[1] |
Xinyan FANG, Yanxia ZHANG, Ruilin CUI, Siwei LUO.
Research on technology mechanism used in P2P network video surveillance system
[J]. Telecommunications Science, 2022, 38(12): 152-162.
|
[2] |
Huifang HOU,Xuefang LI,Jie PAN,Zhigang DING.
5G carrier network data collection and security management evolution ideas
[J]. Telecommunications Science, 2020, 36(9): 154-159.
|
[3] |
Jie PAN,Zhao XUE.
Virtualized deployment of DPI based on Docker
[J]. Telecommunications Science, 2019, 35(12): 131-136.
|
[4] |
Xuanyu GUO.
Accurate analysis method of network element performance and service data characteristics
[J]. Telecommunications Science, 2019, 35(10): 146-150.
|
[5] |
Panpan LI,Zhengxia XIE,Guangxue YUE,Bolin MA,Li CHEN,Jianhua LIU.
SSDHT:social network-based secure DHT mechanism
[J]. Telecommunications Science, 2018, 34(11): 10-20.
|
[6] |
Huifang HOU,Jie PAN.
Discussion of constructing unified DPI system by operators in the background of big data
[J]. Telecommunications Science, 2017, 33(4): 191-197.
|
[7] |
Lifang MA,Weifeng CHEN,Shizhan LAN,Song LU,Yulan ZHANG,Xiaobin MO,Changzhi HE.
Routing selection algorithm based on ant colony optimization in mobile P2P network
[J]. Telecommunications Science, 2016, 32(7): 121-125.
|
[8] |
Wumaier HENIGULI.
Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN
[J]. Telecommunications Science, 2016, 32(4): 52-58.
|
[9] |
Kang CHEN,Huazheng FU,Chong CHEN,Yuyi ZHANG,Yu WEI.
A real time approach to user interest classification using DPI
[J]. Telecommunications Science, 2016, 32(12): 109-115.
|
[10] |
Guohui ZHU,Chunlan LU,Rui ZHANG.
Guided evolutionary game algorithm of unstructured P2P network
[J]. Telecommunications Science, 2016, 32(1): 60-65.
|
[11] |
Jianwei REN,Chunyan AN,Yun LIU,Jian LI.
Security on peer to peer networking in energy internet
[J]. Telecommunications Science, 2015, 31(Z1): 74-78.
|
[12] |
Jie Pan,Zhuoning Xi,Peng Lin.
Construction of DPI Intelligent Network System Based on SDN/NFV
[J]. Telecommunications Science, 2015, 31(6): 1-107.
|
[13] |
Xianghui Xu,Yuan Zhang,Feng Yang.
Construction and Analysis of Intelligent Perceive Ability in IP Network
[J]. Telecommunications Science, 2015, 31(12): 164-167.
|
[14] |
Wei Lin,Xianghan Zheng.
Private Cloud Assistant Trust Model for P2P Secure Transactions
[J]. Telecommunications Science, 2015, 31(1): 46-52.
|
[15] |
Lin Wei and Zheng Xianghan.
Private Cloud Assistant Trust Model for P2P Secure Transactions
[J]. Telecommunications Science, 2015, 31(1): 2015015-.
|