[1] |
Nian TAO, Sheng ZHANG, Tai FU.
Analysis of the development trend and key scenarios of smart communities based on 5G+AIoT
[J]. Telecommunications Science, 2022, 38(Z1): 231-239.
|
[2] |
Ning JIN, Qingyang WANG.
Research on clustering algorithm based 6G typical usage scenarios
[J]. Telecommunications Science, 2022, 38(1): 121-131.
|
[3] |
Mingxia BO,Hongyu TANG,Chen MA,Jian ZHANG.
Application of security threat intelligence based on big data analysis in telecom operators
[J]. Telecommunications Science, 2020, 36(11): 127-133.
|
[4] |
Jiaren JIANG,GLiu JIAN,Weiqing WANG.
Android security reinforcing scheme of intelligent terminal based on certificate chain authentication mechanism
[J]. Telecommunications Science, 2017, 33(2): 32-35.
|
[5] |
Yixiang ZHU,Kang ZHANG,Weiqing WANG.
Review of iOS malicious application analysis
[J]. Telecommunications Science, 2017, 33(2): 42-47.
|
[6] |
Yuliang WANG,Xiaodong CHEN,Tun WU.
Research on malicious behavior detection based on iOS system
[J]. Telecommunications Science, 2017, 33(2): 48-54.
|
[7] |
Linjie WANG.
Task scheduling scheme based on improved particle swarm optimization with biological symbiosis mechanism in cloud computing
[J]. Telecommunications Science, 2016, 32(9): 113-119.
|
[8] |
Yaling LUO,Wenwei LI,Xin SU.
HTTP behavior characteristics generation and extraction approach for Android malware
[J]. Telecommunications Science, 2016, 32(8): 136-145.
|
[9] |
iayuan ZHANGJ.
A detection method of Android system vulnerabilities based on matching
[J]. Telecommunications Science, 2016, 32(5): 132-137.
|
[10] |
Sihan QING.
Research status and outlook of Android security
[J]. Telecommunications Science, 2016, 32(10): 2-14.
|
[11] |
Yang LIU,Weiping WEN.
An obfuscate implementation for Android resources index table
[J]. Telecommunications Science, 2016, 32(10): 22-26.
|
[12] |
Sihan QING.
Research on Android security of broadcasting mechanism
[J]. Telecommunications Science, 2016, 32(10): 27-35.
|
[13] |
Bin XIA,Feng QIU.
Research and realization of the Trojan detection engine based on Android
[J]. Telecommunications Science, 2016, 32(10): 36-41.
|
[14] |
Xihai DENG,Weimiao FENG,Luping MA,Ying LI.
A general attack model based on Android system vulnerability
[J]. Telecommunications Science, 2016, 32(10): 42-49.
|
[15] |
Xiaobei Chen,Kejun Wei.
Global Research and Standardization Progress of 5G
[J]. Telecommunications Science, 2015, 31(5): 10-13.
|