您当前的位置:
首页 >
文章列表页 >
Discussion on cyber security threat intelligence work of telecom operators
更新时间:2026-04-20
    • Discussion on cyber security threat intelligence work of telecom operators

    • Vol. 31, Issue 12, Pages: 7-12(2018)
    • DOI:10.13992/j.cnki.tetas.2018.12.002    

      CLC: TP393.08
    • Published:2018

    移动端阅览

  • 王晓周, 乔喆, 李雨昂, et al. Discussion on cyber security threat intelligence work of telecom operators[J]. 2018, 31(12): 7-12. DOI: 10.13992/j.cnki.tetas.2018.12.002.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

91

下载量

4

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Research on micro-segmentation security of public cloud based on zero trust
Architecture design and deployment practice of a 5G parallel simulation cyber range
APT e-mail attack detection based on multi-dimensional analysis
Implementation of a sustainable security operation system
Research on the scheme of improving the threat intelligence capability of basic telecom operator

Related Author

张文勇
朱凌君
管纪伟
戢茜
陈斌
章建聪
高泽芳
王岱辉

Related Institution

中移(苏州)软件技术有限公司
华信咨询设计研究院有限公司
中国移动通信集团终端有限公司
中国移动通信集团山东有限公司
0