Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Modern Science & Technology of Telecommunications
1002-5316
2016 Issue 3
The research of information security standards for network devices of critical infrastructure cybersecurity
ZHANG Zhibing;,LI Mowen;,NI Ping;,ZHOU Kaibo;,LI Li;
..............
page:1-5
The Web security of network devices
NI Ping;,ZHANG Zhibing;,ZHOU Kaibo;,LI Li;
..............
page:6-10,15
Security threats and counter measures related to Telnet of network devices
ZHOU Kaibo;,ZHANG Zhibing;,NI Ping;,LI Li;
..............
page:11-15
Security threats and counter measures related to SNMP of network devices
ZHOU Kaibo;,ZHANG Zhibing;,NI Ping;,LI Li;
..............
page:16-20,33
Security threats and counter measures related to HTTP of network devices
NI Ping;,ZHANG Zhibing;,ZHOU Kaibo;,LI Li;
..............
page:21-28
Research on the effect for energy consuming by raising the environmental temperature of sever room
LIU Yiheng;,YU Haibin;,ZHANG Hu;,ZHAO Ning;
..............
page:29-33
Research and development of OpenFlow 1.3 protocol conformance testing platform
CHEN Lei;
..............
page:34-40
Evaluation of antenna integrated base station equipment
ZHANG Yu;,WU Xiang;,LIU Gang;,WANG Wenyue;
..............
page:41-44
The complexity of network fake governance in China
LI Qiangzhi;
..............
page:45-48,54
Study on the technical solutions of WLAN and cellular networks integration
LIU Di;,SHEN Pengfei;,DUO Hao;
..............
page:49-54
Research on VoWi-Fi solution based on ePDG architecture
MA Hongyuan;,ZHANG Le;,BU Zhonggui;,WANG Xiaozhou;
..............
page:55-59
Restudy on effect of remote stations on transport network
LIN Yan;
..............
page:60-64
Artificial Intelligence revolution is coming
ZHAO Xu;,YUAN Wei;
..............
page:65-68
The research of UVA technology application development and regulation
ZHANG Jun;
..............
page:69-71,78
Modeling and strategy analysis of high-capacity business platform access
WANG Jin;,CHEN Xiaoyue;,YU Yao;
..............
page:72-75
Governance of Spam Messages from MVNOs
HE Huan;
..............
page:76-78