期刊


ISSN1018-4864
刊名Telecommunication systems
参考译名电信系统
收藏年代2000~2024



全部

2000 2001 2002 2003 2004 2005
2006 2007 2008 2009 2010 2011
2012 2013 2014 2015 2016 2017
2018 2019 2020 2021 2022 2023
2024

2010, vol.43, no.1/2 2010, vol.43, no.3/4 2010, vol.44, no.1/2 2010, vol.44, no.3/4 2010, vol.45, no.1 2010, vol.45, no.2/3
2010, vol.45, no.4

题名作者出版年年卷期
A new worm propagation threat in BitTorrent: modeling and analysisSinan Hatahet; Abdelmadjid Bouabdallah; Yacine Challal20102010, vol.45, no.2/3
GTHBAC: A Generalized Temporal History Based Access Control ModelAli Noorollahi Ravari; Jafar Haadi Jafarian; Morteza Amini; Rasool Jalili20102010, vol.45, no.2/3
Towards the realisation of context-risk-aware access control in pervasive computingAli Ahmed; Ning Zhang20102010, vol.45, no.2/3
Information system security compliance to FISMA standard: a quantitative measureElaine Hulitt; Rayford B. Vaughn20102010, vol.45, no.2/3
LACK - a VoIP steganographic methodWojciech Mazurczyk; Jozef Lubacz20102010, vol.45, no.2/3
Developing wireless sensor network applications in a virtual environmentNicholas M. Boers; Pawet Gburzyriski; Ioanis Nikolaidis; Wiodek Olesiriski20102010, vol.45, no.2/3
Conception approach of access control in heterogeneous information systems using UMLAneta Poniszewska-Maranda20102010, vol.45, no.2/3
Analysis of IPv6 handovers in IEEE 802.16 environmentTomasz Mrugalski; Jozef Wozniak20102010, vol.45, no.2/3
Real-time automated risk assessment in protected core networkingKonrad Wrona; Geir Hallingstad20102010, vol.45, no.2/3
Defending the weakest link: phishing websites detection by analysing user behavioursXun Dong; John A. Clark; Jeremy L. Jacob20102010, vol.45, no.2/3
12