首页 > 最新文献

CompSciRN: Other Cybersecurity最新文献

英文 中文
Tracking Mixed Bitcoins 追踪混合比特币
Pub Date : 2020-09-17 DOI: 10.2139/ssrn.3701657
Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just
Mixer services purportedly remove all connections between the input (deposited) Bitcoins and the output (withdrawn) mixed Bitcoins, seemingly rendering taint analysis tracking ineffectual. In this paper, we introduce and explore a novel tracking strategy, called emph{Address Taint Analysis}, that adapts from existing transaction-based taint analysis techniques for tracking Bitcoins that have passed through a mixer service. We also investigate the potential of combining address taint analysis with address clustering and backward tainting. We further introduce a set of filtering criteria that reduce the number of false-positive results based on the characteristics of withdrawn transactions and evaluate our solution with verifiable mixing transactions of nine mixer services from previous reverse-engineering studies. Our finding shows that it is possible to track the mixed Bitcoins from the deposited Bitcoins using address taint analysis and the number of potential transaction outputs can be significantly reduced with the filtering criteria.
据称,混合器服务删除了输入(存入)比特币和输出(提取)混合比特币之间的所有连接,似乎使污染分析跟踪无效。在本文中,我们介绍并探索了一种新的跟踪策略,称为emph{地址污点分析},它适应于现有的基于交易的污点分析技术,用于跟踪通过混合器服务的比特币。我们还研究了将地址污染分析与地址聚类和向后污染相结合的潜力。我们进一步引入了一组过滤标准,根据撤回交易的特征减少假阳性结果的数量,并使用先前逆向工程研究中九个混合器服务的可验证混合交易来评估我们的解决方案。我们的发现表明,使用地址污染分析可以从存放的比特币中跟踪混合比特币,并且通过过滤标准可以显着减少潜在交易输出的数量。
{"title":"Tracking Mixed Bitcoins","authors":"Tin Tironsakkul, Manuel Maarek, Andrea Eross, Mike Just","doi":"10.2139/ssrn.3701657","DOIUrl":"https://doi.org/10.2139/ssrn.3701657","url":null,"abstract":"Mixer services purportedly remove all connections between the input (deposited) Bitcoins and the output (withdrawn) mixed Bitcoins, seemingly rendering taint analysis tracking ineffectual. In this paper, we introduce and explore a novel tracking strategy, called emph{Address Taint Analysis}, that adapts from existing transaction-based taint analysis techniques for tracking Bitcoins that have passed through a mixer service. We also investigate the potential of combining address taint analysis with address clustering and backward tainting. We further introduce a set of filtering criteria that reduce the number of false-positive results based on the characteristics of withdrawn transactions and evaluate our solution with verifiable mixing transactions of nine mixer services from previous reverse-engineering studies. Our finding shows that it is possible to track the mixed Bitcoins from the deposited Bitcoins using address taint analysis and the number of potential transaction outputs can be significantly reduced with the filtering criteria.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115722839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of Methodological Foundations for Designing a Classifier of Threats to Cyber-physical Systems 网络物理系统威胁分类器设计方法基础的发展
Pub Date : 2020-06-26 DOI: 10.15587/1729-4061.2020.205702
O. Shmatko, S. Balakireva, A. Vlasov, N. Zagorodna, O. Korol, O. Milov, Oleksii Petrov, S. Pohasii, K. Rzayev, V. Khvostenko
The emergence of a full-scale quantum computer questions the stability of almost all symmetric and asymmetric cryptography algorithms. At the same time, the rapid growth of computing resources of IT and “G” technologies contributes to an increase in attacks on information and communication (ICS) and cyberphysical systems (CPS). These systems are the core of modern critical cybernetic information systems (CCIS). In such conditions, the primary task of maintaining the required level of security is the classification of modern threats that are integrated with social engineering methods and acquire signs of synergy and hybridity. The paper proposes a synergistic model of threats to ICS/CPS, which takes into account the focus of threats on synergy and hybridity, and the combined impact of security components: information security (IS), cybersecurity (CS), security of information (SI). This approach allows developing methodological foundations for building a unified classifier of threats to cyberphysical systems, forming sets of critical threats, critical points in the ICS/CPS infrastructure elements, based on minimal computing, human and economic costs. The developed methodology for determining the category of an attacker allows systematizing an attacker and, based on the analysis of weighting factors, forming a matrix of correspondence between the capabilities of attackers of various categories and technical means of information security (TMIS). These actions significantly reduce the risk of an attack by certain categories of attackers and allow for planning in the formation of both the IS policy and the corresponding protection profiles.
全尺寸量子计算机的出现对几乎所有对称和非对称密码算法的稳定性提出了质疑。与此同时,随着IT和G技术计算资源的快速增长,针对信息通信系统和网络物理系统的攻击也在增加。这些系统是现代关键控制论信息系统(CCIS)的核心。在这种情况下,维持所需安全级别的主要任务是对现代威胁进行分类,这些威胁与社会工程方法相结合,并获得协同和混合的迹象。本文提出了ICS/CPS威胁的协同模型,该模型考虑了威胁对协同性和混合性的关注,以及安全组件的综合影响:信息安全(IS),网络安全(CS),信息安全(SI)。这种方法允许开发方法基础,以建立对网络物理系统的统一威胁分类器,形成关键威胁集,ICS/CPS基础设施要素中的关键点,基于最小的计算,人力和经济成本。所开发的确定攻击者类别的方法允许将攻击者系统化,并基于对加权因素的分析,形成不同类别攻击者能力与信息安全技术手段(TMIS)之间的对应矩阵。这些操作显著降低了某些类别攻击者的攻击风险,并允许在形成IS策略和相应的保护配置文件时进行规划。
{"title":"Development of Methodological Foundations for Designing a Classifier of Threats to Cyber-physical Systems","authors":"O. Shmatko, S. Balakireva, A. Vlasov, N. Zagorodna, O. Korol, O. Milov, Oleksii Petrov, S. Pohasii, K. Rzayev, V. Khvostenko","doi":"10.15587/1729-4061.2020.205702","DOIUrl":"https://doi.org/10.15587/1729-4061.2020.205702","url":null,"abstract":"The emergence of a full-scale quantum computer questions the stability of almost all symmetric and asymmetric cryptography algorithms. At the same time, the rapid growth of computing resources of IT and “G” technologies contributes to an increase in attacks on information and communication (ICS) and cyberphysical systems (CPS). These systems are the core of modern critical cybernetic information systems (CCIS). In such conditions, the primary task of maintaining the required level of security is the classification of modern threats that are integrated with social engineering methods and acquire signs of synergy and hybridity. The paper proposes a synergistic model of threats to ICS/CPS, which takes into account the focus of threats on synergy and hybridity, and the combined impact of security components: information security (IS), cybersecurity (CS), security of information (SI). This approach allows developing methodological foundations for building a unified classifier of threats to cyberphysical systems, forming sets of critical threats, critical points in the ICS/CPS infrastructure elements, based on minimal computing, human and economic costs. The developed methodology for determining the category of an attacker allows systematizing an attacker and, based on the analysis of weighting factors, forming a matrix of correspondence between the capabilities of attackers of various categories and technical means of information security (TMIS). These actions significantly reduce the risk of an attack by certain categories of attackers and allow for planning in the formation of both the IS policy and the corresponding protection profiles.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117203452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Proof Of The ABC Conjecture. ABC猜想的证明。
Pub Date : 2020-06-01 DOI: 10.2139/ssrn.3601689
Michael C. I. Nwogugu
In this article, its shown that the ABC Conjecture is correct for integers a+b=c, and any real number r>1. This article proposes that the ABC Conjecture is true iff: c>0.
本文证明了ABC猜想对整数a+b=c和任何实数r>1都是正确的。本文提出当c>0时ABC猜想为真。
{"title":"A Proof Of The ABC Conjecture.","authors":"Michael C. I. Nwogugu","doi":"10.2139/ssrn.3601689","DOIUrl":"https://doi.org/10.2139/ssrn.3601689","url":null,"abstract":"In this article, its shown that the ABC Conjecture is correct for integers a+b=c, and any real number r>1. This article proposes that the ABC Conjecture is true iff: c>0.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123234024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Can Cryptocurrencies Be a Future Safe Haven for Investors? A Case Study of Bitcoin 加密货币能成为投资者未来的避风港吗?比特币的案例研究
Pub Date : 2020-05-05 DOI: 10.2139/ssrn.3593508
A. Khaki, Somar Al-Mohamad, Walid Bakry, Samet Gunay
Purpose: This study attempts to determine whether or not Bitcoin prices are affected by real economic activity, financial markets, and foreign exchange markets; and whether Bitcoin has the potential to be a safe haven for investors. Background: Cryptocurrencies in general, and Bitcoin in particular, have generated a huge interest from both practitioners and academicians as an alternative mechanism for electronic payment systems. While some argue that “Bitcoin works in practice, but not in theory”, others argue that Bitcoin’s stability depends on unknown variables in unknown combination, and thus it is difficult if not impossible to model precisely, thereby raising doubts about the soundness of the system. The research community should assume the task of precisely identifying the factors driving Bitcoin prices, and develop some theoretical foundation to help understand how Bitcoin will be affected when the legal environment and practices change. Significance of the Study: The extensive discussion of Bitcoin on blogs and in the mainstream financial media has primarily focused on the cryptocurrency’s technical, legal and safety issues. Even the limited academic research on the subject has focused on the technical and safety issues, leaving the question of financial and economic aspects largely untouched. The present study thus seeks to determine the extent to which Bitcoin is affected, if at all, by changes in economic growth, financial markets, and forex markets. The paper also seeks to determine whether Bitcoin behaves differently from forex markets and financial markets and if it has a hedging or diversification potential? Design/methodology/approach: A Markov regime-switching regression model is employed in this study to determine the relationship between real economic activity (proxied by the Baltic Dry Index), financial markets (proxied by the Dow Jones Industrial Average Index), and foreign exchange markets (proxied by the USD-Euro & USD-Yen exchange rates). Findings: The results indicate that, unlike USD-Euro and USD-Yen exchange rates, Bitcoin exhibits significantly different behavior in terms of its association with other financial and economic variables. While equity markets or forex markets are significantly related to each other in varying levels in both the bullish and the bearish regimes, real economic activity appears to be unrelated to either of them. Bitcoin meanwhile, is affected neither by real economic activity, nor equity markets, nor forex markets in either bullish and the bearish regimes. Indeed, it differs significantly in its behavior from forex markets. Furthermore, the results indicate that Bitcoin tends largely to exhibit a bullish trend and the probability of transition to a bearish trend is very small. Thus, it can be concluded that Bitcoin may offer potential for both hedging and diversification to varying degrees. Originality/value: Although the technical, legal and safety issues in cryptocurrencies ha
目的:本研究试图确定比特币价格是否受到实体经济活动、金融市场和外汇市场的影响;以及比特币是否有潜力成为投资者的避风港。背景:一般来说,加密货币,特别是比特币,作为电子支付系统的替代机制,已经引起了从业者和学者的巨大兴趣。一些人认为“比特币在实践中起作用,但在理论上不起作用”,另一些人则认为比特币的稳定性取决于未知变量的未知组合,因此很难(如果不是不可能的话)精确地建模,从而引发了对系统健全性的质疑。研究界应该承担起精确识别驱动比特币价格的因素的任务,并发展一些理论基础,以帮助理解当法律环境和实践发生变化时,比特币将如何受到影响。研究意义:博客和主流金融媒体上对比特币的广泛讨论主要集中在加密货币的技术、法律和安全问题上。即使是有限的学术研究也集中在技术和安全问题上,而金融和经济方面的问题基本上没有触及。因此,本研究旨在确定比特币受到经济增长、金融市场和外汇市场变化的影响程度。该论文还试图确定比特币的行为是否与外汇市场和金融市场不同,以及它是否具有对冲或多样化的潜力?设计/方法/方法:本研究采用马尔可夫制度转换回归模型来确定实体经济活动(以波罗的海干散货指数为代表)、金融市场(以道琼斯工业平均指数为代表)和外汇市场(以美元-欧元和美元-日元汇率为代表)之间的关系。研究结果表明,与美元-欧元和美元-日元汇率不同,比特币与其他金融和经济变量的关联表现出显著不同的行为。尽管股票市场或外汇市场在看涨和看跌两种情况下都在不同程度上相互显著相关,但实体经济活动似乎与它们中的任何一个都无关。与此同时,比特币既不受实体经济活动的影响,也不受股票市场的影响,也不受看涨和看跌机制下外汇市场的影响。事实上,它的行为与外汇市场有很大不同。此外,结果表明,比特币在很大程度上倾向于呈现看涨趋势,向看跌趋势过渡的可能性非常小。因此,可以得出结论,比特币可能在不同程度上提供对冲和多样化的潜力。原创性/价值:尽管加密货币的技术、法律和安全问题已被广泛讨论,但金融和经济方面的问题在很大程度上仍未得到探讨。因此,当前的研究对该主题的稀疏文献做出了适度的贡献。
{"title":"Can Cryptocurrencies Be a Future Safe Haven for Investors? A Case Study of Bitcoin","authors":"A. Khaki, Somar Al-Mohamad, Walid Bakry, Samet Gunay","doi":"10.2139/ssrn.3593508","DOIUrl":"https://doi.org/10.2139/ssrn.3593508","url":null,"abstract":"Purpose: This study attempts to determine whether or not Bitcoin prices are affected by real economic activity, financial markets, and foreign exchange markets; and whether Bitcoin has the potential to be a safe haven for investors. \u0000 \u0000Background: Cryptocurrencies in general, and Bitcoin in particular, have generated a huge interest from both practitioners and academicians as an alternative mechanism for electronic payment systems. While some argue that “Bitcoin works in practice, but not in theory”, others argue that Bitcoin’s stability depends on unknown variables in unknown combination, and thus it is difficult if not impossible to model precisely, thereby raising doubts about the soundness of the system. The research community should assume the task of precisely identifying the factors driving Bitcoin prices, and develop some theoretical foundation to help understand how Bitcoin will be affected when the legal environment and practices change. \u0000 \u0000Significance of the Study: The extensive discussion of Bitcoin on blogs and in the mainstream financial media has primarily focused on the cryptocurrency’s technical, legal and safety issues. Even the limited academic research on the subject has focused on the technical and safety issues, leaving the question of financial and economic aspects largely untouched. The present study thus seeks to determine the extent to which Bitcoin is affected, if at all, by changes in economic growth, financial markets, and forex markets. The paper also seeks to determine whether Bitcoin behaves differently from forex markets and financial markets and if it has a hedging or diversification potential? \u0000 \u0000Design/methodology/approach: A Markov regime-switching regression model is employed in this study to determine the relationship between real economic activity (proxied by the Baltic Dry Index), financial markets (proxied by the Dow Jones Industrial Average Index), and foreign exchange markets (proxied by the USD-Euro & USD-Yen exchange rates). \u0000 \u0000Findings: The results indicate that, unlike USD-Euro and USD-Yen exchange rates, Bitcoin exhibits significantly different behavior in terms of its association with other financial and economic variables. While equity markets or forex markets are significantly related to each other in varying levels in both the bullish and the bearish regimes, real economic activity appears to be unrelated to either of them. Bitcoin meanwhile, is affected neither by real economic activity, nor equity markets, nor forex markets in either bullish and the bearish regimes. Indeed, it differs significantly in its behavior from forex markets. Furthermore, the results indicate that Bitcoin tends largely to exhibit a bullish trend and the probability of transition to a bearish trend is very small. Thus, it can be concluded that Bitcoin may offer potential for both hedging and diversification to varying degrees. \u0000 \u0000Originality/value: Although the technical, legal and safety issues in cryptocurrencies ha","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121290160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Does Piracy Lead to Product Abandonment or Stimulate New Product Development?: Evidence from Mobile Platform-Based Developer Firms 盗版是导致产品放弃还是刺激新产品开发?:来自手机平台开发公司的证据
Pub Date : 2020-05-01 DOI: 10.1002/smj.3208
M. Miric, L. Jeppesen
With the growth of digital platforms, understanding the role of property rights on those platforms has become increasingly important. Digital piracy, the unauthorized copying and distribution of digital products, is therefore an important strategic issue, both because of lost revenues and because it is thought to decrease innovation. Yet, while the latter effect is often argued, empirical evidence is limited. We study whether piracy affects innovation and whether it leads firms to shift to different types of innovations. By studying a large piracy event in a mobile app marketplace, we find that piracy leads to a decrease in the release of incremental innovations, such as bug fixes, but does not decrease more substantial revisions. Additionally, it is associated with subsequent new product development.
随着数字平台的发展,理解这些平台上产权的作用变得越来越重要。因此,数字盗版,即未经授权复制和分发数字产品,是一个重要的战略问题,因为它会造成收入损失,而且被认为会减少创新。然而,尽管后一种效应经常被争论,经验证据是有限的。我们研究盗版是否会影响创新,以及它是否会导致企业转向不同类型的创新。通过研究手机应用市场中的大型盗版事件,我们发现盗版会导致渐进式创新(如漏洞修复)的发布减少,但不会减少更实质性的修订。此外,它还与后续的新产品开发有关。
{"title":"Does Piracy Lead to Product Abandonment or Stimulate New Product Development?: Evidence from Mobile Platform-Based Developer Firms","authors":"M. Miric, L. Jeppesen","doi":"10.1002/smj.3208","DOIUrl":"https://doi.org/10.1002/smj.3208","url":null,"abstract":"With the growth of digital platforms, understanding the role of property rights on those platforms has become increasingly important. Digital piracy, the unauthorized copying and distribution of digital products, is therefore an important strategic issue, both because of lost revenues and because it is thought to decrease innovation. Yet, while the latter effect is often argued, empirical evidence is limited. We study whether piracy affects innovation and whether it leads firms to shift to different types of innovations. By studying a large piracy event in a mobile app marketplace, we find that piracy leads to a decrease in the release of incremental innovations, such as bug fixes, but does not decrease more substantial revisions. Additionally, it is associated with subsequent new product development.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115950116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Forming a Method for Determining the Coordinates of Sound Anomalies Based on Data From a Computerized Microphone System 基于微机传声器系统数据的声音异常坐标确定方法
Pub Date : 2020-04-30 DOI: 10.15587/1729-4061.2020.201103
Alexander Trunov, Zhan Byelozyorov
Special features in the process of determining the coordinates of sound anomalies according to the sound series were considered. Sound anomalies have been shown to be a source of information about events, phenomena that are already occurring, or are their harbingers. It has been stated that audio interception systems complement thermal imagers and provide savings in financial and human resources when used in combination with the benefits of unmanned aerial vehicles. The methods facilitating solution of the problem of surveillance and prediction by finding coordinates of sound anomalies were presented. Indirect methods for solving problems of searching for sound anomaly coordinates with three microphones in accordance with a linear scheme of approximants and linear and quadratic approximation were proposed. Solutions were reduced to analytical complete expressions that make it possible to calculate coordinates according to the input conditions for three or four microphones. Also, a problem of finding coordinates of a sound anomaly for three and four microphones was set and solved by direct methods. Solutions were presented as expressions that make it possible to calculate coordinates of sound anomalies. Numerical experiments were performed during which coordinates of sound anomalies, the absolute error of their determination at each iteration, and total time spent for calculation were found. Systems with coordinates of microphones and sound sources almost identical or coinciding have been shown to have the greatest error. Under these conditions, for direct methods, values of the equation coefficients decreased to almost zero or turned to zero and the difference of values of the sought coordinates between iterations increased sharply which slowed down the process of solution convergence. It was shown that the application of approximate methods to the search for coordinates by solving the minimization problems with the involvement of the recurrent approximation method makes it possible to construct simple algorithms. Their implementation to solve the problems of numerical experiments has given quick and practically accurate coordinate values. It was found, that the application of algorithms to the methods of logical analysis and rules of logical inference reduces the number of iterations and the total calculation time
考虑了根据声音序列确定声音异常坐标过程中的特殊特征。声音异常已被证明是关于已经发生的事件、现象或其先兆的信息来源。有人指出,音频拦截系统是热成像仪的补充,当与无人机的优势结合使用时,可以节省财政和人力资源。提出了通过寻找声异常坐标来解决声异常监测预报问题的方法。提出了用线性逼近格式和线性二次逼近格式间接求解三传声器声异常坐标查找问题的方法。解被简化为解析完备表达式,使得根据三个或四个麦克风的输入条件计算坐标成为可能。设置了3个和4个传声器的声音异常坐标查找问题,并采用直接法进行了求解。解以表达式的形式呈现,使计算声异常坐标成为可能。进行了数值实验,得到了声异常的坐标、每次迭代确定声异常的绝对误差和计算总时间。麦克风和声源的坐标几乎相同或一致的系统显示出最大的误差。在这种情况下,对于直接法,方程系数的值几乎下降到零或变为零,迭代之间寻求的坐标值的差值急剧增加,减缓了解的收敛过程。结果表明,将近似方法应用于求解包含循环逼近法的极小化问题的坐标搜索,可以构造简单的算法。它们用于解决数值实验问题,给出了快速且实际准确的坐标值。结果表明,将算法应用于逻辑分析方法和逻辑推理规则,可以减少迭代次数和总计算时间
{"title":"Forming a Method for Determining the Coordinates of Sound Anomalies Based on Data From a Computerized Microphone System","authors":"Alexander Trunov, Zhan Byelozyorov","doi":"10.15587/1729-4061.2020.201103","DOIUrl":"https://doi.org/10.15587/1729-4061.2020.201103","url":null,"abstract":"Special features in the process of determining the coordinates of sound anomalies according to the sound series were considered. Sound anomalies have been shown to be a source of information about events, phenomena that are already occurring, or are their harbingers. It has been stated that audio interception systems complement thermal imagers and provide savings in financial and human resources when used in combination with the benefits of unmanned aerial vehicles. The methods facilitating solution of the problem of surveillance and prediction by finding coordinates of sound anomalies were presented. Indirect methods for solving problems of searching for sound anomaly coordinates with three microphones in accordance with a linear scheme of approximants and linear and quadratic approximation were proposed. Solutions were reduced to analytical complete expressions that make it possible to calculate coordinates according to the input conditions for three or four microphones. Also, a problem of finding coordinates of a sound anomaly for three and four microphones was set and solved by direct methods. Solutions were presented as expressions that make it possible to calculate coordinates of sound anomalies. Numerical experiments were performed during which coordinates of sound anomalies, the absolute error of their determination at each iteration, and total time spent for calculation were found. Systems with coordinates of microphones and sound sources almost identical or coinciding have been shown to have the greatest error. Under these conditions, for direct methods, values of the equation coefficients decreased to almost zero or turned to zero and the difference of values of the sought coordinates between iterations increased sharply which slowed down the process of solution convergence. It was shown that the application of approximate methods to the search for coordinates by solving the minimization problems with the involvement of the recurrent approximation method makes it possible to construct simple algorithms. Their implementation to solve the problems of numerical experiments has given quick and practically accurate coordinate values. It was found, that the application of algorithms to the methods of logical analysis and rules of logical inference reduces the number of iterations and the total calculation time","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mobile Device Security Issues in Digital Literacy for Higher Learning Institution 高校数字素养中的移动设备安全问题
Pub Date : 2020-02-28 DOI: 10.47252/teniat.v8i1.291
Shekh Abdullah-Al-Musa Ahmed
Keselamatan mudah alih, atau lebih khusus keselamatan peranti mudah alih, menjadi semakin penting dalam pengkomputeran mudah alih untuk literasi digital. Literasi digital adalah kumpulan kecekapan yang diperlukan untuk penyertaan penuh dalam pengetahuan masyarakat. Ini merangkumi pengetahuan, kemahiran, dan tingkah laku yang melibatkan penggunaan alat digital yang berkesan seperti telefon pintar, tablet, komputer riba untuk tujuan komunikasi, ekspresi, kolaborasi dan sokongan. Yang menjadi perhatian utama ialah keselamatan institusi pengajian tinggi kini disimpan di telefon pintar. Seiring dengan perkembangan ini muncul sejumlah masalah keselamatan yang mempengaruhi peranti mudah alih. Peluang untuk memiliki peranti kecil dan kuat yang dihubungkan dengan internet membolehkan komunikasi berlaku dari mana sahaja di institusi pengajian tinggi. Di institusi pengajian tinggi, yang telah melekatkan telefon pintar peribadi mereka ke rangkaian institusi telah mengetahui cara mudah untuk melakukannya. Secara khusus, ada beberapa kes di mana pelajar telah membenarkan capaian peranti mudah alih peribadinya ke rangkaian institusi pengajian tinggi. Walau bagaimanapun, pentadbir sistem menghantar arahan jarak jauh ke peranti dan memerintahkannya untuk menyimpan semua data agar tidak jatuh ke tangan yang salah. Oleh itu kini wujud istilah rooting pada peranti Android. Hal merujuk kepada proses mendapatkan akses root ke peranti. Biasanya, ini melibatkan aplikasi atau skrip yang memberikan akses root kepada pengguna. Setelah akses diberikan, pengguna di institusi pengajian tinggi, dapat melakukan apa sahaja yang diinginkan tanpa sekatan. Namun, salah satu kelemahan proses ini adalah peranti ini terdedah kepada bahaya yang lebih besar dari ancaman luaran. Justeru artikel ini memberi tumpuan kepada masalah keselamatan peranti mudah alih dalam dunia digital di institusi pengajian tinggi. Hal ini bertujuan supaya pelajar institusi memiliki kebolehan kritis dan kreatif ketika melayari media massa, budaya popular dan media digital. Oleh kerana media digital menggunakan telefon pintar untuk maklumat dan artikel ini juga merujuk cara menjaga keselamatan data telefon pintar ini memandangkan kadar capaian maklumat yang semakin kerap dan cepat.   Mobile security, or more specifically mobile device security, has become increasingly important in mobile computing for digital literacy. Digital literacy is the set of competencies required for full participation in knowledge of society. It includes knowledge, skills, and behaviors involving the effective use of digital devices such as smartphones, tablets, and laptops for purposes of communication, expression, collaboration and advocacy. Of particular concern is the security of higher learning institution is now stored on smartphones. Along with this expansion came a number of security issues to affect mobile devices. A chance to have a tiny and powerful device that is Internet linked allows communication from anywhere in the h
移动安全,或者更具体地说是移动设备安全,在移动计算数字扫盲中正变得越来越重要。数字素养是全面融入知识社会所需的一系列技能。它包括有效使用智能手机、平板电脑、笔记本电脑等数字设备进行交流、表达、协作和支持的知识、技能和行为。一个主要的问题是,高等教育机构的安全现在都存储在智能手机上。随之而来的是一系列影响移动设备的安全问题。小型、功能强大的设备有机会连接到互联网,从而可以在高等院校的任何地方进行通信。在高等院校中,那些将个人智能手机连接到学校网络的人已经找到了一种简单的方法。特别是在某些情况下,学生们允许将个人移动设备接入高等院校网络。不过,系统管理员会向设备发送远程指令,指示其保存所有数据,以免落入坏人之手。这就是现在安卓设备上出现root一词的原因,它指的是获取设备root权限的过程。通常,这需要一个应用程序或脚本来授予用户 root 访问权限。一旦获得访问权限,高等院校的用户就可以不受限制地为所欲为。然而,这一过程的缺点之一是设备会面临更大的外部威胁。因此,本文重点讨论高等院校数字世界中移动设备的安全问题。其目的是确保该机构的学生在浏览大众媒体、流行文化和数字媒体时具备批判性和创造性技能。由于数字媒体使用智能手机获取信息,而且信息传播日益频繁和快速,本文还将讨论如何确保智能手机数据的安全。 移动安全,或者更具体地说移动设备安全,在移动计算的数字扫盲中变得越来越重要。数字素养是全面参与社会知识所需的一系列能力。它包括有效使用智能手机、平板电脑和笔记本电脑等数字设备进行交流、表达、协作和宣传所需的知识、技能和行为。特别值得关注的是,高等教育机构的安全现在存储在智能手机上。伴随着这一扩展,一些安全问题也影响到移动设备。拥有一个连接互联网的小巧而功能强大的设备,可以在高等院校的任何地方进行通信。在高等院校中,那些将个人智能手机连接到院校网络的人会发现这样做很容易。具体来说,曾有少数学习者将自己的个人设备连接到高等院校网络。然而,系统管理员向设备发出了远程命令,指示其自行存储所有数据,以防落入不法分子之手。因此,在安卓设备中听说过 "root "这个词。简而言之,这是指对设备进行 root 访问的过程。通常,这涉及运行一个应用程序或脚本,授予用户 root 访问权限。一旦获得访问权限,高等院校的用户就可以不受限制地在系统上做任何院校想做的事情。然而,这一过程的一个弊端是,设备现在也面临着更大的外部威胁。此外,本文重点讨论高等院校数字扫盲中的移动设备安全问题。这涉及到培养院校学习者在大众媒体、流行文化和数字媒体方面的批判性和创造性能力。由于数字媒体使用智能手机来存储信息,本文还提到了如何维护这些智能手机数据的安全。
{"title":"Mobile Device Security Issues in Digital Literacy for Higher Learning Institution","authors":"Shekh Abdullah-Al-Musa Ahmed","doi":"10.47252/teniat.v8i1.291","DOIUrl":"https://doi.org/10.47252/teniat.v8i1.291","url":null,"abstract":"Keselamatan mudah alih, atau lebih khusus keselamatan peranti mudah alih, menjadi semakin penting dalam pengkomputeran mudah alih untuk literasi digital. Literasi digital adalah kumpulan kecekapan yang diperlukan untuk penyertaan penuh dalam pengetahuan masyarakat. Ini merangkumi pengetahuan, kemahiran, dan tingkah laku yang melibatkan penggunaan alat digital yang berkesan seperti telefon pintar, tablet, komputer riba untuk tujuan komunikasi, ekspresi, kolaborasi dan sokongan. Yang menjadi perhatian utama ialah keselamatan institusi pengajian tinggi kini disimpan di telefon pintar. Seiring dengan perkembangan ini muncul sejumlah masalah keselamatan yang mempengaruhi peranti mudah alih. Peluang untuk memiliki peranti kecil dan kuat yang dihubungkan dengan internet membolehkan komunikasi berlaku dari mana sahaja di institusi pengajian tinggi. Di institusi pengajian tinggi, yang telah melekatkan telefon pintar peribadi mereka ke rangkaian institusi telah mengetahui cara mudah untuk melakukannya. Secara khusus, ada beberapa kes di mana pelajar telah membenarkan capaian peranti mudah alih peribadinya ke rangkaian institusi pengajian tinggi. Walau bagaimanapun, pentadbir sistem menghantar arahan jarak jauh ke peranti dan memerintahkannya untuk menyimpan semua data agar tidak jatuh ke tangan yang salah. Oleh itu kini wujud istilah rooting pada peranti Android. Hal merujuk kepada proses mendapatkan akses root ke peranti. Biasanya, ini melibatkan aplikasi atau skrip yang memberikan akses root kepada pengguna. Setelah akses diberikan, pengguna di institusi pengajian tinggi, dapat melakukan apa sahaja yang diinginkan tanpa sekatan. Namun, salah satu kelemahan proses ini adalah peranti ini terdedah kepada bahaya yang lebih besar dari ancaman luaran. Justeru artikel ini memberi tumpuan kepada masalah keselamatan peranti mudah alih dalam dunia digital di institusi pengajian tinggi. Hal ini bertujuan supaya pelajar institusi memiliki kebolehan kritis dan kreatif ketika melayari media massa, budaya popular dan media digital. Oleh kerana media digital menggunakan telefon pintar untuk maklumat dan artikel ini juga merujuk cara menjaga keselamatan data telefon pintar ini memandangkan kadar capaian maklumat yang semakin kerap dan cepat. \u0000  \u0000Mobile security, or more specifically mobile device security, has become increasingly important in mobile computing for digital literacy. Digital literacy is the set of competencies required for full participation in knowledge of society. It includes knowledge, skills, and behaviors involving the effective use of digital devices such as smartphones, tablets, and laptops for purposes of communication, expression, collaboration and advocacy. Of particular concern is the security of higher learning institution is now stored on smartphones. Along with this expansion came a number of security issues to affect mobile devices. A chance to have a tiny and powerful device that is Internet linked allows communication from anywhere in the h","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128806719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bitcoins as Property: Welcome Clarity? 比特币作为财产:欢迎澄清?
Pub Date : 2020-02-09 DOI: 10.2139/ssrn.3538956
K. F. Low
In AA v Persons Unknown & Ors, Re Bitcoin [2019] EWHC 3556 (Comm), Bryan J offered the first reasoned judgment for deciding that bitcoins were property under English law for the purposes of an interim proprietary injunction, following similar, less fully reasoned, decisions in Vorotyntseva v Money-4 Ltd, t/a Nebeus.com [2018] EWHC 2598 (Ch) by Birss J and Liam David Robertson v Persons Unknown (unreported 15 July 2019) by Moulder J, and also relying upon the controversial decision of the Singapore International Commercial Court in B2C2 Ltd v Quoine Pte Ltd [2019] SGHC(I) 3; [2019] 4 SLR 17. This paper critiques the court's conclusion that bitcoins are an intangible property but not a chose in action.
在AA诉身份不明人士案中在Vorotyntseva v Money-4 Ltd, t/a Nebeus.com [2018] EWHC 2598 (Ch) by Birss J和Liam David Robertson v Persons Unknown(2019年7月15日未报告)by Moulder J做出类似但不太充分的判决后,rebitcoin [2019] EWHC 3556 (Comm), Bryan J提出了第一个合理的判决,决定比特币是英国法律下的财产,用于临时所有权禁令。并依据新加坡国际商事法庭在B2C2 Ltd诉Quoine Pte Ltd [2019] SGHC(I) 3案中有争议的判决;[2019] 4 SLR 17。本文对法院关于比特币是一种无形财产而不是行动选择的结论提出了批评。
{"title":"Bitcoins as Property: Welcome Clarity?","authors":"K. F. Low","doi":"10.2139/ssrn.3538956","DOIUrl":"https://doi.org/10.2139/ssrn.3538956","url":null,"abstract":"In AA v Persons Unknown & Ors, Re Bitcoin [2019] EWHC 3556 (Comm), Bryan J offered the first reasoned judgment for deciding that bitcoins were property under English law for the purposes of an interim proprietary injunction, following similar, less fully reasoned, decisions in Vorotyntseva v Money-4 Ltd, t/a Nebeus.com [2018] EWHC 2598 (Ch) by Birss J and Liam David Robertson v Persons Unknown (unreported 15 July 2019) by Moulder J, and also relying upon the controversial decision of the Singapore International Commercial Court in B2C2 Ltd v Quoine Pte Ltd [2019] SGHC(I) 3; [2019] 4 SLR 17. This paper critiques the court's conclusion that bitcoins are an intangible property but not a chose in action.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122035901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effective Enforcement of a Data Protection: A Model for Risk-Based Supervision Using Responsive Regulatory Tools 数据保护的有效执行:使用响应式监管工具的基于风险的监管模型
Pub Date : 2019-11-01 DOI: 10.2139/ssrn.3552665
M. Raghavan, Beni Chugh, Nishanth Kumar
This paper presents ideas for a new approach to enforcement of a data protection regime, based on risk-based supervision and the use of a range of responsive enforcement tools that could be deployed in advance of a breach to prevent it, or after a breach to mitigate the effects. Building on the risk-based approach to supervision, the model proposes a methodology to identify those entities that potentially pose more risk (to individuals and the system) when the personal data they hold is compromised.

Part 2 of this paper proposes a risk-based framework to identify and classify entities based on the risk they pose when the personal data they hold is compromised, using both qualitative and quantitative components. Part 3 sets out an enforcement toolkit for data protection, guided by the paradigm of responsive regulation (that also employs ex ante tools) to prevent and mitigate the effects of a compromise of personal data. This approach is a departure from the post-data breach sanctions that currently dominate data protection regimes worldwide. Part 4 sets out the features of institutional design and inter-sectoral coordination required for effective implementation of such a model approach for risk-based supervision and enforcement of data protection rights.
本文提出了一种执行数据保护制度的新方法的想法,该方法基于基于风险的监督和使用一系列响应性执法工具,这些工具可以在违规之前部署以防止违规,也可以在违规之后部署以减轻影响。在基于风险的监管方法的基础上,该模型提出了一种方法,用于识别那些在其持有的个人数据受到损害时可能对个人和系统构成更大风险的实体。本文的第2部分提出了一个基于风险的框架,该框架使用定性和定量组件,根据实体在其持有的个人数据被泄露时构成的风险对实体进行识别和分类。第3部分列出了数据保护的执行工具包,以响应式监管范式(也使用事前工具)为指导,以防止和减轻个人数据泄露的影响。这种方法与目前在全球数据保护制度中占主导地位的数据泄露后制裁不同。第4部分列出了有效实施这种基于风险的监督和执行数据保护权利的模式方法所需的制度设计和部门间协调的特点。
{"title":"Effective Enforcement of a Data Protection: A Model for Risk-Based Supervision Using Responsive Regulatory Tools","authors":"M. Raghavan, Beni Chugh, Nishanth Kumar","doi":"10.2139/ssrn.3552665","DOIUrl":"https://doi.org/10.2139/ssrn.3552665","url":null,"abstract":"This paper presents ideas for a new approach to enforcement of a data protection regime, based on risk-based supervision and the use of a range of responsive enforcement tools that could be deployed in advance of a breach to prevent it, or after a breach to mitigate the effects. Building on the risk-based approach to supervision, the model proposes a methodology to identify those entities that potentially pose more risk (to individuals and the system) when the personal data they hold is compromised.<br><br>Part 2 of this paper proposes a risk-based framework to identify and classify entities based on the risk they pose when the personal data they hold is compromised, using both qualitative and quantitative components. Part 3 sets out an enforcement toolkit for data protection, guided by the paradigm of responsive regulation (that also employs ex ante tools) to prevent and mitigate the effects of a compromise of personal data. This approach is a departure from the post-data breach sanctions that currently dominate data protection regimes worldwide. Part 4 sets out the features of institutional design and inter-sectoral coordination required for effective implementation of such a model approach for risk-based supervision and enforcement of data protection rights.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127398250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Assurance with Special Reference to the Security Content Automation Protocol (SCAP) — An Overview 特别参考安全内容自动化协议(SCAP)的信息保障概述
Pub Date : 2019-10-30 DOI: 10.2139/ssrn.3497723
P. Paul, P. Aithal
Information Assurance, in short, is called as IA. This is responsible for securing information systems and computing. The term holds the highest degree of security related affairs. In generally Computer Security considered as a branch and area of security but now apart from this, Information Security, IT Security, and Information Assurance considered as important. And among these, security related domain Information Assurance treated as broader and interdisciplinary. Moreover, this Information Assurance holds all the areas and dealing of IT Security and Information Security but additionally, it is responsible for the designing, development of policies, regulation and guidelines of security related projects /proposal, etc. And among the administrative and protocol related affairs Security Content Automation Protocol treated as important. In short, it is called as SCAP. It is a kind of method for using specific standards for the purpose of enabling vulnerability management systems in an automated way for the measurement as well as policy compliance assessment regarding the systems inbuilt in a company or institutions; that may include IT company or may not be. This is a conceptual paper, initially, it has discussed with the areas of Information Assurance but gradually it has described about the Security Content Automation Protocol; including its aim and objectives, versions, etc. paper mentioned all the areas in short and simple sense.
简而言之,信息保障被称为IA。这是负责保护信息系统和计算。该术语拥有最高级别的安全相关事务。一般来说,计算机安全被认为是安全的一个分支和领域,但现在除了这个,信息安全,IT安全和信息保障被认为是重要的。其中,与安全相关的信息保障领域被视为更广泛的跨学科领域。此外,本资讯保障涵盖资讯科技保安及资讯保安的所有范畴及业务,此外,亦负责设计、发展有关保安项目/建议的政策、规例及指引等。并在管理与协议相关的事务中,将安全内容自动化协议视为重要内容。简而言之,它被称为SCAP。它是一种使用特定标准的方法,目的是使脆弱性管理系统能够以自动化的方式对公司或机构内建的系统进行测量和政策合规评估;可能包括IT公司,也可能不包括。这是一篇概念性的论文,最初,它讨论了信息保障领域,但逐渐描述了安全内容自动化协议;包括其目的和目标,版本等,论文简要地提到了所有领域。
{"title":"Information Assurance with Special Reference to the Security Content Automation Protocol (SCAP) — An Overview","authors":"P. Paul, P. Aithal","doi":"10.2139/ssrn.3497723","DOIUrl":"https://doi.org/10.2139/ssrn.3497723","url":null,"abstract":"Information Assurance, in short, is called as IA. This is responsible for securing information systems and computing. The term holds the highest degree of security related affairs. In generally Computer Security considered as a branch and area of security but now apart from this, Information Security, IT Security, and Information Assurance considered as important. And among these, security related domain Information Assurance treated as broader and interdisciplinary. Moreover, this Information Assurance holds all the areas and dealing of IT Security and Information Security but additionally, it is responsible for the designing, development of policies, regulation and guidelines of security related projects /proposal, etc. And among the administrative and protocol related affairs Security Content Automation Protocol treated as important. In short, it is called as SCAP. It is a kind of method for using specific standards for the purpose of enabling vulnerability management systems in an automated way for the measurement as well as policy compliance assessment regarding the systems inbuilt in a company or institutions; that may include IT company or may not be. This is a conceptual paper, initially, it has discussed with the areas of Information Assurance but gradually it has described about the Security Content Automation Protocol; including its aim and objectives, versions, etc. paper mentioned all the areas in short and simple sense.","PeriodicalId":128369,"journal":{"name":"CompSciRN: Other Cybersecurity","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130865016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
CompSciRN: Other Cybersecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1