[1] |
Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU.
A survey of V2X security protection technologies
[J]. Telecommunications Science, 2023, 39(3): 1-15.
|
[2] |
Hailong ZHANG, Bo LI, Najuan JIA.
A method for locating fault sections of power optical communication network intelligent operation and maintenance equipment off-grid based on Dijkstra algorithm
[J]. Telecommunications Science, 2023, 39(1): 92-99.
|
[3] |
Dongming ZHAO.
Research and application practice of knowledge graph technology system for telecom-operators
[J]. Telecommunications Science, 2022, 38(8): 151-162.
|
[4] |
Ruiying CHENG, Pan ZHANG, Yu XIAO, Yujie QIAO, Anyi ZHANG.
Time series data based AI operation and maintenance system of cloud network collaboration platform
[J]. Telecommunications Science, 2022, 38(11): 24-35.
|
[5] |
Zhongping WU, Lujie WANG, Jianuo XU, Yanbo WANG, Liwei ZHANG.
Application research of distribution network based on quantum secure communication and 5G hard-slicing private network
[J]. Telecommunications Science, 2022, 38(1): 159-169.
|
[6] |
Jingyu WANG, Cheng ZHOU, Lei ZHANG, Cong LIU, Zirui ZHUANG, Hongwei YANG, Danyang CHEN, Yanhong ZHU, Lu LU, Jianxin LIAO.
Knowledge-defined intent-based network autonomy
[J]. Telecommunications Science, 2021, 37(9): 1-13.
|
[7] |
Su WANG, Hua LU, Shuo WANG, Lei CAI, Tao HUANG.
Research progress of KPI anomaly detection in intelligent operation and maintenance
[J]. Telecommunications Science, 2021, 37(5): 42-51.
|
[8] |
Dongfeng MAO, Man JIA, Xiaoming HE, Zhihua LIU.
Network telemetry technology and its application in automatic network operation and maintenance
[J]. Telecommunications Science, 2021, 37(2): 154-163.
|
[9] |
Yang QU,Beili QIAN,Chengyu ZHANG,Yue LONG,Jie JIA.
Design and implementation of intelligent maintenance system based on blockchain technology
[J]. Telecommunications Science, 2020, 36(5): 152-158.
|
[10] |
Daoyuan LIU,Keda SUN,Junliang ZHOU,Haidong FAN.
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
[J]. Telecommunications Science, 2020, 36(3): 34-41.
|
[11] |
Yuqing ZHONG,Hao WANG,Zebing LIN,Min WANG,Liye CHEN.
Design of multi-key encryption method
[J]. Telecommunications Science, 2020, 36(11): 89-97.
|
[12] |
Yuan ZHANG,Huifen WANG,Hanming WANG.
Machine vision technology,standardization,and application in safety industry
[J]. Telecommunications Science, 2020, 36(11): 104-112.
|
[13] |
Xiaoyin XI,Xiaoyun YUAN.
Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security
[J]. Telecommunications Science, 2020, 36(11): 134-140.
|
[14] |
Qing LI.
Alarm information association scheme of cloud resource pool based on big data analysis
[J]. Telecommunications Science, 2020, 36(10): 159-171.
|
[15] |
Tianjiao CHEN,Jiang LIU,Tao HUANG.
Application of artificial intelligence in network orchestration system
[J]. Telecommunications Science, 2019, 35(5): 9-16.
|