[1] |
Shengli ZHOU, Keyi JIANG, Bo XU, Rui XU, Xikang ZHANG, Quanzhe ZHAO, Yangdong XU.
Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud
[J]. Telecommunications Science, 2023, 39(6): 122-128.
|
[2] |
Shanshan LI, Jianhong XU, Tao LI, Yongjian ZHAO, Zhifei LIU.
Research on digital twin network capability maturity model of telecom operators
[J]. Telecommunications Science, 2023, 39(6): 149-158.
|
[3] |
Sihong ZHANG, Jian ZHANG.
Impact and countermeasures of generative AI represented by ChatGPT on the telecom industry
[J]. Telecommunications Science, 2023, 39(5): 67-75.
|
[4] |
Xue HAN.
Damage toughness assessment method of power backbone communication network based on power big data
[J]. Telecommunications Science, 2023, 39(5): 136-143.
|
[5] |
Tao LI, Chunjia WANG, Shanshan LI.
Research on intelligent scheme of telecommunication network
[J]. Telecommunications Science, 2023, 39(3): 162-172.
|
[6] |
Yudi SUN.
A prediction model of massive 5G network users’ revisit behavior based on telecom big data
[J]. Telecommunications Science, 2023, 39(2): 157-162.
|
[7] |
Jiangxing WU.
Revolution of the development paradigm of network technology system—network of networks
[J]. Telecommunications Science, 2022, 38(6): 3-12.
|
[8] |
Wenjuan XING, Bo LEI, Qianying ZHAO.
Development status and trend prospect of computing power infrastructure
[J]. Telecommunications Science, 2022, 38(6): 51-61.
|
[9] |
Pingke DENG, Tongxu ZHANG, Nanxiang SHI, Tong ZHANG, Tianzhu SHAO, Shaowen ZHENG.
Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks
[J]. Telecommunications Science, 2022, 38(6): 71-81.
|
[10] |
Kun MA, Lingyu XU, Xiaoping SHEN, Zhicheng GONG, Jianping LAN, Shuangxi CHEN, Jun QIAN.
Virtual machine scheduling model based on Shapley value modified genetic algorithm in cloud computing
[J]. Telecommunications Science, 2022, 38(12): 1-10.
|
[11] |
Haitao ZHANG, Yi JIANG, Shijie ZHU, Qi CHEN.
Research and application exploration of threat intelligence system of telecom operators
[J]. Telecommunications Science, 2022, 38(12): 121-132.
|
[12] |
Xiaozhong LIU, Junyu FANG, Yongbin JIANG.
Analysis of telecom operators’ IoT strategy from the perspective of 2G/3G transition
[J]. Telecommunications Science, 2022, 38(10): 153-162.
|
[13] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[14] |
Mingying ZHU, Zhuxuan HUA, Meng SHI.
Research and practice of telecom integrated grid management based on digital transformation
[J]. Telecommunications Science, 2021, 37(11): 128-134.
|
[15] |
Jian XU,Li JIN.
A quantifiable cloud computing platform security evaluation model
[J]. Telecommunications Science, 2020, 36(7): 163-167.
|