Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
Full-Text Search:
Telecommunications Science
FQ: 月刊
AD of Publication: 北京市
Lanuage: 中文;
ISSN: 1000-0801
CN: 11-2103/TN
YP: 1956
Url: 中国通信学会;人民邮电出版社
Recommended Journals
Telecommunications Science
2010 -S2
Catalog
Research on Authenticity Analysis of Audio Evidence Guo Hong
Application of Reverse Engineering in Digital Forensic Sha Jing
A Brief Analysis of the Difficult Issues on ShanghaiDialect Voice Judicial Identification Liu Yangsheng
Forensic Local Behavior of User Zhao Yajie
Electronic Evidence Authentication Technologies and Specifications He Yue1
Discussion on the Trend of Investigation Technology of Information Crime Yang Zhengming1
Complex Cyber Crime Scene Reconstruction Using Multi-View Analysis Linda Zhong1
Research on Computer Crime Forensics and Its Related Law Problems Wang Xueguang
Law Problems and Technical Countermeasures With the Audio-Video Evidence Development Chen Haiyan
Research on Algorithm Optimization for Parameter Quantization in Parametric Stereo in Enhanced AACPlus Xiong Peng
Research on Steganalysis Technique of VoIP Xiong Peng
Analysis on File Systems of Flash-Based Smart Phone Zhang Huiji
Research on Mobile Phone Anti-Forensic Technology Pan Xuanchen
Study on Cell Phone Forensic Standardization Wang Yi
Speaker Recognition Method Based on Stochastic Resonance Pan Ping
Comparison Between Voiceprint From Cyber Chat and Original One Zhang Ying
Multi-Speaker Recognition System Over Telephone Zheng Yanlin
Differential Fault Analysis on Block Ciphers Li Wei
Lawful Interception for Circuit Switched Services in 3rd Generation Mobile Communications System Xu Xingyu1
Transmit Multicast Beamforming Based on Angles Wang Zhenghao
Research on 3G/4G Femtocell Network Formation Tang Wei1
A Rate Control Technology Based on RCP-LDPC Code for Cooperative UWB System Chen Fangni
Research on Clock Synchronization Algorithm in Packet Networks Cai Jun
Research and Prototype Implementation of BCMCS Technology Wang Shuai1
Research of Handover Algorithm in 3GPP LTE System Liu Qiang1
A Semi-Static Inter-Cell Interference CoordinationScheme in LTE System Li Danhua
Design and Realization of SoC Short-Range Wireless Transceiver Li Hongxue1
Design of Short-Range Wireless Communication Terminal Based on Wireless USB Technology Yu Qiao
Amalgamation of Cloud Computing and Super Computing Li Yingxue
Comparative Research of Fine-Grained Data Integrity Check Methods Chen Long
Research on Electronic Forensics Based on Specific Cyberspace Su Hong1
Criterion of Computer Forensics Systematic Process Mai Yonghao1
Study on Issues Related to Computer Anti-Forensic Cai Liming1
Analysis and Data Recovery on Windows exFAT File System Qian Jingjie
Application of Password Recovery Based on GPU Parallel Technology Tang Weibin
Talking About The Network Video Media UnauthorizedSpread of Intelligent Forensic Analysis Luo Jun1
Research on Application of Image Signal Processing Technology for Image Forensics Cheng Yan
Study on the Platform for Digital Forensics Yao Wei1
Research on the Trend of Development of Digital Forensic Lab Zhao Yong
Research on Performance Evaluation for Steganalysis Ma Xiuying
Entropy Applied in the Field of Digital Forensics Xu Zhiqiang
Active Forensics System Based on Honeypot Technology Xue Lei
Using Linux System to Prevent the Computer Anti-Forensics Zou Ying
Specifics and Problems of Collecting Evidence of Computing Crime Wang Shuai
Research of Constructing the Systematic Course of Computer Forensics Tang Yuejin
Teaching Research on Computer Forensics Experiment Hu Jiguang
Build and Research on Computer Forensics Lecture Tang Ling
Computer Forensics Professional and Related Courses Zhu Yinchen
Research on the Application Strategy of Webpage Temper-Proofing System in the Campus Network Security Protection Wu Beihua
Credibility Evaluation of Multiple Intrusion Detection System Chen Deqiang
Security System of USB Flash Disk Based on Windows Drive Zhao Chen
Research on the Course of Network and Defense Technology Li Wei
A Double-Signed Digital Certificate Authentication Proposal Du Shuang
Case Study of Analyzing and Isolating the Random Failuresof a Wireless Sensor Network Weng Lu1
Research on International Trend of LaboratoryAccreditation of Digital Forensics Huang Daoli1
Designing of the System of Digital Forensic Training and Certification Gao Yunfei
Study on Security of Mobile Payment Shan Meijing
2010 Issues:  [01] [02] [03] [04] [05] [06] [07] [08] [09] [10] [11] [12] [S1] [S2]
More Issues:   [1993]   [1994]   [1995]   [1996]   [1997]   [1998]   [1999]   [2000]   [2001]   [2002]   [2003]   [2004]   [2005]   [2006]   [2007]   [2008]   [2009]   [2011]   [2012]   [2013]   [2014]   [2015]   [2016]   [2017]   [2018]   [2019]
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved