首页 > 最新文献

Network Security最新文献

英文 中文
Malware delivery is evolving through password-protected files 恶意软件通过密码保护文件传播
Pub Date : 2023-06-01 DOI: 10.12968/s1353-4858(23)70027-5
Thomas B. McVey
{"title":"Malware delivery is evolving through password-protected files","authors":"Thomas B. McVey","doi":"10.12968/s1353-4858(23)70027-5","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70027-5","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83040319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerabilities and risk in smart vehicle automatic parking assist systems 智能车辆自动泊车辅助系统的漏洞和风险
Pub Date : 2023-06-01 DOI: 10.12968/s1353-4858(23)70025-1
M. Ibrahim, Nader Sohrabi Safa
Advanced driver assistance systems (ADAS) have gained widespread adoption in the automotive industry in recent years. Automatic parking assist (APA) is an important part of ADAS as it offers numerous benefits, such as safety improvements, space and time savings and fuel efficiency. However, it also introduces novel vulnerabilities, threats and risks that require attention. Vulnerabilities in the APA system may emerge as a result of its intricate design and the use of various communication protocols that adversaries could exploit to gain unauthorised systems access and undermine vehicle safety. Threats to the APA system may arise from diverse origins, including malicious actors, software defects and system malfunctions, which may lead to different types of attacks compromising the system's integrity and availability. The associated risks with the APA system can be considerable, potentially impacting the safety and confidentiality of the vehicle's occupants and other road users. It is crucial to systematically identify, assess and manage these risks by deploying appropriate controls.
近年来,先进驾驶辅助系统(ADAS)在汽车行业得到了广泛的应用。自动停车辅助(APA)是ADAS的重要组成部分,因为它提供了许多好处,如提高安全性,节省空间和时间以及提高燃油效率。然而,它也引入了需要注意的新漏洞、威胁和风险。由于其复杂的设计和各种通信协议的使用,攻击者可以利用APA系统中的漏洞来获得未经授权的系统访问并破坏车辆安全。对APA系统的威胁可能来自不同的来源,包括恶意行为者、软件缺陷和系统故障,这可能导致不同类型的攻击,损害系统的完整性和可用性。与APA系统相关的风险可能相当大,可能会影响车辆乘员和其他道路使用者的安全和机密性。通过部署适当的控制措施,系统地识别、评估和管理这些风险至关重要。
{"title":"Vulnerabilities and risk in smart vehicle automatic parking assist systems","authors":"M. Ibrahim, Nader Sohrabi Safa","doi":"10.12968/s1353-4858(23)70025-1","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70025-1","url":null,"abstract":"Advanced driver assistance systems (ADAS) have gained widespread adoption in the automotive industry in recent years. Automatic parking assist (APA) is an important part of ADAS as it offers numerous benefits, such as safety improvements, space and time savings and fuel efficiency. However, it also introduces novel vulnerabilities, threats and risks that require attention. Vulnerabilities in the APA system may emerge as a result of its intricate design and the use of various communication protocols that adversaries could exploit to gain unauthorised systems access and undermine vehicle safety. Threats to the APA system may arise from diverse origins, including malicious actors, software defects and system malfunctions, which may lead to different types of attacks compromising the system's integrity and availability. The associated risks with the APA system can be considerable, potentially impacting the safety and confidentiality of the vehicle's occupants and other road users. It is crucial to systematically identify, assess and manage these risks by deploying appropriate controls.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88402614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving your company's cyber security training 改善公司的网络安全培训
Pub Date : 2023-06-01 DOI: 10.12968/s1353-4858(23)70026-3
Chrystal Taylor
Even the best security technology can't eliminate the threats to your organisation. Human error will always present a risk. It's important, then, that every organisation takes a careful look at its cyber security training to determine whether it's up to the job.
即使是最好的安全技术也无法消除对组织的威胁。人为的错误总是会带来风险。因此,重要的是,每个组织都要仔细审视自己的网络安全培训,以确定它是否能胜任这项工作。
{"title":"Improving your company's cyber security training","authors":"Chrystal Taylor","doi":"10.12968/s1353-4858(23)70026-3","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70026-3","url":null,"abstract":"Even the best security technology can't eliminate the threats to your organisation. Human error will always present a risk. It's important, then, that every organisation takes a careful look at its cyber security training to determine whether it's up to the job.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"103 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76140808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
No mystery to encryption 加密并不神秘
Pub Date : 2023-06-01 DOI: 10.12968/s1353-4858(23)70024-x
C. Tankard
{"title":"No mystery to encryption","authors":"C. Tankard","doi":"10.12968/s1353-4858(23)70024-x","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70024-x","url":null,"abstract":"","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88897867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Has Twitter made a big mistake with 2FA? Twitter在2FA上犯了大错吗?
Pub Date : 2023-05-01 DOI: 10.12968/s1353-4858(23)70021-4
Luke Potter
Twitter is going through tumultuous changes, many of them seemingly on a whim, as new owner Elon Musk struggles to monetise the platform. However, in the pursuit of profit, some of the modifications risk making the social network more dangerous for users.
Twitter正在经历动荡的变革,其中许多变革似乎是心血来潮,因为新老板埃隆·马斯克(Elon Musk)正在努力将该平台货币化。然而,在追求利润的过程中,一些修改可能会使社交网络对用户更加危险。
{"title":"Has Twitter made a big mistake with 2FA?","authors":"Luke Potter","doi":"10.12968/s1353-4858(23)70021-4","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70021-4","url":null,"abstract":"Twitter is going through tumultuous changes, many of them seemingly on a whim, as new owner Elon Musk struggles to monetise the platform. However, in the pursuit of profit, some of the modifications risk making the social network more dangerous for users.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital identity: healthcare's path forward 数字身份:医疗保健的前进之路
Pub Date : 2023-05-01 DOI: 10.12968/s1353-4858(23)70020-2
Gus Malezis
Digital transformation is disruptive at the best of times. But when you're a healthcare organisation struggling to cope with a pandemic, it's particularly difficult. In the midst of this maelstrom, cyber security can suffer. However, one specific aspect of security – digital identity – offers the potential to ease many of these woes.
在最好的时候,数字化转型也是破坏性的。但当你是一个医疗机构,努力应对一场大流行时,这尤其困难。在这场大漩涡中,网络安全可能会受到影响。然而,安全的一个特定方面——数字身份——提供了缓解这些问题的潜力。
{"title":"Digital identity: healthcare's path forward","authors":"Gus Malezis","doi":"10.12968/s1353-4858(23)70020-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70020-2","url":null,"abstract":"Digital transformation is disruptive at the best of times. But when you're a healthcare organisation struggling to cope with a pandemic, it's particularly difficult. In the midst of this maelstrom, cyber security can suffer. However, one specific aspect of security – digital identity – offers the potential to ease many of these woes.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How the pharma industry can reinvent vulnerability management 制药行业如何重塑漏洞管理
Pub Date : 2023-05-01 DOI: 10.12968/s1353-4858(23)70019-6
Sylvain Cortes
Organisations continue to be breached through the exploitation of known vulnerabilities for which patches were available. Keeping track of the threats is not easy, but this is an area where companies need to up their game, especially in the pharmaceutical sector.
组织继续通过利用已知漏洞进行破坏,这些漏洞有可用的补丁。跟踪这些威胁并不容易,但这是公司需要提升自己的领域,尤其是在制药行业。
{"title":"How the pharma industry can reinvent vulnerability management","authors":"Sylvain Cortes","doi":"10.12968/s1353-4858(23)70019-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70019-6","url":null,"abstract":"Organisations continue to be breached through the exploitation of known vulnerabilities for which patches were available. Keeping track of the threats is not easy, but this is an area where companies need to up their game, especially in the pharmaceutical sector.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysing four recent IcedID malware campaigns 分析最近四个IcedID恶意软件活动
Pub Date : 2023-05-01 DOI: 10.12968/s1353-4858(23)70023-8
Tom McVey
Network SecurityVol. 2023, No. 5 Threat IntelligenceAnalysing four recent IcedID malware campaignsTom McVeyTom McVeyMenlo SecuritySearch for more papers by this authorTom McVeyPublished Online:30 May 2023https://doi.org/10.12968/S1353-4858(23)70023-8AboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. ‘2023 Cyber Security Report’. Check Point Software. Accessed May 2023. https://pages.checkpoint.com/cyber security-report-2023.html. Google Scholar2. ‘How cyber criminals evade detection and compromise web browsers’. Menlo Security. Accessed May 2023. https://info.menlosecurity.com/How-cyber criminals-evade-detection-and-compromise-web-browsers-eBook.html. Google Scholar FiguresReferencesRelatedDetails 1 May 2023Volume 2023Issue 5ISSN (print): 1353-4858ISSN (online): 1872-9371 Metrics History Published online 30 May 2023 Published in print 1 May 2023 Information© MA Business Ltd.
网络SecurityVol。2023, No. 5威胁情报分析最近四次IcedID恶意软件活动stom McVeyTom McVeyMenlo security本文作者搜索更多论文tom mcvey出版在线:2023年5月30日https://doi.org/10.12968/S1353-4858(23)70023-8AboutSectionsView文章查看全文查看EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail查看文章参考文献1。《2023网络安全报告》。检查点软件。2023年5月生效。https://pages.checkpoint.com/cyber安全性- - 2023. - html报告。谷歌Scholar2。“网络罪犯是如何逃避检测并破坏网络浏览器的”。门罗的安全。2023年5月生效。https://info.menlosecurity.com/How-cyber criminals-evade-detection-and-compromise-web-browsers-eBook.html。Google Scholar FiguresReferencesRelatedDetails 2023年5月1日卷2023期5ISSN(印刷):1353-4858ISSN(在线):1872-9371指标历史在线出版2023年5月30日出版印刷2023年5月1日信息©MA Business Ltd。
{"title":"Analysing four recent IcedID malware campaigns","authors":"Tom McVey","doi":"10.12968/s1353-4858(23)70023-8","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70023-8","url":null,"abstract":"Network SecurityVol. 2023, No. 5 Threat IntelligenceAnalysing four recent IcedID malware campaignsTom McVeyTom McVeyMenlo SecuritySearch for more papers by this authorTom McVeyPublished Online:30 May 2023https://doi.org/10.12968/S1353-4858(23)70023-8AboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. ‘2023 Cyber Security Report’. Check Point Software. Accessed May 2023. https://pages.checkpoint.com/cyber security-report-2023.html. Google Scholar2. ‘How cyber criminals evade detection and compromise web browsers’. Menlo Security. Accessed May 2023. https://info.menlosecurity.com/How-cyber criminals-evade-detection-and-compromise-web-browsers-eBook.html. Google Scholar FiguresReferencesRelatedDetails 1 May 2023Volume 2023Issue 5ISSN (print): 1353-4858ISSN (online): 1872-9371 Metrics History Published online 30 May 2023 Published in print 1 May 2023 Information© MA Business Ltd.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing cyber security at scale with ML/AI frameworks 利用机器学习/人工智能框架大规模加强网络安全
Pub Date : 2023-05-01 DOI: 10.12968/s1353-4858(23)70022-6
Bharathasimha Reddy, Amit Nagal, Aditya K Sood, Ruthvik Reddy SL
The world is expanding digitally at an ever-accelerating rate. As networks become larger and data becomes more complex, cyber security challenges are growing rapidly. To combat cyber attacks, machine learning (ML) and other artificial intelligence (AI) solutions should be utilised to design and build robust security solutions. With the explosion in the number of new techniques and frameworks in the ML/AI space, it is tricky for organisations to identify the best frameworks and approaches to build robust ML/AI solutions. In this article, an empirical analysis has been performed on various ML/AI frameworks to determine the performance and effectiveness of running ML/AI algorithms in a distributed manner.
世界正在以不断加速的速度进行数字化扩张。随着网络规模的不断扩大和数据的日益复杂,网络安全面临的挑战日益增多。为了对抗网络攻击,应该利用机器学习(ML)和其他人工智能(AI)解决方案来设计和构建强大的安全解决方案。随着机器学习/人工智能领域新技术和框架数量的爆炸式增长,组织很难确定构建强大的机器学习/人工智能解决方案的最佳框架和方法。在本文中,对各种ML/AI框架进行了实证分析,以确定以分布式方式运行ML/AI算法的性能和有效性。
{"title":"Enhancing cyber security at scale with ML/AI frameworks","authors":"Bharathasimha Reddy, Amit Nagal, Aditya K Sood, Ruthvik Reddy SL","doi":"10.12968/s1353-4858(23)70022-6","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70022-6","url":null,"abstract":"The world is expanding digitally at an ever-accelerating rate. As networks become larger and data becomes more complex, cyber security challenges are growing rapidly. To combat cyber attacks, machine learning (ML) and other artificial intelligence (AI) solutions should be utilised to design and build robust security solutions. With the explosion in the number of new techniques and frameworks in the ML/AI space, it is tricky for organisations to identify the best frameworks and approaches to build robust ML/AI solutions. In this article, an empirical analysis has been performed on various ML/AI frameworks to determine the performance and effectiveness of running ML/AI algorithms in a distributed manner.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"24 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134992379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weaponising ChatGPT
Pub Date : 2023-04-01 DOI: 10.12968/s1353-4858(23)70017-2
Steve Mansfield-Devine
Depending on who you ask, ChatGPT is either a great boon to humanity or an existential menace. In the cyber security world, however, it has been characterised as mostly a threat – one that will enable unskilled actors to become potent hackers. What truth is there in the hype? And could ChatGPT and other large language models actually be a force for good?
根据你问谁,ChatGPT要么是人类的福音,要么是生存的威胁。然而,在网络安全领域,它主要被描述为一种威胁——一种能让不熟练的演员成为强大黑客的威胁。炒作中有什么真相?ChatGPT和其他大型语言模型真的能成为一种好的力量吗?
{"title":"Weaponising ChatGPT","authors":"Steve Mansfield-Devine","doi":"10.12968/s1353-4858(23)70017-2","DOIUrl":"https://doi.org/10.12968/s1353-4858(23)70017-2","url":null,"abstract":"Depending on who you ask, ChatGPT is either a great boon to humanity or an existential menace. In the cyber security world, however, it has been characterised as mostly a threat – one that will enable unskilled actors to become potent hackers. What truth is there in the hype? And could ChatGPT and other large language models actually be a force for good?","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91357427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Network Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1