首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
The next phase of identifying illicit activity in Bitcoin 识别比特币非法活动的下一阶段
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-15 DOI: 10.1002/nem.2259
Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac

Identifying illicit behavior in the Bitcoin network is a well-explored topic. The methods proposed over time have generated great insights into the deanonymization of the Bitcoin user base through the clustering of inputs and outputs. With advanced techniques being deployed by Bitcoin users, these heuristics are now being challenged in their ability to aid in the detection of illicit activity. In this paper, we provide a comprehensive list of methods deployed by malicious actors on the network and illicit transaction mining methods. We detail the evolution of the heuristics that are used to deanonymize Bitcoin transactions. We highlight the issues associated with conducting law enforcement investigations and propose recommendations for the research community to address these issues. Our recommendations include the release of public data by exchanges to allow researchers and law enforcement to further protect the network from malicious users. We recommend the enhancement of current heuristics through machine learning methods and discuss how researchers can take the fight head-on against expert cybercriminals.

识别比特币网络中的非法行为是一个经过深入探讨的课题。随着时间的推移,所提出的方法通过对输入和输出的聚类,对比特币用户群的去匿名化产生了深刻的见解。随着比特币用户采用先进技术,这些启发式方法在帮助检测非法活动方面的能力受到了挑战。在本文中,我们提供了一份恶意行为者在网络上部署的方法和非法交易挖掘方法的综合清单。我们详细介绍了用于比特币交易去匿名化的启发式方法的演变。我们强调了与开展执法调查相关的问题,并为研究界提出了解决这些问题的建议。我们的建议包括由交易所发布公共数据,以便研究人员和执法部门进一步保护网络免受恶意用户的侵害。我们建议通过机器学习方法增强当前的启发式方法,并讨论了研究人员如何与网络犯罪专家正面交锋。
{"title":"The next phase of identifying illicit activity in Bitcoin","authors":"Jack Nicholls,&nbsp;Aditya Kuppa,&nbsp;Nhien-An Le-Khac","doi":"10.1002/nem.2259","DOIUrl":"10.1002/nem.2259","url":null,"abstract":"<p>Identifying illicit behavior in the Bitcoin network is a well-explored topic. The methods proposed over time have generated great insights into the deanonymization of the Bitcoin user base through the clustering of inputs and outputs. With advanced techniques being deployed by Bitcoin users, these heuristics are now being challenged in their ability to aid in the detection of illicit activity. In this paper, we provide a comprehensive list of methods deployed by malicious actors on the network and illicit transaction mining methods. We detail the evolution of the heuristics that are used to deanonymize Bitcoin transactions. We highlight the issues associated with conducting law enforcement investigations and propose recommendations for the research community to address these issues. Our recommendations include the release of public data by exchanges to allow researchers and law enforcement to further protect the network from malicious users. We recommend the enhancement of current heuristics through machine learning methods and discuss how researchers can take the fight head-on against expert cybercriminals.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2259","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139499005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network TPAAD:在软件定义网络中利用机器学习检测和缓解拒绝服务攻击的两阶段认证系统
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2024-01-12 DOI: 10.1002/nem.2258
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, Johari Abdullah

Software-defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, and the ability to exercise centralized control. However, the control plane of the system is vulnerable to denial-of-service (DoS) attacks, which are a primary focus for attackers. These attacks have the potential to result in substantial delays and packet loss. In this study, we present a novel system called Two-Phase Authentication for Attack Detection that aims to enhance the security of SDN by mitigating DoS attacks. The methodology utilized in our study involves the implementation of packet filtration and machine learning classification techniques, which are subsequently followed by the targeted restriction of malevolent network traffic. Instead of completely deactivating the host, the emphasis lies on preventing harmful communication. Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. The deployed model was utilized within an environment designed for the identification of threats in SDN. Based on the observations of the banned queue, our system allows a host to reconnect when it is no longer contributing to malicious traffic. The experiments were run on a VMware Ubuntu, and an SDN environment was created using Mininet and the RYU controller. The results of the tests demonstrated enhanced performance in various aspects, including the reduction of false positives, the minimization of central processing unit utilization and control channel bandwidth consumption, the improvement of packet delivery ratio, and the decrease in the number of flow requests submitted to the controller. These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead.

软件定义网络(SDN)因其固有的优势(如增强的可扩展性、更高的适应性和集中控制能力)而受到广泛关注和采用。然而,系统的控制平面容易受到拒绝服务(DoS)攻击,这是攻击者的主要关注点。这些攻击有可能导致严重的延迟和数据包丢失。在本研究中,我们提出了一种名为 "攻击检测两阶段认证 "的新型系统,旨在通过缓解 DoS 攻击来增强 SDN 的安全性。我们的研究采用的方法包括实施数据包过滤和机器学习分类技术,随后有针对性地限制恶意网络流量。重点在于防止有害通信,而不是完全停用主机。支持向量机和 K-nearest neighbours 算法被用于对 CICDoS 2017 数据集进行高效检测。部署的模型是在为识别 SDN 中的威胁而设计的环境中使用的。根据对禁止队列的观察,我们的系统允许主机在不再产生恶意流量时重新连接。实验在 VMware Ubuntu 上运行,并使用 Mininet 和 RYU 控制器创建了 SDN 环境。测试结果表明各方面的性能都有所提高,包括减少误报、最大限度地降低中央处理单元利用率和控制通道带宽消耗、提高数据包交付率以及减少提交给控制器的流量请求数量。这些结果证实了我们的攻击检测两阶段认证架构能以较低的开销识别和缓解 SDN DoS 攻击。
{"title":"TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network","authors":"Najmun Nisa,&nbsp;Adnan Shahid Khan,&nbsp;Zeeshan Ahmad,&nbsp;Johari Abdullah","doi":"10.1002/nem.2258","DOIUrl":"10.1002/nem.2258","url":null,"abstract":"<p>Software-defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, and the ability to exercise centralized control. However, the control plane of the system is vulnerable to denial-of-service (DoS) attacks, which are a primary focus for attackers. These attacks have the potential to result in substantial delays and packet loss. In this study, we present a novel system called Two-Phase Authentication for Attack Detection that aims to enhance the security of SDN by mitigating DoS attacks. The methodology utilized in our study involves the implementation of packet filtration and machine learning classification techniques, which are subsequently followed by the targeted restriction of malevolent network traffic. Instead of completely deactivating the host, the emphasis lies on preventing harmful communication. Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. The deployed model was utilized within an environment designed for the identification of threats in SDN. Based on the observations of the banned queue, our system allows a host to reconnect when it is no longer contributing to malicious traffic. The experiments were run on a VMware Ubuntu, and an SDN environment was created using Mininet and the RYU controller. The results of the tests demonstrated enhanced performance in various aspects, including the reduction of false positives, the minimization of central processing unit utilization and control channel bandwidth consumption, the improvement of packet delivery ratio, and the decrease in the number of flow requests submitted to the controller. These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2258","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139515576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fractional non-fungible tokens: Overview, evaluation, marketplaces, and challenges 分数型不可兑换代币:概述、评估、市场和挑战
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-11 DOI: 10.1002/nem.2260
Wonseok Choi, Jongsoo Woo, James Won-Ki Hong

Fractional non-fungible tokens (NFTs) have emerged at the forefront of blockchain innovation, merging tokenization, NFTs, and fractional ownership to democratize access to high-value digital assets. In this paper, we explore the fundamental concepts of blockchain technology, smart contracts, NFTs, and tokenization to lay the groundwork for understanding fractional NFTs. We investigate key ERC standards, including ERC-20, ERC-721, and ERC-1155, which are pivotal in enabling the creation and management of fractional NFTs on the Ethereum blockchain. Then, we present two major processes in fractional NFTs, minting and reconstitution. We develop fractional NFTs based on ERC standards and evaluate their gas consumption. Furthermore, through a comprehensive review of existing platforms, we analyze their minting and reconstitution processes and underlying ERC standards. Challenges, such as regulatory compliance and security, are also examined. We highlight the significance of robust security measures and transparency to build trust in fractional NFT ecosystems. While the field is still evolving, fractional NFTs have the potential to disrupt traditional ownership models and revolutionize industries. We envision fractional NFTs fostering a more inclusive and decentralized digital economy as technology advances and adoption grows.

分式不可兑换代币(NFTs)已成为区块链创新的前沿,它将代币化、NFTs 和分式所有权融合在一起,实现了高价值数字资产获取的民主化。在本文中,我们将探讨区块链技术、智能合约、NFT 和代币化的基本概念,为理解部分 NFT 奠定基础。我们研究了主要的ERC标准,包括ERC-20、ERC-721和ERC-1155,这些标准在以太坊区块链上创建和管理分数NFT方面起着关键作用。然后,我们介绍了分数 NFT 的两个主要过程:铸币和重组。我们根据 ERC 标准开发了分数 NFT,并对其耗气量进行了评估。此外,通过对现有平台的全面审查,我们分析了它们的铸币和重组流程以及底层 ERC 标准。我们还研究了监管合规性和安全性等挑战。我们强调了稳健的安全措施和透明度对于在分数 NFT 生态系统中建立信任的重要意义。虽然该领域仍在不断发展,但部分式 NFT 有可能颠覆传统的所有权模式,为各行各业带来变革。我们设想,随着技术的进步和应用的增加,部分式 NFT 将促进更具包容性和去中心化的数字经济。
{"title":"Fractional non-fungible tokens: Overview, evaluation, marketplaces, and challenges","authors":"Wonseok Choi,&nbsp;Jongsoo Woo,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.2260","DOIUrl":"10.1002/nem.2260","url":null,"abstract":"<p>Fractional non-fungible tokens (NFTs) have emerged at the forefront of blockchain innovation, merging tokenization, NFTs, and fractional ownership to democratize access to high-value digital assets. In this paper, we explore the fundamental concepts of blockchain technology, smart contracts, NFTs, and tokenization to lay the groundwork for understanding fractional NFTs. We investigate key ERC standards, including ERC-20, ERC-721, and ERC-1155, which are pivotal in enabling the creation and management of fractional NFTs on the Ethereum blockchain. Then, we present two major processes in fractional NFTs, minting and reconstitution. We develop fractional NFTs based on ERC standards and evaluate their gas consumption. Furthermore, through a comprehensive review of existing platforms, we analyze their minting and reconstitution processes and underlying ERC standards. Challenges, such as regulatory compliance and security, are also examined. We highlight the significance of robust security measures and transparency to build trust in fractional NFT ecosystems. While the field is still evolving, fractional NFTs have the potential to disrupt traditional ownership models and revolutionize industries. We envision fractional NFTs fostering a more inclusive and decentralized digital economy as technology advances and adoption grows.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139462401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel eviction policy based on shortest remaining time for software defined networking flow tables 基于软件定义网络流表最短剩余时间的新型驱逐策略
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-12-21 DOI: 10.1002/nem.2257
Kavi Priya Dhandapani, Mirnalinee Thanganadar Thangathai, Shahul Hamead Haja Moinudeen

Software defined networking is a modern paradigm that divides the control plane from the data plane for improved network manageability. A flow table in the data plane has limited and expensive memory called TCAM. The presence of unwanted flow rules would lead to flow bloat conditions and make the lookup operation inefficient. Eviction schemes based on LRU policy have been widely studied in the literature which preempts the life of the least recently used flow rule and reduces the occupancy of the flow table. LRU considers the past behavior for the eviction of a flow rule. This paper proposes a novel policy that preempts a flow rule by considering its future characteristic, the shortest remaining time (SRT). A rule with a higher probability of being used is avoided from eviction to mitigate the degradation of performance. The modeling of the SRT technique exhibits better utilization of a flow rule that has higher probability of being used. On the other hand, LRU does not guarantee that the evicted flow rule will not be used frequently in the future and it has been shown that an incorrectly evicted flow rule incurs controller delay. The experimental results show that for different traffic rates, SRT has reduced the delay by 15%, reinstallation count by 25%, and jitter by 40%. SRT has increased utilization by 22% compared to LRU.

软件定义网络是一种现代范式,它将控制平面与数据平面分开,以提高网络的可管理性。数据平面中的流量表内存有限且昂贵,称为 TCAM。不需要的流量规则的存在会导致流量膨胀,使查找操作效率低下。基于 LRU 策略的驱逐方案已在文献中得到广泛研究,该方案会抢占最近使用最少的流规则的生命周期,减少流表的占用率。LRU 在驱逐流量规则时考虑了过去的行为。本文提出了一种新策略,即通过考虑流量规则的未来特性--最短剩余时间(SRT)--来抢占流量规则。避免驱逐使用概率较高的规则,以减轻性能下降。SRT 技术的建模表明,被使用概率较高的流量规则能得到更好的利用。另一方面,LRU 并不能保证被驱逐的流量规则在未来不会被频繁使用,而且事实证明,错误驱逐的流量规则会造成控制器延迟。实验结果表明,对于不同的流量,SRT 将延迟减少了 15%,重新安装次数减少了 25%,抖动减少了 40%。与 LRU 相比,SRT 提高了 22% 的利用率。
{"title":"A novel eviction policy based on shortest remaining time for software defined networking flow tables","authors":"Kavi Priya Dhandapani,&nbsp;Mirnalinee Thanganadar Thangathai,&nbsp;Shahul Hamead Haja Moinudeen","doi":"10.1002/nem.2257","DOIUrl":"10.1002/nem.2257","url":null,"abstract":"<div>\u0000 \u0000 <p>Software defined networking is a modern paradigm that divides the control plane from the data plane for improved network manageability. A flow table in the data plane has limited and expensive memory called TCAM. The presence of unwanted flow rules would lead to flow bloat conditions and make the lookup operation inefficient. Eviction schemes based on LRU policy have been widely studied in the literature which preempts the life of the least recently used flow rule and reduces the occupancy of the flow table. LRU considers the past behavior for the eviction of a flow rule. This paper proposes a novel policy that preempts a flow rule by considering its future characteristic, the shortest remaining time (SRT). A rule with a higher probability of being used is avoided from eviction to mitigate the degradation of performance. The modeling of the SRT technique exhibits better utilization of a flow rule that has higher probability of being used. On the other hand, LRU does not guarantee that the evicted flow rule will not be used frequently in the future and it has been shown that an incorrectly evicted flow rule incurs controller delay. The experimental results show that for different traffic rates, SRT has reduced the delay by 15%, reinstallation count by 25%, and jitter by 40%. SRT has increased utilization by 22% compared to LRU.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138825536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain and crypto forensics: Investigating crypto frauds 区块链和加密货币取证:调查加密货币欺诈
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-12-07 DOI: 10.1002/nem.2255
Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar, Mano Yadav

In the past few years, cryptocurrency has gained widespread acceptance because of its decentralized nature, quick and secure transactions, and potential for investment and speculation. But the increased popularity has also led to increased cryptocurrency fraud, including scams, phishing attacks, Ponzi schemes, and other criminal activities. Although there is little documentation of cryptocurrency fraud, an in-depth study is essential to recognize various scams in different cryptocurrencies. To fill this gap, a study investigated cryptocurrency-related fraud in various cryptocurrencies and provided a taxonomy of crypto-forensics and forensic blockchain. In addition, we have introduced an architecture that integrates artificial intelligence (AI) and blockchain technologies to investigate and protect against instances of cryptocurrency fraud. The suggested design's effectiveness was evaluated using several machine learning (ML) classification algorithms. The conclusion of the evaluation confirmed that the random forest (RF) classifier performed the best, delivering the highest level of accuracy, that is, 97.5%. Once the ML classifiers detect cryptocurrency fraud, the information is securely stored in the InterPlanetary File System (IPFS); the document's hash is also stored in the blockchain using smart contracts. Law enforcement can leverage blockchain technology to secure access to fraudulent cryptographic transactions. The proposed architecture was tested for bandwidth utilization. Despite the potential benefits of blockchain and crypto-forensics, several issues and challenges remain, including privacy concerns, standardization, and difficulty identifying fraud between crypto-currencies. Finally, the paper discusses various problems and challenges in blockchain and crypto forensics to investigate cryptocurrency fraud.

在过去几年中,加密货币因其去中心化的特性、快速安全的交易以及投资和投机的潜力而获得了广泛的认可。但是,加密货币的普及也导致了加密货币欺诈的增加,包括诈骗、网络钓鱼攻击、庞氏骗局和其他犯罪活动。虽然有关加密货币欺诈的文献很少,但深入研究对于识别不同加密货币的各种欺诈行为至关重要。为了填补这一空白,一项研究调查了各种加密货币中与加密货币相关的欺诈行为,并提供了加密取证和区块链取证的分类标准。此外,我们还介绍了一种集成人工智能(AI)和区块链技术的架构,用于调查和防范加密货币欺诈事件。我们使用几种机器学习(ML)分类算法对建议设计的有效性进行了评估。评估结论证实,随机森林(RF)分类器表现最佳,准确率最高,达到 97.5%。一旦 ML 分类器检测到加密货币欺诈,信息就会被安全地存储在跨行星文件系统(IPFS)中;文件的哈希值也会通过智能合约存储在区块链中。执法部门可以利用区块链技术确保对欺诈性加密交易的访问。对拟议的架构进行了带宽利用率测试。尽管区块链和加密取证具有潜在优势,但仍存在一些问题和挑战,包括隐私问题、标准化以及难以识别加密货币之间的欺诈行为。最后,本文讨论了区块链和加密取证在调查加密货币欺诈方面存在的各种问题和挑战。
{"title":"Blockchain and crypto forensics: Investigating crypto frauds","authors":"Udit Agarwal,&nbsp;Vinay Rishiwal,&nbsp;Sudeep Tanwar,&nbsp;Mano Yadav","doi":"10.1002/nem.2255","DOIUrl":"10.1002/nem.2255","url":null,"abstract":"<p>In the past few years, cryptocurrency has gained widespread acceptance because of its decentralized nature, quick and secure transactions, and potential for investment and speculation. But the increased popularity has also led to increased cryptocurrency fraud, including scams, phishing attacks, Ponzi schemes, and other criminal activities. Although there is little documentation of cryptocurrency fraud, an in-depth study is essential to recognize various scams in different cryptocurrencies. To fill this gap, a study investigated cryptocurrency-related fraud in various cryptocurrencies and provided a taxonomy of crypto-forensics and forensic blockchain. In addition, we have introduced an architecture that integrates artificial intelligence (AI) and blockchain technologies to investigate and protect against instances of cryptocurrency fraud. The suggested design's effectiveness was evaluated using several machine learning (ML) classification algorithms. The conclusion of the evaluation confirmed that the random forest (RF) classifier performed the best, delivering the highest level of accuracy, that is, 97.5%. Once the ML classifiers detect cryptocurrency fraud, the information is securely stored in the InterPlanetary File System (IPFS); the document's hash is also stored in the blockchain using smart contracts. Law enforcement can leverage blockchain technology to secure access to fraudulent cryptographic transactions. The proposed architecture was tested for bandwidth utilization. Despite the potential benefits of blockchain and crypto-forensics, several issues and challenges remain, including privacy concerns, standardization, and difficulty identifying fraud between crypto-currencies. Finally, the paper discusses various problems and challenges in blockchain and crypto forensics to investigate cryptocurrency fraud.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138561650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network 基于残差的时空注意力卷积神经网络用于检测软件定义网络集成车载 adhoc 网络中的分布式拒绝服务攻击
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-12-06 DOI: 10.1002/nem.2256
V. Karthik, R. Lakshmi, Salini Abraham, M. Ramkumar

Software defined network (SDN) integrated vehicular ad hoc network (VANET) is a magnificent technique for smart transportation as it raises the efficiency, safety, manageability, and comfort of traffic. SDN-integrated VANET (SDN-int-VANET) has numerous benefits, but it is susceptible to threats like distributed denial of service (DDoS). Several methods were suggested for DDoS attack detection (AD), but the existing approaches to optimization have given a base for enhancing the parameters. An incorrect selection of parameters results in a poor performance and poor fit to the data. To overcome these issues, residual-based temporal attention red fox-convolutional neural network (RTARF-CNN) for detecting DDoS attacks in SDN-int-VANET is introduced in this manuscript. The input data is taken from the SDN DDoS attack dataset. For restoring redundancy and missing value, developed random forest and local least squares (DRFLLS) are applied. Then the important features are selected from the pre-processed data with the help of stacked contractive autoencoders (St-CAE), which reduces the processing time of the introduced method. The selected features are classified by residual-based temporal attention-convolutional neural network (RTA-CNN). The weight parameter of RTA-CNN is optimized with the help of red fox optimization (RFO) for better classification. The introduced method is implemented in the PYTHON platform. The RTARF-CNN attains 99.8% accuracy, 99.5% sensitivity, 99.80% precision, and 99.8% specificity. The effectiveness of the introduced technique is compared with the existing approaches.

集成了软件定义网络(SDN)的车载临时网络(VANET)是智能交通的一项重要技术,因为它提高了交通的效率、安全性、可管理性和舒适性。集成了 SDN 的 VANET(SDN-int-VANET)好处多多,但也容易受到分布式拒绝服务(DDoS)等威胁。针对 DDoS 攻击检测(AD)提出了几种方法,但现有的优化方法为增强参数提供了基础。参数选择不正确会导致性能不佳和与数据拟合不良。为了克服这些问题,本稿件介绍了用于检测 SDN-int-VANET 中 DDoS 攻击的基于残差的时空注意力红狐卷积神经网络(RTARF-CNN)。输入数据来自 SDN DDoS 攻击数据集。为恢复冗余和缺失值,应用了开发的随机森林和局部最小二乘法(DRFLLS)。然后,在堆叠收缩自动编码器(St-CAE)的帮助下,从预处理数据中选取重要特征,从而缩短了引入方法的处理时间。所选特征由基于残差的时空注意力卷积神经网络(RTA-CNN)进行分类。RTA-CNN 的权重参数在红狐优化 (RFO) 的帮助下进行了优化,以获得更好的分类效果。引入的方法在PYTHON平台上实现。RTARF-CNN 的准确率达到 99.8%,灵敏度达到 99.5%,精确度达到 99.80%,特异性达到 99.8%。将引入技术的有效性与现有方法进行了比较。
{"title":"Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network","authors":"V. Karthik,&nbsp;R. Lakshmi,&nbsp;Salini Abraham,&nbsp;M. Ramkumar","doi":"10.1002/nem.2256","DOIUrl":"10.1002/nem.2256","url":null,"abstract":"<p>Software defined network (SDN) integrated vehicular ad hoc network (VANET) is a magnificent technique for smart transportation as it raises the efficiency, safety, manageability, and comfort of traffic. SDN-integrated VANET (SDN-int-VANET) has numerous benefits, but it is susceptible to threats like distributed denial of service (DDoS). Several methods were suggested for DDoS attack detection (AD), but the existing approaches to optimization have given a base for enhancing the parameters. An incorrect selection of parameters results in a poor performance and poor fit to the data. To overcome these issues, residual-based temporal attention red fox-convolutional neural network (RTARF-CNN) for detecting DDoS attacks in SDN-int-VANET is introduced in this manuscript. The input data is taken from the SDN DDoS attack dataset. For restoring redundancy and missing value, developed random forest and local least squares (DRFLLS) are applied. Then the important features are selected from the pre-processed data with the help of stacked contractive autoencoders (St-CAE), which reduces the processing time of the introduced method. The selected features are classified by residual-based temporal attention-convolutional neural network (RTA-CNN). The weight parameter of RTA-CNN is optimized with the help of red fox optimization (RFO) for better classification. The introduced method is implemented in the PYTHON platform. The RTARF-CNN attains 99.8% accuracy, 99.5% sensitivity, 99.80% precision, and 99.8% specificity. The effectiveness of the introduced technique is compared with the existing approaches.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138561627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive review of blockchain integration in remote patient monitoring for E-health 区块链集成在电子卫生远程患者监测中的全面审查
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-14 DOI: 10.1002/nem.2254
Nedia Badri, Leïla Nasraoui, Leïla Azouz Saïdane

The integration of the Internet of Things (IoT) with blockchain technology has enabled a significant digital transformation in the areas of E-health, supply chain, financial services, smart grid, and automated contracts. Many E-health organizations take advantage of the game-changing power of blockchain and IoT to improve patient outcomes and optimize internal operational activities. In particular, it proposes a decentralized and evolutive way to model and acknowledge trust and data validity in a peer-to-peer network. Blockchain promises transparent and secure systems to provide new business solutions, especially when combined with smart contracts. In this paper, we provide a comprehensive survey of the literature involving blockchain technology applied to E-health. First, we present a brief background on blockchain and its fundamentals. Second, we review the opportunities and challenges of blockchain in the context of E-health. We then discuss popular consensus algorithms and smart contracts in blockchain in conjunction with E-health. Finally, blockchain platforms are evaluated for their suitability in the realm of IoT-based E-health, including electronic health records, electronic management records, and personal health records, from the perspective of remote patient monitoring.

物联网(IoT)与区块链技术的集成使电子医疗、供应链、金融服务、智能电网和自动化合同等领域实现了重大的数字化转型。许多电子卫生组织利用区块链和物联网改变游戏规则的力量来改善患者的治疗效果并优化内部运营活动。特别是,它提出了一种在点对点网络中建模和承认信任和数据有效性的分散和进化方法。区块链承诺提供透明和安全的系统,以提供新的业务解决方案,特别是与智能合约结合使用时。在本文中,我们对涉及区块链技术应用于电子健康的文献进行了全面的调查。首先,我们简要介绍区块链的背景及其基本原理。其次,我们回顾了电子医疗背景下区块链的机遇和挑战。然后,我们将结合电子健康讨论区块链中流行的共识算法和智能合约。最后,从远程患者监测的角度,评估了区块链平台在基于物联网的电子健康领域的适用性,包括电子健康记录、电子管理记录和个人健康记录。
{"title":"A comprehensive review of blockchain integration in remote patient monitoring for E-health","authors":"Nedia Badri,&nbsp;Leïla Nasraoui,&nbsp;Leïla Azouz Saïdane","doi":"10.1002/nem.2254","DOIUrl":"10.1002/nem.2254","url":null,"abstract":"<p>The integration of the Internet of Things (IoT) with blockchain technology has enabled a significant digital transformation in the areas of E-health, supply chain, financial services, smart grid, and automated contracts. Many E-health organizations take advantage of the <i>game-changing</i> power of blockchain and IoT to improve patient outcomes and optimize internal operational activities. In particular, it proposes a decentralized and evolutive way to model and acknowledge trust and data validity in a peer-to-peer network. Blockchain promises transparent and secure systems to provide new business solutions, especially when combined with smart contracts. In this paper, we provide a comprehensive survey of the literature involving blockchain technology applied to E-health. First, we present a brief background on blockchain and its fundamentals. Second, we review the opportunities and challenges of blockchain in the context of E-health. We then discuss popular consensus algorithms and smart contracts in blockchain in conjunction with E-health. Finally, blockchain platforms are evaluated for their suitability in the realm of IoT-based E-health, including electronic health records, electronic management records, and personal health records, from the perspective of remote patient monitoring.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology analysis of the Ripple transaction network 瑞波交易网络拓扑分析
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-11-06 DOI: 10.1002/nem.2253
Anan Jin, Yuhang Ye, Brian Lee, Yuansong Qiao

The Ripple network is one typical blockchain-based decentralized credit network, which supports money transfer without physical money movement by only transferring the credits between participants. It is critical to obtain a deep understanding on the characteristics of the payment networks while optimizing the network design and transaction routing. This paper presents a comprehensive analysis to the Ripple transaction network, including two subnets formed by the two key functionalities, that is, Ripple Direct Payment Network (RDPN) and Ripple Credit Payment Network (RCPN). The analysis is performed with different network metrics, including clustering coefficient, centrality, and so on. Furthermore, this paper provides an in-depth analysis on the node degrees and edge weights, which reflect the number of transacted accounts of an account and the number of transactions between two accounts. The results show that the network is highly imbalanced and concentrated with a few nodes and edges holding most of the resources. Moreover, RDPN and RCPN show different characteristics in terms of transmitted and received transactions, the senders are more concentrated in RDPN, whereas in RCPN, the receivers are more concentrated.

Ripple 网络是一个典型的基于区块链的去中心化信用网络,它只在参与者之间转移信用,无需实物货币流动即可支持资金转移。在优化网络设计和交易路由的同时,深入了解支付网络的特性至关重要。本文全面分析了瑞波交易网络,包括由两个关键功能形成的两个子网,即瑞波直接支付网络(RDPN)和瑞波信用支付网络(RCPN)。分析采用了不同的网络指标,包括聚类系数、中心度等。此外,本文还深入分析了节点度和边权重,它们反映了一个账户的交易账户数和两个账户之间的交易数量。结果表明,网络高度不平衡且集中,少数节点和边掌握了大部分资源。此外,RDPN 和 RCPN 在发送和接收交易方面表现出不同的特点,在 RDPN 中,发送方更为集中,而在 RCPN 中,接收方更为集中。
{"title":"Topology analysis of the Ripple transaction network","authors":"Anan Jin,&nbsp;Yuhang Ye,&nbsp;Brian Lee,&nbsp;Yuansong Qiao","doi":"10.1002/nem.2253","DOIUrl":"10.1002/nem.2253","url":null,"abstract":"<p>The Ripple network is one typical blockchain-based decentralized credit network, which supports money transfer without physical money movement by only transferring the credits between participants. It is critical to obtain a deep understanding on the characteristics of the payment networks while optimizing the network design and transaction routing. This paper presents a comprehensive analysis to the Ripple transaction network, including two subnets formed by the two key functionalities, that is, Ripple Direct Payment Network (RDPN) and Ripple Credit Payment Network (RCPN). The analysis is performed with different network metrics, including clustering coefficient, centrality, and so on. Furthermore, this paper provides an in-depth analysis on the node degrees and edge weights, which reflect the number of transacted accounts of an account and the number of transactions between two accounts. The results show that the network is highly imbalanced and concentrated with a few nodes and edges holding most of the resources. Moreover, RDPN and RCPN show different characteristics in terms of transmitted and received transactions, the senders are more concentrated in RDPN, whereas in RCPN, the receivers are more concentrated.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135679817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files 评估词袋嵌入法和词到向量嵌入法及降维对日志文件异常检测的影响
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-10-27 DOI: 10.1002/nem.2251
Ziyu Qiu, Zhilei Zhou, Bradley Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood

In terms of cyber security, log files represent a rich source of information regarding the state of a computer service/system. Automating the process of summarizing log file content represents an important aid for decision-making, especially given the 24/7 nature of network/service operations. We perform benchmarking over eight distinct log files in order to assess the impact of the following: (1) different embedding methods for developing semantic descriptions of the original log files, (2) applying dimension reduction to the high-dimensional semantic space, and (3) assessing the impact of using different unsupervised learning algorithms for providing a visual summary of the service state. Benchmarking demonstrates that (1) word-to-vector embeddings identified by bidirectional encoder representation from transformers (BERT) without “fine-tuning” are sufficient to match the performance of Bag-or-Words embeddings provided by term frequency-inverse document frequency (TF-IDF) and (2) the self-organizing map without dimension reduction provides the most effective anomaly detector.

在网络安全方面,日志文件是有关计算机服务/系统状态的丰富信息来源。日志文件内容总结过程的自动化是决策的重要辅助工具,特别是考虑到网络/服务运行的全天候性质。我们对八个不同的日志文件进行了基准测试,以评估以下因素的影响:(1) 采用不同的嵌入方法对原始日志文件进行语义描述;(2) 对高维语义空间进行降维;(3) 评估使用不同的无监督学习算法对提供服务状态可视化摘要的影响。基准测试表明:(1) 通过变换器双向编码器表示法(BERT)确定的词到向量嵌入不需要 "微调",就足以与通过词频-反向文档频率(TF-IDF)提供的袋或词嵌入的性能相媲美;(2) 不进行维度缩减的自组织图提供了最有效的异常检测器。
{"title":"Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files","authors":"Ziyu Qiu,&nbsp;Zhilei Zhou,&nbsp;Bradley Niblett,&nbsp;Andrew Johnston,&nbsp;Jeffrey Schwartzentruber,&nbsp;Nur Zincir-Heywood,&nbsp;Malcolm I. Heywood","doi":"10.1002/nem.2251","DOIUrl":"10.1002/nem.2251","url":null,"abstract":"<p>In terms of cyber security, log files represent a rich source of information regarding the state of a computer service/system. Automating the process of summarizing log file content represents an important aid for decision-making, especially given the 24/7 nature of network/service operations. We perform benchmarking over eight distinct log files in order to assess the impact of the following: (1) different embedding methods for developing semantic descriptions of the original log files, (2) applying dimension reduction to the high-dimensional semantic space, and (3) assessing the impact of using different unsupervised learning algorithms for providing a visual summary of the service state. Benchmarking demonstrates that (1) word-to-vector embeddings identified by bidirectional encoder representation from transformers (BERT) without “fine-tuning” are sufficient to match the performance of Bag-or-Words embeddings provided by term frequency-inverse document frequency (TF-IDF) and (2) the self-organizing map without dimension reduction provides the most effective anomaly detector.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2251","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136261798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Availability-aware virtual network function placement based on multidimensional universal generating functions 基于多维通用生成函数的可用性感知虚拟网络功能布局
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2023-10-24 DOI: 10.1002/nem.2252
Kengo Arakawa, Eiji Oki

Network function virtualization (NFV) implements network functions as software, which enables flexible, resource-efficient, and rapid provision of network services. In NFV, network services are realized by the service function chain (SFC), which is a chain of virtual network functions (VNFs) linked in the proper order. Both availability and deployment cost are key concerns for network operators providing network services as SFC. This paper proposes a flexible VNF placement model on a per-VNF instance basis that minimizes deployment costs while satisfying availability requirements that may be placed on SFC. This paper uses a multidimensional universal generating function (MUGF) method, which is a multistate system analysis method, to compute the availability of a multistate SFC system with multiple VNFs coexisting on a server. The MUGF method calculates the performance of the entire SFC by combining the performance of servers as determined by applying a continuous-time Markov chain. To reduce the time to compute the SFC availability, we introduce operators to be applied to MUGF and develop an availability computing method. In addition, a heuristic algorithm for determining VNF placement targeting the lowest deployment cost possible while meeting availability requirements is presented. Numerical results show that the proposed model obtains VNF placement with lower cost than the conventional model in all examined cases. The proposed model achieves VNF placement at 58.5%–75.0% of the deployment cost of the conventional model for the same SFC availability requirements.

网络功能虚拟化(NFV)以软件形式实现网络功能,从而能够灵活、高效地提供网络服务。在 NFV 中,网络服务由服务功能链(SFC)实现,SFC 是按适当顺序连接的虚拟网络功能(VNF)链。对于以 SFC 形式提供网络服务的网络运营商来说,可用性和部署成本都是关键问题。本文提出了一种基于每个 VNF 实例的灵活 VNF 放置模型,它能最大限度地降低部署成本,同时满足可能对 SFC 提出的可用性要求。本文使用多维通用生成函数(MUGF)方法(一种多态系统分析方法)来计算服务器上共存多个 VNF 的多态 SFC 系统的可用性。MUGF 方法通过结合应用连续时间马尔可夫链确定的服务器性能来计算整个 SFC 的性能。为了缩短计算 SFC 可用性的时间,我们引入了应用于 MUGF 的算子,并开发了一种可用性计算方法。此外,我们还提出了一种启发式算法,用于在满足可用性要求的同时,以尽可能低的部署成本确定 VNF 的位置。数值结果表明,在所有考察案例中,拟议模型都能以低于传统模型的成本获得 VNF 部署。在 SFC 可用性要求相同的情况下,拟议模型的 VNF 部署成本仅为传统模型的 58.5%-75.0%。
{"title":"Availability-aware virtual network function placement based on multidimensional universal generating functions","authors":"Kengo Arakawa,&nbsp;Eiji Oki","doi":"10.1002/nem.2252","DOIUrl":"10.1002/nem.2252","url":null,"abstract":"<p>Network function virtualization (NFV) implements network functions as software, which enables flexible, resource-efficient, and rapid provision of network services. In NFV, network services are realized by the service function chain (SFC), which is a chain of virtual network functions (VNFs) linked in the proper order. Both availability and deployment cost are key concerns for network operators providing network services as SFC. This paper proposes a flexible VNF placement model on a per-VNF instance basis that minimizes deployment costs while satisfying availability requirements that may be placed on SFC. This paper uses a multidimensional universal generating function (MUGF) method, which is a multistate system analysis method, to compute the availability of a multistate SFC system with multiple VNFs coexisting on a server. The MUGF method calculates the performance of the entire SFC by combining the performance of servers as determined by applying a continuous-time Markov chain. To reduce the time to compute the SFC availability, we introduce operators to be applied to MUGF and develop an availability computing method. In addition, a heuristic algorithm for determining VNF placement targeting the lowest deployment cost possible while meeting availability requirements is presented. Numerical results show that the proposed model obtains VNF placement with lower cost than the conventional model in all examined cases. The proposed model achieves VNF placement at 58.5%–75.0% of the deployment cost of the conventional model for the same SFC availability requirements.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2252","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135265795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1