您当前的位置:
首页 >
文章列表页 >
CM-IMS user access equipments security risks analysis and deployment suggestion
更新时间:2026-04-20
    • CM-IMS user access equipments security risks analysis and deployment suggestion

    • Vol. 27, Issue 12, Pages: 38-42(2014)
    • DOI:10.13992/j.cnki.tetas.2014.12.010    

      CLC: TN915.08
    • Published:2014

    移动端阅览

  • 林秀. CM-IMS user access equipments security risks analysis and deployment suggestion[J]. 2014, 27(12): 38-42. DOI: 10.13992/j.cnki.tetas.2014.12.010.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

14

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Research and application on the 5G edge computing
Research on artificial intelligence security problems and control measures
Research on identity authentication technology in network security
Artificial intelligence application in information security analysis

Related Author

张滨
朱丽芳
常玲
赵蓓
薛姗
洪东
张滨

Related Institution

中国移动通信集团公司信息安全管理与运行中心
中国移动通信集团广东有限公司
中国移动通信集团设计院有限公司
0