[1] |
LIU Liang, LI Yan, DENG Wei, XIE Xinqian, SHAO Jiafeng.
Harmonized communication and sensing in 5G-Advanced networks
[J]. Information and Communications Technology and Policy, 2022, 48(9): 76-81.
|
[2] |
SONG Penggao, SUN Like, ZHAO Zhongyuan.
Design and performance evaluation of a link-level simulation platform for integrated sensing and communication in 5G evolution
[J]. Information and Communications Technology and Policy, 2022, 48(9): 82-88.
|
[3] |
WANG Fei, YANG Tuo, XU Xiaodong, ZHOU Guohua, GUO Zhiheng, XU Hua.
The uplink centric broadcast communication in 5G-Advanced networks
[J]. Information and Communications Technology and Policy, 2022, 48(9): 89-96.
|
[4] |
SHEN Changxiang, TIAN Nan.
Active immune trusted computing to create a secure and trusted network industry ecosystem
[J]. Information and Communications Technology and Policy, 2022, 48(8): 1-6.
|
[5] |
ZHANG Bin, WEN Nuan, QIU Qin, ZHOU Ying, LI Wenqi.
Research and practice of data security management in information and communication enterprises
[J]. Information and Communications Technology and Policy, 2022, 48(8): 19-23.
|
[6] |
LIU Yuze, XING Zhen, YOU Shilin, LIN Zhaoji.
Research on security of proximity based service in 5G
[J]. Information and Communications Technology and Policy, 2022, 48(8): 24-30.
|
[7] |
ZHANG Feng, JIANG Weiqiang, WANG Guangtao, LIU Chang, ZHANG Mingtian.
Thoughts on security assurance for critical information infrastructure in the cloud computing service environment
[J]. Information and Communications Technology and Policy, 2022, 48(8): 31-35.
|
[8] |
LIU Xin, CAO Jing, SHAO Zhijie, ZHOU Yuefeng.
Anti-ransomware research based on data storage technologies
[J]. Information and Communications Technology and Policy, 2022, 48(8): 36-42.
|
[9] |
ZHENG Wei, JIANG Ding, GUO Fei, SUN Lijie.
Research on industry development of cyber security insurance at home and abroad
[J]. Information and Communications Technology and Policy, 2022, 48(8): 43-51.
|
[10] |
WANG Wei, CAO Jing, CHENG Geng, LI Xueying.
Research on reducing the impact of automated decision on personal information security
[J]. Information and Communications Technology and Policy, 2022, 48(8): 52-58.
|
[11] |
WEI Kai, YAN Shu, LYU Ailin.
An overview on the market-based allocation of data factor
[J]. Information and Communications Technology and Policy, 2022, 48(8): 59-64.
|
[12] |
ZHOU Bohui, YU Le, MA Yusheng, PAN Jiali.
Patent situation analysis of data security technology
[J]. Information and Communications Technology and Policy, 2022, 48(7): 87-91.
|
[13] |
GUO Zhen, LI Shuaizheng.
Thinking on the path of accelerating the development of digital economy based on artificial intelligence
[J]. Information and Communications Technology and Policy, 2022, 48(6): 69-74.
|
[14] |
LIU Qi, PAN Feng, JIANG Bo.
Development status analysis and consideration on local 5G in Japan
[J]. Information and Communications Technology and Policy, 2022, 48(6): 75-79.
|
[15] |
HUANG Xinxuan, LI Man, TANG Xiaoyong, ZHU Lei, REN Haiying.
Research on telemedicine system technical in 5G-based intelligent and rapid deployment of hospital
[J]. Information and Communications Technology and Policy, 2022, 48(6): 80-84.
|