[1] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[2] |
Li SU, Li LU, Xing ZHANG, Chang LIU.
Graph database based security protection mechanism of 5G network data flow
[J]. Telecommunications Science, 2021, 37(4): 28-36.
|
[3] |
Xiaojun LIU,Juan WU,Xiaoqing XU.
Big data architecture analysis and data security fusion technology
[J]. Telecommunications Science, 2020, 36(7): 146-155.
|
[4] |
Guohe LI,Zheng FENG,Zhuoyu WANG,Yong SUN,Yang GUO,Qiguo SAN.
Practical exploration on the construction of data asset management system
[J]. Telecommunications Science, 2019, 35(2): 105-112.
|
[5] |
Hongbin ZHU,Long AN,Mingchen YANG.
Research and practice on power big data security governance system
[J]. Telecommunications Science, 2019, 35(11): 140-145.
|
[6] |
Boxuan LV,Jingwen LIU,Wei XU,Dan WANG,Wenying NIE,Ming HE.
Mobile office system oriented to intelligent terminal
[J]. Telecommunications Science, 2018, 34(2): 115-121.
|
[7] |
Shengli ZHOU,Bin CHEN,Lifa WU.
Data security protection schema of telecom operators under the environment of big data
[J]. Telecommunications Science, 2017, 33(5): 119-125.
|
[8] |
Shuzhen CHEN,Minwei YANG,Yao HE.
Research and implementation of data security for mobile terminal based on TEE
[J]. Telecommunications Science, 2017, 33(3): 126-133.
|
[9] |
Jiaren Jiang.
Virtualization Security, Key Issues of Public Cloud Computing Security
[J]. Telecommunications Science, 2015, 31(12): 121-124.
|
[10] |
Wei Li.
Network Management System's Data Management Layer Based on Big Data Technology
[J]. Telecommunications Science, 2015, 31(11): 185-188.
|
[11] |
Kun Hu,Di Liu,Minghui Liu.
Research on Security Connotation and Response Strategies for Big Data
[J]. Telecommunications Science, 2014, 30(2): 112-117.
|
[12] |
Hao Wu,Jiulun Fan,Jianhua Liu,Junsheng Zhang.
Cloud Storage Data Protection Mechanism Based on a Fingerprint Cube Algorithm
[J]. Telecommunications Science, 2014, 30(11): 110-115.
|
[13] |
Lei Gu,Yi Wang.
Construction of Smart City Based on Open Government Data
[J]. Telecommunications Science, 2014, 30(11): 38-43.
|
[14] |
Yubin Yang,Liming Cheng.
A Fine-Grained Mobile Data Security Model
[J]. Telecommunications Science, 2014, 30(1): 15-23.
|
[15] |
Yanxia Zhang,Hong Li,Jun Chen,Xiaoguang Yang.
Research on Information Security Mechanism Used in Network Video Surveillance System
[J]. Telecommunications Science, 2013, 29(8): 69-73.
|