第一个是期刊论文,刊物Phys. Rev. D(Physical Review D的缩写)意为:物理学评论D,D主要收录基本粒子、场论、宇宙学方面的文章第二个是书籍,Electromagnetic Theory《电磁理论》,麻省理工(MIT)Stratton教授的经典著作第三个是会议论文ccsw为Cloud Computing Security Workshop云计算安全研讨会希望对你有用,更多学术信息知识参见优庞网
[1]Ligang Zheng, Guoping Qiu, Yanqiang Lei and Jiwu Huang. Near-duplicate Image Detection in a Visually Salient Riemannian Space. IEEE Trans. on Information Forensics & Security. 7(5): 1578 – 1593, 2012.[2]Yanqiang Lei, Weiqi Luo, Yuangen Wang, Jiwu Huang. Video Sequence Matching Based on the Invariance of Color Correlation. IEEE Trans. on Circuits and Systems for Video Technology. 22(9): 1332-1343, 2012[3]Chuntao Wang, Jiangqun Ni, Jiwu Huang. An Informed Watermarking Scheme Using Hidden Markov Model in the Wavelet Domain. IEEE Trans. on Information Forensics & Security. 7(3):853-867, 2012.[4]Jian Li, Hongmei Liu, Jiwu Huang, Yun Q. shi. Reference Index-Based H.264 Video Watermarking Scheme. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p1-22, September 2012[5]Rui Yang, Zhenhua Qu, Jiwu Huang. Exposing MP3 Audio Forgeries Using Frame Offsets. ACM Trans. on Multimedia Computing, Communications, and Applications. Volume 8, Issue 2S, Article No. 33, p. 1-20, September 2012[6]Zhongwei He, Wei Lu, Wei Sun, Jiwu Huang. Digital image splicing detection based on Markov features in DCT and DWT domain. Pattern Recognition, 45(12): 4292-4299, 2012[7]Haotian Wu and Jiwu Huang. Reversible Image Watermarking on Prediction Errors by Efficient Histogram Modification. Signal Processing. Volume 92, Issue 12, Pages 3000-3009, 2012.[8]Fangjun Huang, Jiwu Huang, Yun Q. Shi. New Channel Selection Rule for JPEG Steganography. IEEE Trans. on Information Forensics & Security. 7(4):1181-1191, 2012.[9]Jian Cao and Jiwu Huang. Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security. IEEE Trans. on Information Forensics & Security. 7(1): 821 – 826, 2012.[10]Xiangui Kang, Yinxiang Li, Zhenhua Qu and Jiwu Huang. Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise. IEEE Trans. on Information Forensics & Security. 7(2): 393-402, 2012.[11]Guopu Zhu, Sam Kwong, Jiwu Huang, and Jianquan Yang. Random Gray Code and Its Performance Analysis for Image Hashing. Signal Processing. 91 (2011) 2178–2193.[12]Yanqing Lei, Yunagen Wang, Jiwu Huang. Robust Image Hash in Radon Transform Domain for Authentication.Signal Processing: Image Communication. 26 (2011) 280–288[13]Xiangui Kang, Member, IEEE, Rui Yang, Student Member, IEEE, and Jiwu Huang. Geometric Invariant Audio Watermarking Based on an LCM Feature. IEEE Trans. on Multimedia, 13(2): 181-190, April, 2011.[14]Weiqi Luo, Jiwu Huang. Security Analysis on Spatial ±1 Steganography for JPEG Decompressed Images. IEEE Signal Processing Letters, 18(1): 39-42, 2011.[15]Fangjun Huang, Weiqi Luo, Jiwu Huang. Steganalysis of JPEG steganography with complementary embedding strategy. IET Information Security, 5(1):10-18. 2011[16]Weiqi Luo, Jiwu Huang. A More Secure Steganography Based on Adaptive Pixel-Value Differencing Scheme. Multimedia Tools and Applications. Volume 52, Issue 2, Page 407-430, 2011[17]Hongmei Liu, Xinzhi Yao, Jiwu Huang: Minority codes with improved embedding efficiency for large payloads. Multimedia Tools Applications. 52(2-3): 431-443 (2011)[18]Fangjun Huang, Jiwu Huang, Yun Q.Shi. Detecting Double JPEG Compression with the Same Quantization Matrix.IEEE Trans. on Information Forensics & Security, 5(4): 838-856.[19]Weiqi Luo, Yuangen Wang, Jiwu Huang. Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification. IEEE Trans. on Information Forensics & Security, 5(4): 810-815, 2010[20]Fangjun Huang, Jiwu Huang, Yun Q. Shi. An Experimental Study on the Security Performance of YASS. IEEE Trans. on Information Forensics & Security, 5(3): 374-380[21]Weiqi Luo, Jiwu Huang. JPEG Error Analysis and Its Applications to Digital Image Forensics. IEEE Trans. on Information Forensics & Security, 5(3): 480-491[22]Weiqi Luo, Fangjun Huang, Jiwu Huang. Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Trans. on Information Forensics & Security, 5(2):201-214, 2010.[23]Xiangui Kang, Jiwu Huang, Wenjun Zeng. Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-polar Mapping. IEEE Trans. on Information Forensics & Security, 5(1):1-12, 2010.[24]Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. Fragility Analysis of Adaptive Quantization Based Image Hashing. IEEE Trans. on Information Forensics & Security, 5(1):133-147, 2010.[25]Yong Wang, Shaoquan Wu, and Jiwu Huang. Audio Watermarking Scheme Robust against Desynchronization Based on the Dyadic Wavelet Transform, EURASIP Journal on Advances in Signal Processing, Volume 2010 (2010), Article ID 232616, 17 pages[26]Hongmei Liu, Xinzhi Yao and Jiwu Huang. “Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication” EURASIP Journal on Advances in Signal Processing, Volume 2010 (2010), Article ID 341856, 17 pages[27]Yong Wang, Jiwu Huang. Robust AVS Audio Watermarking. Science China: Information Sciences. 53(3): 607-618. 2010[28]Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. A Study on the Randomness Measure of Image. IEEE Trans. on Information Forensics & Security, 4(4):928-932, 2009[29]Bin Li, Jiwu Huang, Yun Q. Shi. Steganalysis of YASS. IEEE Trans. on Information Forensics & Security, 4(3): 369-382, 2009.[30]Xiangui Kang, Jiwu Huang, Wenjun Zeng. Improving Robustness of Quantization-Based Image watermarking via Adaptive Receiver. IEEE Trans. on Multimedia, vol.10, no.6, pp. 953-959, Oct. 2008.[31]Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang. Invariant Image Watermarking Based on the Statistical Features in the Low-Frequency Domain. IEEE Trans. on Circuits and Systems for Video Technology, 18(6): 777-790, 2008.[32]Shijun Xiang, HJ Kim and Jiwu Huang “Audio Watermarking Robust to Time-Scale Modification and MP3 Compression” Signal Processing, vol. 88, pp. 2372-2388. 2008.[33]Bin Li, Yanmei Fang and Jiwu Huang. Steganalysis of Multiple-Base Notational System Steganography. IEEE Signal Processing Letter, vol.15, pp.493-496.2008[34]Shijun Xiang, Jiwu Huang. Histogram-Based Audio Watermarking against Time-Scale Modifications and Cropping Attacks. IEEE Trans. on Multimedia. 9(7): 1357-1372, 2007.[35]Ning Bi; Qiyu Sun; Daren Huang; Zhihua Yang; Jiwu Huang. Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition. IEEE Trans. on Image Processing. 2007, 16(8):1956-1966.[36]Yongjian Hu, Sam Kwong, Jiwu Huang. A new method of reversible visible watermarking. IEEE Trans. on Circuits and Systems for Video Technology. 16(1): 129-133, 2006.[37]Shaoquan Wu, Jiwu Huang, Daren Huang, Yun Q. Shi, Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission. IEEE Trans. on Broadcasting. 2005, 51(1): 69-76.[38]Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. on Circuits and Systems for Video Technology. 2003, 13(8): 776-786.[39]Jiwu Huang, Yun Q. Shi. Reliable Information Bit Hiding. IEEE Trans. on Circuits and Systems for Video Technology. 2002, 12(10): 916-920.[40]Jiwu Huang, Yun Q. Shi, Yi Shi, Embedding image watermarks in DC components, IEEE Trans. on Circuits and Systems for Video Technology. 2000, 10(6), pp. 974-979.
[1] 冯登国. 计算机通信网络安全. 北京:清华大学出版社, 2001 [2] Dorothy Denning, ”Cryptography and Data Security”, Addison-Wesley. ISBN 0-201-10150-5. [3] M. Bishop and D. Bailey, “A Critical Analysis of Vulnerability Taxonomies”, Technical Report CSE-96-11, Dept. of Computer Science, University of California at Davis, Davis, CA 95616-8562 (Sep. 1996). [4] 微软安全中心. [5] FrSIRT. [6] 国际CVE标准. [7] Mitre Corporation. Common Vulnerabilities and Exposures. Available from , accessed 2003. [8] Wenliang Du,Aditya P. Mathur. Vulnerability Testing of Software System Using Fault Injection.Coast TR 98-02, 1998. [9] CVSS. http://www.first.org/cvss/. [10] Matt Blaze. 2002 September 15 (Preprint, revised 2003 March 02). Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks. IEEE Security and Privacy (March/April 2003). [11] Steven M. Christey and Chris Wysopal. 2002 February 12 (Expired 2002 August 12). Responsible Vulnerability Disclosure Process (Internet-Draft RFC). [12] Computer Emergency Response Team/Coordination Center. 2000 October 09. CERT/CC Vulnerability Disclosure Policy. [13] Computer Emergency Response Team/Coordination Center. 2003. CERT/CC Vulnerability Metric. [14] Russ Cooper. 2001. Proposal – The Responsible Disclosure Forum. [15] Dennis Fisher. 2003 November 18. “Security Researcher Calls for Vulnerability Trade Association.” eWeek. [16] Daniel E. Geer, Jr. (Editor), Dennis Devlin, Jim Duncan, Jeffrey Schiller, and Jane Winn. 2002 Third Quarter. “Vulnerability Disclosure.” Secure Business Quarterly. [17] Daniel E. Geer, Jr. (Editor), Mary Ann Davidson, Marc Donner, Lynda McGhie, and Adam Shostack. 2003 Second Quarter. “Patch Management.” Secure Business Quarterly. [18] Tiina Havana. 2003 April. Communication in the Software Vulnerability Reporting Process. M.A. thesis, University of Jyvaskyla. [19] Internet Security Systems. 2002 November 18 (Revised). X-Force™ Vulnerability Disclosure Guidelines. [20] Elias Levy. 2001 October 21. “Security in an Open Electronic Society.” SecurityFocus. [21] Microsoft Corporation. 2002 November (Revised). Microsoft Security Response Center Security Bulletin Severity Rating System. [22] Marcus Ranum. 2000 October. “The Network Police Blotter – Full Disclosure is Bogus.” ;login:The Magazine of USENIX & SAGE. Volume 25, no. 6: 47-49. [23] Krsul V.Software Vulnerability Analysis.Department of Computer Sciences, Purdue University, 1998 [24] @Stake. 2002 June 05. Security Vulnerability Reporting Policy. Available from , accessed 2003. [25] William A. Arbaugh, William L. Fithen, and John McHugh. 2000 December. Windows of Vulnerability: A Case Study Analysis. IEEE Computer. [26] Ross Anderson. 2001. Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons. ISBN: 0-471-38922-6. [27] Matt Bishop. 2003. Computer Security: Art and Science. Addison-Wesley Professional. ISBN: 0-201-44099-7. [28] Matt Bishop. 1999 September. Vulnerabilities Analysis. Proceedings of the Second International Symposium on Recent Advances in Intrusion Detection. [29] 单国栋, 戴英侠, 王航. 计算机漏洞分类研究. 计算机工程,2002,28(10):3-6 [30] 夏云庆 编著 Visual C++ 6.0 数据库高级编程 北京希望电子出版社 [31] 段钢 编著 加密与解密(第二版) 电子工业出版社 [33] 候俊杰 著 深入浅出MFC 第2 版 华中科技大学出版社 [34] Applied Microsoft.NET Framework Programming (美) Jeffrey Richter 著 清华 大学出版社 [35] National Vulnerability Database [36] US-CERT Vulnerability Notes. [37] SecurityFocus. [38] Internet Security Systems – X-Force Database. [39] The Open Source Vulnerability Database
速看!中国知网(CNKI)数据库上新1.《中国学术期刊总库》:A,B,C,G,H,I,J专辑2.《中国学术期刊个刊库》:A,B,C,G,I,J专辑3.《博士学位论文数据库》:A,B,C,I,J专辑4.《优秀硕士学位论文数据库》:A,B,C,G,I,J专辑 以上数据库对应专辑均可全文下载使
知网收录的期刊一般只要是国家认可的正规国家级期刊知网都是检索收录。
知网是国家知识基础设施的概念,由世界银行于1998年提出。CNKI工程是以实现全社会知识资源传播共享与增值利用为目标的信息化建设项目。由清华大学、清华同方发起。知网收录的期刊,比如《上海国土资源》、《西北水电》、《船电技术》、《中华辞赋》等。
1、《上海国土资源》是围绕国土资源诸领域的重点、难点、热点问题,及时反映相关的学术研究与实践工作成果,促进科技交流与成果展示,为经济和社会发展提供服务。
2、《西北水电》是国家电力公司西北勘测设计研究院主办的技术性期刊。1982年创刊,国内外公开发行。《西北水电》杂志为陕西省优秀科技期刊;中国学术期刊综合评价数据库来源期刊;中国科技论文统计源期刊;中国科学引文数据库来源期刊。
3、《船电技术》(月刊)创刊于1981年,由武汉船用电力推进装置研究所、中国造船工程学会轮机学术委员会主办。它是中国造船工程学会轮机学术委员会的会刊,我国船电界唯一公开发行的刊物。刊载有关于各类船舶、港口、石油平台的电站、电机、电子控制、化学电源、微机应用及自动化等方面的理论研究。
CNKI中心网站及数据库交换服务中心每日更新5000~7000篇,各镜像站点通过互联网或卫星传送数据可实现每日更新,专辑光盘每月更新,专题光盘年度更新。
中国期刊全文数据库(CNKI)是目前世界上最大的连续动态更新的中国期刊全文数据库,收录国内8200多种重要期刊,以学术、技术、政策指导、高等科普及教育类为主。
同时收录部分基础教育、大众科普、大众文化和文艺作品类刊物,内容覆盖自然科学、工程技术、农业、哲学、医学、人文社会科学等各个领域,全文文献总量2200多万篇。
CNKI概述:
1、产品分为十大专辑:理工A、理工B、理工C、农业、医药卫生、文史哲、政治军事与法律、教育与社会科学综合、电子技术与信息科学、经济与管理。十专辑下分为168个专题和近3600个子栏目。
2、收录年限:1994年至今(部分刊物回溯至1979年,部分刊物回溯至创刊),8200种全文期刊的数据完整性达到98%。
3、数据库应用:CJFD除了可用于信息检索、信息咨询、原文传递等常规服务外,还可以用于以下一些专项服务:引文服务,生成引文检索报告;查新服务,生成查新检索报告;期刊评价,生成期刊评价检索报告;科研能力评价。
生成科研能力评价检索报告;项目背景分析,生成项目背景分析检索报告;定题服务,生成CNKI快讯。
是。因为新闻出版署可查的期刊不一定是正规期刊,正规期刊必须在邮政期刊订阅网上可查 1、正规期刊内容均将通过不同的网络载体呈现。 2、作为一本面向海内外公开发行的正规期刊,在拥有国家新闻出版总署所批复刊号的同时,需要有各地邮政部门确认的邮发代号,没有刊号及邮发代号,无法在邮局(或在中国邮政报刊订阅网上)订阅,此类出版物在职称评定过程被视为非正规出版物,不予认定。因此,正规的期刊,必须拥有国家新闻出版总署所批复的刊号和各当邮政部门确认的邮发代号。
可以。万方可以做新闻期刊。集纳了70多个类目共7600种科技类期刊全文。方数据库是由万方数据公司开发的,涵盖期刊、会议纪要、论文、学术成果、学术会议论文的大型网络数据库,也是和中国知网齐名的中国专业的学术数据库。
可以在网上搜一下核心期刊要目总览,核心类别叫中国医学;CSCD的名单网上也有的。
中国科学引文数据库(CSCD)分为核心库和扩展库,其中,核心库期刊:669种(以*号为标记);扩展库期刊:378种。
CSCD已被中国科学院院士主席团指定为中国科学院院士推选人查询库,被国家自然科学基金委员会列为国家杰出青年基金申请项目、基金资助项目后期绩效评估、国家重点实验室评估等指定查询库。
扩展资料
注意事项:
1、刊物选择:一般发表核心期刊都是要求发到专刊上面,所以投稿的时候一定要选对,如发的是教育类的,教育类专刊CN刊号一定要带有G4的标志。
2、格式字数:不同的刊物对格式字数等要求都不同,字数只能多不能少,如图教育探索征稿要求。
3、科学性:文章一定要有科学依据,真实的数据真实存在的。
4、可读性:可读通过数据图表等有一定的启发,专业术语语言规范性都有要求。
参考资料来源:百度百科-核心期刊
《时珍国医国药》《重庆医科大学学报》(此刊是CSCD+北大核心),审稿1-2周。需要速联
01/官网查询。中国科学院文献情报中心情况分区查询链接:自从2020年12月起,中科院已启用升级版查询系统。登陆进入系统后,输入刊名/issn即可检索。02/小程序查询.中国科学院文献情报中心公众号—服务—分区表—2020年升级版—输入刊名/ISSN即可检索。04/LetPub查询百度搜索LetPub,点击进入首页,输入期刊名即可检索。点击想要查询的学科,还可以根据研究方向查看中科院分区。需要投稿却不清楚分区的,可以根据目录来选择哦!
可以通过手机超星学习通APP来查找最新期刊。在学习通APP中有很多隐藏功能,例如大家可以通过超星阅读本来免费观看所有的图书和期刊,功能性很强。超星学习通是款专为高校师生们打造的学习专业平台。如何在学习通上找外文文献直接在学习通搜索框中查找相关文献就可以。查找文献查找到之后,会有相关的外文文献等可供选择。学习通是基于微服务架构打造的课程学习,知识传播与管理分享平台。它利用超星20余年来积累的海量的图书、期刊、报纸、视频、原创等资源,集知识管理、课程学习、专题创作,办公应用为一体,为读者提供一站式学习与工作环境。学习通怎么看学习通怎么看,方法如下:首先进入学习通,点击右下角的“我”。在个人名字旁边有一个小标志,点击。该标志点开,就有学习通的使用次数了。学习通内包含各种教与学相关的微应用,用户可以在学习通上自助完成图书馆藏书借阅查询、电子资源搜索下载、图书馆最新资讯浏览,学习学校专业课程,进行小组讨论,查看本校通讯录,同时拥有超过百万册电子图书,海量报纸文章以及中外文献元数据,为用户提供移动学习服务。学习通可以查找期刊论文吗如果想查期刊论文的话,最好去自己学校里面的一些资料里面查。学习通上能查到的数量都非常的少。学习通怎么搜书打开“学习通APP”,登录自己的账号和密码, 新用户请先注册,进入学习通首页后,选择一本读物点开阅读,打开一本书籍后,选择章节进行阅读,然后页面跳转至该章,便可以开始阅读了。超星学习通是面向智能手机、平板电脑等移动终端的移动学习专业平台,由北京世纪超星信息技术发展有限责任公司开发。用户可以在超星学习通上自助完成图书馆藏书借阅查询、电子资源搜索下载、图书馆资讯浏览,学习学校课程,进行小组讨论,查看本校通讯录,同时拥有电子图书,报纸文章以及中外文献元数据,为用户提供方便快捷的移动学习服务。