[1] |
Xiaojian ZHANG, Jiaxuan FEI, Haitao JIANG, Qigui YAO.
Security risk analysis of power 5G hybrid networking
[J]. Telecommunications Science, 2022, 38(1): 132-139.
|
[2] |
Wei DING.
Network security threat prevention and control system of electric power monitoring systems for wind farm
[J]. Telecommunications Science, 2020, 36(5): 138-144.
|
[3] |
Qi LIANG.
Security& safety protection solution of ICS
[J]. Telecommunications Science, 2018, 34(4): 144-150.
|
[4] |
Liang SHEN,Dong WANG,Jiaxing XUAN.
Security risk analysis and evaluation techniques in power information system cloud
[J]. Telecommunications Science, 2018, 34(2): 153-160.
|
[5] |
Ying XU,Zhao WU,Zhiqi LI.
Perception technology of virtual threat for large enterprise's information security construction
[J]. Telecommunications Science, 2016, 32(12): 149-156.
|
[6] |
Huifang WANG.
Fuzzy evaluation in the selecting for excellence of telecommunication engineering design
[J]. Telecommunications Science, 2016, 32(11): 161-164.
|
[7] |
Hao CHEN,Sihan QING.
Android malware detection method based on combined algorithm
[J]. Telecommunications Science, 2016, 32(10): 15-21.
|
[8] |
Jian LI,Yun LIU,Chunyan AN,Jianwei REN.
Security technologies in 4G network for power grid
[J]. Telecommunications Science, 2015, 31(Z1): 63-73.
|
[9] |
Wenfen Liu,Shuwei Zhang,Xin Gong.
An Improved Network Risk Evaluation Metbod Based on Markov Game
[J]. Telecommunications Science, 2014, 30(7): 13-18.
|
[10] |
Rong Yue,Hong Li.
Study of Mobile Internet Security Risk and End-to-End Service Security Evaluation
[J]. Telecommunications Science, 2013, 29(8): 74-79.
|
[11] |
Bin Tan.
Analysis and Application of Security Risk Management Based on Business Process Granularity
[J]. Telecommunications Science, 2013, 29(11): 168-172.
|
[12] |
Chao Zhang.
Cost Management Model for Information System
[J]. Telecommunications Science, 2012, 28(6): 141-145.
|
[13] |
Hu Haiyang,Lv Qian,Yu Dongjin and Zhao Gehua.
Research on Efficient and Reliable Service Composition in
Mobile Ad Hoc Networking Based on Risk Analysis
[J]. Telecommunications Science, 2012, 28(11): 42-51.
|
[14] |
Diao Yanrong,Zhou Feng and Shi Fangyan.
A Solution of Arrearages Control in Mobile Internet
[J]. Telecommunications Science, 2009, 25(5): 27-31.
|
[15] |
Yang Zhao,Jian Zhang,Xinfeng Wang.
Research on Graded Network and Information System Security Defense Mechanism
[J]. Telecommunications Science, 2009, 1(2): 80-83.
|