知识中心主页
文献服务
文献资源
外文期刊
外文会议
专业机构
智能制造
高级检索
版权声明
使用帮助
期刊
ISSN
1018-4864
刊名
Telecommunication systems
参考译名
电信系统
收藏年代
2000~2024
全部
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2010, vol.43, no.1/2
2010, vol.43, no.3/4
2010, vol.44, no.1/2
2010, vol.44, no.3/4
2010, vol.45, no.1
2010, vol.45, no.2/3
2010, vol.45, no.4
题名
作者
出版年
年卷期
A new worm propagation threat in BitTorrent: modeling and analysis
Sinan Hatahet; Abdelmadjid Bouabdallah; Yacine Challal
2010
2010, vol.45, no.2/3
GTHBAC: A Generalized Temporal History Based Access Control Model
Ali Noorollahi Ravari; Jafar Haadi Jafarian; Morteza Amini; Rasool Jalili
2010
2010, vol.45, no.2/3
Towards the realisation of context-risk-aware access control in pervasive computing
Ali Ahmed; Ning Zhang
2010
2010, vol.45, no.2/3
Information system security compliance to FISMA standard: a quantitative measure
Elaine Hulitt; Rayford B. Vaughn
2010
2010, vol.45, no.2/3
LACK - a VoIP steganographic method
Wojciech Mazurczyk; Jozef Lubacz
2010
2010, vol.45, no.2/3
Developing wireless sensor network applications in a virtual environment
Nicholas M. Boers; Pawet Gburzyriski; Ioanis Nikolaidis; Wiodek Olesiriski
2010
2010, vol.45, no.2/3
Conception approach of access control in heterogeneous information systems using UML
Aneta Poniszewska-Maranda
2010
2010, vol.45, no.2/3
Analysis of IPv6 handovers in IEEE 802.16 environment
Tomasz Mrugalski; Jozef Wozniak
2010
2010, vol.45, no.2/3
Real-time automated risk assessment in protected core networking
Konrad Wrona; Geir Hallingstad
2010
2010, vol.45, no.2/3
Defending the weakest link: phishing websites detection by analysing user behaviours
Xun Dong; John A. Clark; Jeremy L. Jacob
2010
2010, vol.45, no.2/3
1
2
制造业外文文献服务平台