[1] |
Xue HAN.
Damage toughness assessment method of power backbone communication network based on power big data
[J]. Telecommunications Science, 2023, 39(5): 136-143.
|
[2] |
Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU.
A survey of V2X security protection technologies
[J]. Telecommunications Science, 2023, 39(3): 1-15.
|
[3] |
Wenjuan XING, Bo LEI, Qianying ZHAO.
Development status and trend prospect of computing power infrastructure
[J]. Telecommunications Science, 2022, 38(6): 51-61.
|
[4] |
Pingke DENG, Tongxu ZHANG, Nanxiang SHI, Tong ZHANG, Tianzhu SHAO, Shaowen ZHENG.
Computing satellite networks—the novel development of computing-empowered space-air-ground integrated networks
[J]. Telecommunications Science, 2022, 38(6): 71-81.
|
[5] |
Jiangxing WU.
Revolution of the development paradigm of network technology system—network of networks
[J]. Telecommunications Science, 2022, 38(6): 3-12.
|
[6] |
Kun MA, Lingyu XU, Xiaoping SHEN, Zhicheng GONG, Jianping LAN, Shuangxi CHEN, Jun QIAN.
Virtual machine scheduling model based on Shapley value modified genetic algorithm in cloud computing
[J]. Telecommunications Science, 2022, 38(12): 1-10.
|
[7] |
Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU.
Research and practice of SASE cloud security
[J]. Telecommunications Science, 2022, 38(1): 140-149.
|
[8] |
Zhongping WU, Lujie WANG, Jianuo XU, Yanbo WANG, Liwei ZHANG.
Application research of distribution network based on quantum secure communication and 5G hard-slicing private network
[J]. Telecommunications Science, 2022, 38(1): 159-169.
|
[9] |
Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG.
Big data security features and operation practices
[J]. Telecommunications Science, 2021, 37(5): 160-169.
|
[10] |
Jian XU,Li JIN.
A quantifiable cloud computing platform security evaluation model
[J]. Telecommunications Science, 2020, 36(7): 163-167.
|
[11] |
Xiaohui YAO,Qing LI,Kunkun SUN.
A domain adaptive hybrid genetic algorithm and its verification in security service function chain orchestration
[J]. Telecommunications Science, 2020, 36(5): 16-24.
|
[12] |
Daoyuan LIU,Keda SUN,Junliang ZHOU,Haidong FAN.
Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises
[J]. Telecommunications Science, 2020, 36(3): 34-41.
|
[13] |
Sining LUO,Hualong WANG,Hongyu LI,Wei PENG.
Improved ant colony algorithm based cloud computing user task scheduling algorithm
[J]. Telecommunications Science, 2020, 36(2): 95-100.
|
[14] |
Mengyao LU,Hongyu TANG,Wei TANG,Jian ZHANG.
Adaptive security architecture defense platform based on software defined security
[J]. Telecommunications Science, 2020, 36(12): 133-138.
|
[15] |
Yuqing ZHONG,Hao WANG,Zebing LIN,Min WANG,Liye CHEN.
Design of multi-key encryption method
[J]. Telecommunications Science, 2020, 36(11): 89-97.
|