首页 > 最新文献

2008 Third International Conference on Systems and Networks Communications最新文献

英文 中文
A High Availability Firewall Model Based on SCTP Protocol 基于SCTP协议的高可用性防火墙模型
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.63
Edmo Lopes Filho, Gilberto Tadayoshi Hashimoto, P. F. Rosa
The growth and proliferation of computer networks allow businesses to efficiently communicate with their own components as well as with their business partners, customers, and suppliers. However, the flexibility and efficiency provided by such systems come with increasing risks, including disruption of services. To address the security issues, network and security managers, among other options, often turn to network policy management services such as firewall and intrusion prevention system (IPS) protection. This paper addresses "availability," one of the basic requirements of security management programs and proposes a model to support firewall redundancy based on the SCTP protocol.
计算机网络的发展和扩散使企业能够有效地与他们自己的组件以及他们的业务伙伴、客户和供应商进行通信。然而,这种系统提供的灵活性和效率也带来了越来越大的风险,包括服务中断。为了解决安全问题,网络和安全管理人员经常求助于网络策略管理服务,如防火墙和入侵防御系统(IPS)保护。本文讨论了安全管理程序的基本要求之一“可用性”,并提出了一个基于SCTP协议支持防火墙冗余的模型。
{"title":"A High Availability Firewall Model Based on SCTP Protocol","authors":"Edmo Lopes Filho, Gilberto Tadayoshi Hashimoto, P. F. Rosa","doi":"10.1109/ICSNC.2008.63","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.63","url":null,"abstract":"The growth and proliferation of computer networks allow businesses to efficiently communicate with their own components as well as with their business partners, customers, and suppliers. However, the flexibility and efficiency provided by such systems come with increasing risks, including disruption of services. To address the security issues, network and security managers, among other options, often turn to network policy management services such as firewall and intrusion prevention system (IPS) protection. This paper addresses \"availability,\" one of the basic requirements of security management programs and proposes a model to support firewall redundancy based on the SCTP protocol.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132169043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
WS-Re2Policy: A Policy Language for Distributed SLA Monitoring and Enforcement WS-Re2Policy:用于分布式SLA监控和实施的策略语言
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.17
N. Repp, André Miede, M. Niemann, R. Steinmetz
Web service technology and the Service-oriented Architecture (SOA) paradigm have become state of the art for the integration of systems across enterprise boundaries. Here, a strong need for policies exists, which describe the Quality of Service delivered by third parties.Current policy languages in the area of Web services and SOAs allow the specification of requirements with respect to the Quality of Service as well as the parameters, which should be monitored. They do not cover the countermeasures needed and accepted in case of requirement violations. Especially, in distributed scenarios it is helpful to provide the monitoring units with information about possible reactions to violations in order to enforce policies at the monitoring units. Therefore, we developed the Web service requirements and reactions policy language (WS-Re2Policy), which overcomes those issues by specifying requirements and reactions in a single policy to be distributed to independent monitoring units.
Web服务技术和面向服务的体系结构(SOA)范例已经成为跨企业边界集成系统的最新技术。在这里,存在对政策的强烈需求,这些政策描述了第三方交付的服务质量。Web服务和soa领域的当前策略语言允许规范与服务质量和参数相关的需求,这些需求应该被监控。它们不包括在需求违反的情况下需要和接受的对策。特别是,在分布式场景中,为监控单元提供有关违规可能反应的信息,以便在监控单元执行策略,是很有帮助的。因此,我们开发了Web服务需求和反应策略语言(WS-Re2Policy),它通过在单个策略中指定要分发给独立监视单元的需求和反应来克服这些问题。
{"title":"WS-Re2Policy: A Policy Language for Distributed SLA Monitoring and Enforcement","authors":"N. Repp, André Miede, M. Niemann, R. Steinmetz","doi":"10.1109/ICSNC.2008.17","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.17","url":null,"abstract":"Web service technology and the Service-oriented Architecture (SOA) paradigm have become state of the art for the integration of systems across enterprise boundaries. Here, a strong need for policies exists, which describe the Quality of Service delivered by third parties.Current policy languages in the area of Web services and SOAs allow the specification of requirements with respect to the Quality of Service as well as the parameters, which should be monitored. They do not cover the countermeasures needed and accepted in case of requirement violations. Especially, in distributed scenarios it is helpful to provide the monitoring units with information about possible reactions to violations in order to enforce policies at the monitoring units. Therefore, we developed the Web service requirements and reactions policy language (WS-Re2Policy), which overcomes those issues by specifying requirements and reactions in a single policy to be distributed to independent monitoring units.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123401115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Traffic Demand Derivation in IP-Based Multi Service Class Environment 基于ip的多业务类环境下的流量需求衍生
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.31
L. Ioan, Grazziela Niculescu, E. Borcoci
Multimedia communication services over multi-domain heterogeneous network infrastructure need end to end (E2E) guarantees for quality of services (QoS). In this context, the proper network dimensioning and traffic engineering of each network domain are significantly dependent on the accuracy of the of traffic demand estimation. The aim of this paper is to propose an algorithm, which estimates the future traffic demand based on current subscriptions, traffic projections and historical data provided by network monitoring. This algorithm is currently evaluated and implemented in the framework of the FP6 European research project named ENTHRONE II.
多域异构网络基础设施上的多媒体通信业务需要端到端服务质量(QoS)保证。在这种情况下,适当的网络维度和每个网络域的流量工程在很大程度上依赖于流量需求估计的准确性。本文的目的是提出一种基于当前订阅量、流量预测和网络监控提供的历史数据来估计未来流量需求的算法。该算法目前正在FP6欧洲研究项目ENTHRONE II的框架中进行评估和实施。
{"title":"Traffic Demand Derivation in IP-Based Multi Service Class Environment","authors":"L. Ioan, Grazziela Niculescu, E. Borcoci","doi":"10.1109/ICSNC.2008.31","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.31","url":null,"abstract":"Multimedia communication services over multi-domain heterogeneous network infrastructure need end to end (E2E) guarantees for quality of services (QoS). In this context, the proper network dimensioning and traffic engineering of each network domain are significantly dependent on the accuracy of the of traffic demand estimation. The aim of this paper is to propose an algorithm, which estimates the future traffic demand based on current subscriptions, traffic projections and historical data provided by network monitoring. This algorithm is currently evaluated and implemented in the framework of the FP6 European research project named ENTHRONE II.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124871937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Route Optimization on Proxy Mobile IPv6 代理移动IPv6路由优化性能分析
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.20
Jae-Min Lee, Jong‐Hyouk Lee, Tai-Myung Chung
In the mobile IPv6 (MIPv6), a mobile node (MN) directly manages its signaling related mobility because the MIPv6 is a host based mobility protocol. On the other hands, the proxy mobile IPv6 (PMIPv6) provides a network based mobility in where special network entities manage all gnaling related mobility for supporting mobility service of MN. The route optimization (RO) mechanism for PMIPv6 is proposed while the specification of PMIPv6 is still focusing on basic operations. The RO mechanism establishes the enhanced communication path between MNs so that it can reduce transmission delay and network burden. In this paper, we analyze the performance of RO mechanism compared with the basic PMIPv6. The presented results confirm that the RO mechanism provide the improved performance during the MN communicates with the CN, due to the established communication path.
在移动IPv6 (MIPv6)中,由于MIPv6是一种基于主机的移动协议,因此移动节点(MN)直接管理与信令相关的移动。另一方面,代理移动IPv6 (proxy mobile IPv6, PMIPv6)提供了一种基于网络的移动性,由特定的网络实体来管理所有与信令相关的移动性,以支持MN的移动性业务。在PMIPv6规范还停留在基本操作阶段的时候,提出了路由优化机制。RO机制在MNs之间建立了增强的通信路径,从而减少了传输延迟和网络负担。在本文中,我们分析了RO机制与基本PMIPv6的性能。研究结果证实,由于建立了通信路径,RO机制在MN与CN通信期间提供了更好的性能。
{"title":"Performance Analysis of Route Optimization on Proxy Mobile IPv6","authors":"Jae-Min Lee, Jong‐Hyouk Lee, Tai-Myung Chung","doi":"10.1109/ICSNC.2008.20","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.20","url":null,"abstract":"In the mobile IPv6 (MIPv6), a mobile node (MN) directly manages its signaling related mobility because the MIPv6 is a host based mobility protocol. On the other hands, the proxy mobile IPv6 (PMIPv6) provides a network based mobility in where special network entities manage all gnaling related mobility for supporting mobility service of MN. The route optimization (RO) mechanism for PMIPv6 is proposed while the specification of PMIPv6 is still focusing on basic operations. The RO mechanism establishes the enhanced communication path between MNs so that it can reduce transmission delay and network burden. In this paper, we analyze the performance of RO mechanism compared with the basic PMIPv6. The presented results confirm that the RO mechanism provide the improved performance during the MN communicates with the CN, due to the established communication path.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129448653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Modeling of Fault Tolerant Fully Adaptive Wormhole Switching 2-D Meshes in Presence of Virtual Channels 虚拟通道下容错全自适应虫孔交换二维网格性能建模
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.26
S. Nickmanesh, A. Movaghar, F. Rookhosh
In recent decades, researchers try to construct high performance interconnection networks with emphasis on fault tolerance. Their studies are based on this fact that, a network can be a major performance bottleneck in parallel processors. This paper proposes an analytical model to predict message latency in wormhole-switched mesh as an instance of a fault tolerant routing. The mesh topology has desirable properties such as modularity, regularity in structure, partitioning to smaller one, simplicity in implementation. To achieve our purpose we modeled an algorithm suggested by Linder-Harden, then performance of this model was evaluated by using XMulator.
近几十年来,研究人员试图构建高性能互连网络,重点是容错性。他们的研究基于这样一个事实,即网络可能是并行处理器的主要性能瓶颈。作为容错路由的一个实例,本文提出了一个分析模型来预测虫洞交换网格中的消息延迟。网状拓扑结构具有模块化、结构规整、可分割、实现简单等优点。为了达到我们的目的,我们对Linder-Harden提出的算法进行了建模,然后使用XMulator对该模型的性能进行了评估。
{"title":"Performance Modeling of Fault Tolerant Fully Adaptive Wormhole Switching 2-D Meshes in Presence of Virtual Channels","authors":"S. Nickmanesh, A. Movaghar, F. Rookhosh","doi":"10.1109/ICSNC.2008.26","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.26","url":null,"abstract":"In recent decades, researchers try to construct high performance interconnection networks with emphasis on fault tolerance. Their studies are based on this fact that, a network can be a major performance bottleneck in parallel processors. This paper proposes an analytical model to predict message latency in wormhole-switched mesh as an instance of a fault tolerant routing. The mesh topology has desirable properties such as modularity, regularity in structure, partitioning to smaller one, simplicity in implementation. To achieve our purpose we modeled an algorithm suggested by Linder-Harden, then performance of this model was evaluated by using XMulator.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless Networks 利用蜜节点和信道冲浪防御无线网络中的干扰攻击
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.62
S. K. Dhurandher, S. Misra, D. Agrawal, Avanish Rayankula
The advent of wireless networks has brought a new set of security issues with it. The most feared of these is a jamming based attack. This is because with the existing network architecture, there is very little that can be done to overcome a jamming attack. In this paper we propose a pre-emptive detection strategy using honeynodes and a response mechanism based on the existing channel surfing algorithm to protect wireless nodes from a jammer. Honeynodes generate dummy communication at a frequency close to the actual frequency of operation, so that the authentic nodes can jump to another frequency even before a jammer starts scanning that frequency. We have implemented the proposed method using ns2. Experimental results show a marked improvement in the performance in our proposed system over the existing channel surfing algorithm.
无线网络的出现带来了一系列新的安全问题。其中最可怕的是基于干扰的攻击。这是因为在现有的网络架构下,几乎没有办法克服干扰攻击。本文提出了一种利用蜜节点的先发制人检测策略和一种基于现有信道冲浪算法的响应机制来保护无线节点免受干扰。蜜节点以接近实际操作频率的频率产生虚拟通信,因此,在干扰器开始扫描该频率之前,真实节点甚至可以跳到另一个频率。我们已经使用ns2实现了所提出的方法。实验结果表明,与现有的信道冲浪算法相比,我们提出的系统性能有了明显的提高。
{"title":"Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless Networks","authors":"S. K. Dhurandher, S. Misra, D. Agrawal, Avanish Rayankula","doi":"10.1109/ICSNC.2008.62","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.62","url":null,"abstract":"The advent of wireless networks has brought a new set of security issues with it. The most feared of these is a jamming based attack. This is because with the existing network architecture, there is very little that can be done to overcome a jamming attack. In this paper we propose a pre-emptive detection strategy using honeynodes and a response mechanism based on the existing channel surfing algorithm to protect wireless nodes from a jammer. Honeynodes generate dummy communication at a frequency close to the actual frequency of operation, so that the authentic nodes can jump to another frequency even before a jammer starts scanning that frequency. We have implemented the proposed method using ns2. Experimental results show a marked improvement in the performance in our proposed system over the existing channel surfing algorithm.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130088105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automatic Control of Students' Attendance in Classrooms Using RFID 利用射频识别技术自动控制学生出勤
Pub Date : 2008-10-26 DOI: 10.1109/ICSNC.2008.70
Francisco Silva, V. Filipe, António Pereira
Radio frequency identification (RFID) is one of the automatic identification technologies more in vogue nowadays. There is a wide research and development in this area trying to take maximum advantage of this technology, and in coming years many new applications and research areas will continue to appear. This sudden interest in RFID also brings about some concerns, mainly the security and privacy of those who work with or use tags in their everyday life. RFID has, for some time, been used to access control in many different areas, from asset tracking to limiting access to restricted areas. In this paper we propose an architecture and a prototype of a system that uses distributed RFID over Ethernet and we demonstrate how to automate an entire students' attendance registration system by using RFID in an educational institution environment. Although the use of RFID systems in educational institutions is not new, it is intended to show how the use of it came to solve daily problems in our university.
射频识别(RFID)是当今较为流行的自动识别技术之一。在这一领域有广泛的研究和开发,试图最大限度地利用这项技术,在未来几年,许多新的应用和研究领域将继续出现。这种对RFID的突然兴趣也带来了一些担忧,主要是那些在日常生活中使用标签的人的安全和隐私。一段时间以来,RFID已被用于许多不同领域的访问控制,从资产跟踪到限制对受限区域的访问。在本文中,我们提出了一个系统的架构和原型,该系统在以太网上使用分布式RFID,并演示了如何在教育机构环境中使用RFID实现整个学生考勤注册系统的自动化。虽然在教育机构中使用RFID系统并不新鲜,但它旨在展示如何使用它来解决我们大学的日常问题。
{"title":"Automatic Control of Students' Attendance in Classrooms Using RFID","authors":"Francisco Silva, V. Filipe, António Pereira","doi":"10.1109/ICSNC.2008.70","DOIUrl":"https://doi.org/10.1109/ICSNC.2008.70","url":null,"abstract":"Radio frequency identification (RFID) is one of the automatic identification technologies more in vogue nowadays. There is a wide research and development in this area trying to take maximum advantage of this technology, and in coming years many new applications and research areas will continue to appear. This sudden interest in RFID also brings about some concerns, mainly the security and privacy of those who work with or use tags in their everyday life. RFID has, for some time, been used to access control in many different areas, from asset tracking to limiting access to restricted areas. In this paper we propose an architecture and a prototype of a system that uses distributed RFID over Ethernet and we demonstrate how to automate an entire students' attendance registration system by using RFID in an educational institution environment. Although the use of RFID systems in educational institutions is not new, it is intended to show how the use of it came to solve daily problems in our university.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125946232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
2008 Third International Conference on Systems and Networks Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1