共 50 条
- [31] GSM security issues and challenges [J]. SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 413 - +
- [32] Solutions to the GSM Security Weaknesses [J]. NGMAST 2008: SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2008, : 576 - 581
- [33] Communication Security in GSM Networks [J]. SECTECH: 2008 INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 248 - 251
- [35] An Approach to Analyze and Model the Information Flow on Spacecraft Platform Network [J]. PROCEEDINGS OF THE 2017 12TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2017, : 1669 - 1674
- [36] Layered protocols approach to analyze haptic communication over a network [J]. WORLD HAPTICS CONFERENCE: FIRST JOINT EUROHAPTICS CONFERENCE AND SYMPOSIUM ON HAPTIC INTERFACES FOR VIRUTUAL ENVIRONMENT AND TELEOPERATOR SYSTEMS, PROCEEDINGS, 2005, : 30 - 39
- [37] Amplified DWDM Communication Network: An Approach to analyze the characteristic Performance [J]. 2015 TWELFTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2015,
- [38] Modelling and Analysis of Network Security - an Algebraic Approach [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 308 - 315
- [39] Integration soft computing approach to network security [J]. AMS 2007: FIRST ASIA INTERNATIONAL CONFERENCE ON MODELLING & SIMULATION ASIA MODELLING SYMPOSIUM, PROCEEDINGS, 2007, : 159 - 164
- [40] Data Security Approach for Online Social Network [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 262 - 267