[1] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[2] |
Li SU, Li LU, Xing ZHANG, Chang LIU.
Graph database based security protection mechanism of 5G network data flow
[J]. Telecommunications Science, 2021, 37(4): 28-36.
|
[3] |
Xiaojun LIU,Juan WU,Xiaoqing XU.
Big data architecture analysis and data security fusion technology
[J]. Telecommunications Science, 2020, 36(7): 146-155.
|
[4] |
Tao PANG,Haihua QIU,Biying PAN.
Research on artificial intelligence key technologies of mobile terminal
[J]. Telecommunications Science, 2020, 36(5): 145-151.
|
[5] |
Yufei CUI,Jinwu WEI,Siyu PAN,Rongfang ZHANG,Xiao WANG,Zixiang JIA.
Research on terminal switch interval based on DTL
[J]. Telecommunications Science, 2019, 35(7): 165-172.
|
[6] |
Youkang ZHU,Guangxue YUE,Xiaohui YANG,Jiansheng LIU.
A survey on edge computing offloading
[J]. Telecommunications Science, 2019, 35(4): 74-94.
|
[7] |
Hongbin ZHU,Long AN,Mingchen YANG.
Research and practice on power big data security governance system
[J]. Telecommunications Science, 2019, 35(11): 140-145.
|
[8] |
Boxuan LV,Jingwen LIU,Wei XU,Dan WANG,Wenying NIE,Ming HE.
Mobile office system oriented to intelligent terminal
[J]. Telecommunications Science, 2018, 34(2): 115-121.
|
[9] |
Jingwen LIU,Wei XU,Boxuan LV,Dan WANG,Wenying NIE,Ning FAN.
Design of mobile payment system based on NFC
[J]. Telecommunications Science, 2018, 34(2): 131-138.
|
[10] |
Shengli ZHOU,Bin CHEN,Lifa WU.
Data security protection schema of telecom operators under the environment of big data
[J]. Telecommunications Science, 2017, 33(5): 119-125.
|
[11] |
Lei WANG,Meng LU.
Initialization scheme of the trusted execution environment based on the user card
[J]. Telecommunications Science, 2017, 33(2): 9-14.
|
[12] |
Xueqiong WANG,Junjie XIONG,Xiaohui YAO.
Terminal replacement model based on big data mining
[J]. Telecommunications Science, 2016, 32(12): 43-52.
|
[13] |
Fei Zhao,Wenjun Zhang,Yong Deng.
Solution of Communication Services of Vehicle Mobile Terminals Based on LTE and Ev-Do Hybrid Networking
[J]. Telecommunications Science, 2015, 31(8): 165-170.
|
[14] |
Jiaren Jiang.
Virtualization Security, Key Issues of Public Cloud Computing Security
[J]. Telecommunications Science, 2015, 31(12): 121-124.
|
[15] |
Kun Hu,Di Liu,Minghui Liu.
Research on Security Connotation and Response Strategies for Big Data
[J]. Telecommunications Science, 2014, 30(2): 112-117.
|