Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Telecom Engineering Technics and Standardization
1008-5599
2015 Issue 12
Big data application in information security analysis
zhang bin ;
..............page:1-5
Study and practice for information security data resource sharing based on improved SID model
WANG Xiao-qing;,HONG Dong;,QIAO Zhe;,DU Xue-tao;
..............page:6-10
Construction of the mobile application security testing system
chen xi ;, liu ying qing ;, ye yun fang ;
..............page:11-16
The management of mobile phone real name based on bad information big data
ZHU Yan-fen;,ZHAO Ke;,LIU Yang;
..............page:17-20
The study on real time IDS alarm based on the P2DR model
ZHANG Juan-juan;,JIANG Yi;,ZHANG Hai-tao;
..............page:26-30
Anti-spam SMS system based on multi classifier fusion
LIU Wen-long;,SHI Zhen-jun;
..............page:31-36
Research of cyber security situation awareness base on APT attack chain
WU Peng;,HUANG Fu-tao;
..............page:43-47
The standardization progress and solution of security assessment of networking system
ZHAO Bei;,DU Xue-tao;,XUE Shan;,WU Ri-qiefu;
..............page:50-53
Design scheme of heterogeneous virtualization system abstraction layer
LIU Hua-dong;,WANG Chun;
..............page:64-68
A kind of LTE high-rise residential coverage solution with low cost and easy consonance
dong jian ;, li xiao ming ;, wang chao ;, wang rong jun ;
..............page:69-72
The application strategy research of spectrum flexible optical networks
lu ;, yang yan ping ;
..............page:77-82
Design and optimization of back-off algorithm based on Licensed Assisted Access
WANG Shuang;,ZHANG Meng;,DONG Hong-feng;,ZHANG Xin;
..............page:83-87
xin xi dong tai
..............page:88
zuo pin xuan
..............page:封3