[1] |
Le ZHANG, Hongyuan MA.
Practice on edge cloud security of telecom operators
[J]. Telecommunications Science, 2023, 39(4): 165-172.
|
[2] |
Lijuan YE, Yiting WANG, Licheng ZHU.
Cellular automata model based power network attack prediction technology
[J]. Telecommunications Science, 2023, 39(4): 173-179.
|
[3] |
Jianwu ZHANG, Yanjun AN, Huangyan DENG.
A survey on DNS attack detection and security protection
[J]. Telecommunications Science, 2022, 38(9): 1-17.
|
[4] |
Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, Ruolan LI, Hua ZHANG.
Research and practice of network security threat intelligence management system for power enterprise
[J]. Telecommunications Science, 2022, 38(7): 184-189.
|
[5] |
Jifang JIN, Chengyuan LIU, Xiaohong FAN, Xiaoyi DUAN, Jiayu LIU.
Comparative study of power analysis attacks based on template and KNN algorithm
[J]. Telecommunications Science, 2022, 38(4): 121-129.
|
[6] |
Yatian LIU, Bowen HU, Maofei CHEN, Dongxin LIU.
Study on the 5GC security situational awareness system
[J]. Telecommunications Science, 2022, 38(11): 73-85.
|
[7] |
Yue GU, Dan LI, Kaihui GAO.
Research on network traffic classification based on machine learning and deep learning
[J]. Telecommunications Science, 2021, 37(3): 105-113.
|
[8] |
Wenjun HOU, Bing BAI, Benzhi YANG.
Research on the development and business trend of holographic technology under 6G network
[J]. Telecommunications Science, 2021, 37(11): 1-10.
|
[9] |
Yanshang YIN, Tongpeng SUO, Ligang DONG, Xian JIANG.
SDN security prediction method based on bayesian attack graph
[J]. Telecommunications Science, 2021, 37(11): 75-85.
|
[10] |
Jiantao SHENG,Maofei CHEN,Dongxin LIU,Laifu WANG,Guoshui SHI,Huamin JIN.
Detection of malicious domain name based on a classifier combination
[J]. Telecommunications Science, 2020, 36(5): 47-55.
|
[11] |
Ming GAO,Jin LUO,Huiying ZHOU,Hai JIAO,Lili YING.
A differential feedback scheduling decision algorithm based on mimic defense
[J]. Telecommunications Science, 2020, 36(5): 73-82.
|
[12] |
Yuanying XIAO,Yaodong YOU,Lixi XIANG.
Causes and optimization of the false alarm rate of code review system
[J]. Telecommunications Science, 2020, 36(12): 155-162.
|
[13] |
Zhiqiang YANG,Li SU,Minpeng QI,Bo YANG.
Overview and prospect of 5G security
[J]. Telecommunications Science, 2020, 36(12): 1-19.
|
[14] |
Guofeng HE.
Application protection in 5G cloud network using zero trust architecture
[J]. Telecommunications Science, 2020, 36(12): 123-132.
|
[15] |
Ping XIE,Xiaosong LIU.
Security of the deployment of SDN-based IoT using blockchain
[J]. Telecommunications Science, 2020, 36(12): 139-146.
|