[1] |
Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, Ruolan LI, Hua ZHANG.
Research and practice of network security threat intelligence management system for power enterprise
[J]. Telecommunications Science, 2022, 38(7): 184-189.
|
[2] |
Haitao ZHANG, Yi JIANG, Shijie ZHU, Qi CHEN.
Research and application exploration of threat intelligence system of telecom operators
[J]. Telecommunications Science, 2022, 38(12): 121-132.
|
[3] |
Mingxia BO,Hongyu TANG,Chen MA,Jian ZHANG.
Application of security threat intelligence based on big data analysis in telecom operators
[J]. Telecommunications Science, 2020, 36(11): 127-133.
|
[4] |
Hansheng LIU,Hongyu TANG,Mingxia BO,Jianfeng NIU,Tianbo LI,Lingxiao LI.
A multi-source threat intelligence confidence value evaluation method based on machine learning
[J]. Telecommunications Science, 2020, 36(1): 119-126.
|
[5] |
Huaijian XIA,Wen ZHAGN,Sujin JIA,Haiying LIN,Xinfang HE.
Power substitution potential user identification model based on big data
[J]. Telecommunications Science, 2019, 35(2): 142-146.
|
[6] |
Yang YU,Shaomin ZHU,Chaoyi BIAN.
Knowledge graph based ubiquitous power IoT security visualization technology
[J]. Telecommunications Science, 2019, 35(11): 132-139.
|
[7] |
Yanfang HOU,Jinhua WANG.
Big data security analysis method based on self-update threat intelligence database
[J]. Telecommunications Science, 2018, 34(3): 50-58.
|
[8] |
Liang SHEN,Dong WANG,Jiaxing XUAN.
Security risk analysis and evaluation techniques in power information system cloud
[J]. Telecommunications Science, 2018, 34(2): 153-160.
|
[9] |
Chunmei GUO,Jun MA,Hao GUO,Xueyao BI,Ruhui ZHANG,Shaomin ZHU,Congyi YANG.
Analysis of software defined security model and architecture
[J]. Telecommunications Science, 2017, 33(6): 186-192.
|
[10] |
Ying XU,Zhao WU,Zhiqi LI.
Perception technology of virtual threat for large enterprise's information security construction
[J]. Telecommunications Science, 2016, 32(12): 149-156.
|
[11] |
Jiahua Zhang,Zhongxue Yang,Jiangping Wang,Yukai Shi,Liang Wei.
SDN Communication Quality Assurance Strategy witb DDoS Defense and Routing Optimization
[J]. Telecommunications Science, 2015, 31(4): 120-126.
|
[12] |
Mingjie Ma,Fenggang Sun,Lidong Zhai,Yuejin Du.
Security Cballenges Facing Our Country and Countermeasure Recommendations Under New Network Security Tbreats
[J]. Telecommunications Science, 2014, 30(7): 8-12.
|
[13] |
Hongtao Bai,Hailong Liu,Xiaoming Ren,Fei Liu.
Overview of Mobile Communication Services Security
[J]. Telecommunications Science, 2009, 1(2): 21-28.
|
[14] |
Zhibin Zheng.
Security Threats and Technology Development Trends of Information Network
[J]. Telecommunications Science, 2009, 1(2): 28-34.
|
[15] |
Bai Hongtao,Liu Hailong,Ren Xiaoming and Liu Fei.
Overview of Mobile Communication Services Security
[J]. Telecommunications Science, 2009, 25(2): 21-28.
|