pp

FIGI - DFS - Report - Security audit of various DFS applications

FIGI - DFS - Report - Security audit of various DFS applications




pp

HSTP.DLT-Risk - DLT-based application development risks and their mitigations

HSTP.DLT-Risk - DLT-based application development risks and their mitigations




pp

XSTR-USM - Unified Security Model (USM) - A neutral integrated system approach to cybersecurity

XSTR-USM - Unified Security Model (USM) - A neutral integrated system approach to cybersecurity




pp

XSTP-sgstruct - Strategic approaches to the transformation of security studies

XSTP-sgstruct - Strategic approaches to the transformation of security studies




pp

XSTR-HYB-QKD - Overview of hybrid approaches for key exchange with quantum key distribution

XSTR-HYB-QKD - Overview of hybrid approaches for key exchange with quantum key distribution




pp

U4SSC - Rapport de vérification - Canton de Genève, Suisse

U4SSC - Rapport de vérification - Canton de Genève, Suisse




pp

FSTP-VS-SDCA - Application of software-defined cameras in the surveillance industry

FSTP-VS-SDCA - Application of software-defined cameras in the surveillance industry




pp

DSTR-IoT-DLT-Accounting - Accounting and billing aspects in Internet of Things (IoT) ecosystem and integrated approach using Distributed Ledger Technology (DLT)

DSTR-IoT-DLT-Accounting - Accounting and billing aspects in Internet of Things (IoT) ecosystem and integrated approach using Distributed Ledger Technology (DLT)




pp

ESTR-NUI - Radio frequency level-based single number indicator for mobile network usefulness for a given range of applications

ESTR-NUI - Radio frequency level-based single number indicator for mobile network usefulness for a given range of applications




pp

TR.x509ac4sc - A use case of X.509 Attribute Certificate for Supply Chain

TR.x509ac4sc - A use case of X.509 Attribute Certificate for Supply Chain




pp

QSTR-MCM-UC - Use cases on the combat of multimedia content misappropriation

QSTR-MCM-UC - Use cases on the combat of multimedia content misappropriation




pp

[ J.206 (03/13) ] - Architecture for an application control framework using integrated broadcast and broadband digital television

Architecture for an application control framework using integrated broadcast and broadband digital television




pp

[ J.207 (07/19) ] - Specification for an integrated broadcast and broadband digital television application control framework

Specification for an integrated broadcast and broadband digital television application control framework




pp

[ F.751.3 (03/22) ] - Requirements for change management in distributed ledger technology (DLT)-based decentralized applications

Requirements for change management in distributed ledger technology (DLT)-based decentralized applications




pp

[ F.748.15 (03/22) ] - Framework and metrics for digital human application systems

Framework and metrics for digital human application systems




pp

[ F.748.14 (03/22) ] - Requirements and evaluation methods of non-interactive 2D real-person digital human application systems

Requirements and evaluation methods of non-interactive 2D real-person digital human application systems




pp

[ F.748.16 (05/22) ] - Requirements for applications and services in smart manufacturing based on machine vision

Requirements for applications and services in smart manufacturing based on machine vision




pp

[ F.748.18 (12/22) ] - Metric and evaluation methods for AI-enabled multimedia application computing power benchmark

Metric and evaluation methods for AI-enabled multimedia application computing power benchmark




pp

[ Z.161.2 (10/19) ] - Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support

Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support




pp

[ Z.168 (10/21) ] - Testing and Test Control Notation version 3: The IDL to TTCN-3 mapping

Testing and Test Control Notation version 3: The IDL to TTCN-3 mapping




pp

[ Z.161.2 (10/21) ] - Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support

Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support




pp

[ Z.161.2 (10/22) ] - Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support

Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support




pp

[ Z.161.1 (10/22) ] - Testing and Test Control Notation version 3: TTCN-3 language extensions: Support of interfaces with continuous signals

Testing and Test Control Notation version 3: TTCN-3 language extensions: Support of interfaces with continuous signals




pp

[ D.170 (2010) Supplement 1 (05/10) ] - Dispute management guidelines

Dispute management guidelines




pp

[ D.170 (2010) Supplement 2 (05/10) ] - Dispute process guidelines

Dispute process guidelines




pp

[ D.211 (1998) Supplement 1 (05/10) ] - Guidelines for international short message service (SMS) interconnection

Guidelines for international short message service (SMS) interconnection




pp

[ D.50 Supplement 1 (04/11) ] - General considerations for traffic measurement and options for international internet connectivity

General considerations for traffic measurement and options for international internet connectivity




pp

[ D.170 (2010) Supplement 3 (01/12) ] - ITU-T D.170 - Supplement on guidelines for contents of an international interconnection agreement

ITU-T D.170 - Supplement on guidelines for contents of an international interconnection agreement




pp

[ D.170 (2010) Supplement 4 (01/12) ] - ITU-T D.170 - Supplement on guidelines for net settlement generic templates

ITU-T D.170 - Supplement on guidelines for net settlement generic templates




pp

[ D.150 (1999) Supplement 1 (01/12) ] - Checklist for bilateral complex agreements

Checklist for bilateral complex agreements




pp

[ D.50 (2011) Supplement 2 (05/13) ] - Supplement 2: Guidelines for reducing the costs of international Internet connectivity

Supplement 2: Guidelines for reducing the costs of international Internet connectivity




pp

[ D.170 (2010) Supplement 5 (05/13) ] - Supplement on guidelines for fraud mitigation

Supplement on guidelines for fraud mitigation




pp

[ D.195 (2012) Supplement 2 (05/13) ] - Guidelines for day sales outstanding (DSO) management

Guidelines for day sales outstanding (DSO) management




pp

[ D.195 (2012) Supplement 3 (05/13) ] - Prepayment guidelines

Prepayment guidelines




pp

[ D.195 (2012) Supplement 1 (05/13) ] - Credit management guidelines

Credit management guidelines




pp

[ D.Sup4 (04/20) ] - ITU-T D.263 - Supplement on Principles for increased adoption and use of mobile financial services (MFSs) through effective consumer protection mechanisms

ITU-T D.263 - Supplement on Principles for increased adoption and use of mobile financial services (MFSs) through effective consumer protection mechanisms




pp

[ L.1507 (07/19) ] - Use of ICTsites to support environmental sensing

Use of ICTsites to support environmental sensing




pp

[ L.108/L.79 (03/18) ] - Optical fibre cable elements for microduct blowing-installation application

Optical fibre cable elements for microduct blowing-installation application




pp

[ L.162 (11/16) ] - Microduct technology and its applications

Microduct technology and its applications




pp

[ X.894 (10/18) ] - Information technology - Generic applications of ASN.1: Cryptographic message syntax

Information technology - Generic applications of ASN.1: Cryptographic message syntax




pp

[ X.Sup13 (09/18) ] - ITU-T X.1051 - Supplement on information security management users' guide for Recommendation ITU-T X.1051

ITU-T X.1051 - Supplement on information security management users' guide for Recommendation ITU-T X.1051




pp

[ X.1249 (01/19) ] - Technical framework for countering mobile in-application advertising spam

Technical framework for countering mobile in-application advertising spam




pp

[ X.Sup27 (09/16) ] - ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso

ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso




pp

[ X.Sup28 (09/16) ] - ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)

ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)




pp

[ X.Sup29 (09/17) ] - ITU-T X.1242 - Supplement on guidelines on countermeasures against short message service phishing and smishing attacks

ITU-T X.1242 - Supplement on guidelines on countermeasures against short message service phishing and smishing attacks




pp

[ X.Sup30 (09/17) ] - ITU-T X.805 - Supplement on security guidelines for mobile virtual network operators

ITU-T X.805 - Supplement on security guidelines for mobile virtual network operators




pp

[ X.Sup31 (09/17) ] - ITU-T X.660 - Supplement on guidelines for using object identifiers for the Internet of things

ITU-T X.660 - Supplement on guidelines for using object identifiers for the Internet of things




pp

[ X.Sup33 (09/18) ] - ITU-T X.1231 - Supplement on technical framework for countering telephone service scams

ITU-T X.1231 - Supplement on technical framework for countering telephone service scams




pp

[ X.Sup32 (03/18) ] - ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations

ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations




pp

[ X.Sup34 (01/19) ] - ITU-T X.1051 - Supplement on code of practice for information security controls for telecommunication organizations

ITU-T X.1051 - Supplement on code of practice for information security controls for telecommunication organizations