首页 > 最新文献

Network Security最新文献

英文 中文
Digital identity – creating a unified system 数字身份——创建一个统一的系统
Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70049-4
Frederik Mennes
Network SecurityVol. 2023, No. 10 FeaturesDigital identity – creating a unified systemFrederik MennesFrederik MennesOneSpanSearch for more papers by this authorFrederik MennesPublished Online:31 Oct 2023https://doi.org/10.12968/S1353-4858(23)70049-4AboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. ‘New legislation set to make digital identities more trustworthy and secure’. Department for Digital, Culture, Media & Sport (DCMS), 10 Mar 2022. Accessed Oct 2023. www.gov.uk/government/news/new-legislation-set-to-make-digital-identities-more-trustworthy-and-secure. Google Scholar2. ‘Tony Blair and William Hague call for digital ID cards for all’. BBC News, 22 Feb 2023. Accessed Oct 2023. www.bbc.com/news/uk-politics-64729442. Google Scholar3. ‘British businesses to save billions under new UK version of GDPR’. Department for Science, Innovation and Technology (DSIT), 8 Mar 2023. Accessed Oct 2023. www.gov.uk/government/news/british-businesses-to-save-billions-under-new-uk-version-of-gdpr. Google Scholar FiguresReferencesRelatedDetails 1 October 2023Volume 2023Issue 10ISSN (print): 1353-4858ISSN (online): 1872-9371 Metrics History Published online 31 October 2023 Published in print 1 October 2023 Information© MA Business Ltd.
网络SecurityVol。2023, No. 10 FeaturesDigital identity -创建一个统一的系统frederik MennesFrederik mennesonespan本文作者搜索更多的论文frederik mennes出版在线:31 Oct 2023https://doi.org/10.12968/S1353-4858(23)70049-4AboutSectionsView articleView全文TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail查看文章参考文献1。“新的立法将使数字身份更加可信和安全。”数字、文化、媒体和体育部(DCMS), 2022年3月10日。2023年10月访问。www.gov.uk /政府/新闻/ new-legislation-set-to-make-digital-identities-more-trustworthy-and-secure。谷歌Scholar2。“托尼·布莱尔和威廉·黑格呼吁为所有人发放数字身份证。”BBC新闻,2023年2月22日。2023年10月访问。www.bbc.com/news/uk -政治- 64729442。谷歌Scholar3。“英国企业将在新版GDPR下节省数十亿美元”。科学、创新及科技部,2023年3月8日。2023年10月访问。www.gov.uk /政府/新闻/ british-businesses-to-save-billions-under-new-uk-version-of-gdpr。Google Scholar FiguresReferencesRelatedDetails 2023年10月1日卷2023期10ISSN(印刷):1353-4858ISSN(在线):1872-9371 Metrics History在线出版2023年10月31日出版印刷2023年10月1日信息©MA Business Ltd。
{"title":"Digital identity – creating a unified system","authors":"Frederik Mennes","doi":"10.12968/s1353-4858(23)70049-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70049-4","url":null,"abstract":"Network SecurityVol. 2023, No. 10 FeaturesDigital identity – creating a unified systemFrederik MennesFrederik MennesOneSpanSearch for more papers by this authorFrederik MennesPublished Online:31 Oct 2023https://doi.org/10.12968/S1353-4858(23)70049-4AboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. ‘New legislation set to make digital identities more trustworthy and secure’. Department for Digital, Culture, Media & Sport (DCMS), 10 Mar 2022. Accessed Oct 2023. www.gov.uk/government/news/new-legislation-set-to-make-digital-identities-more-trustworthy-and-secure. Google Scholar2. ‘Tony Blair and William Hague call for digital ID cards for all’. BBC News, 22 Feb 2023. Accessed Oct 2023. www.bbc.com/news/uk-politics-64729442. Google Scholar3. ‘British businesses to save billions under new UK version of GDPR’. Department for Science, Innovation and Technology (DSIT), 8 Mar 2023. Accessed Oct 2023. www.gov.uk/government/news/british-businesses-to-save-billions-under-new-uk-version-of-gdpr. Google Scholar FiguresReferencesRelatedDetails 1 October 2023Volume 2023Issue 10ISSN (print): 1353-4858ISSN (online): 1872-9371 Metrics History Published online 31 October 2023 Published in print 1 October 2023 Information© MA Business Ltd.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChatGPT: The potential is clear, but what are the risks? ChatGPT:潜力是显而易见的,但风险是什么?
Pub Date : 2023-10-01 DOI: 10.12968/s1353-4858(23)70050-0
Brett Raybould
ChatGPT is everywhere and organisations are frantically searching for ways to get on the bandwagon. And the technology has great potential for transforming business processes. But like so many technological innovations, this one is a two-edged sword. And that's because it also offers similar benefits to people with malicious intent. And being so new, the security weaknesses and ethical consequences of the technology have yet to be fully explored.
ChatGPT无处不在,组织正在疯狂地寻找加入这一潮流的方法。该技术在转换业务流程方面具有巨大的潜力。但就像许多技术创新一样,这是一把双刃剑。这是因为它也为怀有恶意的人提供了类似的好处。作为一种新技术,这项技术的安全弱点和伦理后果尚未得到充分探索。
{"title":"ChatGPT: The potential is clear, but what are the risks?","authors":"Brett Raybould","doi":"10.12968/s1353-4858(23)70050-0","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70050-0","url":null,"abstract":"ChatGPT is everywhere and organisations are frantically searching for ways to get on the bandwagon. And the technology has great potential for transforming business processes. But like so many technological innovations, this one is a two-edged sword. And that's because it also offers similar benefits to people with malicious intent. And being so new, the security weaknesses and ethical consequences of the technology have yet to be fully explored.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI: security implications for business automation 生成式人工智能:业务自动化的安全含义
Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70045-7
Scott Weedon
AI tools such as ChatGPT certainly appear to offer significant benefits to organisations looking to save costs and improve efficiency. But the technology is being adopted with an enthusiasm that leaves little room for the careful consideration of potential security vulnerabilities. So how do you embrace this revolution without putting yourself at risk?
ChatGPT等人工智能工具无疑为希望节省成本和提高效率的组织提供了巨大的好处。但人们对这项技术的采用热情高涨,几乎没有给潜在的安全漏洞留下仔细考虑的余地。那么,你如何在不让自己陷入危险的情况下接受这场革命呢?
{"title":"Generative AI: security implications for business automation","authors":"Scott Weedon","doi":"10.12968/s1353-4858(23)70045-7","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70045-7","url":null,"abstract":"AI tools such as ChatGPT certainly appear to offer significant benefits to organisations looking to save costs and improve efficiency. But the technology is being adopted with an enthusiasm that leaves little room for the careful consideration of potential security vulnerabilities. So how do you embrace this revolution without putting yourself at risk?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134995404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Five ways to use AI to prevent cyber attacks 利用人工智能预防网络攻击的五种方法
Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70043-3
Daniel Pearson
Artificial intelligence has the potential to plug the gaps in your website defences. At a time of limited budgets, constrained resources and a global skills shortage, AI is capable of taking over many previously labour-intensive tasks and of providing insight into threats and weaknesses. This article looks at five key ways in which AI offers a boost to your web security.
人工智能有可能填补你网站防御的漏洞。在预算有限、资源有限和全球技能短缺的情况下,人工智能能够接管许多以前劳动密集型的任务,并提供对威胁和弱点的洞察。本文着眼于人工智能提高网络安全的五种关键方式。
{"title":"Five ways to use AI to prevent cyber attacks","authors":"Daniel Pearson","doi":"10.12968/s1353-4858(23)70043-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70043-3","url":null,"abstract":"Artificial intelligence has the potential to plug the gaps in your website defences. At a time of limited budgets, constrained resources and a global skills shortage, AI is capable of taking over many previously labour-intensive tasks and of providing insight into threats and weaknesses. This article looks at five key ways in which AI offers a boost to your web security.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"47 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Top of the TTPs: Malware's most common tactics, techniques and procedures ttp的顶部:恶意软件最常见的战术、技术和程序
Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70042-1
Suleyman Ozarslan
The first step in preventing malware from compromising your organisation is to understand how it works. There are many tactics, techniques and procedures (TTPs) employed by malware developers, but some are more common than others, and honing your security strategy, policies and systems to deal with the most frequent methods will significantly strengthen your defences.
防止恶意软件危害您的组织的第一步是了解它的工作原理。恶意软件开发人员采用了许多战术、技术和程序(TTPs),但有些比其他更常见,磨练您的安全策略、策略和系统来处理最常见的方法将大大加强您的防御。
{"title":"Top of the TTPs: Malware's most common tactics, techniques and procedures","authors":"Suleyman Ozarslan","doi":"10.12968/s1353-4858(23)70042-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70042-1","url":null,"abstract":"The first step in preventing malware from compromising your organisation is to understand how it works. There are many tactics, techniques and procedures (TTPs) employed by malware developers, but some are more common than others, and honing your security strategy, policies and systems to deal with the most frequent methods will significantly strengthen your defences.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134995078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ramping up the response to browser-based attacks 加强对基于浏览器的攻击的响应
Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70044-5
Tom McVey
{"title":"Ramping up the response to browser-based attacks","authors":"Tom McVey","doi":"10.12968/s1353-4858(23)70044-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70044-5","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is your email security doing what it claims? 你的电子邮件安全是否如其所言?
Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70040-8
Colin Tankard
{"title":"Is your email security doing what it claims?","authors":"Colin Tankard","doi":"10.12968/s1353-4858(23)70040-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70040-8","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The digital frontier: defending the public sector against cyberthreats 数字前沿:保护公共部门免受网络威胁
Pub Date : 2023-09-01 DOI: 10.12968/s1353-4858(23)70041-x
Anat Garty
Public sector organisations are on the front line when it comes to cyber attacks. They are enticing targets for both criminal and nation-state threat actors. And the systems they operate, as well as the information they hold, are often critical to the safety and security of the nation and its citizens. This raises the bar for these organisations when it comes to cyber security defences. So how do they reach it?
公共部门组织在网络攻击方面处于第一线。对于犯罪分子和民族国家威胁分子来说,它们都是诱人的目标。它们运行的系统,以及它们所掌握的信息,往往对国家及其公民的安全至关重要。这提高了这些组织在网络安全防御方面的门槛。那么它们是如何到达的呢?
{"title":"The digital frontier: defending the public sector against cyberthreats","authors":"Anat Garty","doi":"10.12968/s1353-4858(23)70041-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70041-x","url":null,"abstract":"Public sector organisations are on the front line when it comes to cyber attacks. They are enticing targets for both criminal and nation-state threat actors. And the systems they operate, as well as the information they hold, are often critical to the safety and security of the nation and its citizens. This raises the bar for these organisations when it comes to cyber security defences. So how do they reach it?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134994923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote working is here to stay, but security issues persist 远程工作将继续存在,但安全问题依然存在
Pub Date : 2023-08-01 DOI: 10.12968/s1353-4858(23)70037-8
Sohail Iqbal
The pandemic forced remote working on many organisations. Most have now adjusted and remote and hybrid working practices are well established. However, the security threats raised by this change linger, with many of the basic issues remaining unaddressed. It's time for organisations to catch up if they are to safely reap the many benefits that remote working offers.
疫情迫使许多组织进行远程工作。大多数现在已经调整,远程和混合工作实践已经建立。然而,这一变化带来的安全威胁依然存在,许多基本问题仍未得到解决。如果企业想要安全地获得远程工作带来的诸多好处,现在是时候迎头赶上了。
{"title":"Remote working is here to stay, but security issues persist","authors":"Sohail Iqbal","doi":"10.12968/s1353-4858(23)70037-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70037-8","url":null,"abstract":"The pandemic forced remote working on many organisations. Most have now adjusted and remote and hybrid working practices are well established. However, the security threats raised by this change linger, with many of the basic issues remaining unaddressed. It's time for organisations to catch up if they are to safely reap the many benefits that remote working offers.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83433791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The growing cyberthreat to critical national infrastructure 对关键国家基础设施日益增长的网络威胁
Pub Date : 2023-08-01 DOI: 10.12968/s1353-4858(23)70036-6
M. Hughes
There is no more attractive target for cyber attackers – especially those linked to nation states – than critical national infrastructure (CNI). Organisations working in sectors that comprise CNI are subject to attacks ranging from ransom attempts to cyber war. Governments are becoming increasingly nervous about these threats, but often left the industry itself to do something about them. So what are the threats, how are they evolving and what do we do about them?
对于网络攻击者来说,没有比关键的国家基础设施(CNI)更有吸引力的目标了——尤其是那些与国家有关的目标。在构成CNI的行业中工作的组织经常受到从勒索赎金到网络战的各种攻击。政府对这些威胁越来越紧张,但往往让行业自己去做一些事情。那么威胁是什么,它们是如何演变的,我们该如何应对?
{"title":"The growing cyberthreat to critical national infrastructure","authors":"M. Hughes","doi":"10.12968/s1353-4858(23)70036-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70036-6","url":null,"abstract":"There is no more attractive target for cyber attackers – especially those linked to nation states – than critical national infrastructure (CNI). Organisations working in sectors that comprise CNI are subject to attacks ranging from ransom attempts to cyber war. Governments are becoming increasingly nervous about these threats, but often left the industry itself to do something about them. So what are the threats, how are they evolving and what do we do about them?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81991162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1