Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecom Engineering Technics and Standardization
1008-5599
2011 Issue 10
Research and analysis of the re-capturing porn sites
SU Li;CONG Jian;ZHAO Le-yi
..............
page:11-14
Study of basic information security evaluation system
DU Xue-tao;LI You-guo;YUAN Jie;ZHAO Bei;CHEN Tao
..............
page:20-24
Application of image recognition technology in mobile Intemet
ZHANG Chen-min
..............
page:67-69
Information safety management and practice of China Mobile
ZHANG Bin
..............
page:1-6
Discussion on applications of PID technology in metro optical transport network
WANG Jian-wei
..............
page:75-78
Two-way reliable network framework
LIU Jia;DU Xue-tao
..............
page:57-61
Research of WLAN test system and congestion control strategy based on cross-AC switching
ZHOU Xue-song;LI Bin;WANG Qi;ZHAO Wang-fei
..............
page:82-86
Exploration on Intemet data services security measures
SUN Xiu-cheng
..............
page:54-57
Discussion on the application of the honeynet in the telecommunications industry
TANG Hong-yu
..............
page:62-66
Study on the analysis and strategies of mobile coprological information
ZHOU Xiao-lei;ZHAO Gang;LI Hai-yah;CHENG Xiao-ming;HUANG Cheng-huan
..............
page:25-28
Principle of DDoS attack and the application of anti-DDoS system
QU Jin-guang
..............
page:50-53
Introduction of safety evaluation system
JLANG Jing;DONG Zhi-chun;LV Ming;ZHANG Qing
..............
page:46-49
xin xi dong tai
..............
page:91-92,53,66,86,24
Research and design of universal plug and play device access control and security protocol
MENG Xiang-yu;WANG Chun;LI Wei
..............
page:70-74
Research in the control of spam message
WU Zhen-kui;LOU Tao;TIAN Gang;LAI Xiao-long;QIAO Yun
..............
page:29-32
Discuss on battery used in energy efficient base station
WANG Xiao-ping;ZHAO Li-ming
..............
page:78-81
Comprehensive management system of basic information security
HOU Fang;YAN Jun;ZHU Dong-lai;SUN Run-tao;SUN Jing
..............
page:42-45
Research based on MSC pool N+1 centralized backup solution
SHI Chao-yun;HU Sheng-hong
..............
page:87-90
Briefly discussion on the construction of China mobile lntemet base information security system
WANG Jia;FENG Yun-bo;SUN Li-jun;HUANG Guo-xiong;YE Zhi-xiong
..............
page:7-10
Construction of the data anti-leakage security system
JIANG Jia-xing;QIAO Zhe;CHEN Xi;LIAO Wei
..............
page:33-37
General report of mobile virus governance
LAI Xiao-yang;HONG Jing;HANG Yue-bin
..............
page:38-41
Service security for WLAN
WANG Zi-liang;LI Xiang-jun;LIU Song-sen
..............
page:15-19