首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
Data sharing mode of dispatching automation system based on distributed machine learning 基于分布式机器学习的调度自动化系统数据共享模式
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2024-04-09 DOI: 10.1002/nem.2269
Xiaoli He, Mi Luo, Yurui Hu, Feng Xiong
The difficulties of sending massive amounts of data between several data centres are examined in this work, with particular attention paid to how poorly current scheduling algorithms handle point‐to‐multipoint transfers and transmission time limits. In this research, a new method called multicast source‐based tree (MSBT) is proposed for effectively handling point‐to‐multipoint transmissions in a certain amount of time. By allowing receivers to simultaneously receive data from several source points, MSBT introduces the idea of ‘source selection’ for the creation of multicast tree structure‐based algorithms. Large data blocks are distributed as efficiently as possible using this method, which also guarantees effective transmission from a single‐source point to several recipient locations. Furthermore covered in the article is how PV producers and sellers' capacity allocation is affected by the discount rate. These results offer insightful information on how decisions are made in related sectors. The development of new energy big data platforms underscores their significance; leaders in the industry, like United Power, Vision Energy and Goldwind, serve as prime examples.
本研究探讨了在多个数据中心之间发送海量数据的困难,尤其关注了当前调度算法在处理点对多点传输和传输时间限制方面的不足。这项研究提出了一种名为基于组播源的树 (MSBT) 的新方法,可在一定时间内有效处理点对多点传输。MSBT 允许接收器同时接收来自多个源点的数据,为创建基于组播树结构的算法引入了 "源选择 "的理念。使用这种方法可以尽可能高效地分发大数据块,同时还能保证从单个源点到多个接收点的有效传输。此外,文章还介绍了光伏生产商和销售商的容量分配如何受到贴现率的影响。这些结果为相关部门如何做出决策提供了有洞察力的信息。新能源大数据平台的发展凸显了其重要性;联合动力、远景能源和金风科技等行业领先企业就是最好的例子。
{"title":"Data sharing mode of dispatching automation system based on distributed machine learning","authors":"Xiaoli He, Mi Luo, Yurui Hu, Feng Xiong","doi":"10.1002/nem.2269","DOIUrl":"https://doi.org/10.1002/nem.2269","url":null,"abstract":"The difficulties of sending massive amounts of data between several data centres are examined in this work, with particular attention paid to how poorly current scheduling algorithms handle point‐to‐multipoint transfers and transmission time limits. In this research, a new method called multicast source‐based tree (MSBT) is proposed for effectively handling point‐to‐multipoint transmissions in a certain amount of time. By allowing receivers to simultaneously receive data from several source points, MSBT introduces the idea of ‘source selection’ for the creation of multicast tree structure‐based algorithms. Large data blocks are distributed as efficiently as possible using this method, which also guarantees effective transmission from a single‐source point to several recipient locations. Furthermore covered in the article is how PV producers and sellers' capacity allocation is affected by the discount rate. These results offer insightful information on how decisions are made in related sectors. The development of new energy big data platforms underscores their significance; leaders in the industry, like United Power, Vision Energy and Goldwind, serve as prime examples.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"13 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140603077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic mobility and handover management in software-defined networking-based fifth-generation heterogeneous networks 基于软件定义网络的第五代异构网络中的动态移动性和切换管理
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2024-03-28 DOI: 10.1002/nem.2268
Adil Khan, Shabeer Ahmad, Ihsan Ali, Babar Hayat, Yanan Tian, Weixing Liu
The adoption and application of mobile communication technology have rapidly escalated, leading to a significant upsurge in the demand of data traffic. Ultra-densification stands as one of the network solutions within the realm of 5G and beyond technologies, aimed to enhance data rates and network capacity. Heterogeneous networks (HetNets) are deployed with different types of small cells (SCs) in mobile networks to provide high capacity, data rate, throughput, and low latency communication. HetNet solves the problem of network densification at the expense of mobility management problems such as ping-pong handover, unnecessary handovers, handover delay, and cell load. This paper introduces an enhanced optimal cell selection technique employing software-defined networking (SDN) to tackle the challenges of handover and mobility management in 5G and beyond 5G (B5G) HetNet. The proposed SDN-based cell selection scheme leverages linear programming (LP) to manage the mobility of users dynamically, facilitating the selection of the optimal cell for user equipment (UE) handover. This selection is based on multi-attribute decision-making criteria, which include user direction, received signal strength (RSS) value, cell load, and dwell time. By applying LP, computational overhead during cell selection is significantly reduced. The results indicate that the proposed scheme leads to a 39% reduction in number of handovers. This reduction signifies a substantial advancement in mitigating issues associated with frequent and unnecessary handovers, ultimately leading to minimized signaling overhead between UE and cells. Moreover, the proposed solution outperformed the existing scheme in terms of system's throughput and selects an optimal target cell with a lower cell load.
移动通信技术的采用和应用迅速升级,导致数据流量需求大幅飙升。超密集化是 5G 及更先进技术领域的网络解决方案之一,旨在提高数据传输速率和网络容量。异构网络(HetNets)在移动网络中部署了不同类型的小蜂窝(SC),以提供高容量、数据速率、吞吐量和低延迟通信。HetNet 以移动性管理问题为代价解决了网络密集化问题,这些问题包括乒乓式切换、不必要的切换、切换延迟和小区负载。本文介绍了一种采用软件定义网络(SDN)的增强型优化小区选择技术,以应对 5G 和 5G 以上(B5G)HetNet 中的切换和移动性管理挑战。所提出的基于 SDN 的小区选择方案利用线性规划(LP)来动态管理用户的移动性,从而促进为用户设备(UE)切换选择最佳小区。这种选择基于多属性决策标准,包括用户方向、接收信号强度(RSS)值、小区负荷和停留时间。通过应用 LP,小区选择过程中的计算开销大大减少。结果表明,所提出的方案可将切换次数减少 39%。这一减少标志着在缓解与频繁和不必要的切换相关的问题方面取得了重大进展,最终使 UE 和小区之间的信令开销降至最低。此外,所提出的解决方案在系统吞吐量方面优于现有方案,并能选择具有较低小区负荷的最佳目标小区。
{"title":"Dynamic mobility and handover management in software-defined networking-based fifth-generation heterogeneous networks","authors":"Adil Khan, Shabeer Ahmad, Ihsan Ali, Babar Hayat, Yanan Tian, Weixing Liu","doi":"10.1002/nem.2268","DOIUrl":"https://doi.org/10.1002/nem.2268","url":null,"abstract":"The adoption and application of mobile communication technology have rapidly escalated, leading to a significant upsurge in the demand of data traffic. Ultra-densification stands as one of the network solutions within the realm of 5G and beyond technologies, aimed to enhance data rates and network capacity. Heterogeneous networks (HetNets) are deployed with different types of small cells (SCs) in mobile networks to provide high capacity, data rate, throughput, and low latency communication. HetNet solves the problem of network densification at the expense of mobility management problems such as ping-pong handover, unnecessary handovers, handover delay, and cell load. This paper introduces an enhanced optimal cell selection technique employing software-defined networking (SDN) to tackle the challenges of handover and mobility management in 5G and beyond 5G (B5G) HetNet. The proposed SDN-based cell selection scheme leverages linear programming (LP) to manage the mobility of users dynamically, facilitating the selection of the optimal cell for user equipment (UE) handover. This selection is based on multi-attribute decision-making criteria, which include user direction, received signal strength (RSS) value, cell load, and dwell time. By applying LP, computational overhead during cell selection is significantly reduced. The results indicate that the proposed scheme leads to a 39% reduction in number of handovers. This reduction signifies a substantial advancement in mitigating issues associated with frequent and unnecessary handovers, ultimately leading to minimized signaling overhead between UE and cells. Moreover, the proposed solution outperformed the existing scheme in terms of system's throughput and selects an optimal target cell with a lower cell load.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"45 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140324443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Athena: Smart order routing on centralized crypto exchanges using a unified order book 雅典娜:使用统一订单簿在集中式加密货币交易所进行智能订单路由选择
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-26 DOI: 10.1002/nem.2266
Robert Henker, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel, Jürgen Döllner, Markus Bick

Most cryptocurrency spot trading occurs on centralized crypto exchanges, where offers for buying and selling are organized via an order book. In liquid markets, the price achieved for buying and selling deviates only slightly from the assumed reference price, that is, trading is associated with low implicit costs. However, compared to traditional finance, crypto markets are still illiquid, and consequently, the reduction of implicit costs is crucial for any trading strategy and of high interest, especially for institutional investors. This paper describes the design and implementation of Athena, a system that automatically splits orders across multiple exchanges to minimize implicit costs. For this purpose, order books are collected from several centralized crypto exchanges and merged into an internal unified order book. In addition to price and quantity, the entries in the unified order book are enriched with information about the exchange. This enables a smart order routing algorithm to split an order into several slices and execute these on several exchanges to reduce implicit costs and achieve a better price. An extensive evaluation shows the savings of using the smart order routing algorithm.

摘要大多数加密货币现货交易都是在集中式加密货币交易所进行的,交易所通过订单簿组织买卖报价。在流动性高的市场中,买卖价格与假定参考价格的偏差很小,也就是说,交易的隐性成本很低。然而,与传统金融相比,加密货币市场仍然缺乏流动性,因此,降低隐性成本对任何交易策略都至关重要,尤其是对机构投资者而言,更是如此。本文介绍了雅典娜(Athena)系统的设计与实现,该系统可在多个交易所之间自动拆分订单,以最大限度地降低隐性成本。为此,我们从多个集中式加密货币交易所收集订单簿,并将其合并为内部统一订单簿。除了价格和数量外,统一订单簿中的条目还丰富了交易所的信息。这样,智能订单路由算法就能将订单分割成多个片段,并在多个交易所执行,从而降低隐含成本,获得更好的价格。一项广泛的评估显示,使用智能订单路由算法可以节省成本。
{"title":"Athena: Smart order routing on centralized crypto exchanges using a unified order book","authors":"Robert Henker,&nbsp;Daniel Atzberger,&nbsp;Jan Ole Vollmer,&nbsp;Willy Scheibel,&nbsp;Jürgen Döllner,&nbsp;Markus Bick","doi":"10.1002/nem.2266","DOIUrl":"10.1002/nem.2266","url":null,"abstract":"<p>Most cryptocurrency spot trading occurs on centralized crypto exchanges, where offers for buying and selling are organized via an order book. In liquid markets, the price achieved for buying and selling deviates only slightly from the assumed reference price, that is, trading is associated with low implicit costs. However, compared to traditional finance, crypto markets are still illiquid, and consequently, the reduction of implicit costs is crucial for any trading strategy and of high interest, especially for institutional investors. This paper describes the design and implementation of Athena, a system that automatically splits orders across multiple exchanges to minimize implicit costs. For this purpose, order books are collected from several centralized crypto exchanges and merged into an internal unified order book. In addition to price and quantity, the entries in the unified order book are enriched with information about the exchange. This enables a smart order routing algorithm to split an order into several slices and execute these on several exchanges to reduce implicit costs and achieve a better price. An extensive evaluation shows the savings of using the smart order routing algorithm.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2266","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140314422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Out-of-band transaction pool sync for large dynamic blockchain networks 大型动态区块链网络的带外交易池同步
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-24 DOI: 10.1002/nem.2265
Novak Boskov, Xingyu Chen, Sevval Simsek, Ari Trachtenberg, David Starobinski

Synchronization of transaction pools (mempools) has shown potential for improving the performance and block propagation delay of state-of-the-art blockchains. Indeed, various heuristics have been proposed in the literature to incorporate early exchanges of unconfirmed transactions into the block propagation protocol. In this work, we take a different approach, maintaining transaction synchronization externally (and independently) of the block propagation channel. In the process, we formalize the synchronization problem within a graph theoretic framework and introduce a novel algorithm (SREPset reconciliation-enhanced propagation) with quantifiable guarantees. We analyze the algorithm's performance for various realistic network topologies and show that it converges on static connected graphs in a time bounded by the diameter of the graph. In graphs with dynamic edges, SREP converges in an expected time that is linear in the number of nodes. We confirm our analytical findings through extensive simulations that include comparisons with MempoolSync, a recent approach from the literature. Our simulations show that SREP incurs reasonable bandwidth overhead and scales gracefully with the size of the network (unlike MempoolSync).

交易池(mempool)的同步化已显示出改善最先进区块链性能和区块传播延迟的潜力。事实上,文献中已经提出了各种启发式方法,将未确认交易的早期交换纳入区块传播协议。在这项工作中,我们采用了一种不同的方法,在区块传播通道之外(独立于区块传播通道)保持交易同步。在此过程中,我们在图论框架内对同步问题进行了形式化,并引入了一种具有可量化保证的新型算法(SREP 集调和增强传播)。我们分析了该算法在各种现实网络拓扑中的性能,结果表明它在静态连接图上的收敛时间与图的直径成正比。在有动态边的图中,SREP 的收敛时间与节点数呈线性关系。我们通过大量仿真证实了我们的分析结果,其中包括与文献中最新方法 MempoolSync 的比较。我们的模拟结果表明,SREP 会产生合理的带宽开销,并能随着网络规模的增大而优雅地扩展(与 MempoolSync 不同)。
{"title":"Out-of-band transaction pool sync for large dynamic blockchain networks","authors":"Novak Boskov,&nbsp;Xingyu Chen,&nbsp;Sevval Simsek,&nbsp;Ari Trachtenberg,&nbsp;David Starobinski","doi":"10.1002/nem.2265","DOIUrl":"10.1002/nem.2265","url":null,"abstract":"<p>Synchronization of transaction pools (<i>mempools</i>) has shown potential for improving the performance and block propagation delay of state-of-the-art blockchains. Indeed, various heuristics have been proposed in the literature to incorporate early exchanges of <i>unconfirmed</i> transactions into the block propagation protocol. In this work, we take a different approach, maintaining transaction synchronization externally (and independently) of the block propagation channel. In the process, we formalize the synchronization problem within a graph theoretic framework and introduce a novel algorithm (<i>SREP</i>—<i>set reconciliation-enhanced propagation</i>) with quantifiable guarantees. We analyze the algorithm's performance for various realistic network topologies and show that it converges on static connected graphs in a time bounded by the diameter of the graph. In graphs with dynamic edges, <i>SREP</i> converges in an expected time that is linear in the number of nodes. We confirm our analytical findings through extensive simulations that include comparisons with <i>MempoolSync</i>, a recent approach from the literature. Our simulations show that <i>SREP</i> incurs reasonable bandwidth overhead and scales gracefully with the size of the network (unlike <i>MempoolSync</i>).</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140300514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A security-enhanced equipment predictive maintenance solution for the ETO manufacturing 针对 ETO 制造业的安全增强型设备预测性维护解决方案
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-17 DOI: 10.1002/nem.2263
Xiangyu Cao, Zhengjun Jing, Xiaorong Zhao, Xiaolong Xu

With the rapid advancement of intelligent manufacturing, ensuring equipment safety has become a crucial prerequisite for enterprise production. In the engineer-to-order (ETO) production mode, characterized by diverse equipment types and frequent adjustments in production lines, equipment maintenance has become increasingly complex. Traditional maintenance plans are no longer adequate to meet the evolving demands of equipment maintenance. This paper proposes a security-enhanced predictive maintenance scheme specifically designed for ETO-type production equipment. The scheme utilizes industrial Internet of Things (IIoT) technology to monitor machines and equipment, constructs prediction models using machine learning methods, and reinforces the security of the prediction system through adoption of a decentralized architecture with blockchain distributed storage. In this experiment, six supervised learning models were compared, and it was found that the model based on the random forest algorithm achieved an outstanding accuracy rate of 98.88%. Furthermore, the average total response time for generating predictions within the system is 2.0 s, demonstrating a performance suitable for practical equipment maintenance applications.

随着智能制造的快速发展,确保设备安全已成为企业生产的重要前提。在按订单生产(ETO)模式下,设备类型多样,生产线调整频繁,设备维护变得日益复杂。传统的维护计划已无法满足不断发展的设备维护需求。本文提出了一种专为 ETO 型生产设备设计的安全增强型预测性维护方案。该方案利用工业物联网(IIoT)技术监控机器设备,使用机器学习方法构建预测模型,并通过采用区块链分布式存储的去中心化架构来加强预测系统的安全性。本实验比较了六种监督学习模型,发现基于随机森林算法的模型准确率高达 98.88%,表现出色。此外,系统内生成预测的平均总响应时间为 2.0 秒,表现出适合实际设备维护应用的性能。
{"title":"A security-enhanced equipment predictive maintenance solution for the ETO manufacturing","authors":"Xiangyu Cao,&nbsp;Zhengjun Jing,&nbsp;Xiaorong Zhao,&nbsp;Xiaolong Xu","doi":"10.1002/nem.2263","DOIUrl":"10.1002/nem.2263","url":null,"abstract":"<div>\u0000 \u0000 <p>With the rapid advancement of intelligent manufacturing, ensuring equipment safety has become a crucial prerequisite for enterprise production. In the engineer-to-order (ETO) production mode, characterized by diverse equipment types and frequent adjustments in production lines, equipment maintenance has become increasingly complex. Traditional maintenance plans are no longer adequate to meet the evolving demands of equipment maintenance. This paper proposes a security-enhanced predictive maintenance scheme specifically designed for ETO-type production equipment. The scheme utilizes industrial Internet of Things (IIoT) technology to monitor machines and equipment, constructs prediction models using machine learning methods, and reinforces the security of the prediction system through adoption of a decentralized architecture with blockchain distributed storage. In this experiment, six supervised learning models were compared, and it was found that the model based on the random forest algorithm achieved an outstanding accuracy rate of 98.88%. Furthermore, the average total response time for generating predictions within the system is 2.0 s, demonstrating a performance suitable for practical equipment maintenance applications.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139946551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IGXSS: XSS payload detection model based on inductive GCN IGXSS:基于感应式 GCN 的 XSS 有效载荷检测模型
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-11 DOI: 10.1002/nem.2264
Qiuhua Wang, Chuangchuang Li, Dong Wang, Lifeng Yuan, Gaoning Pan, Yanyu Cheng, Mingde Hu, Yizhi Ren

To facilitate the management, Internet of Things (IoT) vendors usually apply remote ways such as HTTP services to uniformly manage IoT devices, leading to traditional web application vulnerabilities that also endanger the cloud interfaces of IoT, such as cross-site scripting (XSS), code injection, and Remote Command/Code Execute (RCE). XSS is one of the most common web application attacks, which allows the attacker to obtain private user information or attack IoT devices and IoT cloud platforms. Most of the existing XSS payload detection models are based on machine learning or deep learning, which usually require a lot of external resources, such as pretrained word vectors, to achieve a better performance on unknown samples. But in the field of XSS payload detection, high-quality vector representations of samples are often difficult to obtain. In addition, existing models all perform substantially worse when the distribution of XSS payloads and benign samples in the test dataset is extremely unbalanced (e.g., XSS payloads: benign samples = 1: 20). While in the real XSS attack scenario against IoT, an XSS payload is often hidden in a massive amount of normal user requests, indicating that these models are not practical. In response to the above issues, we propose an XSS payload detection model based on inductive graph neural networks, IGXSS (XSS payload detection model based on inductive GCN), to detect XSS payloads targeting IoT. Firstly, we treat the samples and words obtained from segmenting the samples as nodes and attach lines between them in order to form a graph. Then, we obtain the feature matrix of nodes and edges utilizing information between nodes only (instead of external resources such as pretrained word vectors). Finally, we feed the obtained feature matrix into a two-layer GCN for training and validate the performance of models in several datasets with different sample distributions. Extensive experiments on the real datasets show that IGXSS performs better compared to other models under various sample distributions. In particular, when the sample distribution is extremely unbalanced, the recall and F1 score of IGXSS still reach 1.000 and 0.846, demonstrating that IGXSS is more robust and more suitable for practical scenarios.

为方便管理,物联网(IoT)厂商通常采用 HTTP 服务等远程方式统一管理物联网设备,导致传统的 Web 应用程序漏洞也危及物联网云接口,如跨站脚本(XSS)、代码注入和远程命令/代码执行(RCE)等。XSS 是最常见的网络应用程序攻击之一,攻击者可借此获取用户隐私信息或攻击物联网设备和物联网云平台。现有的 XSS 有效载荷检测模型大多基于机器学习或深度学习,通常需要大量外部资源(如预训练的词向量)才能在未知样本上取得更好的性能。但在 XSS 有效载荷检测领域,通常很难获得高质量的样本向量表示。此外,当测试数据集中 XSS 有效载荷和良性样本的分布极不平衡时(例如,XSS 有效载荷:良性样本 = 1:20),现有模型的性能都会大大降低。而在针对物联网的真实 XSS 攻击场景中,XSS 有效载荷往往隐藏在大量正常用户请求中,这表明这些模型并不实用。针对上述问题,我们提出了一种基于归纳图神经网络的 XSS 有效载荷检测模型 IGXSS(基于归纳图神经网络的 XSS 有效载荷检测模型),用于检测针对物联网的 XSS 有效载荷。首先,我们将样本和样本分割后得到的单词视为节点,并在它们之间添加线段以形成图。然后,我们仅利用节点之间的信息(而不是预训练词向量等外部资源)获得节点和边的特征矩阵。最后,我们将获得的特征矩阵输入双层 GCN 进行训练,并在多个具有不同样本分布的数据集上验证模型的性能。在真实数据集上进行的大量实验表明,IGXSS 在各种样本分布情况下的表现都优于其他模型。特别是在样本分布极不平衡的情况下,IGXSS 的召回率和 F1 得分仍能达到 1.000 和 0.846,这表明 IGXSS 更稳健,更适合实际应用场景。
{"title":"IGXSS: XSS payload detection model based on inductive GCN","authors":"Qiuhua Wang,&nbsp;Chuangchuang Li,&nbsp;Dong Wang,&nbsp;Lifeng Yuan,&nbsp;Gaoning Pan,&nbsp;Yanyu Cheng,&nbsp;Mingde Hu,&nbsp;Yizhi Ren","doi":"10.1002/nem.2264","DOIUrl":"10.1002/nem.2264","url":null,"abstract":"<p>To facilitate the management, Internet of Things (IoT) vendors usually apply remote ways such as HTTP services to uniformly manage IoT devices, leading to traditional web application vulnerabilities that also endanger the cloud interfaces of IoT, such as cross-site scripting (XSS), code injection, and Remote Command/Code Execute (RCE). XSS is one of the most common web application attacks, which allows the attacker to obtain private user information or attack IoT devices and IoT cloud platforms. Most of the existing XSS payload detection models are based on machine learning or deep learning, which usually require a lot of external resources, such as pretrained word vectors, to achieve a better performance on unknown samples. But in the field of XSS payload detection, high-quality vector representations of samples are often difficult to obtain. In addition, existing models all perform substantially worse when the distribution of XSS payloads and benign samples in the test dataset is extremely unbalanced (e.g., XSS payloads: benign samples = 1: 20). While in the real XSS attack scenario against IoT, an XSS payload is often hidden in a massive amount of normal user requests, indicating that these models are not practical. In response to the above issues, we propose an XSS payload detection model based on inductive graph neural networks, IGXSS (XSS payload detection model based on inductive GCN), to detect XSS payloads targeting IoT. Firstly, we treat the samples and words obtained from segmenting the samples as nodes and attach lines between them in order to form a graph. Then, we obtain the feature matrix of nodes and edges utilizing information between nodes only (instead of external resources such as pretrained word vectors). Finally, we feed the obtained feature matrix into a two-layer GCN for training and validate the performance of models in several datasets with different sample distributions. Extensive experiments on the real datasets show that IGXSS performs better compared to other models under various sample distributions. In particular, when the sample distribution is extremely unbalanced, the recall and F1 score of IGXSS still reach 1.000 and 0.846, demonstrating that IGXSS is more robust and more suitable for practical scenarios.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139773683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing the propagation delay of compact block in Bitcoin network 减少紧凑型区块在比特币网络中的传播延迟
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2024-01-25 DOI: 10.1002/nem.2262
Aeri Kim, Meryam Essaid, Sejin Park, Hongtaek Ju

Bitcoin is a Blockchain-based network in which thousands of nodes are directly connected and communicate via a gossip-based flooding protocol. Mined blocks are propagated to all participating nodes in the network through a CBR (compact block relay) protocol developed to reduce the block propagation delay. However, propagation delay persists. The relay time between nodes must be measured and analyzed to determine the cause of the delay and provide solutions for reducing block propagation time. Previously, we measured the relay time and investigated the cause of the delay. According to the findings of the previous study, the delay of the relay time occurs when assembling compact blocks, depending on whether transactions are requested. In this paper, we find the reasons for requesting transactions. The reasons are due to the transaction propagation method and the characteristics of the transaction itself. We propose a solution based on this. It is a method of reducing probability of requesting transactions by using the compact block's “PREFILLEDTXN” to send the transactions expected to be requested with the block. The probability of requesting is reduced by up to 67% when transactions that have just entered the memory pool are propagated by PREFILLEDTXN. The block relay time is reduced by up to 44% as a result. Finally, this research reduces block relay time between nodes.

比特币是一个基于区块链的网络,在这个网络中,成千上万的节点直接相连,并通过基于流言的泛洪协议进行通信。挖出的区块通过 CBR(紧凑型区块中继)协议传播到网络中的所有参与节点,以减少区块传播延迟。然而,传播延迟依然存在。必须测量和分析节点之间的中继时间,以确定延迟的原因,并提供缩短区块传播时间的解决方案。此前,我们测量了中继时间,并调查了延迟的原因。根据之前的研究结果,中继时间的延迟发生在组装紧凑块时,取决于是否有事务请求。在本文中,我们找到了请求事务的原因。原因在于事务传播方式和事务本身的特性。在此基础上,我们提出了一种解决方案。这是一种通过使用紧凑区块的 "PREFILLEDTXN "来发送预计与该区块一起被请求的事务,从而降低请求事务概率的方法。通过 PREFILLEDTXN 传播刚进入内存池的事务时,请求概率最多可降低 67%。因此,区块中继时间最多可减少 44%。最后,这项研究缩短了节点之间的区块中继时间。
{"title":"Reducing the propagation delay of compact block in Bitcoin network","authors":"Aeri Kim,&nbsp;Meryam Essaid,&nbsp;Sejin Park,&nbsp;Hongtaek Ju","doi":"10.1002/nem.2262","DOIUrl":"10.1002/nem.2262","url":null,"abstract":"<div>\u0000 \u0000 <p>Bitcoin is a Blockchain-based network in which thousands of nodes are directly connected and communicate via a gossip-based flooding protocol. Mined blocks are propagated to all participating nodes in the network through a CBR (compact block relay) protocol developed to reduce the block propagation delay. However, propagation delay persists. The relay time between nodes must be measured and analyzed to determine the cause of the delay and provide solutions for reducing block propagation time. Previously, we measured the relay time and investigated the cause of the delay. According to the findings of the previous study, the delay of the relay time occurs when assembling compact blocks, depending on whether transactions are requested. In this paper, we find the reasons for requesting transactions. The reasons are due to the transaction propagation method and the characteristics of the transaction itself. We propose a solution based on this. It is a method of reducing probability of requesting transactions by using the compact block's “PREFILLEDTXN” to send the transactions expected to be requested with the block. The probability of requesting is reduced by up to 67% when transactions that have just entered the memory pool are propagated by PREFILLEDTXN. The block relay time is reduced by up to 44% as a result. Finally, this research reduces block relay time between nodes.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139590560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity 更深入:针对低交易量代币的共享流动性去中心化交易所设计,以提高平均流动性
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-17 DOI: 10.1002/nem.2261
Srisht Fateh Singh, Panagiotis Michalopoulos, Andreas Veneris

This paper presents Deeper, a design for a decentralized exchange that enhances liquidity via reserve sharing. By doing this, it addresses the problem of shallow liquidity in low trading volume token pairs. Shallow liquidity impairs the functioning of on-chain markets by creating room for unwanted phenomena such as high slippage and sandwich attacks. Deeper solves this by allowing liquidity providers of multiple trading pairs against a common token to share liquidity. This is achieved by creating a common reserve pool for the shared token that is accessible by each trading pair. Independent from the shared liquidity, providers are free to add liquidity to individual token pairs without any restriction. The trading between one token pair does not affect the price of other token pairs even though the reserve of the shared token changes. The proposed design is an extension of concentrated liquidity automated market maker DEXs that is simple enough to be implemented on smart contracts. This is demonstrated by providing a template for a hook-based smart contract that adds our custom functionality to Uniswap V4. Experiments on historical prices show that for a batch consisting of eight trading pairs, Deeper enhances liquidity by over 2.6–5.9×. The enhancement in liquidity can be increased further by increasing the participating tokens in the shared pool. While providing shared liquidity, liquidity providers should be cautious of certain risks and pitfalls, which are described. Overall, Deeper enables the creation of fair markets for low trading volume token pairs.

本文介绍的 Deeper 是一种去中心化交易所的设计,它通过储备金共享来提高流动性。通过这种方式,它可以解决低交易量代币对的浅层流动性问题。浅层流动性为高滑点和三明治攻击等不必要的现象创造了空间,从而损害了链上市场的运作。Deeper 允许针对共同代币的多个交易对的流动性提供者共享流动性,从而解决了这一问题。这是通过为共享代币创建一个每个交易对都能访问的共同储备池来实现的。独立于共享流动性,流动性提供者可以自由地为单个代币对增加流动性,不受任何限制。即使共享代币的储备发生变化,一个代币对之间的交易也不会影响其他代币对的价格。所提出的设计是集中流动性自动做市商 DEX 的扩展,简单得足以在智能合约上实现。我们提供了一个基于钩子的智能合约模板,将我们的定制功能添加到 Uniswap V4 中,从而证明了这一点。对历史价格的实验表明,对于由 8 个交易对组成的批量交易,Deeper 可将流动性提高 2.6-5.9×$$ 5.9/times $$。通过增加共享池中的参与代币,可以进一步提高流动性。在提供共享流动性的同时,流动性提供者应谨慎对待某些风险和陷阱,下文将对此进行介绍。总体而言,Deeper 能够为低交易量的代币对创建公平的市场。
{"title":"Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity","authors":"Srisht Fateh Singh,&nbsp;Panagiotis Michalopoulos,&nbsp;Andreas Veneris","doi":"10.1002/nem.2261","DOIUrl":"10.1002/nem.2261","url":null,"abstract":"<p>This paper presents <span>Deeper</span>, a design for a decentralized exchange that enhances liquidity via reserve sharing. By doing this, it addresses the problem of shallow liquidity in low trading volume token pairs. Shallow liquidity impairs the functioning of on-chain markets by creating room for unwanted phenomena such as high slippage and sandwich attacks. <span>Deeper</span> solves this by allowing liquidity providers of multiple trading pairs against a common token to share liquidity. This is achieved by creating a common reserve pool for the shared token that is accessible by each trading pair. Independent from the shared liquidity, providers are free to add liquidity to individual token pairs without any restriction. The trading between one token pair does not affect the price of other token pairs even though the reserve of the shared token changes. The proposed design is an extension of concentrated liquidity automated market maker DEXs that is simple enough to be implemented on smart contracts. This is demonstrated by providing a template for a hook-based smart contract that adds our custom functionality to <span>Uniswap V4</span>. Experiments on historical prices show that for a batch consisting of eight trading pairs, <span>Deeper</span> enhances liquidity by over 2.6–\u0000<span></span><math>\u0000 <mn>5</mn>\u0000 <mo>.</mo>\u0000 <mn>9</mn>\u0000 <mo>×</mo></math>. The enhancement in liquidity can be increased further by increasing the participating tokens in the shared pool. While providing shared liquidity, liquidity providers should be cautious of certain risks and pitfalls, which are described. Overall, <span>Deeper</span> enables the creation of fair markets for low trading volume token pairs.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2261","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139498570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The next phase of identifying illicit activity in Bitcoin 识别比特币非法活动的下一阶段
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-15 DOI: 10.1002/nem.2259
Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac

Identifying illicit behavior in the Bitcoin network is a well-explored topic. The methods proposed over time have generated great insights into the deanonymization of the Bitcoin user base through the clustering of inputs and outputs. With advanced techniques being deployed by Bitcoin users, these heuristics are now being challenged in their ability to aid in the detection of illicit activity. In this paper, we provide a comprehensive list of methods deployed by malicious actors on the network and illicit transaction mining methods. We detail the evolution of the heuristics that are used to deanonymize Bitcoin transactions. We highlight the issues associated with conducting law enforcement investigations and propose recommendations for the research community to address these issues. Our recommendations include the release of public data by exchanges to allow researchers and law enforcement to further protect the network from malicious users. We recommend the enhancement of current heuristics through machine learning methods and discuss how researchers can take the fight head-on against expert cybercriminals.

识别比特币网络中的非法行为是一个经过深入探讨的课题。随着时间的推移,所提出的方法通过对输入和输出的聚类,对比特币用户群的去匿名化产生了深刻的见解。随着比特币用户采用先进技术,这些启发式方法在帮助检测非法活动方面的能力受到了挑战。在本文中,我们提供了一份恶意行为者在网络上部署的方法和非法交易挖掘方法的综合清单。我们详细介绍了用于比特币交易去匿名化的启发式方法的演变。我们强调了与开展执法调查相关的问题,并为研究界提出了解决这些问题的建议。我们的建议包括由交易所发布公共数据,以便研究人员和执法部门进一步保护网络免受恶意用户的侵害。我们建议通过机器学习方法增强当前的启发式方法,并讨论了研究人员如何与网络犯罪专家正面交锋。
{"title":"The next phase of identifying illicit activity in Bitcoin","authors":"Jack Nicholls,&nbsp;Aditya Kuppa,&nbsp;Nhien-An Le-Khac","doi":"10.1002/nem.2259","DOIUrl":"10.1002/nem.2259","url":null,"abstract":"<p>Identifying illicit behavior in the Bitcoin network is a well-explored topic. The methods proposed over time have generated great insights into the deanonymization of the Bitcoin user base through the clustering of inputs and outputs. With advanced techniques being deployed by Bitcoin users, these heuristics are now being challenged in their ability to aid in the detection of illicit activity. In this paper, we provide a comprehensive list of methods deployed by malicious actors on the network and illicit transaction mining methods. We detail the evolution of the heuristics that are used to deanonymize Bitcoin transactions. We highlight the issues associated with conducting law enforcement investigations and propose recommendations for the research community to address these issues. Our recommendations include the release of public data by exchanges to allow researchers and law enforcement to further protect the network from malicious users. We recommend the enhancement of current heuristics through machine learning methods and discuss how researchers can take the fight head-on against expert cybercriminals.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2259","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139499005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network TPAAD:在软件定义网络中利用机器学习检测和缓解拒绝服务攻击的两阶段认证系统
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2024-01-12 DOI: 10.1002/nem.2258
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, Johari Abdullah

Software-defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, and the ability to exercise centralized control. However, the control plane of the system is vulnerable to denial-of-service (DoS) attacks, which are a primary focus for attackers. These attacks have the potential to result in substantial delays and packet loss. In this study, we present a novel system called Two-Phase Authentication for Attack Detection that aims to enhance the security of SDN by mitigating DoS attacks. The methodology utilized in our study involves the implementation of packet filtration and machine learning classification techniques, which are subsequently followed by the targeted restriction of malevolent network traffic. Instead of completely deactivating the host, the emphasis lies on preventing harmful communication. Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. The deployed model was utilized within an environment designed for the identification of threats in SDN. Based on the observations of the banned queue, our system allows a host to reconnect when it is no longer contributing to malicious traffic. The experiments were run on a VMware Ubuntu, and an SDN environment was created using Mininet and the RYU controller. The results of the tests demonstrated enhanced performance in various aspects, including the reduction of false positives, the minimization of central processing unit utilization and control channel bandwidth consumption, the improvement of packet delivery ratio, and the decrease in the number of flow requests submitted to the controller. These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead.

软件定义网络(SDN)因其固有的优势(如增强的可扩展性、更高的适应性和集中控制能力)而受到广泛关注和采用。然而,系统的控制平面容易受到拒绝服务(DoS)攻击,这是攻击者的主要关注点。这些攻击有可能导致严重的延迟和数据包丢失。在本研究中,我们提出了一种名为 "攻击检测两阶段认证 "的新型系统,旨在通过缓解 DoS 攻击来增强 SDN 的安全性。我们的研究采用的方法包括实施数据包过滤和机器学习分类技术,随后有针对性地限制恶意网络流量。重点在于防止有害通信,而不是完全停用主机。支持向量机和 K-nearest neighbours 算法被用于对 CICDoS 2017 数据集进行高效检测。部署的模型是在为识别 SDN 中的威胁而设计的环境中使用的。根据对禁止队列的观察,我们的系统允许主机在不再产生恶意流量时重新连接。实验在 VMware Ubuntu 上运行,并使用 Mininet 和 RYU 控制器创建了 SDN 环境。测试结果表明各方面的性能都有所提高,包括减少误报、最大限度地降低中央处理单元利用率和控制通道带宽消耗、提高数据包交付率以及减少提交给控制器的流量请求数量。这些结果证实了我们的攻击检测两阶段认证架构能以较低的开销识别和缓解 SDN DoS 攻击。
{"title":"TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network","authors":"Najmun Nisa,&nbsp;Adnan Shahid Khan,&nbsp;Zeeshan Ahmad,&nbsp;Johari Abdullah","doi":"10.1002/nem.2258","DOIUrl":"10.1002/nem.2258","url":null,"abstract":"<p>Software-defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, and the ability to exercise centralized control. However, the control plane of the system is vulnerable to denial-of-service (DoS) attacks, which are a primary focus for attackers. These attacks have the potential to result in substantial delays and packet loss. In this study, we present a novel system called Two-Phase Authentication for Attack Detection that aims to enhance the security of SDN by mitigating DoS attacks. The methodology utilized in our study involves the implementation of packet filtration and machine learning classification techniques, which are subsequently followed by the targeted restriction of malevolent network traffic. Instead of completely deactivating the host, the emphasis lies on preventing harmful communication. Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. The deployed model was utilized within an environment designed for the identification of threats in SDN. Based on the observations of the banned queue, our system allows a host to reconnect when it is no longer contributing to malicious traffic. The experiments were run on a VMware Ubuntu, and an SDN environment was created using Mininet and the RYU controller. The results of the tests demonstrated enhanced performance in various aspects, including the reduction of false positives, the minimization of central processing unit utilization and control channel bandwidth consumption, the improvement of packet delivery ratio, and the decrease in the number of flow requests submitted to the controller. These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2258","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139515576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1