主页
外文期刊
OA 期刊
电子期刊
外文会议
中文期刊
标准
网络数据库
专业机构
企业门户
起重机械
生产工程
高级检索
关于我们
版权声明
使用帮助
期刊
ISSN
1018-4864
刊名
Telecommunication systems
参考译名
电信系统
收藏年代
2000~2025
全部
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2010, vol.43, no.1/2
2010, vol.43, no.3/4
2010, vol.44, no.1/2
2010, vol.44, no.3/4
2010, vol.45, no.1
2010, vol.45, no.2/3
2010, vol.45, no.4
题名
作者
出版年
年卷期
A new worm propagation threat in BitTorrent: modeling and analysis
Sinan Hatahet; Abdelmadjid Bouabdallah; Yacine Challal
2010
2010, vol.45, no.2/3
GTHBAC: A Generalized Temporal History Based Access Control Model
Ali Noorollahi Ravari; Jafar Haadi Jafarian; Morteza Amini; Rasool Jalili
2010
2010, vol.45, no.2/3
Towards the realisation of context-risk-aware access control in pervasive computing
Ali Ahmed; Ning Zhang
2010
2010, vol.45, no.2/3
Information system security compliance to FISMA standard: a quantitative measure
Elaine Hulitt; Rayford B. Vaughn
2010
2010, vol.45, no.2/3
LACK - a VoIP steganographic method
Wojciech Mazurczyk; Jozef Lubacz
2010
2010, vol.45, no.2/3
Developing wireless sensor network applications in a virtual environment
Nicholas M. Boers; Pawet Gburzyriski; Ioanis Nikolaidis; Wiodek Olesiriski
2010
2010, vol.45, no.2/3
Conception approach of access control in heterogeneous information systems using UML
Aneta Poniszewska-Maranda
2010
2010, vol.45, no.2/3
Analysis of IPv6 handovers in IEEE 802.16 environment
Tomasz Mrugalski; Jozef Wozniak
2010
2010, vol.45, no.2/3
Real-time automated risk assessment in protected core networking
Konrad Wrona; Geir Hallingstad
2010
2010, vol.45, no.2/3
Defending the weakest link: phishing websites detection by analysing user behaviours
Xun Dong; John A. Clark; Jeremy L. Jacob
2010
2010, vol.45, no.2/3
1
2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
京公网安备11010202008970号 机械工业信息研究院 2018-2025