首页 > 最新文献

2015 APWG Symposium on Electronic Crime Research (eCrime)最新文献

英文 中文
Beyond the lock icon: real-time detection of phishing websites using public key certificates 锁图标之外:使用公钥证书实时检测钓鱼网站
Pub Date : 2015-05-26 DOI: 10.1109/ECRIME.2015.7120795
Zheng Dong, Apu Kapadia, J. Blythe, L. Camp
We propose a machine-learning approach to detect phishing websites using features from their X.509 public key certificates. We show that its efficacy extends beyond HTTPS-enabled sites. Our solution enables immediate local identification of phishing sites. As such, this serves as an important complement to the existing server-based anti-phishing mechanisms which predominately use blacklists. Blacklisting suffers from several inherent drawbacks in terms of correctness, timeliness, and completeness. Due to the potentially significant lag prior to site blacklisting, there is a window of opportunity for attackers. Other local client-side phishing detection approaches also exist, but primarily rely on page content or URLs, which are arguably easier to manipulate by attackers. We illustrate that our certificate-based approach greatly increases the difficulty of masquerading undetected for phishers, with single millisecond delays for users. We further show that this approach works not only against HTTPS-enabled phishing attacks, but also detects HTTP phishing attacks with port 443 enabled.
我们提出了一种机器学习方法,利用X.509公钥证书中的特征来检测网络钓鱼网站。我们展示了它的功效超出了支持https的站点。我们的解决方案可以立即在本地识别钓鱼网站。因此,这是对现有的主要使用黑名单的基于服务器的反网络钓鱼机制的重要补充。黑名单在正确性、及时性和完整性方面存在一些固有的缺点。由于在网站被列入黑名单之前存在潜在的显著滞后,这为攻击者提供了机会之窗。其他本地客户端网络钓鱼检测方法也存在,但主要依赖于页面内容或url,这可能更容易被攻击者操纵。我们说明了我们基于证书的方法大大增加了钓鱼者伪装而不被发现的难度,对用户来说只有一毫秒的延迟。我们进一步展示了这种方法不仅可以对付启用https的网络钓鱼攻击,还可以检测启用端口443的HTTP网络钓鱼攻击。
{"title":"Beyond the lock icon: real-time detection of phishing websites using public key certificates","authors":"Zheng Dong, Apu Kapadia, J. Blythe, L. Camp","doi":"10.1109/ECRIME.2015.7120795","DOIUrl":"https://doi.org/10.1109/ECRIME.2015.7120795","url":null,"abstract":"We propose a machine-learning approach to detect phishing websites using features from their X.509 public key certificates. We show that its efficacy extends beyond HTTPS-enabled sites. Our solution enables immediate local identification of phishing sites. As such, this serves as an important complement to the existing server-based anti-phishing mechanisms which predominately use blacklists. Blacklisting suffers from several inherent drawbacks in terms of correctness, timeliness, and completeness. Due to the potentially significant lag prior to site blacklisting, there is a window of opportunity for attackers. Other local client-side phishing detection approaches also exist, but primarily rely on page content or URLs, which are arguably easier to manipulate by attackers. We illustrate that our certificate-based approach greatly increases the difficulty of masquerading undetected for phishers, with single millisecond delays for users. We further show that this approach works not only against HTTPS-enabled phishing attacks, but also detects HTTP phishing attacks with port 443 enabled.","PeriodicalId":127631,"journal":{"name":"2015 APWG Symposium on Electronic Crime Research (eCrime)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114638314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Spare the rod, spoil the network security? Economic analysis of sanctions online 省了棍子,破坏了网络安全?经济分析的制裁在线
Pub Date : 2015-05-26 DOI: 10.1109/ECRIME.2015.7120800
Vaibhav Garg, L. Camp
When and how should we encourage network providers to mitigate the harm of security and privacy risks? Poorly designed interventions that do not align with economic incentives can lead stakeholders to be less, rather than more, careful. We apply an economic framework that compares two fundamental regulatory approaches: risk based or ex ante and harm based or ex post. We posit that for well known security risks, such as botnets, ex ante sanctions are economically efficient. Systematic best practices, e.g. patching, can reduce the risk of becoming a bot and thus can be implemented ex ante. Conversely risks, which are contextual, poorly understood, and new, and where distribution of harm is difficult to estimate, should incur ex post sanctions, e.g. information disclosure. Privacy preferences and potential harm vary widely across domains; thus, post-hoc consideration of harm is more appropriate for privacy risks. We examine two current policy and enforcement efforts, i.e. Do Not Track and botnet takedowns, under the ex ante vs. ex post framework. We argue that these efforts may worsen security and privacy outcomes, as they distort market forces, reduce competition, or create artificial monopolies. Finally, we address the overlap between security and privacy risks.
我们何时以及如何鼓励网络供应商减轻安全和隐私风险的危害?设计不良的干预措施与经济激励不一致,可能导致利益相关者更不小心,而不是更小心。我们应用一个经济框架来比较两种基本的监管方法:基于风险或事前和基于伤害或事后。我们假设,对于众所周知的安全风险,如僵尸网络,事前制裁在经济上是有效的。系统的最佳实践,例如打补丁,可以减少成为僵尸的风险,因此可以事先实施。相反,如果风险与环境有关,不为人所知,是新的,而且危害的分布难以估计,则应招致事后制裁,例如信息披露。不同领域的隐私偏好和潜在危害差异很大;因此,事后考虑损害更适合于隐私风险。我们在事前与事后框架下研究了两项当前的政策和执法工作,即不跟踪和僵尸网络删除。我们认为,这些努力可能会恶化安全和隐私的结果,因为它们扭曲了市场力量,减少了竞争,或造成了人为的垄断。最后,我们将讨论安全和隐私风险之间的重叠。
{"title":"Spare the rod, spoil the network security? Economic analysis of sanctions online","authors":"Vaibhav Garg, L. Camp","doi":"10.1109/ECRIME.2015.7120800","DOIUrl":"https://doi.org/10.1109/ECRIME.2015.7120800","url":null,"abstract":"When and how should we encourage network providers to mitigate the harm of security and privacy risks? Poorly designed interventions that do not align with economic incentives can lead stakeholders to be less, rather than more, careful. We apply an economic framework that compares two fundamental regulatory approaches: risk based or ex ante and harm based or ex post. We posit that for well known security risks, such as botnets, ex ante sanctions are economically efficient. Systematic best practices, e.g. patching, can reduce the risk of becoming a bot and thus can be implemented ex ante. Conversely risks, which are contextual, poorly understood, and new, and where distribution of harm is difficult to estimate, should incur ex post sanctions, e.g. information disclosure. Privacy preferences and potential harm vary widely across domains; thus, post-hoc consideration of harm is more appropriate for privacy risks. We examine two current policy and enforcement efforts, i.e. Do Not Track and botnet takedowns, under the ex ante vs. ex post framework. We argue that these efforts may worsen security and privacy outcomes, as they distort market forces, reduce competition, or create artificial monopolies. Finally, we address the overlap between security and privacy risks.","PeriodicalId":127631,"journal":{"name":"2015 APWG Symposium on Electronic Crime Research (eCrime)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121906028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of content copyright infringement in mobile application markets 移动应用市场内容版权侵权分析
Pub Date : 2015-05-26 DOI: 10.1109/ECRIME.2015.7120798
Ryan V. Johnson, Nikolaos Kiourtis, A. Stavrou, Vincent Sritapan
As mobile devices increasingly become bigger in terms of display and reliable in delivering paid entertainment and video content, we also see a rise in the presence of mobile applications that attempt to profit by streaming pirated content to unsuspected end-users. These applications are both paid and free and in the case of free applications, the source of funding appears to be advertisements that are displayed while the content is streamed to the device. In this paper, we assess the extent of content copyright infringement for mobile markets that span multiple platforms (iOS, Android, and Windows Mobile) and cover both official and unofficial mobile markets located across the world. Using a set of search keywords that point to titles of paid streaming content, we discovered 8,592 Android, 5,550 iOS, and 3,910 Windows mobile applications that matched our search criteria. Out of those applications, hundreds had links to either locally or remotely stored pirated content and were not developed, endorsed, or, in many cases, known to the owners of the copyrighted contents. We also revealed the network locations of 856,717 Uniform Resource Locators (URLs) pointing to back-end servers and cyber-lockers used to communicate the pirated content to the mobile application.
随着移动设备在显示和提供付费娱乐和视频内容方面变得越来越大,我们也看到越来越多的移动应用程序试图通过向不知情的最终用户传输盗版内容来获利。这些应用程序有付费的,也有免费的,在免费应用程序的情况下,资金来源似乎是在内容流到设备时显示的广告。在本文中,我们评估了跨越多个平台(iOS, Android和Windows mobile)的移动市场的内容版权侵权程度,并涵盖了全球官方和非官方的移动市场。使用一组指向付费流媒体内容标题的搜索关键词,我们发现8592个Android、5550个iOS和3910个Windows手机应用符合我们的搜索标准。在这些应用程序中,有数百个链接到本地或远程存储的盗版内容,并且没有被开发、认可,或者在许多情况下,版权内容的所有者都不知道。我们还揭示了856,717个统一资源定位器(url)的网络位置,这些url指向后端服务器和网络锁,用于将盗版内容传递给移动应用程序。
{"title":"Analysis of content copyright infringement in mobile application markets","authors":"Ryan V. Johnson, Nikolaos Kiourtis, A. Stavrou, Vincent Sritapan","doi":"10.1109/ECRIME.2015.7120798","DOIUrl":"https://doi.org/10.1109/ECRIME.2015.7120798","url":null,"abstract":"As mobile devices increasingly become bigger in terms of display and reliable in delivering paid entertainment and video content, we also see a rise in the presence of mobile applications that attempt to profit by streaming pirated content to unsuspected end-users. These applications are both paid and free and in the case of free applications, the source of funding appears to be advertisements that are displayed while the content is streamed to the device. In this paper, we assess the extent of content copyright infringement for mobile markets that span multiple platforms (iOS, Android, and Windows Mobile) and cover both official and unofficial mobile markets located across the world. Using a set of search keywords that point to titles of paid streaming content, we discovered 8,592 Android, 5,550 iOS, and 3,910 Windows mobile applications that matched our search criteria. Out of those applications, hundreds had links to either locally or remotely stored pirated content and were not developed, endorsed, or, in many cases, known to the owners of the copyrighted contents. We also revealed the network locations of 856,717 Uniform Resource Locators (URLs) pointing to back-end servers and cyber-lockers used to communicate the pirated content to the mobile application.","PeriodicalId":127631,"journal":{"name":"2015 APWG Symposium on Electronic Crime Research (eCrime)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122374724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Spammer success through customization and randomization of URLs 垃圾邮件发送者通过自定义和url的随机化成功
Pub Date : 2015-05-26 DOI: 10.1109/ECRIME.2015.7120799
Gary Warner, D. Rajani, M. Nagy
Spam researchers and security personnel require a method for determining whether the URLs embedded in email messages are safe or potentially hostile. Prior research has been focused on spam collections that are quite insignificant compared to real-world spam volumes. In this paper, researchers evaluate 464 million URLs representing nearly 1 million unique domains observed in email messages in a six day period from November 2014. Four methods of customization and randomization of URLs believed to be used by spammers to attempt to increase deliverability of their URLs are explored: domain diversity, hostname wild-carding, path uniqueness, and attribute uniqueness. Implications of the findings suggest improvements for “URL blacklist” methods, methods of sampling to decrease the number of URLs that must be reviewed for safety, as well as presenting some challenges to the ICANN, Registrar, and Email Safety communities.
垃圾邮件研究人员和安全人员需要一种方法来确定嵌入在电子邮件消息中的url是安全的还是潜在的恶意的。之前的研究主要集中在垃圾邮件收集上,与真实世界的垃圾邮件数量相比,这些垃圾邮件收集微不足道。在本文中,研究人员评估了4.64亿个url,这些url代表了从2014年11月开始的6天内观察到的电子邮件消息中近100万个唯一域名。本文探讨了四种自定义和随机化url的方法,这些方法被认为是垃圾邮件发送者用来提高其url的可交付性的:域多样性、主机名通配符、路径唯一性和属性唯一性。调查结果的含义建议改进“URL黑名单”方法、抽样方法,以减少必须进行安全审核的URL数量,并向ICANN、注册商和电子邮件安全社群提出一些挑战。
{"title":"Spammer success through customization and randomization of URLs","authors":"Gary Warner, D. Rajani, M. Nagy","doi":"10.1109/ECRIME.2015.7120799","DOIUrl":"https://doi.org/10.1109/ECRIME.2015.7120799","url":null,"abstract":"Spam researchers and security personnel require a method for determining whether the URLs embedded in email messages are safe or potentially hostile. Prior research has been focused on spam collections that are quite insignificant compared to real-world spam volumes. In this paper, researchers evaluate 464 million URLs representing nearly 1 million unique domains observed in email messages in a six day period from November 2014. Four methods of customization and randomization of URLs believed to be used by spammers to attempt to increase deliverability of their URLs are explored: domain diversity, hostname wild-carding, path uniqueness, and attribute uniqueness. Implications of the findings suggest improvements for “URL blacklist” methods, methods of sampling to decrease the number of URLs that must be reviewed for safety, as well as presenting some challenges to the ICANN, Registrar, and Email Safety communities.","PeriodicalId":127631,"journal":{"name":"2015 APWG Symposium on Electronic Crime Research (eCrime)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global adversarial capability modeling 全局对抗能力建模
Pub Date : 2015-05-26 DOI: 10.1109/ECRIME.2015.7120797
Jonathan M. Spring, Sarah Kern, Alec Summers
Intro: Computer network defense has models for attacks and incidents comprised of multiple attacks after the fact. However, we lack an evidence-based model the likelihood and intensity of attacks and incidents. Purpose: We propose a model of global capability advancement, the adversarial capability chain (ACC), to fit this need. The model enables cyber risk analysis to better understand the costs for an adversary to attack a system, which directly influences the cost to defend it. Method: The model is based on four historical studies of adversarial capabilities: capability to exploit Windows XP, to exploit the Android API, to exploit Apache, and to administer compromised industrial control systems. Result: We propose the ACC with five phases: Discovery, Validation, Escalation, Democratization, and Ubiquity. We use the four case studies as examples as to how the ACC can be applied and used to predict attack likelihood and intensity.
简介:计算机网络防御具有针对攻击和事后多重攻击事件的模型。然而,我们缺乏一个基于证据的模型来预测袭击和事件的可能性和强度。目的:为了适应这一需求,我们提出了一种全球能力提升模型——对抗能力链(ACC)。该模型使网络风险分析能够更好地了解对手攻击系统的成本,这直接影响到防御系统的成本。方法:该模型基于对抗性能力的四项历史研究:利用Windows XP的能力,利用Android API的能力,利用Apache的能力,以及管理受损的工业控制系统的能力。结果:我们提出了五个阶段:发现、验证、升级、民主化和普遍性。我们使用四个案例研究作为例子,说明如何应用和使用ACC来预测攻击的可能性和强度。
{"title":"Global adversarial capability modeling","authors":"Jonathan M. Spring, Sarah Kern, Alec Summers","doi":"10.1109/ECRIME.2015.7120797","DOIUrl":"https://doi.org/10.1109/ECRIME.2015.7120797","url":null,"abstract":"Intro: Computer network defense has models for attacks and incidents comprised of multiple attacks after the fact. However, we lack an evidence-based model the likelihood and intensity of attacks and incidents. Purpose: We propose a model of global capability advancement, the adversarial capability chain (ACC), to fit this need. The model enables cyber risk analysis to better understand the costs for an adversary to attack a system, which directly influences the cost to defend it. Method: The model is based on four historical studies of adversarial capabilities: capability to exploit Windows XP, to exploit the Android API, to exploit Apache, and to administer compromised industrial control systems. Result: We propose the ACC with five phases: Discovery, Validation, Escalation, Democratization, and Ubiquity. We use the four case studies as examples as to how the ACC can be applied and used to predict attack likelihood and intensity.","PeriodicalId":127631,"journal":{"name":"2015 APWG Symposium on Electronic Crime Research (eCrime)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121955979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Chasing shuabang in apps stores 在应用商店里追逐说邦
Pub Date : 2015-05-26 DOI: 10.1109/ECRIME.2015.7120796
Sergio de los Santos, Antonio Guzmán, Chema Alonso, Francisco Gomez-Rodriguez
There are well-known attack techniques that threaten current apps stores. However, the complexity of these environments and their high rate of variability have prevented any effective analysis aimed at mitigating the effects of these threats. In this paper, the analysis performed over one of these techniques, Shuabang, is introduced. The completion of this analysis has been supported by a new tool that facilitates the correlation of large amounts of information from different apps stores.
有一些众所周知的攻击技术威胁着当前的应用商店。然而,这些环境的复杂性及其高变异性阻碍了任何旨在减轻这些威胁影响的有效分析。本文介绍了对其中一种技术Shuabang的分析。这项分析的完成得益于一个新工具,该工具可以将来自不同应用商店的大量信息进行关联。
{"title":"Chasing shuabang in apps stores","authors":"Sergio de los Santos, Antonio Guzmán, Chema Alonso, Francisco Gomez-Rodriguez","doi":"10.1109/ECRIME.2015.7120796","DOIUrl":"https://doi.org/10.1109/ECRIME.2015.7120796","url":null,"abstract":"There are well-known attack techniques that threaten current apps stores. However, the complexity of these environments and their high rate of variability have prevented any effective analysis aimed at mitigating the effects of these threats. In this paper, the analysis performed over one of these techniques, Shuabang, is introduced. The completion of this analysis has been supported by a new tool that facilitates the correlation of large amounts of information from different apps stores.","PeriodicalId":127631,"journal":{"name":"2015 APWG Symposium on Electronic Crime Research (eCrime)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116656709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Which malware lures work best? Measurements from a large instant messaging worm 哪种恶意软件引诱效果最好?来自大型即时通讯蠕虫的测量结果
Pub Date : 2015-05-26 DOI: 10.1109/ECRIME.2015.7120801
T. Moore, R. Clayton
Users are inveigled into visiting a malicious website in a phishing or malware-distribution scam through the use of a `lure' - a superficially valid reason for their interest. We examine real world data from some `worms' that spread over the social graph of Instant Messenger users. We find that over 14 million distinct users clicked on these lures over a two year period from Spring 2010. Furthermore, we present evidence that 95% of users who clicked on the lures became infected with malware. In one four week period spanning May-June 2010, near the worm's peak, we estimate that at least 1.67 million users were infected. We measure the extent to which small variations in lure URLs and the short pieces of text that accompany these URLs affects the likelihood of users clicking on the malicious URL. We show that the hostnames containing recognizable brand names were more effective than the terse random strings employed by URL shortening systems; and that brief Portuguese phrases were more effective in luring in Brazilians than more generic `language independent' text.
用户通过使用“诱饵”(表面上是他们感兴趣的正当理由),在网络钓鱼或恶意软件分发骗局中被诱骗访问恶意网站。我们研究了一些“蠕虫”在即时通讯用户社交图谱上传播的真实世界数据。我们发现,从2010年春季开始的两年时间里,有超过1400万独立用户点击了这些诱饵。此外,我们提供的证据表明,95%点击诱饵的用户感染了恶意软件。在2010年5月至6月的四周时间里,接近蠕虫的高峰期,我们估计至少有167万用户被感染。我们测量诱饵URL的微小变化以及这些URL附带的短文本片段对用户点击恶意URL的可能性的影响程度。我们表明,包含可识别品牌名称的主机名比URL缩短系统使用的简洁随机字符串更有效;简短的葡萄牙语短语比那些“语言无关”的通用文本更能有效地吸引巴西人。
{"title":"Which malware lures work best? Measurements from a large instant messaging worm","authors":"T. Moore, R. Clayton","doi":"10.1109/ECRIME.2015.7120801","DOIUrl":"https://doi.org/10.1109/ECRIME.2015.7120801","url":null,"abstract":"Users are inveigled into visiting a malicious website in a phishing or malware-distribution scam through the use of a `lure' - a superficially valid reason for their interest. We examine real world data from some `worms' that spread over the social graph of Instant Messenger users. We find that over 14 million distinct users clicked on these lures over a two year period from Spring 2010. Furthermore, we present evidence that 95% of users who clicked on the lures became infected with malware. In one four week period spanning May-June 2010, near the worm's peak, we estimate that at least 1.67 million users were infected. We measure the extent to which small variations in lure URLs and the short pieces of text that accompany these URLs affects the likelihood of users clicking on the malicious URL. We show that the hostnames containing recognizable brand names were more effective than the terse random strings employed by URL shortening systems; and that brief Portuguese phrases were more effective in luring in Brazilians than more generic `language independent' text.","PeriodicalId":127631,"journal":{"name":"2015 APWG Symposium on Electronic Crime Research (eCrime)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125892820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 APWG Symposium on Electronic Crime Research (eCrime)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1