},{"name":"访问控制","count":4,"id":125},{"name":"金融行业","count":4,"id":126},{"name":"阿里安全视角","count":4,"id":127},{"name":"Click Virus","count":3,"id":128},{"name":"Enterprise interview","count":3,"id":129},{"name":"专家访谈","count":3,"id":130},{"name":"专题 防火墙","count":3,"id":131},{"name":"产品与案例","count":3,"id":132},{"name":"人物专访","count":3,"id":133},{"name":"企业访谈","count":3,"id":134},{"name":"信息安全法论坛","count":3,"id":135},{"name":"典型案例","count":3,"id":136},{"name":"博士论坛","count":3,"id":137},{"name":"安全实战","count":3,"id":138},{"name":"应急与保障","count":3,"id":139},{"name":"我国《计算机信息系统安全保护等级划分准则》系列之五","count":3,"id":140},{"name":"新闻集萃","count":3,"id":141},{"name":"检测技术专题","count":3,"id":142},{"name":"第十八次全国计算机安全学术交流会论文专拦","count":3,"id":143},{"name":"网络监察","count":3,"id":144},{"name":"课题研究","count":3,"id":145},{"name":"黑客问题研究","count":3,"id":146},{"name":"\"漏洞\"问题探析","count":2,"id":147},{"name":"Disaster Recovery","count":2,"id":148},{"name":"Focus & Forum","count":2,"id":149},{"name":"专题介绍","count":2,"id":150},{"name":"业内风采","count":2,"id":151},{"name":"产业报道","count":2,"id":152},{"name":"人才与成才","count":2,"id":153},{"name":"信息安全与管理","count":2,"id":154},{"name":"华为安全新视野","count":2,"id":155},{"name":"咨询服务","count":2,"id":156},{"name":"安全动态","count":2,"id":157},{"name":"安全组织","count":2,"id":158},{"name":"安全门诊","count":2,"id":159},{"name":"技巧","count":2,"id":160},{"name":"政府信息安全大家谈","count":2,"id":161},{"name":"电子政务与安全","count":2,"id":162},{"name":"综合报道","count":2,"id":163},{"name":"网站","count":2,"id":164},{"name":"网管手册·市场","count":2,"id":165},{"name":"网络犯罪","count":2,"id":166},{"name":"网络知识产权问题研究","count":2,"id":167},{"name":"网络自习室","count":2,"id":168},{"name":"腾讯安全聚焦","count":2,"id":169},{"name":"自习室","count":2,"id":170},{"name":"计算机病毒防范","count":2,"id":171},{"name":"通讯安全","count":2,"id":172},{"name":"高端访谈","count":2,"id":173},{"name":"F8","count":1,"id":174},{"name":"PKI大会主席采访","count":1,"id":175},{"name":"Security Management","count":1,"id":176},{"name":"System Security","count":1,"id":177},{"name":"书架","count":1,"id":178},{"name":"人物志","count":1,"id":179},{"name":"人物访谈","count":1,"id":180},{"name":"企业与安全","count":1,"id":181},{"name":"安全书库","count":1,"id":182},{"name":"安全战略","count":1,"id":183},{"name":"安全控制","count":1,"id":184},{"name":"安全标准","count":1,"id":185},{"name":"安全等级保护","count":1,"id":186},{"name":"安全编程","count":1,"id":187},{"name":"小知识","count":1,"id":188},{"name":"开发","count":1,"id":189},{"name":"我国《计算机信息系统安全保护等级划分准则》系列之二","count":1,"id":190},{"name":"我国《计算机信息系统安全保护等级划分准则》系列之六","count":1,"id":191},{"name":"技术掊训","count":1,"id":192},{"name":"新品发布","count":1,"id":193},{"name":"案例","count":1,"id":194},{"name":"案例评述","count":1,"id":195},{"name":"法规时空","count":1,"id":196},{"name":"灾难存储","count":1,"id":197},{"name":"物理安全","count":1,"id":198},{"name":"笑话与幽默","count":1,"id":199},{"name":"网安书架","count":1,"id":200}]
全部
近一年
近三年
近五年
查看更多栏目
<
1
/
1
>
排序:
年/期
被引
下载
批量选择
(已选择)
0
条
清除
导出
共有
623
篇文献
题名
地铁多线路多系统网络安全系统设计与组建
文摘阅读
23
下载
4
第三方链接
0
被引
1
作者: 黄剑平 陈忠 杨鑫
年/期:2023/7
被引:1
下载:4
意识、法制与技术:构建智能教育的信息安全三重保护机制——探索教育元宇宙的安全未来
文摘阅读
26
下载
7
第三方链接
0
被引
0
作者: 吴君胜 曾海 邱崇光 黄月盈 刘婷婷
年/期:2023/7
被引:0
下载:7
基于数据分析系统推进医院DRG绩效管理
文摘阅读
29
下载
23
第三方链接
0
被引
1
作者: 曹济铭
年/期:2023/7
被引:1
下载:23
公安派出所情报实战能力路径建设研究
文摘阅读
31
下载
12
第三方链接
0
被引
1
作者: 吴骁 刘引
年/期:2023/7
被引:1
下载:12
智能汽车行业软件供应链安全风险与治理
文摘阅读
29
下载
13
第三方链接
0
被引
0
作者: 王颉 贺文轩 杨乐明 李民锋 宋荆汉
年/期:2023/7
被引:0
下载:13
铁路信息系统网络安全应急预案规范化编制研究
文摘阅读
50
下载
19
第三方链接
0
被引
0
作者: 张明 董守放 任俊桦 王爱丽
年/期:2023/6
被引:0
下载:19
打印机安全风险分析与信息防护框架研究
文摘阅读
27
下载
9
第三方链接
0
被引
0
作者: 王乐东 涂航 侯文瑞
年/期:2023/6
被引:0
下载:9
论个人信息保护视野下的网络平台软法建设
文摘阅读
30
下载
8
第三方链接
0
被引
0
作者: 高帅天
年/期:2023/6
被引:0
下载:8
地铁电力系统网络安全防御关键技术研究
文摘阅读
41
下载
21
第三方链接
0
被引
0
作者: 王小飞 杨郑曦 夏宇
年/期:2023/6
被引:0
下载:21
智慧图书馆私有云平台网络及网络安全设计——以国家图书馆为例
文摘阅读
35
下载
15
第三方链接
0
被引
2
作者: 路龙惠 许蕗 任旭明
年/期:2023/6
被引:2
下载:15
首页
上一页
10
11
12
13
14
15
16
下一页
src='', frameborder='0',name='_blank', scrolling='no')
分享到微信朋友圈
打开微信,点击底部的“发现”,使用“扫一扫”即可将网页分享到我的朋友圈。