您当前的位置:
首页 >
文章列表页 >
Research on disposal methods of mobile internet user malicious attack traffic
更新时间:2026-04-20
    • Research on disposal methods of mobile internet user malicious attack traffic

    • Vol. 31, Issue 12, Pages: 79-82(2018)
    • DOI:10.13992/j.cnki.tetas.2018.12.021    

      CLC: TP393.08
    • Published:2018

    移动端阅览

  • 李海明, 宋刚. Research on disposal methods of mobile internet user malicious attack traffic[J]. 2018, 31(12): 79-82. DOI: 10.13992/j.cnki.tetas.2018.12.021.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

31

下载量

1

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Research on non-awareness authentication analysis method towards WLAN
Principle of DDoS attack and the application of anti-DDoS system
New Method of WAP Service Cutover
Safety Problems of GPRS Network and Its Possible Solutions
Application of RADIUS Protocol in Accounting of Network Management

Related Author

谭晖
徐雯
陈立黎
曲劲光
杨健
张慧勇
洪顺安
危国旺

Related Institution

中国移动通信集团湖北有限公司
中国移动通信集团宁夏有限公司
中国移动通信集团公司
福建移动通信有限责任公司
北京邮电大学华飞研究所
0