期刊


ISSN1018-4864
刊名Telecommunication systems
参考译名电信系统
收藏年代2000~2025



全部

2000 2001 2002 2003 2004 2005
2006 2007 2008 2009 2010 2011
2012 2013 2014 2015 2016 2017
2018 2019 2020 2021 2022 2023
2024 2025

2010, vol.43, no.1/2 2010, vol.43, no.3/4 2010, vol.44, no.1/2 2010, vol.44, no.3/4 2010, vol.45, no.1 2010, vol.45, no.2/3
2010, vol.45, no.4

题名作者出版年年卷期
A new worm propagation threat in BitTorrent: modeling and analysisSinan Hatahet; Abdelmadjid Bouabdallah; Yacine Challal20102010, vol.45, no.2/3
GTHBAC: A Generalized Temporal History Based Access Control ModelAli Noorollahi Ravari; Jafar Haadi Jafarian; Morteza Amini; Rasool Jalili20102010, vol.45, no.2/3
Towards the realisation of context-risk-aware access control in pervasive computingAli Ahmed; Ning Zhang20102010, vol.45, no.2/3
Information system security compliance to FISMA standard: a quantitative measureElaine Hulitt; Rayford B. Vaughn20102010, vol.45, no.2/3
LACK - a VoIP steganographic methodWojciech Mazurczyk; Jozef Lubacz20102010, vol.45, no.2/3
Developing wireless sensor network applications in a virtual environmentNicholas M. Boers; Pawet Gburzyriski; Ioanis Nikolaidis; Wiodek Olesiriski20102010, vol.45, no.2/3
Conception approach of access control in heterogeneous information systems using UMLAneta Poniszewska-Maranda20102010, vol.45, no.2/3
Analysis of IPv6 handovers in IEEE 802.16 environmentTomasz Mrugalski; Jozef Wozniak20102010, vol.45, no.2/3
Real-time automated risk assessment in protected core networkingKonrad Wrona; Geir Hallingstad20102010, vol.45, no.2/3
Defending the weakest link: phishing websites detection by analysing user behavioursXun Dong; John A. Clark; Jeremy L. Jacob20102010, vol.45, no.2/3
12