[1] |
CHEN Mo, JIN Lei, GONG Xiang-yang, MAN Yi.
Research on Fault Tracing Technology for 5G Mass Network Management Data
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(5): 131-136,142.
|
[2] |
ZHANG Zi, HUANG Ting-lei.
A Mechanism of Router Nodes Movement for WM2N
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 7-12.
|
[3] |
LIU Tao, WANG Wen-dong, GONG Xiang-yang, QUE Xi-rong, CHENG Shi-duan.
Updated Mechanism for in-Band Controlling Traffic of Software Defined Networking
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 24-28.
|
[4] |
LIU Sheng-li, PENG Fei, WU Dong-ying, ZOU Rui, XIAO Da.
CHoney: a New Honeypot for Capturing Attacks Against Cisco Routers
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2015, 38(5): 47-53.
|
[5] |
ZHU Kai, ZHANG Chao, ZHANG Kai, LI Wen-jing, MENG Luo-ming.
Assessment of Users’ QoE for Mobile Internet Based on TCP Packet Layer Analysis
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 40-45.
|
[6] |
WANG Kai-xuan, YANG Zheng, QIU Xue-song.
Algorithm of Fault Locating on Impact Analysis in Power Communications Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(s1): 55-59.
|
[7] |
.
An Optimized UserBehavior Clustering Analysis Based Service Fault Detection Mechanism for Mobile Device
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(s1): 46-50.
|
[8] |
.
Comparison and Evaluation of Internet Topology Generators
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(3): 53-57.
|
[9] |
.
The Design and Implementation of Alarm RealTimeDisplay System Based on Web
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 115-119.
|
[10] |
.
Comparasion of the System Management Based on WSDM, WBEM and SNMP
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 134-139.
|
[11] |
.
New Generation Network Management Based on the NETCONF Protocol
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 10-14.
|
[12] |
.
CADE Method for Autonomic NetworkManagement and Application Framework
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 30-34.
|
[13] |
.
Interface of Configuring the Data Network Equipments and Application Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(s1): 140-143.
|
[14] |
QIU Xue-song;CHEN Jian;GUO Hai-sheng;GAO Zhi-peng.
Anomaly Traffic Integrated Detection Model for Enterprise IT Network
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(6): 28-31.
|
[15] |
DU Hui-jun,YANG Ning.
A Kind of Non-Key Words Index B-Tree Mechanism in High-End Router CIDR List
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(5): 104-108.
|