首页 > 最新文献

Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems最新文献

英文 中文
AXIe — New standard for the highest performance test and measurement applications AXIe -最高性能测试和测量应用的新标准
Vaclav Haasz
The aging VXI and physical limitations of PXI create a need for new bus standard for the highest performance test applications. AXIe, based on AdvancedTCA with extensions for instrumentation and test, leverage existing standards from PXI, LXI and IVI and provide more than enough power and space to accommodate the most demanding test instruments. AXIe promises high scalability and performance that will address a range of platforms including bench top measurements, modular systems and automated test equipment.
老化的VXI和PXI的物理限制创造了对最高性能测试应用的新总线标准的需求。AXIe基于AdvancedTCA,具有仪器和测试扩展,利用PXI, LXI和IVI的现有标准,并提供足够的功率和空间来容纳最苛刻的测试仪器。axe承诺高可扩展性和高性能,将解决一系列平台,包括台式测量,模块化系统和自动化测试设备。
{"title":"AXIe — New standard for the highest performance test and measurement applications","authors":"Vaclav Haasz","doi":"10.1109/IDAACS.2011.6072705","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072705","url":null,"abstract":"The aging VXI and physical limitations of PXI create a need for new bus standard for the highest performance test applications. AXIe, based on AdvancedTCA with extensions for instrumentation and test, leverage existing standards from PXI, LXI and IVI and provide more than enough power and space to accommodate the most demanding test instruments. AXIe promises high scalability and performance that will address a range of platforms including bench top measurements, modular systems and automated test equipment.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134085800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Neural network approach to real-time network intrusion detection and recognition 神经网络方法的实时网络入侵检测与识别
Pavel Kachurka, V. Golovko
Modern intrusion detection systems process large amounts of data. Most systems use signature- and rule-based approaches to find attack traces. The main disadvantage of such technologies is the need of continuous updating of signature database to let the system detect newest attacks. We present recirculation neural network based approach which lets to detect previously unseen attack types in real-time mode and to further correct recognition of this types. The experiments held on both KDD data and real network traffic data prove that this approach can be used in host-based anomaly and misuse detectors.
现代入侵检测系统需要处理大量数据。大多数系统使用基于签名和规则的方法来查找攻击痕迹。这些技术的主要缺点是需要不断更新特征库,以便系统检测到最新的攻击。我们提出了一种基于循环神经网络的方法,可以实时检测以前未见过的攻击类型,并进一步正确识别这些类型。在KDD数据和实际网络流量数据上进行的实验表明,该方法可以用于基于主机的异常和误用检测。
{"title":"Neural network approach to real-time network intrusion detection and recognition","authors":"Pavel Kachurka, V. Golovko","doi":"10.1109/IDAACS.2011.6072781","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072781","url":null,"abstract":"Modern intrusion detection systems process large amounts of data. Most systems use signature- and rule-based approaches to find attack traces. The main disadvantage of such technologies is the need of continuous updating of signature database to let the system detect newest attacks. We present recirculation neural network based approach which lets to detect previously unseen attack types in real-time mode and to further correct recognition of this types. The experiments held on both KDD data and real network traffic data prove that this approach can be used in host-based anomaly and misuse detectors.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116920495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Buffer overflow attacks data acquisition 缓冲区溢出攻击数据采集
M. Drozd, M. Barabas, M. Grégr, P. Chmelar
In this abstract, we investigate the network traffic that may cause the unauthorized control of a computer in the campus network using buffer overflow attacks, the objective of which is to gain the control of privileged programs and computers. We provide statistics of the network traffic in a campus and an eterprise network together with probabilities of a buffer overflow attack to provide attakers the most vulnerable services using low interaction honeypot HoneyD together with a highly interactive shadow honeypot Argos that were used to detect attacks and describe their detection profiles. In this manner, we can collect data to be used for training classifiers to predict and detect even zero day vulnerabilities and malware. Our intension is to acquaint dataset that can identify serious security threats in much higher details, compared to 1999 KDD Cup dataset.
在本摘要中,我们研究了可能导致使用缓冲区溢出攻击对校园网中计算机进行未经授权控制的网络流量,其目的是获得对特权程序和计算机的控制。我们提供校园和企业网络中网络流量的统计数据以及缓冲区溢出攻击的概率,使用低交互蜜罐HoneyD和高度交互的影子蜜罐Argos为攻击者提供最脆弱的服务,用于检测攻击并描述其检测配置文件。通过这种方式,我们可以收集数据用于训练分类器来预测和检测甚至零日漏洞和恶意软件。与1999年的KDD Cup数据集相比,我们的目的是了解能够更详细地识别严重安全威胁的数据集。
{"title":"Buffer overflow attacks data acquisition","authors":"M. Drozd, M. Barabas, M. Grégr, P. Chmelar","doi":"10.1109/IDAACS.2011.6072875","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072875","url":null,"abstract":"In this abstract, we investigate the network traffic that may cause the unauthorized control of a computer in the campus network using buffer overflow attacks, the objective of which is to gain the control of privileged programs and computers. We provide statistics of the network traffic in a campus and an eterprise network together with probabilities of a buffer overflow attack to provide attakers the most vulnerable services using low interaction honeypot HoneyD together with a highly interactive shadow honeypot Argos that were used to detect attacks and describe their detection profiles. In this manner, we can collect data to be used for training classifiers to predict and detect even zero day vulnerabilities and malware. Our intension is to acquaint dataset that can identify serious security threats in much higher details, compared to 1999 KDD Cup dataset.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116896729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evolution of immune detectors in intelligent security system for malware detection 智能安防系统中用于恶意软件检测的免疫检测器的发展
V. Golovko, Sergei V. Bezobrazov, Vasilii Melianchuk, M. Komar
In this paper we present the basic principles of the evolution of detectors in intelligent malware detection system. This system based on integration of both AI methods: artificial neural networks and artificial immune systems. The goal of the evolution is adaptation of detectors to new, unknown malicious code for increasing of quality of detection.
本文介绍了智能恶意软件检测系统中检测器进化的基本原理。该系统基于人工神经网络和人工免疫系统两种人工智能方法的集成。进化的目标是使检测器适应新的未知恶意代码,以提高检测质量。
{"title":"Evolution of immune detectors in intelligent security system for malware detection","authors":"V. Golovko, Sergei V. Bezobrazov, Vasilii Melianchuk, M. Komar","doi":"10.1109/IDAACS.2011.6072865","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072865","url":null,"abstract":"In this paper we present the basic principles of the evolution of detectors in intelligent malware detection system. This system based on integration of both AI methods: artificial neural networks and artificial immune systems. The goal of the evolution is adaptation of detectors to new, unknown malicious code for increasing of quality of detection.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124663754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The technique for computer systems Trojan diagnosis in the monitor mode 监控模式下的计算机系统木马诊断技术
Sergiy Lysenko, O. Savenko
New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.
提出了一种基于模糊逻辑的监控模式下计算机系统木马诊断新技术,提高了系统的可靠性和效率。
{"title":"The technique for computer systems Trojan diagnosis in the monitor mode","authors":"Sergiy Lysenko, O. Savenko","doi":"10.1109/IDAACS.2011.6072874","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072874","url":null,"abstract":"New technique for computer system Trojan diagnosis in monitor mode which uses fuzzy logic and allows improving reliability and efficiency is developed.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124945493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of 4-channel cardiomagnetic scaner and technical requirements for 9-channel scaner to diagnose the heart abnormalities 4通道心磁扫描仪的研制及9通道心磁扫描仪诊断心脏异常的技术要求
M. Budnyk, Volodymyr Sosnytskyi, I. Voitovych, V. Maiko, Y. Minov, P. Sutkovyi, Oleksandr Zakorchenyi, T. Ryzhenko, V. Budnyk
Detail description of hardware and software of novel Ukrainian generation of magnetocardiographic apparatus — cardiomagnetic scanner CARDIOMAGSCAN have been presented. This cheaper supersensitive device includes 4 signal SQUID-channels, electrocardiograph, and automatic electromechanical system for patient scanning. Scanner is enabled to perform observation of the human heart during 15 minutes at unshielded environment. Device is intended to non-invasive medical diagnostics of cardiology diseases with help of advanced software including early stages, difficult-to-diagnose cases, and asymptomatic forms.
详细介绍了乌克兰新一代心脏磁图仪——CARDIOMAGSCAN的硬件和软件。这种便宜的超灵敏设备包括4个信号squid通道,心电图仪和用于患者扫描的自动机电系统。扫描仪可在无屏蔽环境下对人体心脏进行15分钟的观察。该设备旨在借助先进的软件对心脏病进行无创医学诊断,包括早期阶段、难以诊断的病例和无症状的形式。
{"title":"Development of 4-channel cardiomagnetic scaner and technical requirements for 9-channel scaner to diagnose the heart abnormalities","authors":"M. Budnyk, Volodymyr Sosnytskyi, I. Voitovych, V. Maiko, Y. Minov, P. Sutkovyi, Oleksandr Zakorchenyi, T. Ryzhenko, V. Budnyk","doi":"10.1109/IDAACS.2011.6072717","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072717","url":null,"abstract":"Detail description of hardware and software of novel Ukrainian generation of magnetocardiographic apparatus — cardiomagnetic scanner CARDIOMAGSCAN have been presented. This cheaper supersensitive device includes 4 signal SQUID-channels, electrocardiograph, and automatic electromechanical system for patient scanning. Scanner is enabled to perform observation of the human heart during 15 minutes at unshielded environment. Device is intended to non-invasive medical diagnostics of cardiology diseases with help of advanced software including early stages, difficult-to-diagnose cases, and asymptomatic forms.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multimedia and wireless communication in culture and creative industries 文化创意产业中的多媒体及无线通讯
Eileen Kuehn, J. Reinhardt, Stephan Bergemann, J. Sieck
This paper presents two different approaches to visualise information from culture and creative industries by using RFID based tracking and identification as well as Wi-Fi for the communication between the different components. Besides the required RFID backend, the paper also introduces a multi media information system built on top of the backend. The first approach is based on passive RFID whereas the second uses active RFID. In particular, the differences in the processing of system events, delivery of needed information and the implemented infrastructure will be discussed and evaluated.
本文介绍了两种不同的方法,通过使用基于RFID的跟踪和识别以及Wi-Fi在不同组件之间的通信来可视化来自文化和创意产业的信息。除了所需要的RFID后端外,本文还介绍了在此基础上构建的多媒体信息系统。第一种方法基于无源RFID,而第二种方法使用有源RFID。特别是,将讨论和评估系统事件处理、所需信息的交付和实现的基础设施方面的差异。
{"title":"Multimedia and wireless communication in culture and creative industries","authors":"Eileen Kuehn, J. Reinhardt, Stephan Bergemann, J. Sieck","doi":"10.1109/IDAACS.2011.6072883","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072883","url":null,"abstract":"This paper presents two different approaches to visualise information from culture and creative industries by using RFID based tracking and identification as well as Wi-Fi for the communication between the different components. Besides the required RFID backend, the paper also introduces a multi media information system built on top of the backend. The first approach is based on passive RFID whereas the second uses active RFID. In particular, the differences in the processing of system events, delivery of needed information and the implemented infrastructure will be discussed and evaluated.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129373026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research of artificial neural network's component of software quality evaluation and prediction method 人工神经网络组件软件质量评价与预测方法研究
O. Pomorova, T. Hovorushchenko
This paper represents the artificial neural network's method of design results evaluation and software quality characteristics prediction (NMEP) and the analysis of results of realized artificial neural network (ANN) training and functioning.
介绍了人工神经网络设计结果评价和软件质量特征预测(NMEP)方法,并对已实现的人工神经网络(ANN)的训练和功能结果进行了分析。
{"title":"Research of artificial neural network's component of software quality evaluation and prediction method","authors":"O. Pomorova, T. Hovorushchenko","doi":"10.1109/IDAACS.2011.6072916","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072916","url":null,"abstract":"This paper represents the artificial neural network's method of design results evaluation and software quality characteristics prediction (NMEP) and the analysis of results of realized artificial neural network (ANN) training and functioning.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129348025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Universal asset assessment system based on excel™ 基于excel™的通用资产评估系统
G. Markowsky
At the 2009 IEEE International Conference on Technologies for Homeland Security the author presented a paper entitled “Comparing Apples to Oranges” which showed the fundamental problem of ranking assets on multiple-factors. In particular, the talk showed that programs like Carver2 cannot consistently order targets. In particular, the author contends that using a spreadsheet such as Excel™ permits users to do as good a job of assessing targets as more dedicated systems. To improve the usefulness of Excel™ for target selection, the author has written a module that permits the spreadsheet to identify Condorcet cycles so that users will get a more realistic understanding of the vulnerability of their various assets. This paper describes the theoretical basis for this module and illustrates its operation. This module is available from the author.
在2009年IEEE国土安全技术国际会议上,作者发表了一篇题为“比较苹果和橘子”的论文,其中展示了基于多因素对资产进行排名的基本问题。特别是,这次谈话表明,像Carver2这样的程序不能始终如一地订购目标。特别地,作者认为使用Excel™这样的电子表格允许用户在评估目标时做得和更专用的系统一样好。为了提高Excel™对目标选择的有用性,作者编写了一个模块,允许电子表格识别孔多塞周期,以便用户对其各种资产的脆弱性有更现实的了解。本文阐述了该模块的理论基础,并举例说明了其实现方法。该模块可从作者处获得。
{"title":"Universal asset assessment system based on excel™","authors":"G. Markowsky","doi":"10.1109/IDAACS.2011.6072870","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072870","url":null,"abstract":"At the 2009 IEEE International Conference on Technologies for Homeland Security the author presented a paper entitled “Comparing Apples to Oranges” which showed the fundamental problem of ranking assets on multiple-factors. In particular, the talk showed that programs like Carver2 cannot consistently order targets. In particular, the author contends that using a spreadsheet such as Excel™ permits users to do as good a job of assessing targets as more dedicated systems. To improve the usefulness of Excel™ for target selection, the author has written a module that permits the spreadsheet to identify Condorcet cycles so that users will get a more realistic understanding of the vulnerability of their various assets. This paper describes the theoretical basis for this module and illustrates its operation. This module is available from the author.","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130699741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of identification accuracy of multisensor conversion characteristic using SVM 利用支持向量机提高多传感器转换特性识别精度
I. Turchenko, V. Kochan
A method of individual conversion characteristic identification of multisensor using reduced number of its calibration/testing results is described in this paper. The proposed method is based on the neural-based reconstruction (approximation or prediction) of surface points of multisensor conversion characteristic. Each neural network module reconstructs separate point of the surface. Our results show that the use of a Support Vector Machine (SVM) model allows improving the reconstruction accuracy of multisensor conversion characteristic. The reconstruction results obtained by SVM are compared with the results obtained by a multi-layer perceptron (MLP).
本文介绍了一种利用减少多传感器标定/测试结果的单个转换特性识别方法。该方法基于多传感器转换特征表面点的神经重构(近似或预测)。每个神经网络模块重建表面的单独点。研究结果表明,使用支持向量机模型可以提高多传感器转换特性的重建精度。将SVM得到的重建结果与多层感知器(MLP)得到的重建结果进行了比较。
{"title":"Improvement of identification accuracy of multisensor conversion characteristic using SVM","authors":"I. Turchenko, V. Kochan","doi":"10.1109/IDAACS.2011.6072780","DOIUrl":"https://doi.org/10.1109/IDAACS.2011.6072780","url":null,"abstract":"A method of individual conversion characteristic identification of multisensor using reduced number of its calibration/testing results is described in this paper. The proposed method is based on the neural-based reconstruction (approximation or prediction) of surface points of multisensor conversion characteristic. Each neural network module reconstructs separate point of the surface. Our results show that the use of a Support Vector Machine (SVM) model allows improving the reconstruction accuracy of multisensor conversion characteristic. The reconstruction results obtained by SVM are compared with the results obtained by a multi-layer perceptron (MLP).","PeriodicalId":106306,"journal":{"name":"Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127974803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1