首页 > 最新文献

Information & Security: An International Journal最新文献

英文 中文
The Obama Administration and Incident Response: A Report 奥巴马政府和事件反应:一份报告
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.3408
Raymond Collier
{"title":"The Obama Administration and Incident Response: A Report","authors":"Raymond Collier","doi":"10.11610/ISIJ.3408","DOIUrl":"https://doi.org/10.11610/ISIJ.3408","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The EU Civil Protection Upgrading Needs 欧盟民防升级需求
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2907
D. Procházková
Civil protection has two pillars. The first one supports the humans daily lives and the other ensures the protection of humans at emergency and critical situations. Both consist of systems aiming to provide human security, welfare and critical infrastructure protection. This paper describes the three types of civil protection systems existing in the EU Member States and summarizes the results of original research. The results demonstrate a need for individual public assets’ protection. The paper includes suggestions on domains for future research to fulfil identified requirements.
民防有两大支柱。前者支持人类的日常生活,后者确保在紧急和危急情况下保护人类。两者都由旨在提供人类安全、福利和关键基础设施保护的系统组成。本文介绍了欧盟成员国现有的三种民事保护制度,并对原有的研究成果进行了总结。结果表明,有必要保护个人公共资产。本文包括对未来研究领域的建议,以满足已确定的需求。
{"title":"The EU Civil Protection Upgrading Needs","authors":"D. Procházková","doi":"10.11610/ISIJ.2907","DOIUrl":"https://doi.org/10.11610/ISIJ.2907","url":null,"abstract":"Civil protection has two pillars. The first one supports the humans daily lives and the other ensures the protection of humans at emergency and critical situations. Both consist of systems aiming to provide human security, welfare and critical infrastructure protection. This paper describes the three types of civil protection systems existing in the EU Member States and summarizes the results of original research. The results demonstrate a need for individual public assets’ protection. The paper includes suggestions on domains for future research to fulfil identified requirements.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"24 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120942570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Introduction to the Fusion of Quantitative and Qualitative Beliefs 定量信念与定性信念融合导论
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.2001
J. Dezert, F. Smarandache
The efficient management and combination of uncertain and conflict- ing sources of information remain of primal importance for the development of re- liable information fusion systems. Advanced fusion systems must deal both with quantitative and qualitative aspects of beliefs expressed by the differen t sources of information (sensors, expert systems, human reports, etc). This paper intro- duces the theory of plausible and paradoxical reasoning, known as DSmT (Dezert- Smarandache Theory) in literature, developed originally for dealing with impre- cise, uncertain and potentially highly conflicting sources of information pro viding quantitative beliefs on a given set of possible solutions of a given proble m. We also propose in this paper new ideas on a possible extension of DSmT for the combination of uncertain and conflicting qualitative information in order to de al directly with beliefs expressed with linguistic labels instead of numerical value s to be closer to the nature of information expressed in natural languages and available directly from human experts.
有效地管理和组合不确定和冲突的信息源对于开发可靠的信息融合系统至关重要。先进的融合系统必须同时处理由不同信息来源(传感器、专家系统、人类报告等)表达的信念的定量和定性方面。本文介绍了似是而非的推理理论,在文献中被称为DSmT (Dezert- Smarandache理论),最初是为处理印象推理而发展起来的。在给定问题m的一组可能解上提供定量信念的不确定和潜在高度冲突的信息源。我们还在本文中提出了DSmT的可能扩展,用于不确定和冲突的定性信息的组合,以便直接处理用语言标签表示的信念,而不是用数值表示的信念,更接近用自然语言表示的信息的性质,并且可以直接获得来自人类专家。
{"title":"Introduction to the Fusion of Quantitative and Qualitative Beliefs","authors":"J. Dezert, F. Smarandache","doi":"10.11610/ISIJ.2001","DOIUrl":"https://doi.org/10.11610/ISIJ.2001","url":null,"abstract":"The efficient management and combination of uncertain and conflict- ing sources of information remain of primal importance for the development of re- liable information fusion systems. Advanced fusion systems must deal both with quantitative and qualitative aspects of beliefs expressed by the differen t sources of information (sensors, expert systems, human reports, etc). This paper intro- duces the theory of plausible and paradoxical reasoning, known as DSmT (Dezert- Smarandache Theory) in literature, developed originally for dealing with impre- cise, uncertain and potentially highly conflicting sources of information pro viding quantitative beliefs on a given set of possible solutions of a given proble m. We also propose in this paper new ideas on a possible extension of DSmT for the combination of uncertain and conflicting qualitative information in order to de al directly with beliefs expressed with linguistic labels instead of numerical value s to be closer to the nature of information expressed in natural languages and available directly from human experts.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121492964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development 乌克兰武装力量转型的挑战:科学如何支持武装力量的发展
Pub Date : 1900-01-01 DOI: 10.11610/isij.2303
Leonid I. Polyakov
The First Deputy Minister of Defence of Ukraine examines the challenges of transformation at three levels—conceptual, planning/programming, and implementation of force development programmes—and the main challenges that require scientific support from research organisations in the Ukrainian defence establishment.
乌克兰国防部第一副部长从三个层面考察了转型的挑战——概念、规划/规划和部队发展计划的实施——以及需要乌克兰国防机构研究机构提供科学支持的主要挑战。
{"title":"The Challenge of Transforming Ukrainian Armed Forces: How Science Supports Armed Forces’ Development","authors":"Leonid I. Polyakov","doi":"10.11610/isij.2303","DOIUrl":"https://doi.org/10.11610/isij.2303","url":null,"abstract":"The First Deputy Minister of Defence of Ukraine examines the challenges of transformation at three levels—conceptual, planning/programming, and implementation of force development programmes—and the main challenges that require scientific support from research organisations in the Ukrainian defence establishment.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116551958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN EXPERIMENTAL APPLICATION OF A TRAIT-BASED PERSONALITY MODEL TO THE SIMULATION OF MILITARY DECISION-MAKING 基于特质的人格模型在军事决策模拟中的实验应用
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1204
F. McKenzie, Mikel D. Petty, Jean M. Catanzaro
Due to the uncertainties inherent in military operations and the variations in human personalities, military command and control behavior rarely conforms strictly to doctrine. (Of course, the degree of conformity to doctrine may vary.) In a military simulation with automated commanders, models of command behavior and decisionmaking that follow doctrine precisely and exhibit no variations are therefore unrealistic. Automated commanders that exhibit doctrinal behavior are essential for training, especially at the introductory levels, but are not sufficient for the full range of purposes the simulation may be applied to, such as advanced training and mission rehearsal. Simulation users may seek an automated commander that realistically models the effects of the fog of war and the difficulty of making doctrinal decisions under stressful conditions. Such realism in simulation could better prepare trainees for expected encounters on the battlefield.
由于军事行动固有的不确定性和人的个性差异,军事指挥控制行为很少严格遵守条令。(当然,符合教义的程度可能会有所不同。)因此,在具有自动化指挥官的军事模拟中,精确遵循条令且没有变化的指挥行为和决策模型是不现实的。表现出理论行为的自动化指挥官对于训练是必不可少的,特别是在入门级,但对于模拟可能应用的全部目的(如高级训练和任务排练)来说是不够的。模拟用户可能会寻求一个能够真实模拟战争迷雾影响的自动化指挥官,以及在压力条件下做出理论决策的困难。这种模拟的真实感可以让受训者更好地为战场上预期的遭遇做好准备。
{"title":"AN EXPERIMENTAL APPLICATION OF A TRAIT-BASED PERSONALITY MODEL TO THE SIMULATION OF MILITARY DECISION-MAKING","authors":"F. McKenzie, Mikel D. Petty, Jean M. Catanzaro","doi":"10.11610/ISIJ.1204","DOIUrl":"https://doi.org/10.11610/ISIJ.1204","url":null,"abstract":"Due to the uncertainties inherent in military operations and the variations in human personalities, military command and control behavior rarely conforms strictly to doctrine. (Of course, the degree of conformity to doctrine may vary.) In a military simulation with automated commanders, models of command behavior and decisionmaking that follow doctrine precisely and exhibit no variations are therefore unrealistic. Automated commanders that exhibit doctrinal behavior are essential for training, especially at the introductory levels, but are not sufficient for the full range of purposes the simulation may be applied to, such as advanced training and mission rehearsal. Simulation users may seek an automated commander that realistically models the effects of the fog of war and the difficulty of making doctrinal decisions under stressful conditions. Such realism in simulation could better prepare trainees for expected encounters on the battlefield.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125335735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cilvil-military Interoperability in Support of NATO Emerging Security Challenges 支持北约新兴安全挑战的军民互操作性
Pub Date : 1900-01-01 DOI: 10.11610/isij.2703
J. Shea
A speech by the Deputy Assistant Secretary General, Emerging Security Challenges Division, NATO International Staff, to the Second Workshop on Multinational Cooperation in Civil-Military Interoperability in Sofia, underlining the importance of civil-military interaction and multinational approaches in various frameworks, as well as their important contribution to allied and national capabilities to deal with new threats and challenges.
北约国际参谋部负责新兴安全挑战司副助理秘书长在索非亚举行的第二届军民互操作性多国合作研讨会上的讲话,强调了军民互动和各种框架下的多国方法的重要性,以及它们对盟国和国家应对新威胁和挑战的能力的重要贡献。
{"title":"Cilvil-military Interoperability in Support of NATO Emerging Security Challenges","authors":"J. Shea","doi":"10.11610/isij.2703","DOIUrl":"https://doi.org/10.11610/isij.2703","url":null,"abstract":"A speech by the Deputy Assistant Secretary General, Emerging Security Challenges Division, NATO International Staff, to the Second Workshop on Multinational Cooperation in Civil-Military Interoperability in Sofia, underlining the importance of civil-military interaction and multinational approaches in various frameworks, as well as their important contribution to allied and national capabilities to deal with new threats and challenges.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122749651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interoperability between Agencies and Nations 机构和国家之间的互操作性
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.1601
Magnus Wallmark
This article describes how secure and robust communications and information solutions, adapted for the National Security and Public Safety (NSPS) segment, can be obtained using commercial technology and existing infrastructure. Application areas include, for instance, emergency dispatch and command centres, agency communication and collaboration, and coast and border surveillance. The communication and information solutions follow the principles of a service-oriented architecture. The proposed approach to communications and information services for National Security and Public Safety facilitates improved operational capabilities and efficiency by providing access to much more advanced and timely information, by supporting efficient management of operations and by enabling cooperation and sharing of resources and information.
本文描述了如何使用商业技术和现有基础设施获得适用于国家安全和公共安全(NSPS)部分的安全可靠的通信和信息解决方案。例如,应用领域包括紧急调度和指挥中心、机构通信和协作以及海岸和边境监视。通信和信息解决方案遵循面向服务的体系结构的原则。拟议的国家安全和公共安全通信和信息服务方法通过提供更先进和及时的信息,通过支持有效的行动管理以及通过实现资源和信息的合作和共享,促进了作战能力和效率的提高。
{"title":"Interoperability between Agencies and Nations","authors":"Magnus Wallmark","doi":"10.11610/ISIJ.1601","DOIUrl":"https://doi.org/10.11610/ISIJ.1601","url":null,"abstract":"This article describes how secure and robust communications and information solutions, adapted for the National Security and Public Safety (NSPS) segment, can be obtained using commercial technology and existing infrastructure. Application areas include, for instance, emergency dispatch and command centres, agency communication and collaboration, and coast and border surveillance. The communication and information solutions follow the principles of a service-oriented architecture. The proposed approach to communications and information services for National Security and Public Safety facilitates improved operational capabilities and efficiency by providing access to much more advanced and timely information, by supporting efficient management of operations and by enabling cooperation and sharing of resources and information.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122772007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Genetic Program: A Technocratic Hypothesis on the Paradigm of Civilization 遗传程序:文明范式的技术官僚假说
Pub Date : 1900-01-01 DOI: 10.11610/ISIJ.0903
T. Semerdjiev
The Hypothesis Billions of years before the new era, while the third planet in the Solar system covered in dense clouds was still in its sleep, in the dark depths of the endless ocean of organoids, the last module of the Genetic Program began. It was part of the perfect algorithm for evolution of life on Earth. Also, it was the beginning of the second of the three qualitative transitions unexplained by the human beings, which mark the separate parts of the Creation.
假设在新时代到来的数十亿年前,当太阳系中第三颗行星被浓密的云层覆盖时,它还在沉睡,在无尽的类器官海洋的黑暗深处,基因计划的最后一个模块开始了。这是地球上生命进化的完美算法的一部分。同时,这也是人类无法解释的三个质变中的第二个质变的开始,这三个质变标志着创造的不同部分。
{"title":"The Genetic Program: A Technocratic Hypothesis on the Paradigm of Civilization","authors":"T. Semerdjiev","doi":"10.11610/ISIJ.0903","DOIUrl":"https://doi.org/10.11610/ISIJ.0903","url":null,"abstract":"The Hypothesis Billions of years before the new era, while the third planet in the Solar system covered in dense clouds was still in its sleep, in the dark depths of the endless ocean of organoids, the last module of the Genetic Program began. It was part of the perfect algorithm for evolution of life on Earth. Also, it was the beginning of the second of the three qualitative transitions unexplained by the human beings, which mark the separate parts of the Creation.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"90 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122852220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defining the Concept of ‘Hybrid Warfare’ Based on the Analysis of Russia’s Aggression against Ukraine 界定“混合战争”概念——基于对俄罗斯侵略乌克兰的分析
Pub Date : 1900-01-01 DOI: 10.11610/isij.4107
O. Manko, Y. Mikhieiev
There is no generally accepted definition of ‘Hybrid Warfare.’ Often, authors use the term depending on the particular context and the issue at stake. This article reviews the variety of views on the definition of the concept of ‘hybrid warfare,’ suggests an up-to-date interpretation of the concept, and identifies key characteristics of conflicts involving this type of warfare. It has been found that an information-psychological element forms the basis of ‘hybrid warfare’ with the aim to influence primarily public consciousness, rather than the armed forces or the State’s infrastructure. Moreover, it has been identified that the indicated threats are of ambiguous nature, and thus it is difficult to single out, detect and identify them in order to organize an appropriate response. The authors note that the concept of ‘hybrid warfare’ has originated in the realm of special forces’ operations in geopolitical terms by integrating the experience of severe confrontations threatening international security, combating terrorism and extremism of state and non-state actors. Along with the features of ‘hybrid warfare,’ the authors elaborate on its components and types, i.e. information warfare, cyber warfare, asymmetric warfare, task force hostilities, terrorist activities, urban guerrilla warfare, signs of humanitarian war, signs of ethnic conflict, trade war, etc. It has been proved that information operations’ planning is a significant component of the interagency approach to the decision-making under conditions of a new type of war – the ‘hybrid’ war.
“混合战争”并没有被普遍接受的定义。通常,作者会根据特定的语境和利害攸关的问题来使用这个术语。本文回顾了关于“混合战争”概念定义的各种观点,提出了对该概念的最新解释,并确定了涉及这类战争的冲突的关键特征。研究发现,信息心理因素构成了"混合战争"的基础,其目的主要是影响公众意识,而不是影响武装部队或国家基础设施。此外,已查明所指出的威胁具有模棱两可的性质,因此很难挑出、发现和确定它们,以便组织适当的反应。作者指出,“混合战争”的概念起源于地缘政治方面的特种部队行动领域,整合了威胁国际安全的严重对抗的经验,打击国家和非国家行为体的恐怖主义和极端主义。根据“混合战争”的特点,作者详细阐述了其构成和类型,即信息战、网络战、不对称战、特遣部队敌对行动、恐怖活动、城市游击战、人道主义战争迹象、种族冲突迹象、贸易战等。事实证明,在一种新型战争——“混合”战争条件下,信息作战规划是机构间决策方法的重要组成部分。
{"title":"Defining the Concept of ‘Hybrid Warfare’ Based on the Analysis of Russia’s Aggression against Ukraine","authors":"O. Manko, Y. Mikhieiev","doi":"10.11610/isij.4107","DOIUrl":"https://doi.org/10.11610/isij.4107","url":null,"abstract":"There is no generally accepted definition of ‘Hybrid Warfare.’ Often, authors use the term depending on the particular context and the issue at stake. This article reviews the variety of views on the definition of the concept of ‘hybrid warfare,’ suggests an up-to-date interpretation of the concept, and identifies key characteristics of conflicts involving this type of warfare. It has been found that an information-psychological element forms the basis of ‘hybrid warfare’ with the aim to influence primarily public consciousness, rather than the armed forces or the State’s infrastructure. Moreover, it has been identified that the indicated threats are of ambiguous nature, and thus it is difficult to single out, detect and identify them in order to organize an appropriate response. The authors note that the concept of ‘hybrid warfare’ has originated in the realm of special forces’ operations in geopolitical terms by integrating the experience of severe confrontations threatening international security, combating terrorism and extremism of state and non-state actors. Along with the features of ‘hybrid warfare,’ the authors elaborate on its components and types, i.e. information warfare, cyber warfare, asymmetric warfare, task force hostilities, terrorist activities, urban guerrilla warfare, signs of humanitarian war, signs of ethnic conflict, trade war, etc. It has been proved that information operations’ planning is a significant component of the interagency approach to the decision-making under conditions of a new type of war – the ‘hybrid’ war.","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131577915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Profiling Human Roles in Cybercrime 分析网络犯罪中的人类角色
Pub Date : 1900-01-01 DOI: 10.11610/isij.4313
Venelin Georgiev
{"title":"Profiling Human Roles in Cybercrime","authors":"Venelin Georgiev","doi":"10.11610/isij.4313","DOIUrl":"https://doi.org/10.11610/isij.4313","url":null,"abstract":"","PeriodicalId":159156,"journal":{"name":"Information & Security: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131102040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Information & Security: An International Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1