[1] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[2] |
Li SU, Li LU, Xing ZHANG, Chang LIU.
Graph database based security protection mechanism of 5G network data flow
[J]. Telecommunications Science, 2021, 37(4): 28-36.
|
[3] |
Xiaojun LIU,Juan WU,Xiaoqing XU.
Big data architecture analysis and data security fusion technology
[J]. Telecommunications Science, 2020, 36(7): 146-155.
|
[4] |
Hongbin ZHU,Long AN,Mingchen YANG.
Research and practice on power big data security governance system
[J]. Telecommunications Science, 2019, 35(11): 140-145.
|
[5] |
Qiu YUE,Qin LIU,Xiaole YANG,Xiaofei BI,Shixuan ZHU.
Application of SDN deployment in large-scale public cloud across different resource pools
[J]. Telecommunications Science, 2018, 34(6): 115-122.
|
[6] |
Boxuan LV,Jingwen LIU,Wei XU,Dan WANG,Wenying NIE,Ming HE.
Mobile office system oriented to intelligent terminal
[J]. Telecommunications Science, 2018, 34(2): 115-121.
|
[7] |
Shengli ZHOU,Bin CHEN,Lifa WU.
Data security protection schema of telecom operators under the environment of big data
[J]. Telecommunications Science, 2017, 33(5): 119-125.
|
[8] |
Shuzhen CHEN,Minwei YANG,Yao HE.
Research and implementation of data security for mobile terminal based on TEE
[J]. Telecommunications Science, 2017, 33(3): 126-133.
|
[9] |
Yongjian WANG,Aibo SONG,Yawei YE,Haibo JIANG.
Data security for internet plus in public cloud
[J]. Telecommunications Science, 2017, 33(10): 71-80.
|
[10] |
Wei Si,Feng Wang.
Cloud Backup Solution
[J]. Telecommunications Science, 2015, 31(7): 125-131.
|
[11] |
Xiaodi Wang,Yunyong Zhang,Di Liu,Ni Zhang,Yiming Yu.
Research on Security of Virtualization on Cloud Computing
[J]. Telecommunications Science, 2015, 31(6): 1-5.
|
[12] |
Feng Guo,Wei Li.
Research on the Progress of Certification Regarding on Public Cloud Service
[J]. Telecommunications Science, 2014, 30(6): 108-110.
|
[13] |
Kun Hu,Di Liu,Minghui Liu.
Research on Security Connotation and Response Strategies for Big Data
[J]. Telecommunications Science, 2014, 30(2): 112-117.
|
[14] |
Hao Wu,Jiulun Fan,Jianhua Liu,Junsheng Zhang.
Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm
[J]. Telecommunications Science, 2014, 30(11): 110-115.
|
[15] |
Yubin Yang,Liming Cheng.
A Fine-Grained Mobile Data Security Model
[J]. Telecommunications Science, 2014, 30(1): 15-23.
|