[1] |
Nian TAO, Sheng ZHANG, Tai FU.
Analysis of the development trend and key scenarios of smart communities based on 5G+AIoT
[J]. Telecommunications Science, 2022, 38(Z1): 231-239.
|
[2] |
Ning JIN, Qingyang WANG.
Research on clustering algorithm based 6G typical usage scenarios
[J]. Telecommunications Science, 2022, 38(1): 121-131.
|
[3] |
Feiyang LIU, Kun LI, Fei SONG, Huachun ZHOU.
Construction of DDoS attacks malicious behavior knowledge base construction
[J]. Telecommunications Science, 2021, 37(11): 17-32.
|
[4] |
Mingxia BO,Hongyu TANG,Chen MA,Jian ZHANG.
Application of security threat intelligence based on big data analysis in telecom operators
[J]. Telecommunications Science, 2020, 36(11): 127-133.
|
[5] |
Zhe TU,Huachun ZHOU,Kun LI,Weilin WANG.
Endogenous detection framework of malicious behavior in information network
[J]. Telecommunications Science, 2020, 36(10): 37-45.
|
[6] |
Yixiang ZHU,Kang ZHANG,Weiqing WANG.
Review of iOS malicious application analysis
[J]. Telecommunications Science, 2017, 33(2): 42-47.
|
[7] |
Linjie WANG.
Task scheduling scheme based on improved particle swarm optimization with biological symbiosis mechanism in cloud computing
[J]. Telecommunications Science, 2016, 32(9): 113-119.
|
[8] |
Xiaobei Chen,Kejun Wei.
Global Research and Standardization Progress of 5G
[J]. Telecommunications Science, 2015, 31(5): 10-13.
|
[9] |
Dong Shuanghe,Yan Binfeng,Hu Bo and Guo Xiaohua.
Technology and Application of High-Capacity USIM Card
[J]. Telecommunications Science, 2015, 31(3): 2015075-.
|
[10] |
Hou Yuhua and Zhou Xiaolong.
Security Problems and Solutions of Smart Terminal Mobile Operating System
[J]. Telecommunications Science, 2015, 31(3): 2015077-.
|
[11] |
Yuhua Hou,Xiaolong Zhou.
Security Problems and Solutions of Smart Terminal Mobile Operating System
[J]. Telecommunications Science, 2015, 31(3): 8-12.
|
[12] |
Shanjin Ni,Junhui Zhao.
Key Technologies in Physical Layer of 5G Wireless Communications Network
[J]. Telecommunications Science, 2015, 31(12): 40-45.
|
[13] |
Wei Liu,Haiyan Chen.
LTE Network Planning in Current Co-Existing GSM/TD-SCDMA/WLAN Systems
[J]. Telecommunications Science, 2014, 30(9): 164-168.
|
[14] |
Jianchuang Ning,Bin Tan,Yeyu Liang.
Treasury Pattern Analysis and Application Based on Security Control Platform
[J]. Telecommunications Science, 2013, 29(6): 170-176.
|
[15] |
Xuan Luo,Baiqing Liang,Junbiao Pan,Yue Huang.
Study on the Key Technologies of Smartphone Application Security
[J]. Telecommunications Science, 2013, 29(5): 19-27.
|