[1] |
Shengli ZHOU, Keyi JIANG, Bo XU, Rui XU, Xikang ZHANG, Quanzhe ZHAO, Yangdong XU.
Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud
[J]. Telecommunications Science, 2023, 39(6): 122-128.
|
[2] |
Liang XU, Ye WANG, Ran ZHENG, Jiheng ZHANG, Ping YUAN, Xinyang LI, Yu TIAN.
Design and application of multi-dimensional evaluation model of telecommunication network operations and maintenance
[J]. Telecommunications Science, 2023, 39(4): 142-151.
|
[3] |
Chuanbing GONG, Mingshuai YANG, Song WU, Haiping GE, Shouguo ZHANG, Lei LIU, Yunshan QI, Hui XU.
Research on the application of site value evaluation model
[J]. Telecommunications Science, 2023, 39(1): 100-107.
|
[4] |
Lu LIU, Dan YANG, Ruijie CHEN, Jia LI, Xi ZHOU.
Research on POI quality prediction based on KPCA-GA-BP neural network
[J]. Telecommunications Science, 2023, 39(1): 108-116.
|
[5] |
Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, Ruolan LI, Hua ZHANG.
Research and practice of network security threat intelligence management system for power enterprise
[J]. Telecommunications Science, 2022, 38(7): 184-189.
|
[6] |
Jie DONG, Hengzhi LI, Yan CHEN, Wenjuan WANG.
Research and prospect on economic value evaluation and pricing mechanism of spectrum resources
[J]. Telecommunications Science, 2021, 37(7): 107-114.
|
[7] |
Jinfeng XIE, Hanqi YAN, Bingguang DENG, Yan ZHANG.
Development research of terminal evaluation system of internet of things
[J]. Telecommunications Science, 2021, 37(2): 63-70.
|
[8] |
Jian XU,Li JIN.
A quantifiable cloud computing platform security evaluation model
[J]. Telecommunications Science, 2020, 36(7): 163-167.
|
[9] |
Qizhu ZHONG.
Research and application of media streams based on entropy and FAHP
[J]. Telecommunications Science, 2020, 36(4): 145-153.
|
[10] |
Daoyuan LIU,Keda SUN,Junliang ZHOU,Haidong FAN.
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
[J]. Telecommunications Science, 2020, 36(3): 34-41.
|
[11] |
Haoran LIU,Xingqi WANG,Yujing DENG,Yuhua QIN.
Evaluation model of node importance in directed scale-free network based on cascade failure
[J]. Telecommunications Science, 2020, 36(2): 43-51.
|
[12] |
Yusun FU.
Evaluation criteria and solution of mobile communication network
[J]. Telecommunications Science, 2020, 36(11): 28-38.
|
[13] |
Jun WANG,Xiaodong JI,Xinran ZHANG,Xiaoran WEN,Jiajun TONG.
Performance evaluation of 5G cellular vehicle networks
[J]. Telecommunications Science, 2020, 36(1): 49-57.
|
[14] |
Hansheng LIU,Hongyu TANG,Mingxia BO,Jianfeng NIU,Tianbo LI,Lingxiao LI.
A multi-source threat intelligence confidence value evaluation method based on machine learning
[J]. Telecommunications Science, 2020, 36(1): 119-126.
|
[15] |
Xiaohong CAO,Siya XU,Guiping ZHOU,·ingjie WANG,Botao ·U.
Multi-level and multi-index planning and evaluation method for optical network
[J]. Telecommunications Science, 2019, 35(9): 58-68.
|