[1] |
Shengli ZHOU, Keyi JIANG, Bo XU, Rui XU, Xikang ZHANG, Quanzhe ZHAO, Yangdong XU.
Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud
[J]. Telecommunications Science, 2023, 39(6): 122-128.
|
[2] |
Liang XU, Ye WANG, Ran ZHENG, Jiheng ZHANG, Ping YUAN, Xinyang LI, Yu TIAN.
Design and application of multi-dimensional evaluation model of telecommunication network operations and maintenance
[J]. Telecommunications Science, 2023, 39(4): 142-151.
|
[3] |
Chuanbing GONG, Mingshuai YANG, Song WU, Haiping GE, Shouguo ZHANG, Lei LIU, Yunshan QI, Hui XU.
Research on the application of site value evaluation model
[J]. Telecommunications Science, 2023, 39(1): 100-107.
|
[4] |
Lu LIU, Dan YANG, Ruijie CHEN, Jia LI, Xi ZHOU.
Research on POI quality prediction based on KPCA-GA-BP neural network
[J]. Telecommunications Science, 2023, 39(1): 108-116.
|
[5] |
Lunlong ZHONG, Jiongpo LIU, Yongyu LIU.
Induced spoofing detection method based on error valuation accumulation open-loop correction
[J]. Telecommunications Science, 2022, 38(9): 116-128.
|
[6] |
Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, Ruolan LI, Hua ZHANG.
Research and practice of network security threat intelligence management system for power enterprise
[J]. Telecommunications Science, 2022, 38(7): 184-189.
|
[7] |
Yijiang LI, Huibiao YE, Renhua XIE, Jiali LOU, Danna ZHUANG, Chuanhuang LI.
Intelligent prediction method of network performance based on graph neural network
[J]. Telecommunications Science, 2022, 38(3): 143-157.
|
[8] |
Cheng DING, Jinrong CHEN, Xiaodong CAO, Yi WANG.
Quality of service based hierarchical resource allocation algorithm
[J]. Telecommunications Science, 2022, 38(1): 102-111.
|
[9] |
Jie DONG, Hengzhi LI, Yan CHEN, Wenjuan WANG.
Research and prospect on economic value evaluation and pricing mechanism of spectrum resources
[J]. Telecommunications Science, 2021, 37(7): 107-114.
|
[10] |
Jinfeng XIE, Hanqi YAN, Bingguang DENG, Yan ZHANG.
Development research of terminal evaluation system of internet of things
[J]. Telecommunications Science, 2021, 37(2): 63-70.
|
[11] |
Jian XU,Li JIN.
A quantifiable cloud computing platform security evaluation model
[J]. Telecommunications Science, 2020, 36(7): 163-167.
|
[12] |
Tao PANG,Haihua QIU,Biying PAN.
Research on artificial intelligence key technologies of mobile terminal
[J]. Telecommunications Science, 2020, 36(5): 145-151.
|
[13] |
Qizhu ZHONG.
Research and application of media streams based on entropy and FAHP
[J]. Telecommunications Science, 2020, 36(4): 145-153.
|
[14] |
Yongyan LI,Jianping WU.
Wireless sensor node localization based on IPSO-MC
[J]. Telecommunications Science, 2020, 36(3): 11-18.
|
[15] |
Daoyuan LIU,Keda SUN,Junliang ZHOU,Haidong FAN.
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
[J]. Telecommunications Science, 2020, 36(3): 34-41.
|