首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
Achieving Efficient SFC Proactive Reconfiguration Through Deep Reinforcement Learning in Programmable Networks 在可编程网络中通过深度强化学习实现有效的SFC主动重构
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-03 DOI: 10.1109/TNSM.2025.3585590
Huaqing Tu;Ziqiang Hua;Qi Xu;Jun Zhu;Tao Zou;Hongli Xu;Qiao Xiang;Zuqing Zhu
Service function chain (SFC) consists of multiple ordered network functions (e.g., firewall, load balancer) and plays an important role in improving network security and ensuring network performance. Offloading SFCs onto programmable switches can bring significant performance improvement, but it suffers from unbearable reconfiguration delays, making it hard to cope with network workload dynamics in a timely manner. To bridge the gap, this paper presents OptRec, an efficient SFC proactive reconfiguration optimization framework based on deep reinforcement learning (DRL). OptRec predicts future traffic and places SFCs on programmable switches in advance to ensure the timeliness of the SFC reconfiguration, which is a proactive approach. However, it is non-trivial to extract effective features from historical traffic information and global network states, while ensuring efficient and stable model training. To this end, OptRec introduces a multi-level feature extraction model for different types of features. Additionally, it combines reinforcement learning and autoregressive learning to enhance model efficiency and stability. Results of in-depth simulations based on real-world datasets show the average prediction error of OptRec is less than 3% and OptRec can increase the system throughput by up to 69.6%~72.6% compared with other alternatives.
业务功能链(SFC)由多个有序的网络功能(如防火墙、负载均衡器等)组成,在提高网络安全性、保障网络性能方面发挥着重要作用。将sfc卸载到可编程交换机上可以带来显着的性能改进,但它遭受难以忍受的重新配置延迟,使其难以及时应对网络工作负载动态。为了弥补这一差距,本文提出了一种基于深度强化学习(DRL)的高效SFC主动重构优化框架OptRec。OptRec预测未来的流量,并提前将SFC放置在可编程交换机上,以确保SFC重构的及时性,这是一种主动的方法。然而,在保证模型训练高效稳定的同时,从历史交通信息和全局网络状态中提取有效特征并非易事。为此,OptRec引入了针对不同类型特征的多层次特征提取模型。此外,它结合了强化学习和自回归学习来提高模型的效率和稳定性。基于真实数据集的深度仿真结果表明,OptRec的平均预测误差小于3%,与其他方案相比,OptRec可将系统吞吐量提高69.6%~72.6%。
{"title":"Achieving Efficient SFC Proactive Reconfiguration Through Deep Reinforcement Learning in Programmable Networks","authors":"Huaqing Tu;Ziqiang Hua;Qi Xu;Jun Zhu;Tao Zou;Hongli Xu;Qiao Xiang;Zuqing Zhu","doi":"10.1109/TNSM.2025.3585590","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3585590","url":null,"abstract":"Service function chain (SFC) consists of multiple ordered network functions (e.g., firewall, load balancer) and plays an important role in improving network security and ensuring network performance. Offloading SFCs onto programmable switches can bring significant performance improvement, but it suffers from unbearable reconfiguration delays, making it hard to cope with network workload dynamics in a timely manner. To bridge the gap, this paper presents OptRec, an efficient SFC proactive reconfiguration optimization framework based on deep reinforcement learning (DRL). OptRec predicts future traffic and places SFCs on programmable switches in advance to ensure the timeliness of the SFC reconfiguration, which is a proactive approach. However, it is non-trivial to extract effective features from historical traffic information and global network states, while ensuring efficient and stable model training. To this end, OptRec introduces a multi-level feature extraction model for different types of features. Additionally, it combines reinforcement learning and autoregressive learning to enhance model efficiency and stability. Results of in-depth simulations based on real-world datasets show the average prediction error of OptRec is less than 3% and OptRec can increase the system throughput by up to 69.6%~72.6% compared with other alternatives.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"4917-4932"},"PeriodicalIF":5.4,"publicationDate":"2025-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145230026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolutionary Multi-Objective Deep Reinforcement Learning for Task Offloading in Industrial Internet of Things 面向工业物联网任务卸载的进化多目标深度强化学习
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-02 DOI: 10.1109/TNSM.2025.3585148
Xu Liu;Zheng-Yi Chai;Yan-Yang Cheng;Ya-Lun Li;Tao Li
Mobile Edge Computing (MEC) plays a pivotal role in optimizing the Industrial Internet of Things (IIoT), where the Industrial Task Offloading Problem (ITOP) is crucial for ensuring optimal system performance by balancing conflicting objectives such as delay, energy consumption, and cost. However, existing approaches often oversimplify multi-objective optimization by aggregating conflicting goals into a single objective, while also suffering from limited exploration and robustness in uncertain MEC scenarios within IIoT. To overcome this limitation, we propose EMDRL-ITOP, an Evolutionary Multi-Objective Deep Reinforcement Learning algorithm that synergizes evolutionary algorithm with deep reinforcement learning (DRL). Firstly, we formulate a multi-objective task scheduling model for IIoT-MEC and design a three-dimensional vector reward function within a Multi-Objective Markov Decision Process framework, enabling simultaneous optimization of delay, energy, and cost. Then, EMDRL-ITOP integrates evolutionary mechanisms to enhance exploration and robustness: a dynamic elite selection strategy prioritizes high-quality policies, a distillation crossover operator fuses advantageous traits from elite strategies, and a proximal mutation mechanism maintains population diversity. These components collectively improve learning efficiency and solution quality in dynamic environments. Extensive simulations across six instances demonstrate that EMDRL-ITOP achieves a superior balance among conflicting objectives compared to state-of-the-art methods, while also outperforming existing algorithms in several key performance metrics.
移动边缘计算(MEC)在优化工业物联网(IIoT)中发挥着关键作用,其中工业任务卸载问题(ITOP)对于通过平衡延迟、能耗和成本等相互冲突的目标来确保最佳系统性能至关重要。然而,现有的方法往往通过将相互冲突的目标聚合到单个目标中来过度简化多目标优化,同时在工业物联网中不确定的MEC场景中,探索和鲁棒性也有限。为了克服这一限制,我们提出了EMDRL-ITOP,一种将进化算法与深度强化学习(DRL)相结合的进化多目标深度强化学习算法。首先,我们建立了IIoT-MEC的多目标任务调度模型,并在多目标马尔可夫决策过程框架内设计了三维矢量奖励函数,实现了延迟、能量和成本的同时优化。然后,EMDRL-ITOP整合了进化机制,以增强探索和鲁棒性:动态精英选择策略优先选择优质策略,蒸馏交叉算子融合精英策略中的优势性状,近端突变机制保持种群多样性。这些组件共同提高了动态环境中的学习效率和解决方案质量。六个实例的广泛模拟表明,与最先进的方法相比,EMDRL-ITOP在冲突目标之间实现了更好的平衡,同时在几个关键性能指标上也优于现有算法。
{"title":"Evolutionary Multi-Objective Deep Reinforcement Learning for Task Offloading in Industrial Internet of Things","authors":"Xu Liu;Zheng-Yi Chai;Yan-Yang Cheng;Ya-Lun Li;Tao Li","doi":"10.1109/TNSM.2025.3585148","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3585148","url":null,"abstract":"Mobile Edge Computing (MEC) plays a pivotal role in optimizing the Industrial Internet of Things (IIoT), where the Industrial Task Offloading Problem (ITOP) is crucial for ensuring optimal system performance by balancing conflicting objectives such as delay, energy consumption, and cost. However, existing approaches often oversimplify multi-objective optimization by aggregating conflicting goals into a single objective, while also suffering from limited exploration and robustness in uncertain MEC scenarios within IIoT. To overcome this limitation, we propose EMDRL-ITOP, an Evolutionary Multi-Objective Deep Reinforcement Learning algorithm that synergizes evolutionary algorithm with deep reinforcement learning (DRL). Firstly, we formulate a multi-objective task scheduling model for IIoT-MEC and design a three-dimensional vector reward function within a Multi-Objective Markov Decision Process framework, enabling simultaneous optimization of delay, energy, and cost. Then, EMDRL-ITOP integrates evolutionary mechanisms to enhance exploration and robustness: a dynamic elite selection strategy prioritizes high-quality policies, a distillation crossover operator fuses advantageous traits from elite strategies, and a proximal mutation mechanism maintains population diversity. These components collectively improve learning efficiency and solution quality in dynamic environments. Extensive simulations across six instances demonstrate that EMDRL-ITOP achieves a superior balance among conflicting objectives compared to state-of-the-art methods, while also outperforming existing algorithms in several key performance metrics.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"5074-5089"},"PeriodicalIF":5.4,"publicationDate":"2025-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145230068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Assisted Secure Embedding of Virtual Networks in Multi-Domain Elastic Optical Network 多域弹性光网络中区块链辅助的虚拟网络安全嵌入
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-02 DOI: 10.1109/TNSM.2025.3583898
Huanlin Liu;Bing Ma;Jianjian Zhang;Yong Chen;Bo Liu;Haonan Chen;Di Deng
With the continuous advancement of network virtualization (NV) technology, virtual network embedding (VNE) has played a crucial role in solving network resource allocation problem. However, multi-domain elastic optical networks (MD-EONs) are increasingly facing privacy and security challenges. The centralized VNE methods lead to significant communication overhead due to their excessive reliance on central servers. Additionally, network attacks, such as eavesdropping, pose severe threats to data security. So, we propose a blockchain-assisted virtual network secure embedding (BA-VNSE) framework MD-EONs. This framework employs quantum key distribution (QKD) technology to ensure data security during transmission and leverages the blockchain technology to enhance the transparency and security of the VNE process. Furthermore, we propose a blockchain-assisted minimum cost virtual network secure embedding (BAMC-VNSE). During the virtual node embedding (VNM), the multidimensional resources of nodes are comprehensively considered to ensure effective embedding. In the virtual link embedding (VLM), the QKD paths are allowed to differ from the encrypted data transmission paths, ultimately resulting in the selection of the most cost-effective valid embedding scheme. The simulation results demonstrate that the BAMC-VNSE effectively reduces request blocking probability, embedding cost and average number of message while improving the key utilization ratio.
随着网络虚拟化(NV)技术的不断发展,虚拟网络嵌入(VNE)在解决网络资源分配问题中发挥了至关重要的作用。然而,多域弹性光网络(md - eon)正日益面临着隐私和安全方面的挑战。集中式VNE方法由于过度依赖中央服务器,导致了巨大的通信开销。此外,窃听等网络攻击对数据安全构成严重威胁。因此,我们提出了一种区块链辅助虚拟网络安全嵌入(BA-VNSE)框架MD-EONs。该框架采用量子密钥分发(QKD)技术确保传输过程中的数据安全,并利用区块链技术提高虚拟网络传输过程的透明度和安全性。此外,我们提出了一种区块链辅助的最小成本虚拟网络安全嵌入(BAMC-VNSE)。在虚拟节点嵌入(VNM)过程中,综合考虑节点的多维资源,确保有效嵌入。在虚拟链路嵌入(VLM)中,允许QKD路径与加密数据传输路径不同,最终选择最经济有效的嵌入方案。仿真结果表明,bmc - vnse在提高密钥利用率的同时,有效地降低了请求阻塞概率、嵌入成本和平均消息数。
{"title":"Blockchain-Assisted Secure Embedding of Virtual Networks in Multi-Domain Elastic Optical Network","authors":"Huanlin Liu;Bing Ma;Jianjian Zhang;Yong Chen;Bo Liu;Haonan Chen;Di Deng","doi":"10.1109/TNSM.2025.3583898","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3583898","url":null,"abstract":"With the continuous advancement of network virtualization (NV) technology, virtual network embedding (VNE) has played a crucial role in solving network resource allocation problem. However, multi-domain elastic optical networks (MD-EONs) are increasingly facing privacy and security challenges. The centralized VNE methods lead to significant communication overhead due to their excessive reliance on central servers. Additionally, network attacks, such as eavesdropping, pose severe threats to data security. So, we propose a blockchain-assisted virtual network secure embedding (BA-VNSE) framework MD-EONs. This framework employs quantum key distribution (QKD) technology to ensure data security during transmission and leverages the blockchain technology to enhance the transparency and security of the VNE process. Furthermore, we propose a blockchain-assisted minimum cost virtual network secure embedding (BAMC-VNSE). During the virtual node embedding (VNM), the multidimensional resources of nodes are comprehensively considered to ensure effective embedding. In the virtual link embedding (VLM), the QKD paths are allowed to differ from the encrypted data transmission paths, ultimately resulting in the selection of the most cost-effective valid embedding scheme. The simulation results demonstrate that the BAMC-VNSE effectively reduces request blocking probability, embedding cost and average number of message while improving the key utilization ratio.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"3838-3848"},"PeriodicalIF":5.4,"publicationDate":"2025-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TraceDAE: Trace-Based Anomaly Detection in Microservice Systems via Dual Autoencoder 基于跟踪的双自编码器微服务系统异常检测
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-26 DOI: 10.1109/TNSM.2025.3583213
Junjun Li;Shi Ying;Tiangang Li;Xiangbo Tian
Microservice systems have become a popular architecture for modern Web applications owing to their scalability, modularity, and maintainability. However, with the increasing complexity and size of these systems, anomaly detection emerges as a critical task. In this paper, we introduce TraceDAE, a trace-based anomaly detection approach in microservice systems. The approach initially constructs a Service Trace Graph (STG) to depict service invocation relationships and performance metrics, subsequently introducing a dual autoencoder framework. In this framework, the structure autoencoder employs Graph Attention Networks (GAT) to analyze the structure, while the attribute autoencoder leverages the Long Short-Term Memory Network (LSTM) for processing time series data. This approach is capable of effectively identifying Service Response Abnormal and Service Invocation Abnormal. Moreover, the final experimental results on datasets show that TraceDAE is an efficient anomaly detection approach which outperforms the SOTA(State of The Arts) trace-based anomaly detection methods with F1-scores of 0.970 and 0.925, respectively.
由于其可伸缩性、模块化和可维护性,微服务系统已经成为现代Web应用程序的流行体系结构。然而,随着这些系统的复杂性和规模的增加,异常检测成为一项关键任务。本文介绍了一种基于跟踪的微服务系统异常检测方法TraceDAE。该方法最初构建了一个服务跟踪图(Service Trace Graph, STG)来描述服务调用关系和性能指标,随后引入了一个双自编码器框架。在该框架中,结构自编码器使用图注意网络(GAT)来分析结构,而属性自编码器使用长短期记忆网络(LSTM)来处理时间序列数据。该方法能够有效识别服务响应异常和服务调用异常。最后在数据集上的实验结果表明,TraceDAE是一种高效的异常检测方法,其f1分数分别为0.970和0.925,优于基于SOTA(State of the Arts)的异常检测方法。
{"title":"TraceDAE: Trace-Based Anomaly Detection in Microservice Systems via Dual Autoencoder","authors":"Junjun Li;Shi Ying;Tiangang Li;Xiangbo Tian","doi":"10.1109/TNSM.2025.3583213","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3583213","url":null,"abstract":"Microservice systems have become a popular architecture for modern Web applications owing to their scalability, modularity, and maintainability. However, with the increasing complexity and size of these systems, anomaly detection emerges as a critical task. In this paper, we introduce TraceDAE, a trace-based anomaly detection approach in microservice systems. The approach initially constructs a Service Trace Graph (STG) to depict service invocation relationships and performance metrics, subsequently introducing a dual autoencoder framework. In this framework, the structure autoencoder employs Graph Attention Networks (GAT) to analyze the structure, while the attribute autoencoder leverages the Long Short-Term Memory Network (LSTM) for processing time series data. This approach is capable of effectively identifying Service Response Abnormal and Service Invocation Abnormal. Moreover, the final experimental results on datasets show that TraceDAE is an efficient anomaly detection approach which outperforms the SOTA(State of The Arts) trace-based anomaly detection methods with F1-scores of 0.970 and 0.925, respectively.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"4884-4897"},"PeriodicalIF":5.4,"publicationDate":"2025-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145255902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FR-SFCO: Energy-Aware Offloading on Data Plane for Delay-Sensitive SFC FR-SFCO:延迟敏感SFC的数据平面能量感知卸载
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-24 DOI: 10.1109/TNSM.2025.3582223
Bo Pang;Deyun Gao;Xianchao Zhang;Chuan Heng Foh;Hongke Zhang;Victor C. M. Leung
Service Function Chaining (SFC) is widely deployed by telecom operators and cloud service providers, offering traffic QoS guarantees and other additional functions for various applications. The network state at the time of SFC deployment can differ significantly from the runtime conditions, leading to excessive resource allocation and consequent energy waste. The existing SFC reconfiguration methods face the challenge of meeting the latency requirements of delay-sensitive applications while achieving significant energy savings. This paper proposes FR-SFCO, a flow rate-aware SFC offloading framework on programmable data planes for delay-sensitive flows. Specifically, we designed a TCAM-friendly table matching method for FR-SFCO to reduce the flow entries needed for SFC offloading in programmable switches and support larger numbers of offloaded SFC. Then, we proposed a dual-threshold-based offloading trigger mechanism that, according to the real-time traffic arrival rate, can fast offload SFC flows before they default to servers. Building on this, we propose DQN-AOTA, an adaptive offloading thresholds adjustment algorithm based on Deep Q-Learning, which can wisely change the offloading thresholds by interacting with a dynamic network traffic environment to minimize the packet loss and long-term energy consumption. Finally, we build a testbed using BMv2 software switches and Docker containers for extensive evaluation. The experimental results demonstrate the effectiveness of our solution which not only meets the latency constraints for delay-sensitive SFC flows but also reduces energy expenditure by at least 14.6%.
业务功能链(SFC)被电信运营商和云服务提供商广泛部署,为各种应用提供流量QoS保证和其他附加功能。部署SFC时的网络状态可能与运行时的情况有很大差异,从而导致资源分配过多,造成能源浪费。现有的SFC重构方法面临着在满足延迟敏感型应用的延迟需求的同时实现显著节能的挑战。针对延迟敏感流,提出了一种基于可编程数据平面的速率感知SFC卸载框架FR-SFCO。具体来说,我们设计了一种tcam友好的FR-SFCO表匹配方法,以减少可编程交换机中SFC卸载所需的流项,并支持更大数量的SFC卸载,然后,我们提出了一种基于双阈值的卸载触发机制,根据实时流量到达率,可以在SFC流默认到服务器之前快速卸载。在此基础上,我们提出了一种基于深度q学习的自适应卸载阈值调整算法DQN-AOTA,该算法可以通过与动态网络流量环境交互,明智地改变卸载阈值,以最大限度地减少丢包和长期能耗。最后,我们使用BMv2软件交换机和Docker容器构建了一个测试平台,以进行广泛的评估。实验结果证明了我们的解决方案的有效性,它不仅满足延迟敏感SFC流的延迟约束,而且至少减少了14.6%的能量消耗。
{"title":"FR-SFCO: Energy-Aware Offloading on Data Plane for Delay-Sensitive SFC","authors":"Bo Pang;Deyun Gao;Xianchao Zhang;Chuan Heng Foh;Hongke Zhang;Victor C. M. Leung","doi":"10.1109/TNSM.2025.3582223","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3582223","url":null,"abstract":"Service Function Chaining (SFC) is widely deployed by telecom operators and cloud service providers, offering traffic QoS guarantees and other additional functions for various applications. The network state at the time of SFC deployment can differ significantly from the runtime conditions, leading to excessive resource allocation and consequent energy waste. The existing SFC reconfiguration methods face the challenge of meeting the latency requirements of delay-sensitive applications while achieving significant energy savings. This paper proposes FR-SFCO, a flow rate-aware SFC offloading framework on programmable data planes for delay-sensitive flows. Specifically, we designed a TCAM-friendly table matching method for FR-SFCO to reduce the flow entries needed for SFC offloading in programmable switches and support larger numbers of offloaded SFC. Then, we proposed a dual-threshold-based offloading trigger mechanism that, according to the real-time traffic arrival rate, can fast offload SFC flows before they default to servers. Building on this, we propose DQN-AOTA, an adaptive offloading thresholds adjustment algorithm based on Deep Q-Learning, which can wisely change the offloading thresholds by interacting with a dynamic network traffic environment to minimize the packet loss and long-term energy consumption. Finally, we build a testbed using BMv2 software switches and Docker containers for extensive evaluation. The experimental results demonstrate the effectiveness of our solution which not only meets the latency constraints for delay-sensitive SFC flows but also reduces energy expenditure by at least 14.6%.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"3823-3837"},"PeriodicalIF":5.4,"publicationDate":"2025-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology-Driven Configuration of Emulation Networks With Deterministic Templating 基于确定性模板的仿真网络拓扑驱动配置
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-23 DOI: 10.1109/TNSM.2025.3582212
Satoru Kobayashi;Ryusei Shiiba;Shinsuke Miwa;Toshiyuki Miyachi;Kensuke Fukuda
Network emulation is an important component of a digital twin for verifying network behavior without impacting on the service systems. Although we need to repeatedly change network topologies and configuration settings as a part of trial and error for verification, it is not easy to reflect the change without failures because the change affects multiple devices, even if it is as simple as adding a device. We present topology-driven configuration, an idea to separate network topology and generalized configuration to make it easy to change them. Based on this idea, we aim to realize a scalable, simple, and effective configuration platform for emulation networks. We design a configuration generation method using simple and deterministic config templates with a new network parameter data model, and implement it as dot2net. We evaluate three perspectives, scalability, simplicity, and efficacy, of the proposed method using dot2net through measurement and user experiments on existing test network scenarios.
网络仿真是数字孪生的一个重要组成部分,用于在不影响业务系统的情况下验证网络行为。虽然我们需要反复更改网络拓扑和配置设置,作为验证的试错的一部分,但不容易在没有失败的情况下反映更改,因为更改会影响多个设备,即使它像添加设备一样简单。提出了拓扑驱动配置,将网络拓扑和广义配置分离开来,使其易于更改。基于这一思想,我们的目标是实现一个可扩展的、简单的、有效的仿真网络配置平台。采用简单、确定性的配置模板和新的网络参数数据模型,设计了一种配置生成方法,并在dot2net中实现。我们通过对现有测试网络场景的测量和用户实验,评估了使用dot2net的方法的可扩展性、简单性和有效性三个方面。
{"title":"Topology-Driven Configuration of Emulation Networks With Deterministic Templating","authors":"Satoru Kobayashi;Ryusei Shiiba;Shinsuke Miwa;Toshiyuki Miyachi;Kensuke Fukuda","doi":"10.1109/TNSM.2025.3582212","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3582212","url":null,"abstract":"Network emulation is an important component of a digital twin for verifying network behavior without impacting on the service systems. Although we need to repeatedly change network topologies and configuration settings as a part of trial and error for verification, it is not easy to reflect the change without failures because the change affects multiple devices, even if it is as simple as adding a device. We present topology-driven configuration, an idea to separate network topology and generalized configuration to make it easy to change them. Based on this idea, we aim to realize a scalable, simple, and effective configuration platform for emulation networks. We design a configuration generation method using simple and deterministic config templates with a new network parameter data model, and implement it as dot2net. We evaluate three perspectives, scalability, simplicity, and efficacy, of the proposed method using dot2net through measurement and user experiments on existing test network scenarios.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"3933-3946"},"PeriodicalIF":5.4,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Black Hole Prediction in Backbone Networks: A Comprehensive and Type-Independent Forecasting Model 主干网黑洞预测:一种综合、类型无关的预测模型
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-20 DOI: 10.1109/TNSM.2025.3581557
Kiymet Kaya;Elif Ak;Eren Ozaltun;Leandros Maglaras;Trung Q. Duong;Berk Canberk;Sule Gunduz Oguducu
Network backbone black holes(BH) pose significant challenges in the Internet by causing disruptions and data loss as routers silently drop packets without notification. These silent BH failures, stemming from issues like hardware malfunctions or misconfigurations, uniquely affect point-to-point packet flows without disrupting the entire network. Unlike cyber attacks and network intrusions, BHs are often untraceable, making early detection vital and challenging. This study addresses the need for an effective forecasting solution for BH occurrences, especially in environments with unlabeled traffic data where traditional anomaly detection methods fall short. The Type-Independent Black Hole Forecasting Model is introduced to predict BH occurrences with high precision across various anomalies, including contextual and collective anomaly types. The three-stage methodology processes unlabeled time-series network data, where the data is not pre-labeled as anomaly or normal, using machine learning and deep learning techniques to identify and forecast potential BH occurrences. The ‘Point BH Identification and Segregation’ stage segregates point BH traffic using Density-Based Spatial Clustering of Applications with Noise(DBSCAN), followed by Reintegration and Time Series Smoothing. The final stage, Advanced Contextual and Collective BH Detection, leverages Convolutional AutoEncoder(Conv-AE) with window sliding for advanced anomaly detection. Evaluation using a dual-dataset approach, including real backbone network traffic and a time-series adapted public dataset, demonstrates the adaptability of the model to real backbone BH detection systems. Experimental results show superior performance compared to state-of-the-art unsupervised anomaly forecasting models, with a 98% detection rate and 90% F-1 score, outperforming models like MultiHeadSelfAttention, which is the main building block of Transformers.
网络骨干黑洞(BH)造成网络中断和数据丢失,路由器在没有通知的情况下静默地丢弃数据包,给互联网带来了重大挑战。这些沉默的BH故障源于硬件故障或配置错误等问题,只会影响点对点的数据包流,而不会中断整个网络。与网络攻击和网络入侵不同,黑洞通常无法追踪,因此早期发现至关重要且具有挑战性。该研究解决了对黑洞发生的有效预测解决方案的需求,特别是在传统异常检测方法不足的未标记交通数据环境中。引入了类型无关的黑洞预测模型,以高精度预测各种异常的黑洞发生,包括背景异常和集体异常类型。三阶段方法处理未标记的时间序列网络数据,其中数据未预先标记为异常或正常,使用机器学习和深度学习技术来识别和预测潜在的黑洞发生。“点BH识别和分离”阶段使用基于密度的空间聚类应用与噪声(DBSCAN)分离点BH流量,然后是重新整合和时间序列平滑。最后一个阶段,高级上下文和集体黑洞检测,利用带有窗口滑动的卷积自动编码器(conve - ae)进行高级异常检测。使用双数据集方法(包括真实骨干网流量和时间序列自适应公共数据集)进行评估,证明了该模型对真实骨干网BH检测系统的适应性。实验结果表明,与目前最先进的无监督异常预测模型相比,该模型的检测率为98%,F-1得分为90%,优于MultiHeadSelfAttention等模型,而MultiHeadSelfAttention是transformer的主要组成部分。
{"title":"Black Hole Prediction in Backbone Networks: A Comprehensive and Type-Independent Forecasting Model","authors":"Kiymet Kaya;Elif Ak;Eren Ozaltun;Leandros Maglaras;Trung Q. Duong;Berk Canberk;Sule Gunduz Oguducu","doi":"10.1109/TNSM.2025.3581557","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3581557","url":null,"abstract":"Network backbone black holes(BH) pose significant challenges in the Internet by causing disruptions and data loss as routers silently drop packets without notification. These silent BH failures, stemming from issues like hardware malfunctions or misconfigurations, uniquely affect point-to-point packet flows without disrupting the entire network. Unlike cyber attacks and network intrusions, BHs are often untraceable, making early detection vital and challenging. This study addresses the need for an effective forecasting solution for BH occurrences, especially in environments with unlabeled traffic data where traditional anomaly detection methods fall short. The Type-Independent Black Hole Forecasting Model is introduced to predict BH occurrences with high precision across various anomalies, including contextual and collective anomaly types. The three-stage methodology processes unlabeled time-series network data, where the data is not pre-labeled as anomaly or normal, using machine learning and deep learning techniques to identify and forecast potential BH occurrences. The ‘Point BH Identification and Segregation’ stage segregates point BH traffic using Density-Based Spatial Clustering of Applications with Noise(DBSCAN), followed by Reintegration and Time Series Smoothing. The final stage, Advanced Contextual and Collective BH Detection, leverages Convolutional AutoEncoder(Conv-AE) with window sliding for advanced anomaly detection. Evaluation using a dual-dataset approach, including real backbone network traffic and a time-series adapted public dataset, demonstrates the adaptability of the model to real backbone BH detection systems. Experimental results show superior performance compared to state-of-the-art unsupervised anomaly forecasting models, with a 98% detection rate and 90% F-1 score, outperforming models like MultiHeadSelfAttention, which is the main building block of Transformers.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"4983-4997"},"PeriodicalIF":5.4,"publicationDate":"2025-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145230022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threatify: APT Threat Variant Generation Using Graph-Based Machine Learning 威胁:使用基于图的机器学习生成APT威胁变体
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-19 DOI: 10.1109/TNSM.2025.3581463
Boubakr Nour;Makan Pourzandi;Mourad Debbabi
Ensuring cybersecurity in an ever-evolving threat landscape requires proactive identification and understanding of potential threats. Conventional detection and prediction solutions often fall short as they predominantly focus on known attack vectors. Advanced Persistent Threats (APTs) are becoming increasingly sophisticated and stealthy, resulting in new threat variants that are undetectable by these detection solutions. This paper introduces Threatify, a novel approach to predicting the most probable threat variants from existing APTs and previously seen attack campaigns. Our approach automates the generation of threat variants using graph-based machine learning based on the attack definition, past attack campaigns, and the security context between different techniques. Threatify leverages a security knowledge base of realistic attack scenarios and cybersecurity expertise to model, generate, and predict new forms of potential future threats by combining inter- (i.e., within the same APT attack) and intra- (i.e., between different APTs) techniques used by threat actors. It is crucial to emphasize that Threatify does not merely mix techniques from different APTs; rather, it constructs a logical and pragmatic kill chain based on their security context. Threatify is able to predict new attack steps, find relevant techniques to be substituted by, and merge APTs’ techniques in the current security context, and thus create previously unexplored threat variants. Our extensive experimental results demonstrate the efficacy of our approach in generating relevant and novel threat variants with a similarity score of 92%, uniqueness of 82%, validity of 95%, and reduction rate of 96%, including those that have never occurred before.
在不断变化的威胁环境中确保网络安全需要主动识别和了解潜在威胁。传统的检测和预测解决方案往往不足,因为它们主要关注已知的攻击向量。高级持续性威胁(apt)正变得越来越复杂和隐蔽,导致这些检测解决方案无法检测到新的威胁变体。本文介绍了Threatify,这是一种预测现有apt和以前看到的攻击活动中最可能的威胁变体的新方法。我们的方法基于攻击定义、过去的攻击活动和不同技术之间的安全上下文,使用基于图的机器学习自动生成威胁变体。Threatify利用现实攻击场景的安全知识库和网络安全专业知识,通过结合威胁参与者使用的相互(即同一APT攻击内)和内部(即不同APT之间)技术来建模、生成和预测潜在未来威胁的新形式。必须强调的是,Threatify不只是混合来自不同apt的技术;相反,它基于它们的安全上下文构建了一个逻辑和实用的杀伤链。Threatify能够预测新的攻击步骤,找到可用的相关技术,并将apt的技术合并到当前的安全环境中,从而创建以前未探索的威胁变体。我们广泛的实验结果证明了我们的方法在生成相关和新的威胁变体方面的有效性,相似度评分为92%,唯一性评分为82%,有效性为95%,减少率为96%,包括那些以前从未发生过的。
{"title":"Threatify: APT Threat Variant Generation Using Graph-Based Machine Learning","authors":"Boubakr Nour;Makan Pourzandi;Mourad Debbabi","doi":"10.1109/TNSM.2025.3581463","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3581463","url":null,"abstract":"Ensuring cybersecurity in an ever-evolving threat landscape requires proactive identification and understanding of potential threats. Conventional detection and prediction solutions often fall short as they predominantly focus on known attack vectors. Advanced Persistent Threats (APTs) are becoming increasingly sophisticated and stealthy, resulting in new threat variants that are undetectable by these detection solutions. This paper introduces T<sc>hreatify</small>, a novel approach to predicting the most probable threat variants from existing APTs and previously seen attack campaigns. Our approach automates the generation of threat variants using graph-based machine learning based on the attack definition, past attack campaigns, and the security context between different techniques. T<sc>hreatify</small> leverages a security knowledge base of realistic attack scenarios and cybersecurity expertise to model, generate, and predict new forms of potential future threats by combining inter- (i.e., within the same APT attack) and intra- (i.e., between different APTs) techniques used by threat actors. It is crucial to emphasize that T<sc>hreatify</small> does not merely mix techniques from different APTs; rather, it constructs a logical and pragmatic kill chain based on their security context. T<sc>hreatify</small> is able to predict new attack steps, find relevant techniques to be substituted by, and merge APTs’ techniques in the current security context, and thus create previously unexplored threat variants. Our extensive experimental results demonstrate the efficacy of our approach in generating relevant and novel threat variants with a similarity score of 92%, uniqueness of 82%, validity of 95%, and reduction rate of 96%, including those that have never occurred before.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"3978-3994"},"PeriodicalIF":5.4,"publicationDate":"2025-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AZTEC+: Long- and Short-Term Resource Provisioning for Zero-Touch Network Management AZTEC+:零接触网络管理的长期和短期资源分配
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-18 DOI: 10.1109/TNSM.2025.3580706
Sergi Alcalá-Marín;Dario Bega;Marco Gramaglia;Albert Banchs;Xavier Costa-Perez;Marco Fiore
In the past few years, network infrastructures have transitioned from prominently hardware-based models to networks of functions, where software components provide the required functionalities with unprecedented scalability and flexibility. However, this new vision entails a completely new set of problems related to resource provisioning and the network function operation, making it difficult to manage the network function lifecycle management with traditional, human-in-the-loop approaches. Novel zero-touch management solutions promise autonomous network operation with limited human interactions. However, modeling network function behavior into compelling variables and algorithm is an aspect that such solutions must take into account. In this paper, we propose AZTEC+, a data-driven solution for anticipatory resource provisioning in network slicing scenarios. By leveraging a hybrid and modular deep learning architecture, AZTEC+ not only forecasts the future demands for target services but also identifies the best trade-offs to balance the costs due to the instantiation and reconfiguration of such resources. Our experimental evaluation, based on real-world network data, shows how AZTEC+ can outperform state-of-the-art management solutions for a large set of metrics.
在过去的几年中,网络基础设施已经从突出的基于硬件的模型过渡到功能网络,其中软件组件以前所未有的可伸缩性和灵活性提供所需的功能。然而,这种新的愿景带来了一组与资源供应和网络功能操作相关的全新问题,使得使用传统的、人在循环的方法来管理网络功能生命周期管理变得困难。新颖的零接触管理解决方案承诺在有限的人类互动下自主运行网络。然而,将网络函数行为建模为引人注目的变量和算法是此类解决方案必须考虑的一个方面。在本文中,我们提出了AZTEC+,一种数据驱动的解决方案,用于网络切片场景中的预期资源供应。通过利用混合和模块化深度学习架构,AZTEC+不仅可以预测未来对目标服务的需求,还可以确定最佳权衡,以平衡此类资源的实例化和重新配置所带来的成本。我们基于真实网络数据的实验评估显示,AZTEC+如何在大量指标方面优于最先进的管理解决方案。
{"title":"AZTEC+: Long- and Short-Term Resource Provisioning for Zero-Touch Network Management","authors":"Sergi Alcalá-Marín;Dario Bega;Marco Gramaglia;Albert Banchs;Xavier Costa-Perez;Marco Fiore","doi":"10.1109/TNSM.2025.3580706","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3580706","url":null,"abstract":"In the past few years, network infrastructures have transitioned from prominently hardware-based models to networks of functions, where software components provide the required functionalities with unprecedented scalability and flexibility. However, this new vision entails a completely new set of problems related to resource provisioning and the network function operation, making it difficult to manage the network function lifecycle management with traditional, human-in-the-loop approaches. Novel zero-touch management solutions promise autonomous network operation with limited human interactions. However, modeling network function behavior into compelling variables and algorithm is an aspect that such solutions must take into account. In this paper, we propose AZTEC+, a data-driven solution for anticipatory resource provisioning in network slicing scenarios. By leveraging a hybrid and modular deep learning architecture, AZTEC+ not only forecasts the future demands for target services but also identifies the best trade-offs to balance the costs due to the instantiation and reconfiguration of such resources. Our experimental evaluation, based on real-world network data, shows how AZTEC+ can outperform state-of-the-art management solutions for a large set of metrics.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"3809-3822"},"PeriodicalIF":5.4,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11039731","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MARS: Defending TCP Protocol Abuses in Programmable Data Plane 可编程数据平面中TCP协议滥用的防御
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-17 DOI: 10.1109/TNSM.2025.3580467
Dan Tang;Chenguang Zuo;Jiliang Zhang;Keqin Li;Qiuwei Yang;Zheng Qin
The TCP protocol’s inherent lack of built-in security mechanisms has rendered it susceptible to various network attacks. Conventional defense approaches face dual challenges: insufficient line-rate processing capacity and impractical online deployment requirements. The emergence of P4-based programmable data planes now enables line-speed traffic processing at the hardware level, creating new opportunities for protocol protection. In this context, we present MARS - a data plane-native TCP abuse detection and mitigation system that synergistically combines the Beaucoup traffic monitoring algorithm with artificial neural network (ANN) based anomaly detection, enhanced by adaptive heuristic mitigation rules. Through comprehensive benchmarking against existing TCP defense mechanisms, our solution demonstrates 12.95% higher throughput maintenance and 25.93% improved congestion window recovery ratio during attack scenarios. Furthermore, the proposed framework establishes several novel evaluation metrics specifically for TCP protocol protection systems.
TCP协议本身缺乏内置的安全机制,这使得它很容易受到各种网络攻击。传统的防御方法面临双重挑战:线路速率处理能力不足和不切实际的在线部署需求。基于p4的可编程数据平面的出现现在使硬件级别的线速流量处理成为可能,为协议保护创造了新的机会。在此背景下,我们提出了MARS——一个数据平面原生TCP滥用检测和缓解系统,该系统将Beaucoup流量监控算法与基于人工神经网络(ANN)的异常检测协同结合,并通过自适应启发式缓解规则进行增强。通过对现有TCP防御机制的全面基准测试,我们的解决方案在攻击场景下的吞吐量维护提高了12.95%,拥塞窗口恢复率提高了25.93%。此外,提出的框架建立了几个新的评估指标,专门为TCP协议保护系统。
{"title":"MARS: Defending TCP Protocol Abuses in Programmable Data Plane","authors":"Dan Tang;Chenguang Zuo;Jiliang Zhang;Keqin Li;Qiuwei Yang;Zheng Qin","doi":"10.1109/TNSM.2025.3580467","DOIUrl":"https://doi.org/10.1109/TNSM.2025.3580467","url":null,"abstract":"The TCP protocol’s inherent lack of built-in security mechanisms has rendered it susceptible to various network attacks. Conventional defense approaches face dual challenges: insufficient line-rate processing capacity and impractical online deployment requirements. The emergence of P4-based programmable data planes now enables line-speed traffic processing at the hardware level, creating new opportunities for protocol protection. In this context, we present MARS - a data plane-native TCP abuse detection and mitigation system that synergistically combines the Beaucoup traffic monitoring algorithm with artificial neural network (ANN) based anomaly detection, enhanced by adaptive heuristic mitigation rules. Through comprehensive benchmarking against existing TCP defense mechanisms, our solution demonstrates 12.95% higher throughput maintenance and 25.93% improved congestion window recovery ratio during attack scenarios. Furthermore, the proposed framework establishes several novel evaluation metrics specifically for TCP protocol protection systems.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 5","pages":"4050-4060"},"PeriodicalIF":5.4,"publicationDate":"2025-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1