首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
Beyond Size: Investigating the Impact of Scaled-Down Network Telescopes on Threat Detection 超越规模:调查缩小网络望远镜对威胁检测的影响
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-20 DOI: 10.1002/nem.70014
Arthur Vinícius Cunha Camargo, Lisandro Granville, Leandro M. Bertholdo

Cyber threat intelligence relies on network telescopes to detect attacks and emerging threats, traditionally utilizing a substantial portion of the IPv4 address space. However, the escalating scarcity and value of this resource force companies and research centers to grapple with the challenge of repurposing their address spaces, potentially impacting cybersecurity effectiveness and hindering research efforts. In this article, we first investigate the historical usage of IPv4 address space in network telescopes and the current reduction trend in several initiatives. Then, we examine the impact of reducing the allocated space on the ability of these systems to identify attackers and attack campaigns. We explore two network telescopes with the intention of assessing the impact of this reduction by quantifying the losses in several ways. Our findings reveal that even halving the allocated space for a network telescope may still permit the detection of 80% of unique cyberattack sources and the address allocation schema has little to no influence on this detection. We also found that most of the proportions and patterns remain present, albeit with reduced intensity.

网络威胁情报依赖于网络望远镜来检测攻击和新出现的威胁,传统上利用很大一部分IPv4地址空间。然而,这种资源的稀缺性和价值不断上升,迫使公司和研究中心努力应对重新利用其地址空间的挑战,这可能会影响网络安全的有效性,并阻碍研究工作。在这篇文章中,我们首先调查了IPv4地址空间在网络望远镜中的历史使用情况,以及当前在几个倡议中的减少趋势。然后,我们检查减少分配空间对这些系统识别攻击者和攻击活动的能力的影响。我们研究了两个网络望远镜,目的是通过几种方式量化损失来评估这种减少的影响。我们的研究结果表明,即使将分配给网络望远镜的空间减半,仍然可以检测到80%的独特网络攻击源,而地址分配模式对这种检测几乎没有影响。我们还发现,尽管强度降低了,但大多数比例和模式仍然存在。
{"title":"Beyond Size: Investigating the Impact of Scaled-Down Network Telescopes on Threat Detection","authors":"Arthur Vinícius Cunha Camargo,&nbsp;Lisandro Granville,&nbsp;Leandro M. Bertholdo","doi":"10.1002/nem.70014","DOIUrl":"https://doi.org/10.1002/nem.70014","url":null,"abstract":"<div>\u0000 \u0000 <p>Cyber threat intelligence relies on network telescopes to detect attacks and emerging threats, traditionally utilizing a substantial portion of the IPv4 address space. However, the escalating scarcity and value of this resource force companies and research centers to grapple with the challenge of repurposing their address spaces, potentially impacting cybersecurity effectiveness and hindering research efforts. In this article, we first investigate the historical usage of IPv4 address space in network telescopes and the current reduction trend in several initiatives. Then, we examine the impact of reducing the allocated space on the ability of these systems to identify attackers and attack campaigns. We explore two network telescopes with the intention of assessing the impact of this reduction by quantifying the losses in several ways. Our findings reveal that even halving the allocated space for a network telescope may still permit the detection of 80% of unique cyberattack sources and the address allocation schema has little to no influence on this detection. We also found that most of the proportions and patterns remain present, albeit with reduced intensity.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Routing Architecture for IoT Multipath Video Transmission 面向物联网多径视频传输的自适应路由架构
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-14 DOI: 10.1002/nem.70013
Fabiano Bhering, Debora Oliveira, Célio Albuquerque, Diego Passos, Katia Obraczka

Video applications in wireless multihop Internet of Things (IoT) scenarios can benefit from multipath routing strategies to meet their often stringent quality of service (QoS) requirements. However, the dynamics of the underlying network and video service requirements call for a multipath routing fabric that can dynamically adapt to changing conditions. In this paper, we present a wireless multipath routing architecture that is able to adapt to varying network topology conditions and video traffic characteristics by finding new paths dynamically, resulting in enhanced end user's quality of experience. Additionally, we provide an overview of the IoT wireless video application landscape and a taxonomy of the state-of-the-art in route selection mechanisms for multipath routing.

无线多跳物联网(IoT)场景中的视频应用可以从多路径路由策略中获益,以满足其通常非常严格的服务质量(QoS)要求。然而,底层网络和视频服务需求的动态变化要求多路径路由结构能够动态适应不断变化的条件。在本文中,我们介绍了一种无线多路径路由架构,它能够通过动态寻找新路径来适应不同的网络拓扑条件和视频流量特性,从而提高终端用户的体验质量。此外,我们还概述了物联网无线视频应用领域,并对最先进的多路径路由选择机制进行了分类。
{"title":"An Adaptive Routing Architecture for IoT Multipath Video Transmission","authors":"Fabiano Bhering,&nbsp;Debora Oliveira,&nbsp;Célio Albuquerque,&nbsp;Diego Passos,&nbsp;Katia Obraczka","doi":"10.1002/nem.70013","DOIUrl":"https://doi.org/10.1002/nem.70013","url":null,"abstract":"<p>Video applications in wireless multihop Internet of Things (IoT) scenarios can benefit from multipath routing strategies to meet their often stringent quality of service (QoS) requirements. However, the dynamics of the underlying network and video service requirements call for a multipath routing fabric that can dynamically adapt to changing conditions. In this paper, we present a wireless multipath routing architecture that is able to adapt to varying network topology conditions and video traffic characteristics by finding new paths dynamically, resulting in enhanced end user's quality of experience. Additionally, we provide an overview of the IoT wireless video application landscape and a taxonomy of the state-of-the-art in route selection mechanisms for multipath routing.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70013","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture 6G网络切片架构下的品牌设计数据安全与隐私保护
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-27 DOI: 10.1002/nem.70009
Peng Li, Jianing Du

The rapid growth of networking technology has generated several situations and issues in the field of safeguarding critical brand design data in the present hyper connected context, particularly with the arrival of the 6th Generation (6G). As brand development relies more on cloud-based services, protecting client data and intellectual property (IP) is essential. By using 6G network slicing architecture, which contains dedicated, secure network sections for brand design services, improved encryption, and anomaly detection systems, the research suggested a solution to such issues. The data includes features such as network performance, security measurements, and user data privacy measures. The methodology entails pre-processing brand design data with Z-score normalization to standardize feature distributions, followed by Principal Component Analysis (PCA) for a decrease of dimensions. The proposed method uses a Fully Homomorphic Encryption Driven Quantum Support Vector Machine (FHE-QSVM) to detect anomalies in real time while assuring safe and efficient resource allocation in dedicated slices. FHE-QSVM anomaly detection model produced significant metrics, with accuracy (98%), recall (96%), precision (97%), and F1-score (96%) data by accurately categorizing threats while maintaining data confidentiality. The finding shows the FHE-QSVM enhances both the security and privacy of brand design data by accurately categorizing threats while maintaining data confidentiality. Overall, this strategy offers a scalable solution for secure AI-powered brand design services, highlighting the importance of creative encryption, real-time monitoring, and 6G network slicing to meet contemporary data security standards.

随着第六代(6G)的到来,网络技术的快速发展在当前超连接环境下,特别是在保护关键品牌设计数据方面产生了一些情况和问题。随着品牌发展更多地依赖于基于云的服务,保护客户数据和知识产权(IP)至关重要。通过使用6G网络切片架构,该架构包含用于品牌设计服务的专用安全网络部分,改进的加密和异常检测系统,该研究提出了解决这些问题的方法。这些数据包括网络性能、安全度量和用户数据隐私度量等特性。该方法需要用z分数归一化预处理品牌设计数据以标准化特征分布,然后通过主成分分析(PCA)减少维度。该方法采用全同态加密驱动的量子支持向量机(FHE-QSVM)实时检测异常,同时保证了专用切片资源的安全高效分配。FHE-QSVM异常检测模型在保持数据机密性的同时,准确地对威胁进行分类,产生了准确率(98%)、召回率(96%)、精确度(97%)和f1得分(96%)的显著指标。结果表明,FHE-QSVM在保持数据保密性的同时,对威胁进行了准确的分类,增强了品牌设计数据的安全性和保密性。总体而言,该战略为安全的人工智能品牌设计服务提供了可扩展的解决方案,突出了创造性加密、实时监控和6G网络切片的重要性,以满足当代数据安全标准。
{"title":"Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture","authors":"Peng Li,&nbsp;Jianing Du","doi":"10.1002/nem.70009","DOIUrl":"https://doi.org/10.1002/nem.70009","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid growth of networking technology has generated several situations and issues in the field of safeguarding critical brand design data in the present hyper connected context, particularly with the arrival of the 6<sup>th</sup> Generation (6G). As brand development relies more on cloud-based services, protecting client data and intellectual property (IP) is essential. By using 6G network slicing architecture, which contains dedicated, secure network sections for brand design services, improved encryption, and anomaly detection systems, the research suggested a solution to such issues. The data includes features such as network performance, security measurements, and user data privacy measures. The methodology entails pre-processing brand design data with Z-score normalization to standardize feature distributions, followed by Principal Component Analysis (PCA) for a decrease of dimensions. The proposed method uses a Fully Homomorphic Encryption Driven Quantum Support Vector Machine (FHE-QSVM) to detect anomalies in real time while assuring safe and efficient resource allocation in dedicated slices. FHE-QSVM anomaly detection model produced significant metrics, with accuracy (98%), recall (96%), precision (97%), and F1-score (96%) data by accurately categorizing threats while maintaining data confidentiality. The finding shows the FHE-QSVM enhances both the security and privacy of brand design data by accurately categorizing threats while maintaining data confidentiality. Overall, this strategy offers a scalable solution for secure AI-powered brand design services, highlighting the importance of creative encryption, real-time monitoring, and 6G network slicing to meet contemporary data security standards.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143513823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing 基于6G网络切片的智能数字媒体交互系统的设计与实现
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-27 DOI: 10.1002/nem.70011
Na Liu

Rapid growth in intelligent digital media interaction systems (IDMIS) has created new difficulties in controlling and optimizing content distribution and engagement, especially with the impending 6G networks. The purpose of the investigate is to create an intelligent system that uses 6G network slicing to increase digital media communication and user experience through seamless connectivity, dynamic content distribution, and real-time engagement. The structure includes a dynamic, multilayered architecture for IDMIS, and network capital is allocated through 6G network slicing based on user demand and content type. The system includes machine learning (ML) algorithms that predict user behavior and optimize media delivery in real time. To correctly predict user behavior, the research gathers data that capture users' performance and preference (historical interaction data, demographics, contextual data, and user feedback). Once collected, data are processed to reduce dimensionality using principal component analysis (PCA). Refined Support Vector Machine Integrated with Flying Fox Optimization (RSVM-FFO) predicts user behavior and optimizes media delivery in real time. Metrics are used to evaluate the RSVM-FFO approach, such as F1-score (98.12%), accuracy (98.59%), precision (98.57%), and recall (98.17%). The results reveal that the suggested systems considerably improve media interaction effectiveness by reducing latency and bandwidth usage while providing a highly responsive user experience. Finally, advancement in the delivery of high-performance, customized media services is the combination of an IDMIS with 6G network slicing.

智能数字媒体交互系统(IDMIS)的快速发展为控制和优化内容分发和参与带来了新的困难,特别是在即将到来的6G网络下。该调查的目的是创建一个使用6G网络切片的智能系统,通过无缝连接、动态内容分发和实时参与来增加数字媒体通信和用户体验。该结构包括IDMIS的动态、多层架构,并根据用户需求和内容类型通过6G网络切片分配网络资金。该系统包括机器学习(ML)算法,可以预测用户行为并实时优化媒体交付。为了正确预测用户行为,该研究收集了用户表现和偏好的数据(历史交互数据、人口统计数据、上下文数据和用户反馈)。一旦收集到数据,使用主成分分析(PCA)对数据进行处理以降低维数。精细化支持向量机集成飞狐优化(RSVM-FFO)预测用户行为并实时优化媒体交付。采用指标评价RSVM-FFO方法,如f1评分(98.12%)、准确率(98.59%)、精密度(98.57%)和召回率(98.17%)。结果表明,建议的系统通过减少延迟和带宽使用,同时提供高度响应的用户体验,大大提高了媒体交互的有效性。最后,在交付高性能定制媒体服务方面的进步是IDMIS与6G网络切片的结合。
{"title":"Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing","authors":"Na Liu","doi":"10.1002/nem.70011","DOIUrl":"https://doi.org/10.1002/nem.70011","url":null,"abstract":"<div>\u0000 \u0000 <p>Rapid growth in intelligent digital media interaction systems (IDMIS) has created new difficulties in controlling and optimizing content distribution and engagement, especially with the impending 6G networks. The purpose of the investigate is to create an intelligent system that uses 6G network slicing to increase digital media communication and user experience through seamless connectivity, dynamic content distribution, and real-time engagement. The structure includes a dynamic, multilayered architecture for IDMIS, and network capital is allocated through 6G network slicing based on user demand and content type. The system includes machine learning (ML) algorithms that predict user behavior and optimize media delivery in real time. To correctly predict user behavior, the research gathers data that capture users' performance and preference (historical interaction data, demographics, contextual data, and user feedback). Once collected, data are processed to reduce dimensionality using principal component analysis (PCA). Refined Support Vector Machine Integrated with Flying Fox Optimization (RSVM-FFO) predicts user behavior and optimizes media delivery in real time. Metrics are used to evaluate the RSVM-FFO approach, such as F1-score (98.12%), accuracy (98.59%), precision (98.57%), and recall (98.17%). The results reveal that the suggested systems considerably improve media interaction effectiveness by reducing latency and bandwidth usage while providing a highly responsive user experience. Finally, advancement in the delivery of high-performance, customized media services is the combination of an IDMIS with 6G network slicing.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143513824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computationally Efficient Approach for 6G-AI-IoT Network Slicing and Error-Free Transmission 6G-AI-IoT网络切片和无差错传输的高效计算方法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-23 DOI: 10.1002/nem.70007
Yunxiang Qi

Many smart gadgets are connecting to the Internet, and Internet-of-Things (IoT) technologies are enabling a variety of applications. Artificial intelligence (AI) of Things (AIoT) devices are anticipated to possess human-like decision-making, reasoning, perception, and other capacities with the combination of AI and IoT. AIoT gadgets are expected to be extensively utilized across several domains, as anticipated by 6G networks. With AI's steady advancements in speech recognition, computer vision, and natural language processing—not to mention its ability to analyze large amounts of data—semantic communication is now feasible. A new paradigm in wireless communication is opened by semantic communication, which seeks to explore the meaning behind the bits and only transmits the information that may be used, as opposed to attaining error-free transmission. The combination of IoT with AI provides prominent features to overcome various important issues in cloud computing networks. However, there is bottleneck of delay and precision. Therefore, this paper proposed a new method to overcome this problem. First, the network slicing feature maps were extracted by convolutional neural networks. Next, the processing delay is reduced by semantic compression. Simulation results show that the proposed approach makes 99.2% reduction in communication complexity and an 80% reduction in transmission delay as compared with traditional methods. Taking the Resnet18 network as an example, the running time of the semantic communication method is only 0.8% of the traditional method.

许多智能设备正在连接到互联网,物联网(IoT)技术正在实现各种应用。人工智能(AI)物联网(AIoT)设备有望通过人工智能和物联网的结合,拥有类似人类的决策、推理、感知等能力。正如6G网络所预期的那样,AIoT设备预计将广泛应用于多个领域。随着人工智能在语音识别、计算机视觉和自然语言处理方面的稳步进步——更不用说它分析大量数据的能力了——语义通信现在是可行的。语义通信开启了无线通信的新范式,它旨在探索比特背后的含义,只传输可能使用的信息,而不是实现无差错传输。物联网与人工智能的结合为克服云计算网络中的各种重要问题提供了突出的特点。但是,存在延迟和精度的瓶颈。因此,本文提出了一种新的方法来克服这一问题。首先,利用卷积神经网络提取网络切片特征图;其次,通过语义压缩减少处理延迟。仿真结果表明,该方法与传统方法相比,通信复杂度降低99.2%,传输时延降低80%。以Resnet18网络为例,语义通信方法的运行时间仅为传统方法的0.8%。
{"title":"Computationally Efficient Approach for 6G-AI-IoT Network Slicing and Error-Free Transmission","authors":"Yunxiang Qi","doi":"10.1002/nem.70007","DOIUrl":"https://doi.org/10.1002/nem.70007","url":null,"abstract":"<div>\u0000 \u0000 <p>Many smart gadgets are connecting to the Internet, and Internet-of-Things (IoT) technologies are enabling a variety of applications. Artificial intelligence (AI) of Things (AIoT) devices are anticipated to possess human-like decision-making, reasoning, perception, and other capacities with the combination of AI and IoT. AIoT gadgets are expected to be extensively utilized across several domains, as anticipated by 6G networks. With AI's steady advancements in speech recognition, computer vision, and natural language processing—not to mention its ability to analyze large amounts of data—semantic communication is now feasible. A new paradigm in wireless communication is opened by semantic communication, which seeks to explore the meaning behind the bits and only transmits the information that may be used, as opposed to attaining error-free transmission. The combination of IoT with AI provides prominent features to overcome various important issues in cloud computing networks. However, there is bottleneck of delay and precision. Therefore, this paper proposed a new method to overcome this problem. First, the network slicing feature maps were extracted by convolutional neural networks. Next, the processing delay is reduced by semantic compression. Simulation results show that the proposed approach makes 99.2% reduction in communication complexity and an 80% reduction in transmission delay as compared with traditional methods. Taking the Resnet18 network as an example, the running time of the semantic communication method is only 0.8% of the traditional method.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Option Contracts in the DeFi Ecosystem: Opportunities, Solutions, and Technical Challenges DeFi生态系统中的期权合约:机遇、解决方案和技术挑战
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-16 DOI: 10.1002/nem.70005
Srisht Fateh Singh, Vladyslav Nekriach, Panagiotis Michalopoulos, Andreas Veneris, Jeffrey Klinck

This paper investigates the current landscape of option trading platforms for cryptocurrencies, encompassing both centralized and decentralized exchanges. Option contracts in cryptocurrency markets offer functionalities akin to traditional markets, providing investors with tools to mitigate risks, particularly those arising from price volatility, while also allowing them to capitalize on future volatility trends. The paper discusses these applications of option contracts in the context of decentralized finance (DeFi), emphasizing their utility in managing market uncertainties. Despite a recent surge in the trading volume of options contracts on cryptocurrencies, decentralized platforms account for less than 1% of this total volume. Hence, this paper takes a closer look by examining the design choices of these platforms to understand the challenges hindering their growth and adoption. It identifies technical, financial, and adoption-related challenges that decentralized exchanges face and provides commentary on existing platform responses. Subsequently, the paper analyzes the impact of absent options markets on the inefficiencies of automated market maker liquidity. It examines historical on-chain data for 14 ERC20 token pairs on Ethereum. The analysis shows 1143 instances in which deeper liquidity levels, as high as ×6$$ times 6 $$ more, could have been achieved by establishing an options market.

本文研究了加密货币期权交易平台的现状,包括中心化和去中心化交易所。加密货币市场中的期权合约提供了与传统市场类似的功能,为投资者提供了降低风险的工具,特别是价格波动带来的风险,同时还允许他们利用未来的波动趋势。本文在去中心化金融(DeFi)的背景下讨论了期权合约的这些应用,强调了它们在管理市场不确定性方面的效用。尽管近期加密货币期权合约的交易量激增,但去中心化平台的交易量还不到总交易量的 1%。因此,本文通过研究这些平台的设计选择来了解阻碍其发展和采用的挑战。本文指出了去中心化交易所面临的技术、金融和采用方面的挑战,并对现有平台的应对措施进行了评述。随后,本文分析了不存在期权市场对自动做市商流动性效率低下的影响。它研究了以太坊上 14 个 ERC20 代币对的历史链上数据。分析表明,在 1143 个实例中,通过建立期权市场可以实现更高的流动性水平,高达 × 6 $ times 6 $。
{"title":"Option Contracts in the DeFi Ecosystem: Opportunities, Solutions, and Technical Challenges","authors":"Srisht Fateh Singh,&nbsp;Vladyslav Nekriach,&nbsp;Panagiotis Michalopoulos,&nbsp;Andreas Veneris,&nbsp;Jeffrey Klinck","doi":"10.1002/nem.70005","DOIUrl":"https://doi.org/10.1002/nem.70005","url":null,"abstract":"<p>This paper investigates the current landscape of option trading platforms for cryptocurrencies, encompassing both centralized and decentralized exchanges. Option contracts in cryptocurrency markets offer functionalities akin to traditional markets, providing investors with tools to mitigate risks, particularly those arising from price volatility, while also allowing them to capitalize on future volatility trends. The paper discusses these applications of option contracts in the context of decentralized finance (DeFi), emphasizing their utility in managing market uncertainties. Despite a recent surge in the trading volume of options contracts on cryptocurrencies, decentralized platforms account for less than 1<i>%</i> of this total volume. Hence, this paper takes a closer look by examining the design choices of these platforms to understand the challenges hindering their growth and adoption. It identifies technical, financial, and adoption-related challenges that decentralized exchanges face and provides commentary on existing platform responses. Subsequently, the paper analyzes the impact of absent options markets on the inefficiencies of automated market maker liquidity. It examines historical on-chain data for 14 ERC20 token pairs on Ethereum. The analysis shows 1143 instances in which deeper liquidity levels, as high as <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>×</mo>\u0000 <mn>6</mn>\u0000 </mrow>\u0000 <annotation>$$ times 6 $$</annotation>\u0000 </semantics></math> more, could have been achieved by establishing an options market.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143424218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transport Assistants to Enhance TCP Connections: Investigating the Placement Problem 加强TCP连接的运输助手:调查安置问题
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-16 DOI: 10.1002/nem.70006
Jaime Galán-Jiménez, Mohamed Faten Zhani, José Gómez-delaHiz, John Kaippallimalil

As of today, transport control protocol (TCP) remains the de-facto transport protocol in the Internet. However, TCP may incur high delays, especially when retransmitting lost packets as they have to be retransmitted only by the source and after a timeout that is roughly equal to a round trip time. To reduce such delay, recent work proposed to deploy a special network function, called transport assistant (TA), that is able to detect and retransmit lost TCP packets from inside the network rather than the source and thereby reduces retransmission delays. Unfortunately, there is no study on the impact of the placement of the TA on its performance benefits in terms of packet delivery delay. In this paper, we focus on the TA placement problem. We discuss the trade-offs and parameters to be considered to select the best placement for the TA. We first mathematically model the TCP packet delivery delay, that is, the time needed to deliver TCP packets, when the TA is deployed. We also formulate, as an integer linear program (ILP), the problem of placing multiple TAs in order to reduce TCP packet delivery delays while minimizing their deployment costs. We consider use-cases, one where a TA could handle a single flow and another where a TA could handle multiple flows. We then propose two heuristics to solve the problem with minimal execution time. Through experiments, we demonstrated that the deployment of TAs could reduce TCP packet delivery delays by up to 30% and could be leveraged to guide routing and load balancing. Moreover, we show that using the proposed heuristics for placing TAs could lead to performance that is close to the optimal solutions obtained with the ILP but with lower execution time.

到目前为止,传输控制协议(TCP)仍然是Internet中事实上的传输协议。然而,TCP可能会导致高延迟,特别是在重传丢失的数据包时,因为它们必须仅由源重传,并且在大约等于往返时间的超时之后重传。为了减少这种延迟,最近的工作建议部署一种特殊的网络功能,称为传输助理(TA),它能够从网络内部而不是从源检测和重传丢失的TCP数据包,从而减少重传延迟。不幸的是,目前还没有研究TA的位置对其在数据包传递延迟方面的性能效益的影响。在本文中,我们主要研究助教的安置问题。我们讨论了为TA选择最佳位置时要考虑的权衡和参数。我们首先对TCP数据包的传输延迟进行数学建模,即在部署TA时传输TCP数据包所需的时间。我们也制定,作为一个整数线性规划(ILP),放置多个ta的问题,以减少TCP数据包的传递延迟,同时最小化他们的部署成本。我们考虑用例,其中一个是TA可以处理单个流,另一个是TA可以处理多个流。然后,我们提出了两种启发式方法,以最小的执行时间来解决问题。通过实验,我们证明了ta的部署可以将TCP数据包传递延迟减少多达30%,并可以用于指导路由和负载平衡。此外,我们表明,使用提出的启发式方法放置TAs可以导致性能接近用ILP获得的最优解,但执行时间更短。
{"title":"Transport Assistants to Enhance TCP Connections: Investigating the Placement Problem","authors":"Jaime Galán-Jiménez,&nbsp;Mohamed Faten Zhani,&nbsp;José Gómez-delaHiz,&nbsp;John Kaippallimalil","doi":"10.1002/nem.70006","DOIUrl":"https://doi.org/10.1002/nem.70006","url":null,"abstract":"<p>As of today, transport control protocol (TCP) remains the de-facto transport protocol in the Internet. However, TCP may incur high delays, especially when retransmitting lost packets as they have to be retransmitted only by the source and after a timeout that is roughly equal to a round trip time. To reduce such delay, recent work proposed to deploy a special network function, called transport assistant (TA), that is able to detect and retransmit lost TCP packets from inside the network rather than the source and thereby reduces retransmission delays. Unfortunately, there is no study on the impact of the placement of the TA on its performance benefits in terms of packet delivery delay. In this paper, we focus on the TA placement problem. We discuss the trade-offs and parameters to be considered to select the best placement for the TA. We first mathematically model the TCP packet delivery delay, that is, the time needed to deliver TCP packets, when the TA is deployed. We also formulate, as an integer linear program (ILP), the problem of placing multiple TAs in order to reduce TCP packet delivery delays while minimizing their deployment costs. We consider use-cases, one where a TA could handle a single flow and another where a TA could handle multiple flows. We then propose two heuristics to solve the problem with minimal execution time. Through experiments, we demonstrated that the deployment of TAs could reduce TCP packet delivery delays by up to 30% and could be leveraged to guide routing and load balancing. Moreover, we show that using the proposed heuristics for placing TAs could lead to performance that is close to the optimal solutions obtained with the ILP but with lower execution time.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143424217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Security Threats and Defense Mechanisms for 6G Multi-Virtual Network Scenarios 6G多虚拟网络场景下的网络安全威胁及防御机制
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-05 DOI: 10.1002/nem.70003
Yu Zhou

The introduction of 6G networks presents substantial challenges for network security, particularly in multi-virtual network topologies. The combination of network function virtualization (NFV) and software-defined networking (SDN) in 6G is designed to increase scalability and flexibility; nevertheless, these advances complicate network security management. The goal is to identify risks to network security and develop defense solutions for 6G multi-virtual network situations. SDN's virtualized network functions (VNFs) are utilized to provide stateful firewall services that provide scalable and dynamic threat prevention. The SDN controller is critical in developing a set of rules to prevent risky network connectivity and decrease possible risks. 6G multi-virtual network domains—attacking threats that involve different socket addresses so complex that usually applicable protection measures hardly tackle that scenario, machine learning (ML) algorithms, and Intelligent Osprey Optimized Versatile Random Forest (IOO-VRF) model—have been proposed for potentially harmful connection detection and predicting cyber threats accessing the network. Multiple open-access sources can be exploited to gather diverse data for collecting valuable information on studying network traffic and cyber threats. The experimental results indicate that IOO-VRF achieved prediction accuracy comparable to that of other traditional algorithms. The proposed model is assessed on various types of metrics, including accuracy (98%), precision (97.4%), recall (94%), and F1-score (93%). The results emphasized the importance of ML in combination with SDN and NFV for security in the case of resilient, expandable, and flexible security measures for future multi-virtual 6G network communications networks.

6G网络的引入对网络安全提出了重大挑战,特别是在多虚拟网络拓扑结构中。6G网络功能虚拟化(NFV)和软件定义网络(SDN)的结合旨在提高可扩展性和灵活性;然而,这些进步使网络安全管理复杂化。目标是识别网络安全风险,并为6G多虚拟网络情况开发防御解决方案。利用SDN的虚拟化网络功能(VNFs)提供有状态防火墙服务,提供可扩展的动态威胁防护。SDN控制器在制定一套规则以防止有风险的网络连接和降低可能的风险方面至关重要。6G多虚拟网络域-涉及不同套接字地址的攻击威胁非常复杂,通常适用的保护措施很难解决这种情况,机器学习(ML)算法和智能鱼鹰优化通用随机森林(iot - vrf)模型-已被提出用于潜在有害的连接检测和预测访问网络的网络威胁。可以利用多个开放访问源来收集各种数据,以收集研究网络流量和网络威胁的有价值信息。实验结果表明,IOO-VRF的预测精度与其他传统算法相当。所提出的模型通过各种类型的指标进行评估,包括准确率(98%)、精确度(97.4%)、召回率(94%)和f1分数(93%)。研究结果强调了机器学习与SDN和NFV相结合对于未来多虚拟6G网络通信网络具有弹性、可扩展和灵活的安全措施的重要性。
{"title":"Network Security Threats and Defense Mechanisms for 6G Multi-Virtual Network Scenarios","authors":"Yu Zhou","doi":"10.1002/nem.70003","DOIUrl":"https://doi.org/10.1002/nem.70003","url":null,"abstract":"<div>\u0000 \u0000 <p>The introduction of 6G networks presents substantial challenges for network security, particularly in multi-virtual network topologies. The combination of network function virtualization (NFV) and software-defined networking (SDN) in 6G is designed to increase scalability and flexibility; nevertheless, these advances complicate network security management. The goal is to identify risks to network security and develop defense solutions for 6G multi-virtual network situations. SDN's virtualized network functions (VNFs) are utilized to provide stateful firewall services that provide scalable and dynamic threat prevention. The SDN controller is critical in developing a set of rules to prevent risky network connectivity and decrease possible risks. 6G multi-virtual network domains—attacking threats that involve different socket addresses so complex that usually applicable protection measures hardly tackle that scenario, machine learning (ML) algorithms, and Intelligent Osprey Optimized Versatile Random Forest (IOO-VRF) model—have been proposed for potentially harmful connection detection and predicting cyber threats accessing the network. Multiple open-access sources can be exploited to gather diverse data for collecting valuable information on studying network traffic and cyber threats. The experimental results indicate that IOO-VRF achieved prediction accuracy comparable to that of other traditional algorithms. The proposed model is assessed on various types of metrics, including accuracy (98%), precision (97.4%), recall (94%), and F1-score (93%). The results emphasized the importance of ML in combination with SDN and NFV for security in the case of resilient, expandable, and flexible security measures for future multi-virtual 6G network communications networks.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143248506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Application of 6G Network Slicing Driven by Artificial Intelligence in the Internet of Vehicles 人工智能驱动的6G网络切片在车联网中的创新应用
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-05 DOI: 10.1002/nem.70004
Xueqin Ni, Zhiyuan Dong, Xia Rong

The rapid growth of vehicle networks in the Internet of Vehicles (IoV) needs novel approaches to optimizing network resource allocation and enhancing traffic management. Sixth-generation (6G) network slicing, when paired with artificial intelligence (AI), has enormous potential in this field. The purpose of this research is to investigate the use of AI-driven 6G network slicing (NS) for efficient usage of resources and accurate traffic prediction in IoV systems. A unique network design is suggested, combining data-driven approaches and dynamic network slicing. Data are acquired from vehicular sensors and traffic monitoring systems, and log transformation is used to handle exponential growth patterns like vehicle counts and congestion levels. The Fourier transform (FT) is used to extract frequency-domain information from traffic data, which allows for the detection of periodic patterns, trends, and anomalies such as vehicle velocity and traffic density. The Dipper Throated Optimized Efficient Elman Neural Network (DTO-EENN) is used to forecast traffic and optimize resources. This technology allows the system to predict traffic patterns and dynamically alter network slices to ensure optimal resource allocation while reducing latency. The results show that the suggested AI-driven NS technique increases forecast accuracy and network performance while dramatically reducing congestion levels. The research indicates that AI-driven 6G based NS offers a solid framework for optimizing IoV performance.

随着车联网的快速发展,需要新的方法来优化网络资源配置和加强交通管理。第六代(6G)网络切片与人工智能(AI)相结合,在这一领域具有巨大的潜力。本研究的目的是研究人工智能驱动的6G网络切片(NS)在车联网系统中用于有效利用资源和准确的流量预测的使用。结合数据驱动方法和动态网络切片,提出了一种独特的网络设计。数据从车载传感器和交通监控系统获取,日志转换用于处理车辆数量和拥堵程度等指数增长模式。傅里叶变换(FT)用于从交通数据中提取频域信息,这允许检测周期性模式,趋势和异常,如车辆速度和交通密度。采用dip -喉优化高效Elman神经网络(DTO-EENN)进行流量预测和资源优化。该技术允许系统预测流量模式并动态更改网络切片,以确保最佳资源分配,同时减少延迟。结果表明,建议的ai驱动的NS技术提高了预测准确性和网络性能,同时显着降低了拥塞水平。研究表明,基于人工智能驱动的6G网络为优化车联网性能提供了坚实的框架。
{"title":"Innovative Application of 6G Network Slicing Driven by Artificial Intelligence in the Internet of Vehicles","authors":"Xueqin Ni,&nbsp;Zhiyuan Dong,&nbsp;Xia Rong","doi":"10.1002/nem.70004","DOIUrl":"https://doi.org/10.1002/nem.70004","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid growth of vehicle networks in the Internet of Vehicles (IoV) needs novel approaches to optimizing network resource allocation and enhancing traffic management. Sixth-generation (6G) network slicing, when paired with artificial intelligence (AI), has enormous potential in this field. The purpose of this research is to investigate the use of AI-driven 6G network slicing (NS) for efficient usage of resources and accurate traffic prediction in IoV systems. A unique network design is suggested, combining data-driven approaches and dynamic network slicing. Data are acquired from vehicular sensors and traffic monitoring systems, and log transformation is used to handle exponential growth patterns like vehicle counts and congestion levels. The Fourier transform (FT) is used to extract frequency-domain information from traffic data, which allows for the detection of periodic patterns, trends, and anomalies such as vehicle velocity and traffic density. The Dipper Throated Optimized Efficient Elman Neural Network (DTO-EENN) is used to forecast traffic and optimize resources. This technology allows the system to predict traffic patterns and dynamically alter network slices to ensure optimal resource allocation while reducing latency. The results show that the suggested AI-driven NS technique increases forecast accuracy and network performance while dramatically reducing congestion levels. The research indicates that AI-driven 6G based NS offers a solid framework for optimizing IoV performance.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143248507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time-Sensitive Networks SDOG:工业时间敏感网络中基于动态在线分组的可伸缩流调度
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-30 DOI: 10.1002/nem.70001
Chang Liu, Jin Wang, Chang Liu Sr, Jie Wang, Li Tian, Xiao Yu, Min Wei

Although many studies have conducted the traffic scheduling of time-sensitive networks, most focus on small-scale static scheduling for specific scenarios, which cannot cope with dynamic and rapid scheduling of time-triggered (TT) flows generated in scalable scenarios in the Industrial Internet of Things. In this paper, we propose a Scalable TT flow scheduling method based on Dynamic Online Grouping in industrial time-sensitive networks (SDOG). To achieve that, we establish an undirected weighted flow graph based on the conflict index between TT flows and divide available time into equally spaced time windows. We dynamically group the TT flows within each window locally. When the number of flows to be scheduled doubles, we can achieve scalable and efficient solutions to efficiently schedule dynamic TT flows, avoiding unnecessary conflicts during data communication. In addition, a topology pruning strategy is adopted to prune the network topology of each group, reducing unnecessary link variables and further effectively shortening the scheduling time. Experimental results validated our expected performance and demonstrated that our proposed SDOG scheduling method has advantages in terms of overall traffic schedulability and average time for scheduling individual traffic.

虽然已有很多研究对时间敏感网络的流量调度进行了研究,但大多是针对特定场景的小规模静态调度,无法应对工业物联网中可扩展场景中产生的时间触发(TT)流的动态快速调度。本文提出了一种基于工业时间敏感网络动态在线分组的可扩展TT流调度方法。为了实现这一目标,我们基于TT流之间的冲突指数建立了无向加权流图,并将可用时间划分为等间隔的时间窗。我们在本地对每个窗口内的TT流进行动态分组。当要调度的流数量增加一倍时,我们可以实现可扩展的高效解决方案,以高效地调度动态TT流,避免数据通信过程中不必要的冲突。此外,采用拓扑剪枝策略对各组的网络拓扑进行剪枝,减少不必要的链路变量,进一步有效缩短调度时间。实验结果验证了我们的预期性能,并证明了我们提出的SDOG调度方法在整体交通可调度性和调度单个交通的平均时间方面具有优势。
{"title":"SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time-Sensitive Networks","authors":"Chang Liu,&nbsp;Jin Wang,&nbsp;Chang Liu Sr,&nbsp;Jie Wang,&nbsp;Li Tian,&nbsp;Xiao Yu,&nbsp;Min Wei","doi":"10.1002/nem.70001","DOIUrl":"https://doi.org/10.1002/nem.70001","url":null,"abstract":"<div>\u0000 \u0000 <p>Although many studies have conducted the traffic scheduling of time-sensitive networks, most focus on small-scale static scheduling for specific scenarios, which cannot cope with dynamic and rapid scheduling of time-triggered (TT) flows generated in scalable scenarios in the Industrial Internet of Things. In this paper, we propose a Scalable TT flow scheduling method based on Dynamic Online Grouping in industrial time-sensitive networks (SDOG). To achieve that, we establish an undirected weighted flow graph based on the conflict index between TT flows and divide available time into equally spaced time windows. We dynamically group the TT flows within each window locally. When the number of flows to be scheduled doubles, we can achieve scalable and efficient solutions to efficiently schedule dynamic TT flows, avoiding unnecessary conflicts during data communication. In addition, a topology pruning strategy is adopted to prune the network topology of each group, reducing unnecessary link variables and further effectively shortening the scheduling time. Experimental results validated our expected performance and demonstrated that our proposed SDOG scheduling method has advantages in terms of overall traffic schedulability and average time for scheduling individual traffic.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143121256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1