Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecom Engineering Technics and Standardization
1008-5599
2016 Issue 12
Study on big data security system operation
ZHANG Bin;
..............
page:1-7
APP security protection method based on digital certificate signature verification
QIU Qin;,LIU Lu;,WANG Xin-yu;,BAI Xue;
..............
page:8-11
Visual word based similar image retrieval and clustering
DU Gang;,ZHU Yan-yun;,ZHANG Chen;,DU Xue-tao;
..............
page:12-15
Based on three engine of management, technology, talent to build a more perfect information security system
BAO Sen-cheng;,LI Jie-yi;,HUO Wang;,JI Chen-xiao;
..............
page:16-21
Research on quasi real time monitoring method of pseudo base station based on large data
YAN Hui;,HAN Zeng-hui;,LV Chuan-zhu;
..............
page:22-25
Detection method of phishing website based on imbalance SVM-incremental learning of massive data
YE Zhi-xiong;,WANG Dan-hong;
..............
page:26-31
Research and application of fraud prevention security domain name security management system
WU Jing;,SHI Zhen-jun;
..............
page:32-35
Software security based on copyright information protection:a survey
SHI Wen;
..............
page:36-41
Embedded security management system of mobile internet services
ZHANG Zhi;
..............
page:42-46
Application of technology in spam short messages controlling
MA Run-min;,LI Ying;
..............
page:47-50
he san wei yi at & t/ shi dai hua na da zao xin xing tmt shang ye di guo
..............
page:51-54
hua wei shou yu qorvo you xiu he zuo huo ban jiang xiang
..............
page:54-54
Research on key technology of 5G
WEI Yun-feng;,LIU Qing-dong;,YANG Rui;
..............
page:55-60
Design and implementation of monitoring system for the ETL workflows in heterogeneous scheduling environment
WANG Hong-bin;,WANG Chun;
..............
page:61-65
LTE micro cellular compensation strategy based on the road test data
ZHANG Ying;,WANG Wei;
..............
page:66-71
Research on the architecture of information security system in cloud computing environment
CHEN E-xiang;,PEI Jun-hao;,XIANG Hui;
..............
page:72-77
Research on the application of CoMP technology in LTE-A
BI Jun-jie;,AI Xiu-qing;,CHEN Xin;,GAO Ming-hao;
..............
page:78-81
Applications of PCC open ability
LI Bao-yan;,YANG Lin;,YU Fu-dong;
..............
page:82-86
avaya xie shou teng xun yun kai qi zhan lue he zuo
..............
page:86-86
dong tai
..............
page:87-88