首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time-Sensitive Networks SDOG:工业时间敏感网络中基于动态在线分组的可伸缩流调度
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-30 DOI: 10.1002/nem.70001
Chang Liu, Jin Wang, Chang Liu Sr, Jie Wang, Li Tian, Xiao Yu, Min Wei

Although many studies have conducted the traffic scheduling of time-sensitive networks, most focus on small-scale static scheduling for specific scenarios, which cannot cope with dynamic and rapid scheduling of time-triggered (TT) flows generated in scalable scenarios in the Industrial Internet of Things. In this paper, we propose a Scalable TT flow scheduling method based on Dynamic Online Grouping in industrial time-sensitive networks (SDOG). To achieve that, we establish an undirected weighted flow graph based on the conflict index between TT flows and divide available time into equally spaced time windows. We dynamically group the TT flows within each window locally. When the number of flows to be scheduled doubles, we can achieve scalable and efficient solutions to efficiently schedule dynamic TT flows, avoiding unnecessary conflicts during data communication. In addition, a topology pruning strategy is adopted to prune the network topology of each group, reducing unnecessary link variables and further effectively shortening the scheduling time. Experimental results validated our expected performance and demonstrated that our proposed SDOG scheduling method has advantages in terms of overall traffic schedulability and average time for scheduling individual traffic.

虽然已有很多研究对时间敏感网络的流量调度进行了研究,但大多是针对特定场景的小规模静态调度,无法应对工业物联网中可扩展场景中产生的时间触发(TT)流的动态快速调度。本文提出了一种基于工业时间敏感网络动态在线分组的可扩展TT流调度方法。为了实现这一目标,我们基于TT流之间的冲突指数建立了无向加权流图,并将可用时间划分为等间隔的时间窗。我们在本地对每个窗口内的TT流进行动态分组。当要调度的流数量增加一倍时,我们可以实现可扩展的高效解决方案,以高效地调度动态TT流,避免数据通信过程中不必要的冲突。此外,采用拓扑剪枝策略对各组的网络拓扑进行剪枝,减少不必要的链路变量,进一步有效缩短调度时间。实验结果验证了我们的预期性能,并证明了我们提出的SDOG调度方法在整体交通可调度性和调度单个交通的平均时间方面具有优势。
{"title":"SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time-Sensitive Networks","authors":"Chang Liu,&nbsp;Jin Wang,&nbsp;Chang Liu Sr,&nbsp;Jie Wang,&nbsp;Li Tian,&nbsp;Xiao Yu,&nbsp;Min Wei","doi":"10.1002/nem.70001","DOIUrl":"https://doi.org/10.1002/nem.70001","url":null,"abstract":"<div>\u0000 \u0000 <p>Although many studies have conducted the traffic scheduling of time-sensitive networks, most focus on small-scale static scheduling for specific scenarios, which cannot cope with dynamic and rapid scheduling of time-triggered (TT) flows generated in scalable scenarios in the Industrial Internet of Things. In this paper, we propose a Scalable TT flow scheduling method based on Dynamic Online Grouping in industrial time-sensitive networks (SDOG). To achieve that, we establish an undirected weighted flow graph based on the conflict index between TT flows and divide available time into equally spaced time windows. We dynamically group the TT flows within each window locally. When the number of flows to be scheduled doubles, we can achieve scalable and efficient solutions to efficiently schedule dynamic TT flows, avoiding unnecessary conflicts during data communication. In addition, a topology pruning strategy is adopted to prune the network topology of each group, reducing unnecessary link variables and further effectively shortening the scheduling time. Experimental results validated our expected performance and demonstrated that our proposed SDOG scheduling method has advantages in terms of overall traffic schedulability and average time for scheduling individual traffic.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143121256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility 利用属性和团体缓解BGP路由泄漏:一种解决路径合理性的权宜之计
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-30 DOI: 10.1002/nem.70002
Nils Höger, Nils Rodday, Gabi Dreo Rodosek

The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao-Rexford model. Route leaks may lead to traffic misdirection, causing performance issues and potential security risks, often due to mistakes and misconfiguration. Several potential solutions have been published and are currently greatly discussed within the Internet Engineering Task Force (IETF) but have yet to be widely implemented. One approach is the Autonomous System Provider Authorization (ASPA). In addition to these new approaches, there are also efforts to use existing BGP functionalities to detect and prevent route leaks. In this paper, we implement the Down Only (DO) Community and Only to Customer (OTC) Attribute approaches, using them isolated and in conjunction with ASPA. Our research indicates that implementing a DO/OTC deployment strategy focusing on well-interconnected ASes could significantly reduce route leaks. Specifically, we observed mitigation of over 98% of all route leaks when DO and OTC were deployed by the top 5% of the most connected ASes. We show that combining DO/OTC and ASPA can greatly enhance ASPA's route leak prevention capabilities.

众所周知,边界网关协议BGP (Border Gateway Protocol)存在严重的安全漏洞。其中一个漏洞是BGP路由泄漏。BGP路由泄漏描述了路由公告超出其预期范围的传播,违反了Gao-Rexford模型。路由泄漏可能导致流量方向错误,从而导致性能问题和潜在的安全风险,通常是由于错误和错误配置造成的。一些潜在的解决方案已经发表,并且目前在互联网工程任务组(IETF)内部进行了大量讨论,但尚未得到广泛实施。一种方法是自治系统提供者授权(ASPA)。除了这些新方法之外,也有人努力使用现有的BGP功能来检测和防止路由泄漏。在本文中,我们实现了Down Only (DO)社区和Only to Customer (OTC)属性方法,将它们与ASPA分离并结合使用。我们的研究表明,实施DO/OTC部署策略,重点关注互连良好的as,可以显著减少路由泄漏。具体来说,我们观察到,当连接最多的前5%的ase部署DO和OTC时,超过98%的路由泄漏得到缓解。研究表明,将DO/OTC与ASPA相结合可以大大提高ASPA的路由泄漏防护能力。
{"title":"Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility","authors":"Nils Höger,&nbsp;Nils Rodday,&nbsp;Gabi Dreo Rodosek","doi":"10.1002/nem.70002","DOIUrl":"https://doi.org/10.1002/nem.70002","url":null,"abstract":"<p>The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao-Rexford model. Route leaks may lead to traffic misdirection, causing performance issues and potential security risks, often due to mistakes and misconfiguration. Several potential solutions have been published and are currently greatly discussed within the Internet Engineering Task Force (IETF) but have yet to be widely implemented. One approach is the Autonomous System Provider Authorization (ASPA). In addition to these new approaches, there are also efforts to use existing BGP functionalities to detect and prevent route leaks. In this paper, we implement the Down Only (DO) Community and Only to Customer (OTC) Attribute approaches, using them isolated and in conjunction with ASPA. Our research indicates that implementing a DO/OTC deployment strategy focusing on well-interconnected ASes could significantly reduce route leaks. Specifically, we observed mitigation of over 98% of all route leaks when DO and OTC were deployed by the top 5% of the most connected ASes. We show that combining DO/OTC and ASPA can greatly enhance ASPA's route leak prevention capabilities.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143121003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks 多租户虚拟网络中异常检测的位置包捕获
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-29 DOI: 10.1002/nem.2326
Daniel Spiekermann

Anomaly detection in multitenant virtual networks presents significant challenges due to the dynamic, ephemeral nature of virtualized environments and the complex traffic patterns they generate. This paper presents a definition of preferable positions within virtual networks to enhance anomaly detection efficacy. Leveraging a combination of overlay and underlay capture positions, this paper examines the strategic impact of network positioning on anomaly detection accuracy, particularly in environments utilizing software-defined networking (SDN) and network function virtualization (NFV). Through controlled testing with realistic attack scenarios, including data exfiltration, denial of service, and malware infiltration, the advantages and constraints of each capture position are demonstrated. The findings underscore the necessity of adaptable capture mechanisms to address variability in data volume, encapsulation challenges, and privacy concerns unique to virtualized ecosystems. The paper further introduces a cost calculation model that evaluates each capture position by weighting key factors, enabling an optimized trade-off between detection accuracy and resource efficiency. The derived classification of the positional value significantly improves real-time detection of both internal and external threats within multitenant networks.

由于虚拟环境的动态性、短暂性及其产生的复杂流量模式,多租户虚拟网络中的异常检测提出了重大挑战。本文提出了虚拟网络中最佳位置的定义,以提高异常检测的效率。利用叠加和底层捕获位置的组合,本文研究了网络定位对异常检测准确性的战略影响,特别是在利用软件定义网络(SDN)和网络功能虚拟化(NFV)的环境中。通过对真实攻击场景的控制测试,包括数据泄露、拒绝服务和恶意软件渗透,展示了每个捕获位置的优势和约束。研究结果强调了适应性捕获机制的必要性,以解决数据量的可变性、封装挑战和虚拟化生态系统特有的隐私问题。本文进一步介绍了一个成本计算模型,该模型通过加权关键因素来评估每个捕获位置,从而实现检测精度和资源效率之间的优化权衡。位置值的派生分类显着提高了对多租户网络中内部和外部威胁的实时检测。
{"title":"Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks","authors":"Daniel Spiekermann","doi":"10.1002/nem.2326","DOIUrl":"https://doi.org/10.1002/nem.2326","url":null,"abstract":"<p>Anomaly detection in multitenant virtual networks presents significant challenges due to the dynamic, ephemeral nature of virtualized environments and the complex traffic patterns they generate. This paper presents a definition of preferable positions within virtual networks to enhance anomaly detection efficacy. Leveraging a combination of overlay and underlay capture positions, this paper examines the strategic impact of network positioning on anomaly detection accuracy, particularly in environments utilizing software-defined networking (SDN) and network function virtualization (NFV). Through controlled testing with realistic attack scenarios, including data exfiltration, denial of service, and malware infiltration, the advantages and constraints of each capture position are demonstrated. The findings underscore the necessity of adaptable capture mechanisms to address variability in data volume, encapsulation challenges, and privacy concerns unique to virtualized ecosystems. The paper further introduces a cost calculation model that evaluates each capture position by weighting key factors, enabling an optimized trade-off between detection accuracy and resource efficiency. The derived classification of the positional value significantly improves real-time detection of both internal and external threats within multitenant networks.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2326","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143120463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Buy Crypto, Sell Privacy: An Extended Investigation of the Cryptocurrency Exchange Evonax 购买加密货币,出售隐私:对加密货币交易所Evonax的扩展调查
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-25 DOI: 10.1002/nem.2325
Alexander Brechlin, Jochen Schäfer, Frederik Armknecht

Cryptocurrency exchanges have become a multi-billion dollar industry. Although these platforms are not only relevant for economic reasons but also from a privacy and legal perspective, empirical studies investigating the operations of cryptocurrency exchanges and the behavior of their users are surprisingly rare. A notable exception is a study analyzing the cryptocurrency exchange ShapeShift. While this study described new heuristics to retrieve a significant fraction of trades made on the plaform, its approach relied on identifying cryptocurrency transactions based on previously scraped trade data. This limited the analysis to the timeframe for which data had been acquired and likely led to false negatives in the transaction identification process. In this paper, we replicate and extend previous work by conducting an in-depth investigation of the cryptocurrency exchange Evonax. Our analysis is based on actual trading data acquired by using a novel methodology allowing to extract detailed information from the public blockchain and the interface of the exchange platform. We are able to identify 30,402 transactions between the launch of Evonax in February 2018 and December 31, 2022, which should be close to a complete set of all transactions. This allows us not only to analyze the business practices of a cryptocurrency exchange but also to identify a number of interesting use cases that are likely to be associated with illegal activity. This paper is an extended version of a research article previously accepted at the CryptoEx Workshop at IEEE ICBC 2024.

加密货币交易所已经成为一个价值数十亿美元的产业。尽管这些平台不仅与经济原因相关,而且从隐私和法律的角度来看也是相关的,但调查加密货币交易所的运营及其用户行为的实证研究却非常罕见。一个值得注意的例外是一项分析加密货币交易所shapesshift的研究。虽然这项研究描述了新的启发式方法来检索平台上进行的大部分交易,但其方法依赖于根据先前抓取的交易数据识别加密货币交易。这将分析限制在已获得数据的时间范围内,并可能导致交易识别过程中的错误否定。在本文中,我们通过对加密货币交易所Evonax进行深入调查来复制和扩展先前的工作。我们的分析是基于实际交易数据,通过使用一种新颖的方法,允许从公共区块链和交易平台的界面中提取详细信息。我们能够确定在2018年2月Evonax推出至2022年12月31日之间的30,402笔交易,这应该接近于所有交易的完整集合。这使我们不仅可以分析加密货币交易所的业务实践,还可以识别一些可能与非法活动相关的有趣用例。本文是先前在IEEE ICBC 2024的CryptoEx研讨会上接受的一篇研究文章的扩展版本。
{"title":"Buy Crypto, Sell Privacy: An Extended Investigation of the Cryptocurrency Exchange Evonax","authors":"Alexander Brechlin,&nbsp;Jochen Schäfer,&nbsp;Frederik Armknecht","doi":"10.1002/nem.2325","DOIUrl":"https://doi.org/10.1002/nem.2325","url":null,"abstract":"<p>Cryptocurrency exchanges have become a multi-billion dollar industry. Although these platforms are not only relevant for economic reasons but also from a privacy and legal perspective, empirical studies investigating the operations of cryptocurrency exchanges and the behavior of their users are surprisingly rare. A notable exception is a study analyzing the cryptocurrency exchange <i>ShapeShift</i>. While this study described new heuristics to retrieve a significant fraction of trades made on the plaform, its approach relied on identifying cryptocurrency transactions based on previously scraped trade data. This limited the analysis to the timeframe for which data had been acquired and likely led to false negatives in the transaction identification process. In this paper, we replicate and extend previous work by conducting an in-depth investigation of the cryptocurrency exchange <i>Evonax</i>. Our analysis is based on actual trading data acquired by using a novel methodology allowing to extract detailed information from the public blockchain and the interface of the exchange platform. We are able to identify 30,402 transactions between the launch of Evonax in February 2018 and December 31, 2022, which should be close to a complete set of all transactions. This allows us not only to analyze the business practices of a cryptocurrency exchange but also to identify a number of interesting use cases that are likely to be associated with illegal activity. This paper is an extended version of a research article previously accepted at the CryptoEx Workshop at IEEE ICBC 2024.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2325","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143119279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Music Transmission and Performance Optimization Based on the Integration of Artificial Intelligence and 6G Network Slice 基于人工智能与6G网络切片融合的音乐传输与性能优化
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-22 DOI: 10.1002/nem.70000
Honghui Zhu

Network slicing, which enables efficient resource management to meet specific service requirements, provides a scalable solution for optimizing music transmission and live performance in mobile networks beyond 5G and into 6G. The research focuses on optimizing live performances as well as music transmission. Since AI-driven resource management improves performance quality and real-time music streaming in dynamic 6G network situations, these factors are interconnected. This approach allows multiple tenants, such as event organizers and music producers, to share infrastructure while customizing communication and quality standards for real-time music services. To ensure optimal resource allocation, including high bandwidth, low latency, and consistent service quality, network slices are dynamically configured by the infrastructure provider. Although the implementation of network slicing in the core network has been well studied, applying it within the radio access network (RAN) presents challenges, especially given the unpredictability of wireless channels and the strict quality of service (QoS) demands for live music streaming. For 6G networks, the article suggests a tenant-driven RAN slicing method improved by artificial intelligence (AI) to maximize music performance and transmission. A hybrid AI framework integrates a deep recurrent neural network (DRNN) for continuous monitoring and prediction of network conditions with a deep Q-network (DQN) augmented by prioritized experience replay (PER) for real-time resource adaptation. The DRNN forecasts network states to guide high-level resource allocation, whereas DQN with PER dynamically manages routing and bandwidth based on past critical network states, enabling rapid responses to fluctuating performance demands. Comparative results indicate that the suggested approach outperforms conventional techniques, achieving a latency of 25 ms, an audio quality of 4.6, and a bandwidth utilization of 90%. Simulation results in live music and enhanced mobile broadband (eMBB) environments demonstrate the proposed approach's effectiveness in minimizing latency, enhancing audio quality, and stabilizing transmission, surpassing traditional network allocation techniques.

网络切片可以实现高效的资源管理,以满足特定的业务需求,为优化5G以上移动网络中的音乐传输和现场表演提供了可扩展的解决方案。研究的重点是优化现场表演和音乐传播。由于人工智能驱动的资源管理提高了动态6G网络环境下的性能质量和实时音乐流,因此这些因素是相互关联的。这种方法允许多个租户(如活动组织者和音乐制作人)共享基础设施,同时为实时音乐服务定制通信和质量标准。为了确保最优的资源分配,包括高带宽、低延迟和一致的服务质量,网络切片由基础设施提供商动态配置。尽管在核心网络中实现网络切片已经得到了很好的研究,但在无线接入网(RAN)中应用它仍然存在挑战,特别是考虑到无线信道的不可预测性和现场音乐流的严格服务质量(QoS)要求。对于6G网络,本文提出了一种由人工智能(AI)改进的租户驱动的RAN切片方法,以最大限度地提高音乐的性能和传输。混合AI框架将深度递归神经网络(DRNN)与深度q网络(DQN)集成在一起,用于持续监测和预测网络状况,深度q网络(DQN)通过优先体验重播(PER)增强,用于实时资源适应。DRNN预测网络状态以指导高级资源分配,而带有PER的DQN基于过去的关键网络状态动态管理路由和带宽,能够快速响应波动的性能需求。对比结果表明,该方法优于传统技术,延迟为25 ms,音频质量为4.6,带宽利用率为90%。在现场音乐和增强型移动宽带(eMBB)环境中的仿真结果表明,该方法在最小化延迟、提高音频质量和稳定传输方面的有效性优于传统的网络分配技术。
{"title":"Music Transmission and Performance Optimization Based on the Integration of Artificial Intelligence and 6G Network Slice","authors":"Honghui Zhu","doi":"10.1002/nem.70000","DOIUrl":"https://doi.org/10.1002/nem.70000","url":null,"abstract":"<div>\u0000 \u0000 <p>Network slicing, which enables efficient resource management to meet specific service requirements, provides a scalable solution for optimizing music transmission and live performance in mobile networks beyond 5G and into 6G. The research focuses on optimizing live performances as well as music transmission. Since AI-driven resource management improves performance quality and real-time music streaming in dynamic 6G network situations, these factors are interconnected. This approach allows multiple tenants, such as event organizers and music producers, to share infrastructure while customizing communication and quality standards for real-time music services. To ensure optimal resource allocation, including high bandwidth, low latency, and consistent service quality, network slices are dynamically configured by the infrastructure provider. Although the implementation of network slicing in the core network has been well studied, applying it within the radio access network (RAN) presents challenges, especially given the unpredictability of wireless channels and the strict quality of service (QoS) demands for live music streaming. For 6G networks, the article suggests a tenant-driven RAN slicing method improved by artificial intelligence (AI) to maximize music performance and transmission. A hybrid AI framework integrates a deep recurrent neural network (DRNN) for continuous monitoring and prediction of network conditions with a deep Q-network (DQN) augmented by prioritized experience replay (PER) for real-time resource adaptation. The DRNN forecasts network states to guide high-level resource allocation, whereas DQN with PER dynamically manages routing and bandwidth based on past critical network states, enabling rapid responses to fluctuating performance demands. Comparative results indicate that the suggested approach outperforms conventional techniques, achieving a latency of 25 ms, an audio quality of 4.6, and a bandwidth utilization of 90%. Simulation results in live music and enhanced mobile broadband (eMBB) environments demonstrate the proposed approach's effectiveness in minimizing latency, enhancing audio quality, and stabilizing transmission, surpassing traditional network allocation techniques.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143117930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New English Education Model Based on 6G and Sliced Network Virtual Reality Platform 基于6G和切片网络虚拟现实平台的英语教育新模式
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-13 DOI: 10.1002/nem.2324
Xiaozheng Liu

The information society has led to a shift in traditional English education methods, with the evolution of technology, particularly internet and communication network technologies, reshaping the teaching landscape. This facilitated innovative instructional approaches and enhanced the learning experience. This research introduces a novel virtual learn net architecture (VLNA) within the 6G network layers, which processes the performance of the virtual reality-based English education system (VR-EES) model to provide a seamless, personalized learning experience for online learners. This architecture is structured into several layers: The user equipment (UE) layer connects VR headsets to the network with ultrareliable, low-latency links; the radio access network (RAN) layer, employing massive MIMO and beam forming, enhances connection speed, capacity, and coverage. Edge computing handles latency-sensitive tasks like speech recognition and adaptive content delivery, reducing the load on the core network. The core network layer (CLN) manages network slices for specific learning tasks such as real-time interaction, high-definition multimedia, and computation-intensive processes, with control plane and user plane separation (CUPS) optimizing network management and security through end-to-end encryption. Software-defined networking (SDN) and network function virtualization (NFV) provide centralized, dynamic control, allowing real-time resource allocation based on demand. Cloud-edge integration supports Artificial intelligence (AI)-driven adaptive learning, optimizing educational content delivery based on individual progress. The study results demonstrate that stimulation of VLNA achieved significant improvements in latency reduction, bandwidth utilization, throughput, packet loss rate, jitter, user engagement, learning efficiency, and user satisfaction. The integration of edge computing and network slicing led to a significant reduction in latency, while the enhanced throughput enabled seamless VR experiences. In this study, latency reduction, bandwidth utilization, and user satisfaction emerge as the most significant factors, with user satisfaction standing out as the top performer due to its substantial impact on enhancing the overall learning experience. The packet loss rate is maintained to a certain level, ensuring reliable data transmission. The VR-EES model's experimental results also enhanced visual learning, multimedia quality, user pleasure, learning effectiveness, and user engagement.

信息社会导致了传统英语教育方法的转变,随着技术的发展,特别是互联网和通信网络技术的发展,重塑了教学格局。这促进了创新的教学方法,提高了学习经验。本研究在6G网络层中引入了一种新颖的虚拟学习网络架构(VLNA),该架构处理基于虚拟现实的英语教育系统(VR-EES)模型的性能,为在线学习者提供无缝的个性化学习体验。该架构分为几个层:用户设备(UE)层通过超可靠、低延迟的链路将VR头显连接到网络;无线接入网(RAN)层采用大规模MIMO和波束形成,提高了连接速度、容量和覆盖范围。边缘计算处理延迟敏感的任务,如语音识别和自适应内容交付,减少核心网络的负载。核心网络层(core network layer, CLN)管理网络切片,用于实时交互、高清多媒体、计算密集型进程等特定的学习任务,控制平面和用户平面分离(CUPS)通过端到端加密优化网络管理和安全性。软件定义网络(SDN)和网络功能虚拟化(NFV)提供集中、动态的控制,可以根据需求实时分配资源。云边缘集成支持人工智能(AI)驱动的自适应学习,根据个人进步优化教育内容交付。研究结果表明,VLNA刺激在延迟减少、带宽利用率、吞吐量、丢包率、抖动、用户参与度、学习效率和用户满意度方面取得了显著改善。边缘计算和网络切片的集成大大减少了延迟,同时增强的吞吐量使VR体验变得无缝。在本研究中,延迟减少、带宽利用率和用户满意度成为最重要的因素,其中用户满意度因其对增强整体学习体验的重大影响而脱颖而出。将丢包率控制在一定范围内,保证数据的可靠传输。VR-EES模型的实验结果还增强了视觉学习、多媒体质量、用户愉悦感、学习效率和用户参与度。
{"title":"A New English Education Model Based on 6G and Sliced Network Virtual Reality Platform","authors":"Xiaozheng Liu","doi":"10.1002/nem.2324","DOIUrl":"https://doi.org/10.1002/nem.2324","url":null,"abstract":"<div>\u0000 \u0000 <p>The information society has led to a shift in traditional English education methods, with the evolution of technology, particularly internet and communication network technologies, reshaping the teaching landscape. This facilitated innovative instructional approaches and enhanced the learning experience. This research introduces a novel virtual learn net architecture (VLNA) within the 6G network layers, which processes the performance of the virtual reality-based English education system (VR-EES) model to provide a seamless, personalized learning experience for online learners. This architecture is structured into several layers: The user equipment (UE) layer connects VR headsets to the network with ultrareliable, low-latency links; the radio access network (RAN) layer, employing massive MIMO and beam forming, enhances connection speed, capacity, and coverage. Edge computing handles latency-sensitive tasks like speech recognition and adaptive content delivery, reducing the load on the core network. The core network layer (CLN) manages network slices for specific learning tasks such as real-time interaction, high-definition multimedia, and computation-intensive processes, with control plane and user plane separation (CUPS) optimizing network management and security through end-to-end encryption. Software-defined networking (SDN) and network function virtualization (NFV) provide centralized, dynamic control, allowing real-time resource allocation based on demand. Cloud-edge integration supports Artificial intelligence (AI)-driven adaptive learning, optimizing educational content delivery based on individual progress. The study results demonstrate that stimulation of VLNA achieved significant improvements in latency reduction, bandwidth utilization, throughput, packet loss rate, jitter, user engagement, learning efficiency, and user satisfaction. The integration of edge computing and network slicing led to a significant reduction in latency, while the enhanced throughput enabled seamless VR experiences. In this study, latency reduction, bandwidth utilization, and user satisfaction emerge as the most significant factors, with user satisfaction standing out as the top performer due to its substantial impact on enhancing the overall learning experience. The packet loss rate is maintained to a certain level, ensuring reliable data transmission. The VR-EES model's experimental results also enhanced visual learning, multimedia quality, user pleasure, learning effectiveness, and user engagement.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143114896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Log-TF-IDF and NETCONF-Based Network Switch Anomaly Detection 基于Log-TF-IDF和netconf的网络交换机异常检测
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-13 DOI: 10.1002/nem.2322
Sukhyun Nam, Eui-Dong Jeong, James Won-Ki Hong

In this study, we propose and evaluate a model that utilizes both log data and state data to detect abnormal conditions in network switches. Building upon our previous research and drawing inspiration from TF-IDF used in natural language processing to measure word importance, we propose a statistical method, Log-TF-IDF, to quantify the rarity of each log pattern in the log data. Furthermore, based on this Log-TF-IDF, we introduce the AB Score, which quantifies how abnormal the current log pattern is. Our findings indicate that the AB Score is notably higher and more volatile in abnormal conditions. We confirm that anomaly detection is feasible through the AB Score, which has the advantage of being computationally efficient due to its statistical basis. We combined the metrics generated during the AB Score calculation with resource data collected with NETCONF and developed a machine-learning model to detect abnormal conditions in network switches. We confirm that this model can detect abnormal conditions with an F1 score of 0.86 on our collected dataset, confirming its viability for detecting abnormal states in network equipment.

在这项研究中,我们提出并评估了一个利用日志数据和状态数据来检测网络交换机异常状况的模型。基于我们之前的研究,并从自然语言处理中用于测量单词重要性的TF-IDF中获得灵感,我们提出了一种统计方法log -TF-IDF,以量化日志数据中每个日志模式的罕见度。此外,基于这个log - tf - idf,我们引入了AB Score,它量化了当前日志模式的异常程度。我们的研究结果表明,在异常情况下,AB分数明显更高,更不稳定。我们证实了通过AB Score进行异常检测是可行的,由于其统计基础,具有计算效率高的优点。我们将AB Score计算过程中产生的指标与NETCONF收集的资源数据结合起来,开发了一个机器学习模型来检测网络交换机的异常情况。在我们收集的数据集上,我们证实了该模型可以检测异常状态,F1得分为0.86,证实了其在网络设备中检测异常状态的可行性。
{"title":"Log-TF-IDF and NETCONF-Based Network Switch Anomaly Detection","authors":"Sukhyun Nam,&nbsp;Eui-Dong Jeong,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.2322","DOIUrl":"https://doi.org/10.1002/nem.2322","url":null,"abstract":"<div>\u0000 \u0000 <p>In this study, we propose and evaluate a model that utilizes both log data and state data to detect abnormal conditions in network switches. Building upon our previous research and drawing inspiration from TF-IDF used in natural language processing to measure word importance, we propose a statistical method, Log-TF-IDF, to quantify the rarity of each log pattern in the log data. Furthermore, based on this Log-TF-IDF, we introduce the AB Score, which quantifies how abnormal the current log pattern is. Our findings indicate that the AB Score is notably higher and more volatile in abnormal conditions. We confirm that anomaly detection is feasible through the AB Score, which has the advantage of being computationally efficient due to its statistical basis. We combined the metrics generated during the AB Score calculation with resource data collected with NETCONF and developed a machine-learning model to detect abnormal conditions in network switches. We confirm that this model can detect abnormal conditions with an F1 score of 0.86 on our collected dataset, confirming its viability for detecting abnormal states in network equipment.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143114895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multitopology Routing With Virtual Topologies and Segment Routing 多拓扑路由与虚拟拓扑和段路由
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-13 DOI: 10.1002/nem.2321
Nicolas Huin, Sébastien Martin, Jérémie Leguay

Multitopology routing (MTR) provides an attractive alternative to segment routing (SR) for traffic engineering when network devices cannot be upgraded. However, due to a high overhead in terms of link state messages exchanged by topologies and the need to frequently update link weights to follow evolving network conditions, MTR is often limited to a small number of topologies and the satisfaction of loose QoS constraints. To overcome these limitations, we propose virtual MTR (vMTR), an MTR extension where demands are routed over virtual topologies that are silent; that is, they do not exchange LSA messages and that are continuously derived from a very limited set of real topologies, optimizing each QoS parameter. In this context, we present a polynomial and exact algorithm for vMTR and, as a benchmark, a local search algorithm for MTR. We show that vMTR helps to reduce drastically the number of real topologies and that it is more robust to QoS changes. In the case where SR can actually be rolled-out, we also show that vMTR allows to drastically reduce SR overhead.

在网络设备无法升级的情况下,多拓扑路由(MTR)为流量工程提供了一种替代网段路由(SR)的方法。然而,由于拓扑交换链路状态消息方面的高开销以及需要频繁更新链路权重以跟上不断变化的网络条件,MTR通常仅限于少数拓扑和满足松散的QoS约束。为了克服这些限制,我们提出了虚拟MTR (vMTR),这是一种MTR扩展,其中需求通过沉默的虚拟拓扑路由;也就是说,它们不交换LSA消息,并且从非常有限的一组真实拓扑中连续导出LSA消息,从而优化每个QoS参数。在这种情况下,我们提出了一个多项式和精确的vMTR算法,并作为基准,提出了一个局部搜索算法的MTR。我们表明vMTR有助于大幅减少真实拓扑的数量,并且对QoS变化更具鲁棒性。在SR可以实际推出的情况下,我们还展示了vMTR允许大幅减少SR开销。
{"title":"Multitopology Routing With Virtual Topologies and Segment Routing","authors":"Nicolas Huin,&nbsp;Sébastien Martin,&nbsp;Jérémie Leguay","doi":"10.1002/nem.2321","DOIUrl":"https://doi.org/10.1002/nem.2321","url":null,"abstract":"<div>\u0000 \u0000 <p>Multitopology routing (MTR) provides an attractive alternative to segment routing (SR) for traffic engineering when network devices cannot be upgraded. However, due to a high overhead in terms of link state messages exchanged by topologies and the need to frequently update link weights to follow evolving network conditions, MTR is often limited to a small number of topologies and the satisfaction of loose QoS constraints. To overcome these limitations, we propose virtual MTR (vMTR), an MTR extension where demands are routed over virtual topologies that are silent; that is, they do not exchange LSA messages and that are continuously derived from a very limited set of real topologies, optimizing each QoS parameter. In this context, we present a polynomial and exact algorithm for vMTR and, as a benchmark, a local search algorithm for MTR. We show that vMTR helps to reduce drastically the number of real topologies and that it is more robust to QoS changes. In the case where SR can actually be rolled-out, we also show that vMTR allows to drastically reduce SR overhead.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143114966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Muno: Improved Bandwidth Estimation Scheme in Video Conferencing Using Deep Reinforcement Learning 基于深度强化学习的视频会议带宽估计改进方案
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-08 DOI: 10.1002/nem.2323
Van Tu Nguyen, Sang-Woo Ryu, Kyung-Chan Ko, Jae-Hyoung Yoo, James Won-Ki Hong

Many studies have used machine learning techniques for bitrate control to improve the quality of experience (QoE) of video streaming applications. However, most of these studies have focused on HTTP adaptive streaming with one-to-one connections. This research examines video conferencing applications that involve real-time, multiparty, and full-duplex communication among participants. In conventional video conferencing systems, a rule-based algorithm is typically employed to estimate the available bandwidth of each participant, and the outcomes are then used to control the video delivery rate to the participant. This paper proposes Muno, a bandwidth prediction framework based on deep reinforcement learning (DRL) for multiparty video conferencing systems. Muno aims to enhance the overall QoE by using DRL to improve bandwidth estimation for each connection. The experimental results indicate that Muno achieves a significantly higher video streaming rate, video resolution, and framerate while lowering delay in highly dynamic networks when compared to the state-of-the-art rule-based algorithms and roughly equivalent streaming rate and delay in stable networks. Moreover, Muno can generalize well to different network conditions which were not included in the training set. We also implemented a high-performance and scalable version of Muno for in-campus deployment.

许多研究已经将机器学习技术用于比特率控制,以提高视频流应用的体验质量。然而,这些研究大多集中在一对一连接的HTTP自适应流上。本研究检视视讯会议应用,包括参与者之间的即时、多方及全双工通讯。在传统的视频会议系统中,通常采用基于规则的算法来估计每个参与者的可用带宽,然后使用结果来控制对参与者的视频传输速率。本文提出了一种基于深度强化学习(DRL)的带宽预测框架Muno,用于多方视频会议系统。Muno的目标是通过使用DRL来提高每个连接的带宽估计,从而提高整体QoE。实验结果表明,与最先进的基于规则的算法相比,Muno在高动态网络中实现了显着更高的视频流速率、视频分辨率和帧率,同时降低了延迟,并且在稳定网络中大致相同的流速率和延迟。此外,Muno可以很好地泛化到训练集之外的不同网络条件。我们还实现了用于校园内部署的高性能和可扩展版本的Muno。
{"title":"Muno: Improved Bandwidth Estimation Scheme in Video Conferencing Using Deep Reinforcement Learning","authors":"Van Tu Nguyen,&nbsp;Sang-Woo Ryu,&nbsp;Kyung-Chan Ko,&nbsp;Jae-Hyoung Yoo,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.2323","DOIUrl":"https://doi.org/10.1002/nem.2323","url":null,"abstract":"<div>\u0000 \u0000 <p>Many studies have used machine learning techniques for bitrate control to improve the quality of experience (QoE) of video streaming applications. However, most of these studies have focused on HTTP adaptive streaming with one-to-one connections. This research examines video conferencing applications that involve real-time, multiparty, and full-duplex communication among participants. In conventional video conferencing systems, a rule-based algorithm is typically employed to estimate the available bandwidth of each participant, and the outcomes are then used to control the video delivery rate to the participant. This paper proposes Muno, a bandwidth prediction framework based on deep reinforcement learning (DRL) for multiparty video conferencing systems. Muno aims to enhance the overall QoE by using DRL to improve bandwidth estimation for each connection. The experimental results indicate that Muno achieves a significantly higher video streaming rate, video resolution, and framerate while lowering delay in highly dynamic networks when compared to the state-of-the-art rule-based algorithms and roughly equivalent streaming rate and delay in stable networks. Moreover, Muno can generalize well to different network conditions which were not included in the training set. We also implemented a high-performance and scalable version of Muno for in-campus deployment.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143113096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning 基于P4和机器学习的可编程网络中的实时加密流量分类
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-08 DOI: 10.1002/nem.2320
Aristide Tanyi-Jong Akem, Guillaume Fraysse, Marco Fiore

Network traffic encryption has been on the rise in recent years, making encrypted traffic classification (ETC) an important area of research. Machine learning (ML) methods for ETC are widely regarded as the state of the art. However, most existing solutions either rely on offline ETC based on collected network data or on online ETC with models running in the control plane of software-defined networks, all of which do not run at line rate and would not meet the strict requirements of ultra-low-latency applications in modern networks. This work exploits recent advances in data plane programmability to achieve real-time ETC in programmable switches at line rate, with high throughput and low latency. An extensive analysis is first conducted to show how tree-based models excel in ETC on various datasets. Then, a workflow is proposed for in-switch ETC with tree-based models. The proposed workflow builds on (i) an ETC-aware random forest (RF) modelling process where only features based on packet size and packet arrival times are used and (ii) an encoding of the trained RF model into off-the-shelf P4-programmable switches. The performance of the proposed in-switch ETC solution is evaluated on three use cases based on publicly available encrypted traffic datasets. Experiments are then conducted in a real-world testbed with Intel Tofino switches, in the presence of high-speed background traffic. Results show how the solution achieves high classification accuracy of up to 95% in QUIC traffic classification, with submicrosecond delay while consuming less than 10% on average of the total hardware resources available on the switch.

近年来,网络流量加密技术兴起,使得加密流量分类(ETC)成为一个重要的研究领域。ETC的机器学习(ML)方法被广泛认为是最先进的。然而,现有的大多数解决方案要么依赖于基于收集的网络数据的离线ETC,要么依赖于在线ETC,并在软件定义网络的控制平面上运行模型,这些都不能以线速率运行,无法满足现代网络中超低延迟应用的严格要求。这项工作利用数据平面可编程性的最新进展,以线速率实现可编程交换机的实时ETC,具有高吞吐量和低延迟。首先进行了广泛的分析,以显示基于树的模型如何在各种数据集上在ETC中表现出色。在此基础上,提出了一种基于树的交换ETC工作流程。提出的工作流程建立在(i) etc感知随机森林(RF)建模过程之上,其中仅使用基于数据包大小和数据包到达时间的特征,以及(ii)将训练好的RF模型编码到现成的p4可编程交换机中。基于公开可用的加密流量数据集,在三个用例上评估了所提出的交换机内ETC解决方案的性能。然后,在高速背景流量存在的情况下,使用英特尔Tofino交换机在现实世界的测试台上进行实验。结果表明,该方案在QUIC流量分类中实现了高达95%的分类准确率,延迟达到亚微秒级,同时平均消耗不到交换机可用硬件资源总量的10%。
{"title":"Real-Time Encrypted Traffic Classification in Programmable Networks with P4 and Machine Learning","authors":"Aristide Tanyi-Jong Akem,&nbsp;Guillaume Fraysse,&nbsp;Marco Fiore","doi":"10.1002/nem.2320","DOIUrl":"https://doi.org/10.1002/nem.2320","url":null,"abstract":"<p>Network traffic encryption has been on the rise in recent years, making encrypted traffic classification (ETC) an important area of research. Machine learning (ML) methods for ETC are widely regarded as the state of the art. However, most existing solutions either rely on offline ETC based on collected network data or on online ETC with models running in the control plane of software-defined networks, all of which do not run at line rate and would not meet the strict requirements of ultra-low-latency applications in modern networks. This work exploits recent advances in data plane programmability to achieve real-time ETC in programmable switches at line rate, with high throughput and low latency. An extensive analysis is first conducted to show how tree-based models excel in ETC on various datasets. Then, a workflow is proposed for in-switch ETC with tree-based models. The proposed workflow builds on (i) an ETC-aware random forest (RF) modelling process where only features based on packet size and packet arrival times are used and (ii) an encoding of the trained RF model into off-the-shelf P4-programmable switches. The performance of the proposed in-switch ETC solution is evaluated on three use cases based on publicly available encrypted traffic datasets. Experiments are then conducted in a real-world testbed with Intel Tofino switches, in the presence of high-speed background traffic. Results show how the solution achieves high classification accuracy of up to 95<i>%</i> in QUIC traffic classification, with submicrosecond delay while consuming less than 10<i>%</i> on average of the total hardware resources available on the switch.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2320","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143113095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1