首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
P4-PSFP: P4-Based Per-Stream Filtering and Policing for Time-Sensitive Networking P4-PSFP:基于 P4 的时间敏感型网络每流过滤和 Policing
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-26 DOI: 10.1109/TNSM.2024.3434337
Fabian Ihle;Steffen Lindner;Michael Menth
Time-Sensitive Networking (TSN) extends Ethernet to enable real-time communication. In TSN, bounded latency and zero congestion-based packet loss are achieved through mechanisms such as the Credit-Based Shaper (CBS) for bandwidth shaping and the Time-Aware Shaper (TAS) for traffic scheduling. Generally, TSN requires streams to be explicitly admitted before being transmitted. To ensure that admitted traffic conforms with the traffic descriptors indicated for admission control, Per-Stream Filtering and Policing (PSFP) has been defined. For credit-based metering, well-known token bucket policers are applied. However, time-based metering requires time-dependent switch behavior and time synchronization with sub-microsecond precision. While TSN-capable switches support various TSN traffic shaping mechanisms, a full implementation of PSFP is still not available. To bridge this gap, we present a P4-based implementation of PSFP on a 100 Gb/s per port hardware switch. We explain the most interesting aspects of the PSFP implementation whose code is available on GitHub. We demonstrate credit-based and time-based policing and synchronization capabilities to validate the functionality and effectiveness of P4-PSFP. The implementation scales up to 35840 streams depending on the stream identification method. P4-PSFP can be used in practice as long as appropriate TSN switches lack this function. Moreover, its implementation may be helpful for other P4-based hardware implementations that require time synchronization.
时敏网络(TSN)扩展了以太网,实现了实时通信。在 TSN 中,通过用于带宽整形的 "基于信用的整形器"(CBS)和用于流量调度的 "时间感知整形器"(TAS)等机制,可实现有界延迟和基于拥塞的零数据包丢失。一般来说,TSN 要求数据流在传输前必须明确接入。为确保接纳的流量符合为接纳控制而指定的流量描述符,定义了每流过滤和极化(PSFP)。对于基于信用的计量,采用了众所周知的令牌桶策略。但是,基于时间的计量需要与时间相关的交换机行为和亚微秒精度的时间同步。虽然支持 TSN 的交换机支持各种 TSN 流量整形机制,但 PSFP 的全面实施仍然不可用。为了弥补这一差距,我们在每端口 100 Gb/s 的硬件交换机上介绍了基于 P4 的 PSFP 实现。我们解释了 PSFP 实现中最有趣的方面,其代码可在 GitHub 上获取。我们演示了基于信用和基于时间的警戒和同步功能,以验证 P4-PSFP 的功能和有效性。根据流识别方法的不同,该实现可扩展至 35840 个流。只要适当的 TSN 交换机缺乏这一功能,P4-PSFP 就能在实践中使用。此外,它的实现可能有助于其他需要时间同步的基于 P4 的硬件实现。
{"title":"P4-PSFP: P4-Based Per-Stream Filtering and Policing for Time-Sensitive Networking","authors":"Fabian Ihle;Steffen Lindner;Michael Menth","doi":"10.1109/TNSM.2024.3434337","DOIUrl":"10.1109/TNSM.2024.3434337","url":null,"abstract":"Time-Sensitive Networking (TSN) extends Ethernet to enable real-time communication. In TSN, bounded latency and zero congestion-based packet loss are achieved through mechanisms such as the Credit-Based Shaper (CBS) for bandwidth shaping and the Time-Aware Shaper (TAS) for traffic scheduling. Generally, TSN requires streams to be explicitly admitted before being transmitted. To ensure that admitted traffic conforms with the traffic descriptors indicated for admission control, Per-Stream Filtering and Policing (PSFP) has been defined. For credit-based metering, well-known token bucket policers are applied. However, time-based metering requires time-dependent switch behavior and time synchronization with sub-microsecond precision. While TSN-capable switches support various TSN traffic shaping mechanisms, a full implementation of PSFP is still not available. To bridge this gap, we present a P4-based implementation of PSFP on a 100 Gb/s per port hardware switch. We explain the most interesting aspects of the PSFP implementation whose code is available on GitHub. We demonstrate credit-based and time-based policing and synchronization capabilities to validate the functionality and effectiveness of P4-PSFP. The implementation scales up to 35840 streams depending on the stream identification method. P4-PSFP can be used in practice as long as appropriate TSN switches lack this function. Moreover, its implementation may be helpful for other P4-based hardware implementations that require time synchronization.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5273-5290"},"PeriodicalIF":4.7,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Cell Resource Allocation Mechanism Based on Interference Control in Indoor Multicolor VLC-WiFi Heterogeneous Networks 基于室内多色 VLC-WiFi 异构网络干扰控制的多小区资源分配机制
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1109/TNSM.2024.3432148
Huanlin Liu;Yang Hu;Yong Chen;Haonan Chen;Bingchuan Huang;Huiling Zhou;Shiqi Yi
Heterogeneous networks based on multicolor visible light communication (VLC) and wireless fidelity (WiFi) have been considered as a key technology to achieve the capacity target in the future 6G mobile communication. However, the inter-cell interference (ICI) pattern in the multi-cell VLC scenario degrades the performance of the heterogeneous networks. To solve this problem, a multi-cell resource allocation mechanism based on interference control (MCRAMIC) is proposed, which includes a preparatory phase and an execution phase. Firstly, according to the different locations and data rate requirements of varied user equipments (UEs), the VLC access point (AP) selection algorithm based on interference avoidance and the UE priority assessment algorithm based on the requirement of UE are proposed.Then, according to the influence factor and priority factor, the multi-cell resource allocation algorithm based on interference control is proposed. According to the algorithm, the candidate VLC AP sets of the UEs are determined firstly, and the VLC APs and lightwave bands are selected for the UEs in turn. Meanwhile, some UEs are connected to the WiFi AP. Finally, the lightwave bands are further allocated to the UEs. Numeric results show that the proposed MCRAMIC outperforms the centralized resource allocation algorithm based on link conflict graph (LCG) and the resource allocation algorithm based on hypergraph theory in terms of the system throughput, UE satisfaction and service fairness.
基于多色可见光通信(VLC)和无线保真(WiFi)的异构网络被认为是实现未来 6G 移动通信容量目标的关键技术。然而,多小区可见光通信场景中的小区间干扰(ICI)模式会降低异构网络的性能。为解决这一问题,本文提出了一种基于干扰控制的多小区资源分配机制(MCRAMIC),包括准备阶段和执行阶段。首先,根据不同用户设备(UE)的不同位置和数据速率要求,提出了基于干扰规避的 VLC 接入点(AP)选择算法和基于 UE 要求的 UE 优先级评估算法;然后,根据影响因素和优先级因素,提出了基于干扰控制的多小区资源分配算法。根据该算法,首先确定 UE 的候选 VLC AP 集,然后依次为 UE 选择 VLC AP 和光波频段。同时,将部分 UE 连接到 WiFi AP。最后,进一步为 UE 分配光波频段。数值结果表明,在系统吞吐量、UE满意度和服务公平性方面,所提出的MCRAMIC优于基于链路冲突图(LCG)的集中式资源分配算法和基于超图理论的资源分配算法。
{"title":"Multi-Cell Resource Allocation Mechanism Based on Interference Control in Indoor Multicolor VLC-WiFi Heterogeneous Networks","authors":"Huanlin Liu;Yang Hu;Yong Chen;Haonan Chen;Bingchuan Huang;Huiling Zhou;Shiqi Yi","doi":"10.1109/TNSM.2024.3432148","DOIUrl":"10.1109/TNSM.2024.3432148","url":null,"abstract":"Heterogeneous networks based on multicolor visible light communication (VLC) and wireless fidelity (WiFi) have been considered as a key technology to achieve the capacity target in the future 6G mobile communication. However, the inter-cell interference (ICI) pattern in the multi-cell VLC scenario degrades the performance of the heterogeneous networks. To solve this problem, a multi-cell resource allocation mechanism based on interference control (MCRAMIC) is proposed, which includes a preparatory phase and an execution phase. Firstly, according to the different locations and data rate requirements of varied user equipments (UEs), the VLC access point (AP) selection algorithm based on interference avoidance and the UE priority assessment algorithm based on the requirement of UE are proposed.Then, according to the influence factor and priority factor, the multi-cell resource allocation algorithm based on interference control is proposed. According to the algorithm, the candidate VLC AP sets of the UEs are determined firstly, and the VLC APs and lightwave bands are selected for the UEs in turn. Meanwhile, some UEs are connected to the WiFi AP. Finally, the lightwave bands are further allocated to the UEs. Numeric results show that the proposed MCRAMIC outperforms the centralized resource allocation algorithm based on link conflict graph (LCG) and the resource allocation algorithm based on hypergraph theory in terms of the system throughput, UE satisfaction and service fairness.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5707-5717"},"PeriodicalIF":4.7,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value Assessment 基于去中心化动态声誉价值评估的区块链跨链交易方法
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1109/TNSM.2024.3433414
Xiaoxuan Hu;Yaochen Ling;Jialin Hua;Zhenjiang Dong;Yanfei Sun;Jin Qi
With the vigorous development of the blockchain industry, cross-chain transactions can effectively solve the problem of “islands of value” caused by the inability to interact between different chains. However, security risks in reputation management caused by cross-chain transactions implemented through notary solutions have always existed. Consequently, this paper proposes a blockchain cross-chain transaction method based on decentralized dynamic reputation value assessment. The notary election phase addresses the issue of the continually changing behavior of notaries in actual transactions by designing a dynamic evaluation window mechanism based on an RNN. Moreover, a reputation-rating decay mechanism is introduced to avoid the problem of reputation value recovery caused by malicious notaries being inactive for a long time. Relative to alternative reputation assessment models, the proposed method offers a thorough evaluation of user behavior and effectively identifies malicious activities in real-time. Finally, the method was tested by deploying it on the Ethereum blockchain. Our approach offers more dynamic settings for window parameters, adapting to changes in notary behavior and reducing the number of detections within the same timeframe by approximately 59.14%. The weight factor settings are also optimized, allowing for adjustments based on specific situations to achieve accurate reputation values. Overall, this method not only enhances the security of cross-chain transactions but also reduces operational costs by 53.3% compared to traditional technologies.
随着区块链产业的蓬勃发展,跨链交易可以有效解决因不同链之间无法交互而造成的 "价值孤岛 "问题。然而,通过公证方案实现的跨链交易在信誉管理方面的安全隐患一直存在。因此,本文提出了一种基于去中心化动态信誉价值评估的区块链跨链交易方法。在公证人选举阶段,通过设计基于 RNN 的动态评估窗口机制,解决了公证人在实际交易中行为不断变化的问题。此外,还引入了信誉评级衰减机制,以避免因恶意公证人长期不活跃而导致的信誉值恢复问题。与其他声誉评估模型相比,所提出的方法能对用户行为进行全面评估,并能有效地实时识别恶意活动。最后,我们在以太坊区块链上对该方法进行了测试。我们的方法为窗口参数提供了更动态的设置,能适应公证人行为的变化,并将同一时间段内的检测次数减少了约 59.14%。权重因子设置也得到了优化,可根据具体情况进行调整,以实现准确的信誉值。总体而言,与传统技术相比,该方法不仅提高了跨链交易的安全性,还将运营成本降低了 53.3%。
{"title":"A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value Assessment","authors":"Xiaoxuan Hu;Yaochen Ling;Jialin Hua;Zhenjiang Dong;Yanfei Sun;Jin Qi","doi":"10.1109/TNSM.2024.3433414","DOIUrl":"10.1109/TNSM.2024.3433414","url":null,"abstract":"With the vigorous development of the blockchain industry, cross-chain transactions can effectively solve the problem of “islands of value” caused by the inability to interact between different chains. However, security risks in reputation management caused by cross-chain transactions implemented through notary solutions have always existed. Consequently, this paper proposes a blockchain cross-chain transaction method based on decentralized dynamic reputation value assessment. The notary election phase addresses the issue of the continually changing behavior of notaries in actual transactions by designing a dynamic evaluation window mechanism based on an RNN. Moreover, a reputation-rating decay mechanism is introduced to avoid the problem of reputation value recovery caused by malicious notaries being inactive for a long time. Relative to alternative reputation assessment models, the proposed method offers a thorough evaluation of user behavior and effectively identifies malicious activities in real-time. Finally, the method was tested by deploying it on the Ethereum blockchain. Our approach offers more dynamic settings for window parameters, adapting to changes in notary behavior and reducing the number of detections within the same timeframe by approximately 59.14%. The weight factor settings are also optimized, allowing for adjustments based on specific situations to achieve accurate reputation values. Overall, this method not only enhances the security of cross-chain transactions but also reduces operational costs by 53.3% compared to traditional technologies.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5597-5612"},"PeriodicalIF":4.7,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10609432","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Presync: An Efficient Transaction Synchronization Protocol to Accelerate Block Propagation PRESYNC:加速区块传播的高效事务同步协议
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1109/TNSM.2024.3432334
Yixin Li;Liang Liang;Yunjian Jia;Wanli Wen
Block propagation is a critical step in the consensus process, which determines the fork rate and transaction throughput of public blockchain systems. To accelerate block propagation, existing block relay protocols reduce the block size using transaction hashes, which requires the receiver to reconstruct the block based on the transactions in its mempool. Hence, their performance is highly affected by the number of transactions missed by mempools, especially in the P2P network with frequent arrival and departure of nodes. In this paper, we introduce Presync, a transaction synchronization protocol that can reduce the difference of transactions between the block and the mempool with controllable bandwidth overhead. It allows mining pool servers to synchronize the transactions in candidate blocks before the propagation of a valid block. Low-bandwidth mode provides a lightweight synchronization by identifying the unsynchronized transactions, so that the missing transactions can be detected with a low redundancy. High-bandwidth mode conducts a full synchronization of the candidate block using short hashes, and the Merkle root is utilized to match the valid block. We study the performance of Presync through stochastic modeling and experimental evaluations. The results illustrate that low and high-bandwidth modes can respectively reduce the end-to-end delay of compact block by 60% and 78% with bandwidth usages 25KB and 63KB, in a network with 5 active pool servers and 2/3 online probability of full nodes.
区块传播是共识过程中的一个关键步骤,它决定了公共区块链系统的分叉率和交易吞吐量。为了加速区块传播,现有的区块中继协议使用交易哈希值缩小区块大小,这就要求接收方根据其内存池中的交易重建区块。因此,它们的性能会受到内存池遗漏交易数量的严重影响,尤其是在节点频繁到达和离开的 P2P 网络中。在本文中,我们介绍了一种交易同步协议--Presync,它可以在带宽开销可控的情况下减少区块与内存池之间的交易差异。它允许矿池服务器在传播有效区块之前同步候选区块中的事务。低带宽模式通过识别未同步的交易,提供轻量级同步,从而以较低的冗余度检测到丢失的交易。高带宽模式使用短哈希值对候选块进行完全同步,并利用梅克尔根匹配有效块。我们通过随机建模和实验评估研究了 Presync 的性能。结果表明,在有 5 个活动池服务器和 2/3 全节点在线概率的网络中,低带宽模式和高带宽模式在带宽使用量为 25KB 和 63KB 的情况下,可分别将紧凑区块的端到端延迟减少 60% 和 78%。
{"title":"Presync: An Efficient Transaction Synchronization Protocol to Accelerate Block Propagation","authors":"Yixin Li;Liang Liang;Yunjian Jia;Wanli Wen","doi":"10.1109/TNSM.2024.3432334","DOIUrl":"10.1109/TNSM.2024.3432334","url":null,"abstract":"Block propagation is a critical step in the consensus process, which determines the fork rate and transaction throughput of public blockchain systems. To accelerate block propagation, existing block relay protocols reduce the block size using transaction hashes, which requires the receiver to reconstruct the block based on the transactions in its mempool. Hence, their performance is highly affected by the number of transactions missed by mempools, especially in the P2P network with frequent arrival and departure of nodes. In this paper, we introduce Presync, a transaction synchronization protocol that can reduce the difference of transactions between the block and the mempool with controllable bandwidth overhead. It allows mining pool servers to synchronize the transactions in candidate blocks before the propagation of a valid block. Low-bandwidth mode provides a lightweight synchronization by identifying the unsynchronized transactions, so that the missing transactions can be detected with a low redundancy. High-bandwidth mode conducts a full synchronization of the candidate block using short hashes, and the Merkle root is utilized to match the valid block. We study the performance of Presync through stochastic modeling and experimental evaluations. The results illustrate that low and high-bandwidth modes can respectively reduce the end-to-end delay of compact block by 60% and 78% with bandwidth usages 25KB and 63KB, in a network with 5 active pool servers and 2/3 online probability of full nodes.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5582-5596"},"PeriodicalIF":4.7,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network BCDM:基于二进制网络的 IPv6 网络 DDoS 事件早期监控机制
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1109/TNSM.2024.3431701
Yufu Wang;Xingwei Wang;Qiang Ni;Wenjuan Yu;Min Huang
The rapid adoption of IPv6 has increased network access scale while also escalating the threat of Distributed Denial of Service (DDoS) attacks. By the time a DDoS attack is recognized, the overwhelming volume of attack traffic has already made mitigation extremely difficult. Therefore, continuous network monitoring is essential for early warning and defense preparation against DDoS attacks, requiring both sensitive perception of network changes when DDoS occurs and reducing monitoring overhead to adapt to network resource constraints. In this paper, we propose a novel DDoS incident monitoring mechanism that uses macro-level network traffic behavior as a monitoring anchor to detect subtle malicious behavior indicative of the existence of DDoS traffic in the network. This behavior feature can be abstracted from our designed traffic matrix sample by aggregating continuous IPv6 traffic. Compared to IPv4, the fixed-length header of IPv6 allows more efficient packet parsing in preprocessing. As the decision core of monitoring, we construct a lightweight Binary Convolution DDoS Monitoring (BCDM) model, compressed by binarized convolutional filters and hierarchical pooling strategies, which can detect the malicious behavior abstracted from input traffic matrix if DDoS traffic is involved, thereby signaling an ongoing DDoS attack. Experiment on IPv6 replayed CIC-DDoS2019 shows that BCDM, being lightweight in terms of parameter quantity and computational complexity, achieves monitoring accuracies of 90.9%, 96.4%, and 100% when DDoS incident intensities are as low as 6%, 10%, and 15%, respectively, significantly outperforming comparison methods.
IPv6 的快速应用在扩大网络访问规模的同时,也加剧了分布式拒绝服务(DDoS)攻击的威胁。当 DDoS 攻击被识别出来时,巨大的攻击流量已经使缓解变得极为困难。因此,持续的网络监控对于针对 DDoS 攻击的早期预警和防御准备至关重要,既需要在 DDoS 发生时敏锐地感知网络变化,又需要减少监控开销以适应网络资源限制。在本文中,我们提出了一种新颖的 DDoS 事件监控机制,该机制使用宏观层面的网络流量行为作为监控锚,以检测表明网络中存在 DDoS 流量的细微恶意行为。这种行为特征可以通过聚合连续的 IPv6 流量从我们设计的流量矩阵样本中抽象出来。与 IPv4 相比,IPv6 的固定长度报头允许在预处理中更有效地解析数据包。作为监控的决策核心,我们构建了一个轻量级二值化卷积 DDoS 监控(BCDM)模型,该模型由二值化卷积滤波器和分层池策略压缩而成,可检测从输入流量矩阵中抽象出的是否涉及 DDoS 流量的恶意行为,从而发出正在进行的 DDoS 攻击信号。在 IPv6 重放 CIC-DDoS2019 上的实验表明,BCDM 在参数数量和计算复杂度方面都很轻便,当 DDoS 事件强度低至 6%、10% 和 15%时,其监测准确率分别达到 90.9%、96.4% 和 100%,明显优于对比方法。
{"title":"BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network","authors":"Yufu Wang;Xingwei Wang;Qiang Ni;Wenjuan Yu;Min Huang","doi":"10.1109/TNSM.2024.3431701","DOIUrl":"10.1109/TNSM.2024.3431701","url":null,"abstract":"The rapid adoption of IPv6 has increased network access scale while also escalating the threat of Distributed Denial of Service (DDoS) attacks. By the time a DDoS attack is recognized, the overwhelming volume of attack traffic has already made mitigation extremely difficult. Therefore, continuous network monitoring is essential for early warning and defense preparation against DDoS attacks, requiring both sensitive perception of network changes when DDoS occurs and reducing monitoring overhead to adapt to network resource constraints. In this paper, we propose a novel DDoS incident monitoring mechanism that uses macro-level network traffic behavior as a monitoring anchor to detect subtle malicious behavior indicative of the existence of DDoS traffic in the network. This behavior feature can be abstracted from our designed traffic matrix sample by aggregating continuous IPv6 traffic. Compared to IPv4, the fixed-length header of IPv6 allows more efficient packet parsing in preprocessing. As the decision core of monitoring, we construct a lightweight Binary Convolution DDoS Monitoring (BCDM) model, compressed by binarized convolutional filters and hierarchical pooling strategies, which can detect the malicious behavior abstracted from input traffic matrix if DDoS traffic is involved, thereby signaling an ongoing DDoS attack. Experiment on IPv6 replayed CIC-DDoS2019 shows that BCDM, being lightweight in terms of parameter quantity and computational complexity, achieves monitoring accuracies of 90.9%, 96.4%, and 100% when DDoS incident intensities are as low as 6%, 10%, and 15%, respectively, significantly outperforming comparison methods.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5873-5887"},"PeriodicalIF":4.7,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning AdapINT: 基于深度强化学习的灵活自适应带内网络遥测系统
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-18 DOI: 10.1109/TNSM.2024.3427403
Penghui Zhang;Hua Zhang;Yibo Pi;Zijian Cao;Jingyu Wang;Jianxin Liao
In-band Network Telemetry (INT) has emerged as a promising network measurement technology. However, existing network telemetry systems lack the flexibility to meet diverse telemetry requirements and are also difficult to adapt to dynamic network environments. In this paper, we propose AdapINT, a versatile and adaptive in-band network telemetry framework assisted by dual-timescale probes, including long-period auxiliary probes (APs) and short-period dynamic probes (DPs). Technically, the APs collect basic network status information, which is used for the path planning of DPs. To achieve full network coverage, we propose an auxiliary probes path deployment (APPD) algorithm based on the Depth-First-Search (DFS). The DPs collect specific network information for telemetry tasks. To ensure that the DPs can meet diverse telemetry requirements and adapt to dynamic network environments, we apply the deep reinforcement learning (DRL) technique and transfer learning method to design the dynamic probes path deployment (DPPD) algorithm. The evaluation results show that AdapINT can flexibly customize the telemetry system to accommodate diverse requirements and network environments. In latency-aware networks, AdapINT effectively reduces telemetry latency, while in overhead-aware networks, it significantly lowers the control overheads.
带内网络遥测技术(INT)已成为一种前景广阔的网络测量技术。然而,现有的网络遥测系统缺乏灵活性,无法满足不同的遥测要求,也难以适应动态网络环境。本文提出的 AdapINT 是一种多功能自适应带内网络遥测框架,由长周期辅助探头(AP)和短周期动态探头(DP)等双时间尺度探头辅助。在技术上,AP 收集基本的网络状态信息,用于 DP 的路径规划。为了实现全网覆盖,我们提出了一种基于深度优先搜索(DFS)的辅助探针路径部署(APPD)算法。DP 为遥测任务收集特定的网络信息。为了确保 DP 能够满足多样化的遥测要求并适应动态网络环境,我们应用深度强化学习(DRL)技术和迁移学习方法设计了动态探针路径部署(DPPD)算法。评估结果表明,AdapINT 可以灵活定制遥测系统,以适应不同的需求和网络环境。在延迟感知网络中,AdapINT 有效地降低了遥测延迟;在开销感知网络中,AdapINT 显著降低了控制开销。
{"title":"AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning","authors":"Penghui Zhang;Hua Zhang;Yibo Pi;Zijian Cao;Jingyu Wang;Jianxin Liao","doi":"10.1109/TNSM.2024.3427403","DOIUrl":"10.1109/TNSM.2024.3427403","url":null,"abstract":"In-band Network Telemetry (INT) has emerged as a promising network measurement technology. However, existing network telemetry systems lack the flexibility to meet diverse telemetry requirements and are also difficult to adapt to dynamic network environments. In this paper, we propose AdapINT, a versatile and adaptive in-band network telemetry framework assisted by dual-timescale probes, including long-period auxiliary probes (APs) and short-period dynamic probes (DPs). Technically, the APs collect basic network status information, which is used for the path planning of DPs. To achieve full network coverage, we propose an auxiliary probes path deployment (APPD) algorithm based on the Depth-First-Search (DFS). The DPs collect specific network information for telemetry tasks. To ensure that the DPs can meet diverse telemetry requirements and adapt to dynamic network environments, we apply the deep reinforcement learning (DRL) technique and transfer learning method to design the dynamic probes path deployment (DPPD) algorithm. The evaluation results show that AdapINT can flexibly customize the telemetry system to accommodate diverse requirements and network environments. In latency-aware networks, AdapINT effectively reduces telemetry latency, while in overhead-aware networks, it significantly lowers the control overheads.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5505-5520"},"PeriodicalIF":4.7,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141737318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ASAP Hardware Failure-Cause Identification in Microwave Networks Using Venn-Abers Predictors 使用 Venn-Abers 预测器识别微波网络中的 ASAP 硬件故障原因
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-17 DOI: 10.1109/TNSM.2024.3430052
Nicola Di Cicco;Memedhe Ibrahimi;Omran Ayoub;Federica Bruschetta;Michele Milano;Claudio Passera;Francesco Musumeci
We investigate classifying hardware failures in microwave networks via Machine Learning (ML). Although ML-based approaches excel in this task, they usually provide only hard failure predictions without guarantees on their reliability, i.e., on the probability of correct classification. Generally, accumulating data for longer time horizons increases the model’s predictive accuracy. Therefore, in real-world applications, a trade-off arises between two contrasting objectives: i) ensuring high reliability for each classified observation, and ii) collecting the minimal amount of data to provide a reliable prediction. To address this problem, we formulate hardware failure-cause identification as an As-Soon-As-Possible (ASAP) selective classification problem where data streams are sequentially provided to an ML classifier, which outputs a prediction as soon as the probability of correct classification exceeds a user-specified threshold. To this end, we leverage Inductive and Cross Venn-Abers Predictors to transform heuristic probability estimates from any ML model into rigorous predictive probabilities. Numerical results on a real-world dataset show that our ASAP framework reduces the time-to-predict by ~8x compared to the state-of-the-art, while ensuring a selective classification accuracy greater than 95%. The dataset utilized in this study is publicly available, aiming to facilitate future investigations in failure management for microwave networks.
我们研究通过机器学习(ML)对微波网络中的硬件故障进行分类。虽然基于 ML 的方法在这项任务中表现出色,但它们通常只能提供硬故障预测,而不能保证其可靠性,即正确分类的概率。一般来说,在更长的时间跨度内积累数据可以提高模型的预测准确性。因此,在实际应用中,需要在两个截然不同的目标之间进行权衡:i) 确保每个分类观测结果的高可靠性;ii) 收集最少的数据量以提供可靠的预测。为了解决这个问题,我们将硬件故障原因识别表述为一个 "尽可能快"(ASAP)的选择性分类问题,在这个问题中,数据流被依次提供给一个 ML 分类器,一旦正确分类的概率超过用户指定的阈值,分类器就会输出预测结果。为此,我们利用归纳预测器和交叉文氏预测器将任何 ML 模型的启发式概率估计转化为严格的预测概率。在实际数据集上的数值结果表明,我们的 ASAP 框架与最先进的框架相比,预测时间缩短了约 8 倍,同时确保选择性分类准确率超过 95%。本研究中使用的数据集是公开的,旨在促进未来微波网络故障管理方面的研究。
{"title":"ASAP Hardware Failure-Cause Identification in Microwave Networks Using Venn-Abers Predictors","authors":"Nicola Di Cicco;Memedhe Ibrahimi;Omran Ayoub;Federica Bruschetta;Michele Milano;Claudio Passera;Francesco Musumeci","doi":"10.1109/TNSM.2024.3430052","DOIUrl":"10.1109/TNSM.2024.3430052","url":null,"abstract":"We investigate classifying hardware failures in microwave networks via Machine Learning (ML). Although ML-based approaches excel in this task, they usually provide only hard failure predictions without guarantees on their reliability, i.e., on the probability of correct classification. Generally, accumulating data for longer time horizons increases the model’s predictive accuracy. Therefore, in real-world applications, a trade-off arises between two contrasting objectives: i) ensuring high reliability for each classified observation, and ii) collecting the minimal amount of data to provide a reliable prediction. To address this problem, we formulate hardware failure-cause identification as an As-Soon-As-Possible (ASAP) selective classification problem where data streams are sequentially provided to an ML classifier, which outputs a prediction as soon as the probability of correct classification exceeds a user-specified threshold. To this end, we leverage Inductive and Cross Venn-Abers Predictors to transform heuristic probability estimates from any ML model into rigorous predictive probabilities. Numerical results on a real-world dataset show that our ASAP framework reduces the time-to-predict by ~8x compared to the state-of-the-art, while ensuring a selective classification accuracy greater than 95%. The dataset utilized in this study is publicly available, aiming to facilitate future investigations in failure management for microwave networks.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5400-5409"},"PeriodicalIF":4.7,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10601160","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141745487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Forming Optimal Communication Network for Effective Power System Restoration 为有效恢复电力系统建立最佳通信网络
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-16 DOI: 10.1109/TNSM.2024.3429204
Anna Volkova;Abdorasoul Ghasemi;Hermann de Meer
Restoration of modern interdependent Information and Communication Technology (ICT) and power networks relies on preplanned and reactive strategies to consider simultaneous communication and power system recovery. This paper addresses the problem of finding and energizing a proper communication network connecting the distributed power grid assets in the restoration process, assuming a probability of infeasibility of recovering each communication node. The proper network has the minimum size, meets the communication requirements of power system recovery, and guarantees robustness against ICT nodes not being recoverable during restoration. The problem is formulated as a multi-objective optimization problem and solved using the genetic algorithm to find the optimal subgraph that ensures enough node-disjoint paths between the communicating power grid assets. Simulation results for the restoration strategy of the communication network associated with a power network are provided and discussed. The results show that networks’ ability to mitigate the adverse consequences of node failures can be significantly improved by incorporating just a few additional nodes and links while keeping the ICT network compact and feasible for restoration.
现代相互依存的信息与通信技术(ICT)和电力网络的恢复依赖于预先计划和被动策略,以考虑通信和电力系统的同步恢复。本文探讨的问题是,假设每个通信节点都有可能无法恢复,如何在恢复过程中找到并启动连接分布式电网资产的适当通信网络。合适的网络具有最小的规模,能满足电力系统恢复的通信要求,并保证在恢复过程中信息和通信技术节点无法恢复时的鲁棒性。该问题被表述为一个多目标优化问题,并使用遗传算法求解,以找到最佳子图,确保通信电网资产之间有足够的节点间路径。提供并讨论了与电网相关的通信网络恢复策略的仿真结果。结果表明,只需增加几个节点和链路,就能显著提高网络减轻节点故障不良后果的能力,同时保持信息和通信技术网络的紧凑性和恢复的可行性。
{"title":"Towards Forming Optimal Communication Network for Effective Power System Restoration","authors":"Anna Volkova;Abdorasoul Ghasemi;Hermann de Meer","doi":"10.1109/TNSM.2024.3429204","DOIUrl":"10.1109/TNSM.2024.3429204","url":null,"abstract":"Restoration of modern interdependent Information and Communication Technology (ICT) and power networks relies on preplanned and reactive strategies to consider simultaneous communication and power system recovery. This paper addresses the problem of finding and energizing a proper communication network connecting the distributed power grid assets in the restoration process, assuming a probability of infeasibility of recovering each communication node. The proper network has the minimum size, meets the communication requirements of power system recovery, and guarantees robustness against ICT nodes not being recoverable during restoration. The problem is formulated as a multi-objective optimization problem and solved using the genetic algorithm to find the optimal subgraph that ensures enough node-disjoint paths between the communicating power grid assets. Simulation results for the restoration strategy of the communication network associated with a power network are provided and discussed. The results show that networks’ ability to mitigate the adverse consequences of node failures can be significantly improved by incorporating just a few additional nodes and links while keeping the ICT network compact and feasible for restoration.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5250-5259"},"PeriodicalIF":4.7,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141717383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning-Based Online Scheduling of Multiple Workflows in Edge Environment 边缘环境中基于强化学习的多工作流在线调度
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-15 DOI: 10.1109/TNSM.2024.3428496
Binbin Huang;Lingbin Wang;Xiao Liu;Zixin Huang;Yuyu Yin;Fujin Zhu;Shangguang Wang;Shuiguang Deng
In edge environment, many smart application instances are triggered randomly by resource-constrained Internet of Things (IoT) devices. These application instances usually consist of dependent computation components, which can be modeled as workflows in different shapes and sizes. Due to the limited computing power of IoT devices, a common approach is to schedule partial computation components of multiple workflow instances to the resource-rich edge servers to execute. However, how to schedule the stochastically arrived multiple workflow instances in edge environment with the minimum average completion time is still a challenging issue. To address such an issue, in this paper, we adopt the graph convolution neural network to transform multiple workflow instances with different shapes and sizes into embeddings, and formulate the online multiple workflow scheduling problem as a finite Markov decision process. Furthermore, we propose a policy gradient learning-based online multiple workflow scheduling scheme (PG-OMWS) to optimize the average completion time of all workflow instances. Extensive experiments are conducted on the synthetic workflows with various shapes and sizes. The experimental results demonstrate that the PG-OMWS scheme can effectively schedule the stochastically arrived multiple workflow instances, and achieve the lowest average completion time compared with four baseline algorithms in edge environments with different scales.
在边缘环境中,资源受限的物联网(IoT)设备会随机触发许多智能应用实例。这些应用实例通常由相互依赖的计算组件组成,这些组件可以建模为不同形状和大小的工作流。由于物联网设备的计算能力有限,一种常见的方法是将多个工作流实例的部分计算组件调度到资源丰富的边缘服务器上执行。然而,如何以最短的平均完成时间在边缘环境中调度随机到达的多个工作流实例仍是一个具有挑战性的问题。针对这一问题,本文采用图卷积神经网络将不同形状和大小的多个工作流实例转化为嵌入,并将在线多个工作流调度问题表述为有限马尔可夫决策过程。此外,我们还提出了一种基于策略梯度学习的在线多工作流调度方案(PG-OMWS),以优化所有工作流实例的平均完成时间。我们在不同形状和规模的合成工作流上进行了广泛的实验。实验结果表明,PG-OMWS 方案可以有效地调度随机到达的多个工作流实例,并且在不同规模的边缘环境中,与四种基准算法相比,PG-OMWS 方案的平均完成时间最短。
{"title":"Reinforcement Learning-Based Online Scheduling of Multiple Workflows in Edge Environment","authors":"Binbin Huang;Lingbin Wang;Xiao Liu;Zixin Huang;Yuyu Yin;Fujin Zhu;Shangguang Wang;Shuiguang Deng","doi":"10.1109/TNSM.2024.3428496","DOIUrl":"10.1109/TNSM.2024.3428496","url":null,"abstract":"In edge environment, many smart application instances are triggered randomly by resource-constrained Internet of Things (IoT) devices. These application instances usually consist of dependent computation components, which can be modeled as workflows in different shapes and sizes. Due to the limited computing power of IoT devices, a common approach is to schedule partial computation components of multiple workflow instances to the resource-rich edge servers to execute. However, how to schedule the stochastically arrived multiple workflow instances in edge environment with the minimum average completion time is still a challenging issue. To address such an issue, in this paper, we adopt the graph convolution neural network to transform multiple workflow instances with different shapes and sizes into embeddings, and formulate the online multiple workflow scheduling problem as a finite Markov decision process. Furthermore, we propose a policy gradient learning-based online multiple workflow scheduling scheme (PG-OMWS) to optimize the average completion time of all workflow instances. Extensive experiments are conducted on the synthetic workflows with various shapes and sizes. The experimental results demonstrate that the PG-OMWS scheme can effectively schedule the stochastically arrived multiple workflow instances, and achieve the lowest average completion time compared with four baseline algorithms in edge environments with different scales.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5691-5706"},"PeriodicalIF":4.7,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141717384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System MSLTChain:基于多维主观逻辑的树状分片区块链系统信任模型
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-12 DOI: 10.1109/TNSM.2024.3427139
Jin Tian;Junfeng Tian;Ruizhong Du
Sharding is a popular technology for blockchain systems that addresses scalability while ensuring security and decentralization. However, there are still many issues. Firstly, the existing sharding solutions exhibit a high percentage of cross-shard transactions, which place a substantial burden on system resources and result in a significant degradation of performance. Secondly, none of these solutions adequately accounts for the inherent heterogeneity among nodes, and the interoperability of different nodes is constrained by security concerns, thereby impeding the practical advancement of blockchain applications. In this paper, a novel subjective logical trust-based tree sharding system, MSLTChain, is introduced to alleviate the processing workload of cross-shard transactions. The proposal encompasses a tree sharding structure and a trust management model, enabling the processing and validation of cross-shard transactions within the parent shard. Moreover, an adaptive algorithm is incorporated to dynamically fine-tune scalability, further augmenting system throughput. A subjective logical trust model is employed to portray the heterogeneity between nodes and enhance the system’s security level. The paper also conducts a comprehensive theoretical analysis, evaluating the security, scalability, and performance aspects. Finally, the experimental findings substantiate the capability of MSLTChain to satisfy the dual imperatives of scalability and security within the context of sharding blockchain.
分片(Sharding)是区块链系统的一种流行技术,它既能解决可扩展性问题,又能确保安全性和去中心化。然而,目前仍存在许多问题。首先,现有的分片解决方案显示出很高的跨分片交易比例,这对系统资源造成了很大负担,并导致性能显著下降。其次,这些解决方案都没有充分考虑到节点之间固有的异质性,不同节点之间的互操作性受到安全问题的制约,从而阻碍了区块链应用的实际推进。本文介绍了一种新颖的基于主观逻辑信任的树状分片系统--MSLTChain,以减轻跨分片交易的处理工作量。该方案包含树状分片结构和信任管理模型,可在父分片内处理和验证跨分片交易。此外,还采用了一种自适应算法来动态微调可扩展性,从而进一步提高系统吞吐量。本文采用主观逻辑信任模型来描述节点之间的异质性,并提高系统的安全级别。本文还进行了全面的理论分析,对安全性、可扩展性和性能等方面进行了评估。最后,实验结果证实了 MSLTChain 在分片区块链的背景下满足可扩展性和安全性双重要求的能力。
{"title":"MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System","authors":"Jin Tian;Junfeng Tian;Ruizhong Du","doi":"10.1109/TNSM.2024.3427139","DOIUrl":"10.1109/TNSM.2024.3427139","url":null,"abstract":"Sharding is a popular technology for blockchain systems that addresses scalability while ensuring security and decentralization. However, there are still many issues. Firstly, the existing sharding solutions exhibit a high percentage of cross-shard transactions, which place a substantial burden on system resources and result in a significant degradation of performance. Secondly, none of these solutions adequately accounts for the inherent heterogeneity among nodes, and the interoperability of different nodes is constrained by security concerns, thereby impeding the practical advancement of blockchain applications. In this paper, a novel subjective logical trust-based tree sharding system, MSLTChain, is introduced to alleviate the processing workload of cross-shard transactions. The proposal encompasses a tree sharding structure and a trust management model, enabling the processing and validation of cross-shard transactions within the parent shard. Moreover, an adaptive algorithm is incorporated to dynamically fine-tune scalability, further augmenting system throughput. A subjective logical trust model is employed to portray the heterogeneity between nodes and enhance the system’s security level. The paper also conducts a comprehensive theoretical analysis, evaluating the security, scalability, and performance aspects. Finally, the experimental findings substantiate the capability of MSLTChain to satisfy the dual imperatives of scalability and security within the context of sharding blockchain.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5566-5581"},"PeriodicalIF":4.7,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141611368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1