首页 > 最新文献

2019 IEEE Security and Privacy Workshops (SPW)最新文献

英文 中文
Resilience of Multi-robot Systems to Physical Masquerade Attacks 多机器人系统对物理伪装攻击的弹性
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00031
Kacper Wardega, Roberto Tron, Wenchao Li
The advent of autonomous mobile multi-robot systems has driven innovation in both the industrial and defense sectors. The integration of such systems in safety-and security-critical applications has raised concern over their resilience to attack. In this work, we investigate the security problem of a stealthy adversary masquerading as a properly functioning agent. We show that conventional multi-agent pathfinding solutions are vulnerable to these physical masquerade attacks. Furthermore, we provide a constraint-based formulation of multi-agent pathfinding that yields multi-agent plans that are provably resilient to physical masquerade attacks. This formalization leverages inter-agent observations to facilitate introspective monitoring to guarantee resilience.
自主移动多机器人系统的出现推动了工业和国防部门的创新。这些系统在安全和安全关键应用程序中的集成引起了人们对其抵御攻击能力的担忧。在这项工作中,我们研究了一个伪装成正常运作的代理的隐形对手的安全问题。我们表明,传统的多智能体寻径解决方案容易受到这些物理伪装攻击。此外,我们提供了一种基于约束的多代理寻路公式,该公式产生了可证明能够抵御物理伪装攻击的多代理计划。这种形式化利用代理间观察来促进内省监视,以保证弹性。
{"title":"Resilience of Multi-robot Systems to Physical Masquerade Attacks","authors":"Kacper Wardega, Roberto Tron, Wenchao Li","doi":"10.1109/SPW.2019.00031","DOIUrl":"https://doi.org/10.1109/SPW.2019.00031","url":null,"abstract":"The advent of autonomous mobile multi-robot systems has driven innovation in both the industrial and defense sectors. The integration of such systems in safety-and security-critical applications has raised concern over their resilience to attack. In this work, we investigate the security problem of a stealthy adversary masquerading as a properly functioning agent. We show that conventional multi-agent pathfinding solutions are vulnerable to these physical masquerade attacks. Furthermore, we provide a constraint-based formulation of multi-agent pathfinding that yields multi-agent plans that are provably resilient to physical masquerade attacks. This formalization leverages inter-agent observations to facilitate introspective monitoring to guarantee resilience.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115743774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Message from the DLS Organizers 来自DLS组织者的信息
Pub Date : 2019-05-01 DOI: 10.1109/spw.2019.00006
{"title":"Message from the DLS Organizers","authors":"","doi":"10.1109/spw.2019.00006","DOIUrl":"https://doi.org/10.1109/spw.2019.00006","url":null,"abstract":"","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"26 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126564502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the SafeThings 2019 Organizers 2019年安全物展主办方寄语
Pub Date : 2019-05-01 DOI: 10.1109/spw.2019.00010
{"title":"Message from the SafeThings 2019 Organizers","authors":"","doi":"10.1109/spw.2019.00010","DOIUrl":"https://doi.org/10.1109/spw.2019.00010","url":null,"abstract":"","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"123 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116372075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IWPE 2019 Organization IWPE 2019组织
Pub Date : 2019-05-01 DOI: 10.1109/spw.2019.00009
{"title":"IWPE 2019 Organization","authors":"","doi":"10.1109/spw.2019.00009","DOIUrl":"https://doi.org/10.1109/spw.2019.00009","url":null,"abstract":"","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130358567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Risk Assessment for Data Subject-Aware Threat Modeling 面向数据主体感知威胁建模的隐私风险评估
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00023
Laurens Sion, D. Landuyt, Kim Wuyts, W. Joosen
Regulatory efforts such as the General Data Protection Regulation (GDPR) embody a notion of privacy risk that is centered around the fundamental rights of data subjects. This is, however, a fundamentally different notion of privacy risk than the one commonly used in threat modeling which is largely agnostic of involved data subjects. This mismatch hampers the applicability of privacy threat modeling approaches such as LINDDUN in a Data Protection by Design (DPbD) context. In this paper, we present a data subject-aware privacy risk assessment model in specific support of privacy threat modeling activities. This model allows the threat modeler to draw upon a more holistic understanding of privacy risk while assessing the relevance of specific privacy threats to the system under design. Additionally, we propose a number of improvements to privacy threat modeling, such as enriching Data Flow Diagram (DFD) system models with appropriate risk inputs (e.g., information on data types and involved data subjects). Incorporation of these risk inputs in DFDs, in combination with a risk estimation approach using Monte Carlo simulations, leads to a more comprehensive assessment of privacy risk. The proposed risk model has been integrated in threat modeling tool prototype and validated in the context of a realistic eHealth application.
《通用数据保护条例》(GDPR)等监管努力体现了一种以数据主体的基本权利为中心的隐私风险概念。然而,这是一个与威胁建模中常用的隐私风险概念根本不同的概念,后者在很大程度上不知道所涉及的数据主体。这种不匹配阻碍了隐私威胁建模方法(如LINDDUN)在设计数据保护(DPbD)上下文中的适用性。在本文中,我们提出了一个数据主体感知的隐私风险评估模型,具体支持隐私威胁建模活动。该模型允许威胁建模者在评估特定隐私威胁与所设计系统的相关性时,对隐私风险有更全面的了解。此外,我们还提出了对隐私威胁建模的一些改进,例如用适当的风险输入(例如,关于数据类型和涉及的数据主体的信息)丰富数据流程图(DFD)系统模型。将这些风险输入合并到dfd中,并结合使用蒙特卡罗模拟的风险估计方法,可以对隐私风险进行更全面的评估。所提出的风险模型已集成到威胁建模工具原型中,并在实际的电子健康应用环境中进行了验证。
{"title":"Privacy Risk Assessment for Data Subject-Aware Threat Modeling","authors":"Laurens Sion, D. Landuyt, Kim Wuyts, W. Joosen","doi":"10.1109/SPW.2019.00023","DOIUrl":"https://doi.org/10.1109/SPW.2019.00023","url":null,"abstract":"Regulatory efforts such as the General Data Protection Regulation (GDPR) embody a notion of privacy risk that is centered around the fundamental rights of data subjects. This is, however, a fundamentally different notion of privacy risk than the one commonly used in threat modeling which is largely agnostic of involved data subjects. This mismatch hampers the applicability of privacy threat modeling approaches such as LINDDUN in a Data Protection by Design (DPbD) context. In this paper, we present a data subject-aware privacy risk assessment model in specific support of privacy threat modeling activities. This model allows the threat modeler to draw upon a more holistic understanding of privacy risk while assessing the relevance of specific privacy threats to the system under design. Additionally, we propose a number of improvements to privacy threat modeling, such as enriching Data Flow Diagram (DFD) system models with appropriate risk inputs (e.g., information on data types and involved data subjects). Incorporation of these risk inputs in DFDs, in combination with a risk estimation approach using Monte Carlo simulations, leads to a more comprehensive assessment of privacy risk. The proposed risk model has been integrated in threat modeling tool prototype and validated in the context of a realistic eHealth application.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Devil in the Detail: Attack Scenarios in Industrial Applications 细节中的魔鬼:工业应用中的攻击场景
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00040
S. D. Antón, Alexander Hafner, H. Schotten
In the past years, industrial networks have become increasingly interconnected and opened to private or public networks. This leads to an increase in efficiency and manageability, but also increases the attack surface. Industrial networks often consist of legacy systems that have not been designed with security in mind. In the last decade, an increase in attacks on cyber-physical systems was observed, with drastic consequences on the physical work. In this work, attack vectors on industrial networks are categorised. A real-world process is simulated, attacks are then introduced. Finally, two machine learning-based methods for time series anomaly detection are employed to detect the attacks. Matrix Profiles are employed more successfully than a predictor Long Short-Term Memory network, a class of neural networks.
在过去的几年里,工业网络变得越来越互联,并向私有或公共网络开放。这会提高效率和可管理性,但也会增加攻击面。工业网络通常由遗留系统组成,这些系统在设计时没有考虑到安全性。在过去十年中,对网络物理系统的攻击有所增加,对物理工作造成了严重后果。在这项工作中,对工业网络上的攻击向量进行了分类。模拟真实世界的过程,然后引入攻击。最后,采用两种基于机器学习的时间序列异常检测方法对攻击进行检测。矩阵轮廓比预测长短期记忆网络(一种神经网络)更成功。
{"title":"Devil in the Detail: Attack Scenarios in Industrial Applications","authors":"S. D. Antón, Alexander Hafner, H. Schotten","doi":"10.1109/SPW.2019.00040","DOIUrl":"https://doi.org/10.1109/SPW.2019.00040","url":null,"abstract":"In the past years, industrial networks have become increasingly interconnected and opened to private or public networks. This leads to an increase in efficiency and manageability, but also increases the attack surface. Industrial networks often consist of legacy systems that have not been designed with security in mind. In the last decade, an increase in attacks on cyber-physical systems was observed, with drastic consequences on the physical work. In this work, attack vectors on industrial networks are categorised. A real-world process is simulated, attacks are then introduced. Finally, two machine learning-based methods for time series anomaly detection are employed to detect the attacks. Matrix Profiles are employed more successfully than a predictor Long Short-Term Memory network, a class of neural networks.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123509662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices 当智能设备是愚蠢的:使用家庭智能设备的负面体验
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00036
Weijia He, Jesse Martinez, Roshni Padhi, Lefan Zhang, Blase Ur
Household smart devices – internet-connected thermostats, lights, door locks, and more – have increased greatly in popularity. These devices provide convenience, yet can introduce issues related to safety, security, and usability. To better understand device owners' recent negative experiences with widely deployed smart devices and how those experiences impact the ability to provide a safe environment for users, we conducted an online, survey-based study of 72 participants who have smart devices in their own home. Participants reported struggling to diagnose and recover from power outages and network failures, misattributing some events to hacking. For devices featuring built-in learning, participants reported difficulty avoiding false alarms, communicating complex schedules, and resolving conflicting preferences. Finally, while many smart devices support end-user programming, participants reported fears of breaking the system by writing their own programs. To address these negative experiences, we propose a research agenda for improving the transparency of smart devices.
家用智能设备——连接互联网的恒温器、灯、门锁等——越来越受欢迎。这些设备提供了便利,但也可能带来与安全性、安全性和可用性相关的问题。为了更好地了解设备所有者最近对广泛部署的智能设备的负面体验,以及这些体验如何影响为用户提供安全环境的能力,我们对72名在家中拥有智能设备的参与者进行了一项在线调查研究。参与者报告说,他们很难从停电和网络故障中诊断和恢复,错误地将一些事件归咎于黑客攻击。对于具有内置学习功能的设备,参与者报告在避免假警报,沟通复杂的时间表和解决冲突偏好方面存在困难。最后,虽然许多智能设备支持终端用户编程,但参与者表示担心自己编写程序会破坏系统。为了解决这些负面体验,我们提出了一个提高智能设备透明度的研究议程。
{"title":"When Smart Devices Are Stupid: Negative Experiences Using Home Smart Devices","authors":"Weijia He, Jesse Martinez, Roshni Padhi, Lefan Zhang, Blase Ur","doi":"10.1109/SPW.2019.00036","DOIUrl":"https://doi.org/10.1109/SPW.2019.00036","url":null,"abstract":"Household smart devices – internet-connected thermostats, lights, door locks, and more – have increased greatly in popularity. These devices provide convenience, yet can introduce issues related to safety, security, and usability. To better understand device owners' recent negative experiences with widely deployed smart devices and how those experiences impact the ability to provide a safe environment for users, we conducted an online, survey-based study of 72 participants who have smart devices in their own home. Participants reported struggling to diagnose and recover from power outages and network failures, misattributing some events to hacking. For devices featuring built-in learning, participants reported difficulty avoiding false alarms, communicating complex schedules, and resolving conflicting preferences. Finally, while many smart devices support end-user programming, participants reported fears of breaking the system by writing their own programs. To address these negative experiences, we propose a research agenda for improving the transparency of smart devices.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"16 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120904942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
SafeThings 2019 Organization SafeThings 2019组织
Pub Date : 2019-05-01 DOI: 10.1109/spw.2019.00011
{"title":"SafeThings 2019 Organization","authors":"","doi":"10.1109/spw.2019.00011","DOIUrl":"https://doi.org/10.1109/spw.2019.00011","url":null,"abstract":"","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134543298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEC 60870-5-104 Network Characterization of a Large-Scale Operational Power Grid IEC 60870-5-104大规模运行电网的网络特性
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00051
Kelvin Mai, Xi Qin, Neil Ortiz Silva, A. Cárdenas
Modern SCADA systems are interconnected with one or more industrial network protocols such as DNP3, Modbus/TCP, Ethernet/IP, and IEC 60870-5-104(IEC 104). IEC 104 is a particularly important protocol because it is one of the network protocols used for Automatic Generation Control (AGC), which is the algorithm that maintains electric power balance across large geographical areas. In this work, we focus on an empirical study and observation of a real-world, large scale IEC 104 power network.
现代SCADA系统与一个或多个工业网络协议互连,如DNP3, Modbus/TCP,以太网/IP和IEC 60870-5-104(IEC 104)。IEC 104是一个特别重要的协议,因为它是用于自动发电控制(AGC)的网络协议之一,AGC是在大地理区域保持电力平衡的算法。在这项工作中,我们专注于对现实世界大规模IEC 104电网的实证研究和观察。
{"title":"IEC 60870-5-104 Network Characterization of a Large-Scale Operational Power Grid","authors":"Kelvin Mai, Xi Qin, Neil Ortiz Silva, A. Cárdenas","doi":"10.1109/SPW.2019.00051","DOIUrl":"https://doi.org/10.1109/SPW.2019.00051","url":null,"abstract":"Modern SCADA systems are interconnected with one or more industrial network protocols such as DNP3, Modbus/TCP, Ethernet/IP, and IEC 60870-5-104(IEC 104). IEC 104 is a particularly important protocol because it is one of the network protocols used for Automatic Generation Control (AGC), which is the algorithm that maintains electric power balance across large geographical areas. In this work, we focus on an empirical study and observation of a real-world, large scale IEC 104 power network.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123517434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants 智能扬声器隐私控制-个人语音助理的声学标签
Pub Date : 2019-05-01 DOI: 10.1109/SPW.2019.00035
Peng Cheng, I. E. Bagci, Jeff Yan, U. Roedig
Personal Voice Assistants (PVAs) such as the Siri, Amazon Echo and Google Home are now commonplace. PVAs continuously monitor conversations which may be transported to a cloud back end where they are stored, processed and maybe even passed on to other service providers. A user has little control over this process. She is unable to control the recording behaviour of surrounding PVAs, unable to signal her privacy requirements to back-end systems and unable to track conversation recordings. In this paper we explore techniques for embedding additional information into acoustic signals processed by PVAs. A user employs a tagging device which emits an acoustic signal when PVA activity is assumed. Any active PVA will embed this tag into their recorded audio stream. The tag may signal a cooperating PVA or back-end system that a user has not given a recording consent. The tag may also be used to trace when and where a recording was taken. We discuss different tagging techniques and application scenarios, and we describe the implementation of a prototype tagging device based on PocketSphinx. Using the popular PVA Google Home Mini we demonstrate that the device can tag conversations and that the tagging signal can be retrieved from conversations stored in the Google back-end system.
Siri、亚马逊Echo和谷歌Home等个人语音助手(pva)现在已经很常见了。pva持续监控可能被传输到云后端的会话,在云后端存储、处理甚至可能传递给其他服务提供商。用户对这个过程几乎没有控制权。她无法控制周围pva的记录行为,无法向后端系统发出她的隐私要求,也无法跟踪谈话记录。在本文中,我们探讨了在pva处理的声信号中嵌入附加信息的技术。当假定PVA活动时,用户使用一种发出声信号的标记装置。任何活跃的PVA都会将这个标签嵌入到录制的音频流中。标签可以向合作的PVA或后端系统发出信号,表明用户尚未给予录制同意。这个标签也可以用来追踪录音的时间和地点。我们讨论了不同的标记技术和应用场景,并描述了基于PocketSphinx的原型标记设备的实现。使用流行的PVA Google Home Mini,我们演示了该设备可以标记对话,并且可以从存储在Google后端系统中的对话中检索标记信号。
{"title":"Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants","authors":"Peng Cheng, I. E. Bagci, Jeff Yan, U. Roedig","doi":"10.1109/SPW.2019.00035","DOIUrl":"https://doi.org/10.1109/SPW.2019.00035","url":null,"abstract":"Personal Voice Assistants (PVAs) such as the Siri, Amazon Echo and Google Home are now commonplace. PVAs continuously monitor conversations which may be transported to a cloud back end where they are stored, processed and maybe even passed on to other service providers. A user has little control over this process. She is unable to control the recording behaviour of surrounding PVAs, unable to signal her privacy requirements to back-end systems and unable to track conversation recordings. In this paper we explore techniques for embedding additional information into acoustic signals processed by PVAs. A user employs a tagging device which emits an acoustic signal when PVA activity is assumed. Any active PVA will embed this tag into their recorded audio stream. The tag may signal a cooperating PVA or back-end system that a user has not given a recording consent. The tag may also be used to trace when and where a recording was taken. We discuss different tagging techniques and application scenarios, and we describe the implementation of a prototype tagging device based on PocketSphinx. Using the popular PVA Google Home Mini we demonstrate that the device can tag conversations and that the tagging signal can be retrieved from conversations stored in the Google back-end system.","PeriodicalId":125351,"journal":{"name":"2019 IEEE Security and Privacy Workshops (SPW)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121102948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2019 IEEE Security and Privacy Workshops (SPW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1