首页 > 最新文献

Network最新文献

英文 中文
AIS for Malware Detection in a Realistic IoT System: Challenges and Opportunities 在现实物联网系统中进行恶意软件检测的 AIS:挑战与机遇
Pub Date : 2023-11-16 DOI: 10.3390/network3040023
Hadeel Alrubayyi, G. Goteng, Mona Jaber
With the expansion of the digital world, the number of Internet of things (IoT) devices is evolving dramatically. IoT devices have limited computational power and a small memory. Consequently, existing and complex security methods are not suitable to detect unknown malware attacks in IoT networks. This has become a major concern in the advent of increasingly unpredictable and innovative cyberattacks. In this context, artificial immune systems (AISs) have emerged as an effective malware detection mechanism with low requirements for computation and memory. In this research, we first validate the malware detection results of a recent AIS solution using multiple datasets with different types of malware attacks. Next, we examine the potential gains and limitations of promising AIS solutions under realistic implementation scenarios. We design a realistic IoT framework mimicking real-life IoT system architectures. The objective is to evaluate the AIS solutions’ performance with regard to the system constraints. We demonstrate that AIS solutions succeed in detecting unknown malware in the most challenging conditions. Furthermore, the systemic results with different system architectures reveal the AIS solutions’ ability to transfer learning between IoT devices. Transfer learning is a pivotal feature in the presence of highly constrained devices in the network. More importantly, this work highlights that previously published AIS performance results, which were obtained in a simulation environment, cannot be taken at face value. In reality, AIS’s malware detection accuracy for IoT systems is 91% in the most restricted designed system compared to the 99% accuracy rate reported in the simulation experiment.
随着数字世界的扩展,物联网(IoT)设备的数量也在急剧增加。物联网设备的计算能力有限,内存也很小。因此,现有的复杂安全方法并不适合检测物联网网络中的未知恶意软件攻击。面对越来越难以预测的创新型网络攻击,这已成为一个重大问题。在这种情况下,人工免疫系统(AIS)作为一种有效的恶意软件检测机制应运而生,它对计算和内存的要求较低。在这项研究中,我们首先使用多种不同类型恶意软件攻击的数据集验证了最近的人工免疫系统解决方案的恶意软件检测结果。接下来,我们研究了在现实实施场景下有前景的 AIS 解决方案的潜在优势和局限性。我们模仿现实生活中的物联网系统架构设计了一个现实的物联网框架。目的是评估 AIS 解决方案在系统约束条件下的性能。我们证明,AIS 解决方案能在最具挑战性的条件下成功检测未知恶意软件。此外,不同系统架构下的系统结果表明,AIS 解决方案具有在物联网设备之间迁移学习的能力。在网络中设备高度受限的情况下,转移学习是一个关键特征。更重要的是,这项工作突出表明,以前公布的 AIS 性能结果是在模拟环境中获得的,不能照单全收。实际上,在最受限制的设计系统中,AIS 对物联网系统的恶意软件检测准确率为 91%,而模拟实验中报告的准确率为 99%。
{"title":"AIS for Malware Detection in a Realistic IoT System: Challenges and Opportunities","authors":"Hadeel Alrubayyi, G. Goteng, Mona Jaber","doi":"10.3390/network3040023","DOIUrl":"https://doi.org/10.3390/network3040023","url":null,"abstract":"With the expansion of the digital world, the number of Internet of things (IoT) devices is evolving dramatically. IoT devices have limited computational power and a small memory. Consequently, existing and complex security methods are not suitable to detect unknown malware attacks in IoT networks. This has become a major concern in the advent of increasingly unpredictable and innovative cyberattacks. In this context, artificial immune systems (AISs) have emerged as an effective malware detection mechanism with low requirements for computation and memory. In this research, we first validate the malware detection results of a recent AIS solution using multiple datasets with different types of malware attacks. Next, we examine the potential gains and limitations of promising AIS solutions under realistic implementation scenarios. We design a realistic IoT framework mimicking real-life IoT system architectures. The objective is to evaluate the AIS solutions’ performance with regard to the system constraints. We demonstrate that AIS solutions succeed in detecting unknown malware in the most challenging conditions. Furthermore, the systemic results with different system architectures reveal the AIS solutions’ ability to transfer learning between IoT devices. Transfer learning is a pivotal feature in the presence of highly constrained devices in the network. More importantly, this work highlights that previously published AIS performance results, which were obtained in a simulation environment, cannot be taken at face value. In reality, AIS’s malware detection accuracy for IoT systems is 91% in the most restricted designed system compared to the 99% accuracy rate reported in the simulation experiment.","PeriodicalId":19145,"journal":{"name":"Network","volume":"4 6","pages":"522-537"},"PeriodicalIF":0.0,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139268401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Cache Robustness in Information-Centric Networks: Per-Face Popularity Approaches 增强以信息为中心的网络中的缓存鲁棒性:逐面流行方法
Pub Date : 2023-11-01 DOI: 10.3390/network3040022
John Baugh, Jinhua Guo
Information-Centric Networking (ICN) is a new paradigm of network architecture that focuses on content rather than hosts as first-class citizens of the network. As part of these architectures, in-network storage devices are essential to provide end users with close copies of popular content, to reduce latency and improve the overall experience for the user but also to reduce network congestion and load on the content producers. To be effective, in-network storage devices, such as content storage routers, should maintain copies of the most popular content objects. Adversaries that wish to reduce this effectiveness can launch cache pollution attacks to eliminate the benefit of the in-network storage device caches. Therefore, it is crucial to protect these devices and ensure the highest hit rate possible. This paper demonstrates Per-Face Popularity approaches to reducing the effects of cache pollution and improving hit rates by normalizing assessed popularity across all faces of content storage routers. The mechanisms that were developed prevent consumers, whether legitimate or malicious, on any single face or small number of faces from overwhelmingly influencing the content objects that remain in the cache. The results demonstrate that per-face approaches generally have much better hit rates than currently used cache replacement techniques.
信息中心网络(Information-Centric Networking, ICN)是一种新的网络架构范式,它关注的是内容,而不是作为网络一等公民的主机。作为这些体系结构的一部分,网络内存储设备对于为最终用户提供流行内容的紧密副本、减少延迟和改善用户的整体体验以及减少网络拥塞和内容生产者的负载至关重要。为了提高效率,网络内存储设备(如内容存储路由器)应该维护最流行的内容对象的副本。希望降低这种有效性的攻击者可以发起缓存污染攻击,以消除网络内存储设备缓存的好处。因此,保护这些设备并确保尽可能高的命中率至关重要。本文演示了逐面流行度方法,通过规范化内容存储路由器所有面评估的流行度来减少缓存污染的影响并提高命中率。所开发的机制可防止消费者(无论是合法的还是恶意的)在任何单一或少数面孔上对保留在缓存中的内容对象产生压倒性影响。结果表明,与目前使用的缓存替换技术相比,逐面方法通常具有更好的命中率。
{"title":"Enhancing Cache Robustness in Information-Centric Networks: Per-Face Popularity Approaches","authors":"John Baugh, Jinhua Guo","doi":"10.3390/network3040022","DOIUrl":"https://doi.org/10.3390/network3040022","url":null,"abstract":"Information-Centric Networking (ICN) is a new paradigm of network architecture that focuses on content rather than hosts as first-class citizens of the network. As part of these architectures, in-network storage devices are essential to provide end users with close copies of popular content, to reduce latency and improve the overall experience for the user but also to reduce network congestion and load on the content producers. To be effective, in-network storage devices, such as content storage routers, should maintain copies of the most popular content objects. Adversaries that wish to reduce this effectiveness can launch cache pollution attacks to eliminate the benefit of the in-network storage device caches. Therefore, it is crucial to protect these devices and ensure the highest hit rate possible. This paper demonstrates Per-Face Popularity approaches to reducing the effects of cache pollution and improving hit rates by normalizing assessed popularity across all faces of content storage routers. The mechanisms that were developed prevent consumers, whether legitimate or malicious, on any single face or small number of faces from overwhelmingly influencing the content objects that remain in the cache. The results demonstrate that per-face approaches generally have much better hit rates than currently used cache replacement techniques.","PeriodicalId":19145,"journal":{"name":"Network","volume":"80 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135271477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey for Soil Sensing with IOT and Traditional Systems 基于物联网和传统系统的土壤遥感调查
Pub Date : 2023-10-08 DOI: 10.3390/network3040021
Juexing Wang, Xiao Zhang, Li Xiao, Tianxing Li
Smart Agriculture has gained significant attention in recent years due to its benefits for both humans and the environment. However, the high costs associated with commercial devices have prevented some agricultural lands from reaping the advantages of technological advancements. Traditional methods, such as reflectance spectroscopy, offer reliable and repeatable solutions for soil property sensing, but the high costs and redundancy of preprocessing steps limit their on-site applications in real-world scenarios. Recently, RF-based soil sensing systems have opened a new dimension in soil property analysis using IoT-based systems. These systems are not only portable, but also significantly cheaper than traditional methods. In this paper, we carry out a comprehensive review of state-of-the-art soil property sensing, divided into four areas. First, we delve into the fundamental knowledge and studies of reflectance-spectroscopy-based soil sensing, also known as traditional methods. Secondly, we introduce some RF-based IoT soil sensing systems employing a variety of signal types. In the third segment, we introduce the details of sample pretreatment, inference methods, and evaluation metrics. Finally, after analyzing the strengths and weaknesses of the current work, we discuss potential future aspects of soil property sensing.
近年来,智能农业因其对人类和环境的好处而受到了极大的关注。然而,与商业设备相关的高成本阻碍了一些农业用地获得技术进步的好处。传统的方法,如反射光谱,为土壤特性传感提供了可靠和可重复的解决方案,但高成本和预处理步骤的冗余限制了它们在实际场景中的现场应用。近年来,基于射频的土壤传感系统为基于物联网的土壤特性分析开辟了一个新的维度。这些系统不仅便携,而且比传统方法便宜得多。在本文中,我们进行了全面的回顾最新的土壤性质传感,分为四个方面。首先,我们深入研究了基于反射光谱的土壤传感的基础知识和研究,也被称为传统方法。其次,我们介绍了一些采用各种信号类型的基于射频的物联网土壤传感系统。在第三部分中,我们详细介绍了样本预处理、推理方法和评估指标。最后,在分析了当前工作的优势和不足之后,我们讨论了土壤性质传感的潜在未来发展方向。
{"title":"Survey for Soil Sensing with IOT and Traditional Systems","authors":"Juexing Wang, Xiao Zhang, Li Xiao, Tianxing Li","doi":"10.3390/network3040021","DOIUrl":"https://doi.org/10.3390/network3040021","url":null,"abstract":"Smart Agriculture has gained significant attention in recent years due to its benefits for both humans and the environment. However, the high costs associated with commercial devices have prevented some agricultural lands from reaping the advantages of technological advancements. Traditional methods, such as reflectance spectroscopy, offer reliable and repeatable solutions for soil property sensing, but the high costs and redundancy of preprocessing steps limit their on-site applications in real-world scenarios. Recently, RF-based soil sensing systems have opened a new dimension in soil property analysis using IoT-based systems. These systems are not only portable, but also significantly cheaper than traditional methods. In this paper, we carry out a comprehensive review of state-of-the-art soil property sensing, divided into four areas. First, we delve into the fundamental knowledge and studies of reflectance-spectroscopy-based soil sensing, also known as traditional methods. Secondly, we introduce some RF-based IoT soil sensing systems employing a variety of signal types. In the third segment, we introduce the details of sample pretreatment, inference methods, and evaluation metrics. Finally, after analyzing the strengths and weaknesses of the current work, we discuss potential future aspects of soil property sensing.","PeriodicalId":19145,"journal":{"name":"Network","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135251310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing Black Hole Attacks in AODV Using RREQ Packets 利用RREQ报文防范AODV中的黑洞攻击
Pub Date : 2023-10-07 DOI: 10.3390/network3040020
Yujin Nakano, Tomofumi Matsuzawa
Ad hoc networks, formed by multiple wireless communication devices without any connection to wired or intermediary devices such as by access points, are widely used in various situations to construct flexible networks that are not restricted by communication facilities. Ad hoc networks can rarely use existing infrastructure, and no authentication infrastructure is included in these networks as a trusted third party. Hence, distinguishing between ordinary and malicious terminals can be challenging. As a result, black hole attacks are among the most serious security threats to Ad hoc On-demand Distance Vector (AODV) routing, which is one of the most popular routing protocols in mobile ad hoc networks. In this study, we propose a defense method against black hole attacks in which malicious nodes are actively detected to prevent attacks. We applied the proposed method to a network containing nodes engaging in black hole attacks, confirming that the network’s performance is dramatically improved compared to a network without the proposed method.
Ad hoc网络由多个无线通信设备组成,不需要与有线或中间设备(如接入点)连接,广泛应用于各种场合,以构建不受通信设施限制的灵活网络。自组织网络很少使用现有的基础设施,并且这些网络中没有身份验证基础设施作为受信任的第三方。因此,区分普通终端和恶意终端可能具有挑战性。因此,黑洞攻击是移动自组织网络中最流行的路由协议之一——自组织按需距离矢量(AODV)路由最严重的安全威胁之一。在本研究中,我们提出了一种针对黑洞攻击的防御方法,该方法主动检测恶意节点以防止攻击。我们将提出的方法应用于包含参与黑洞攻击的节点的网络,证实与没有提出方法的网络相比,网络的性能得到了显着提高。
{"title":"Preventing Black Hole Attacks in AODV Using RREQ Packets","authors":"Yujin Nakano, Tomofumi Matsuzawa","doi":"10.3390/network3040020","DOIUrl":"https://doi.org/10.3390/network3040020","url":null,"abstract":"Ad hoc networks, formed by multiple wireless communication devices without any connection to wired or intermediary devices such as by access points, are widely used in various situations to construct flexible networks that are not restricted by communication facilities. Ad hoc networks can rarely use existing infrastructure, and no authentication infrastructure is included in these networks as a trusted third party. Hence, distinguishing between ordinary and malicious terminals can be challenging. As a result, black hole attacks are among the most serious security threats to Ad hoc On-demand Distance Vector (AODV) routing, which is one of the most popular routing protocols in mobile ad hoc networks. In this study, we propose a defense method against black hole attacks in which malicious nodes are actively detected to prevent attacks. We applied the proposed method to a network containing nodes engaging in black hole attacks, confirming that the network’s performance is dramatically improved compared to a network without the proposed method.","PeriodicalId":19145,"journal":{"name":"Network","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135300794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Modern Internet Transport Protocols over GEO Satellite Links 地球同步轨道卫星链路上现代互联网传输协议的评估
Pub Date : 2023-09-18 DOI: 10.3390/network3030019
Aljuhara Alshagri, Abdulmohsen Mutairi
New versions of HTTP protocols have been developed to overcome many of the limitations of the original HTTP/1.1 protocol and its underlying transport mechanism over TCP. In this paper, we investigated the performance of modern Internet protocols such as HTTP/2 over TCP and HTTP/3 over QUIC in high-latency satellite links. The goal was to uncover the interaction of the new features of HTTP such as parallel streams and optimized security handshake with modern congestion control algorithms such as CUBIC and BBR over high-latency links. An experimental satellite network emulation testbed was developed for the evaluation. The study analyzed several user-level web performance metrics such as average page load time, First Contentful Paint and Largest Contentful Paint. The results indicate an overhead problem with HTTP/3 that becomes more significant when using a loss-based congestion control algorithm such as CUBIC which is widely used on the Internet. Also, the results highlight the significance of the web page structure and how objects are distributed in it. Among the various Internet protocols evaluated, the results show that HTTP/3 over QUIC will perform better by an average of 35% than HTTP/2 over TCP in satellites links specifically with a more aggressive congestion algorithm such as BBR. This can be attributed to the non-blocking stream multiplexing feature of QUIC and the reduced TLS handshake of HTTP/3.
HTTP协议的新版本已经开发出来,以克服原始HTTP/1.1协议及其基于TCP的底层传输机制的许多限制。在本文中,我们研究了现代互联网协议的性能,如基于TCP的HTTP/2和基于QUIC的HTTP/3在高延迟卫星链路上的性能。目标是揭示HTTP的新特性(如并行流和优化的安全握手)与现代拥塞控制算法(如CUBIC和BBR)在高延迟链路上的交互。为此,建立了卫星网络仿真实验平台。该研究分析了几个用户级别的web性能指标,如平均页面加载时间、第一次内容绘制和最大内容绘制。结果表明,当使用基于损失的拥塞控制算法(如在Internet上广泛使用的CUBIC)时,HTTP/3的开销问题变得更加明显。此外,研究结果还突出了网页结构的重要性以及对象在其中的分布方式。在评估的各种互联网协议中,结果表明,在卫星链路中,基于QUIC的HTTP/3的性能比基于TCP的HTTP/2平均高出35%,特别是使用BBR等更激进的拥塞算法。这可以归因于QUIC的非阻塞流多路复用特性和HTTP/3的减少TLS握手。
{"title":"Evaluation of Modern Internet Transport Protocols over GEO Satellite Links","authors":"Aljuhara Alshagri, Abdulmohsen Mutairi","doi":"10.3390/network3030019","DOIUrl":"https://doi.org/10.3390/network3030019","url":null,"abstract":"New versions of HTTP protocols have been developed to overcome many of the limitations of the original HTTP/1.1 protocol and its underlying transport mechanism over TCP. In this paper, we investigated the performance of modern Internet protocols such as HTTP/2 over TCP and HTTP/3 over QUIC in high-latency satellite links. The goal was to uncover the interaction of the new features of HTTP such as parallel streams and optimized security handshake with modern congestion control algorithms such as CUBIC and BBR over high-latency links. An experimental satellite network emulation testbed was developed for the evaluation. The study analyzed several user-level web performance metrics such as average page load time, First Contentful Paint and Largest Contentful Paint. The results indicate an overhead problem with HTTP/3 that becomes more significant when using a loss-based congestion control algorithm such as CUBIC which is widely used on the Internet. Also, the results highlight the significance of the web page structure and how objects are distributed in it. Among the various Internet protocols evaluated, the results show that HTTP/3 over QUIC will perform better by an average of 35% than HTTP/2 over TCP in satellites links specifically with a more aggressive congestion algorithm such as BBR. This can be attributed to the non-blocking stream multiplexing feature of QUIC and the reduced TLS handshake of HTTP/3.","PeriodicalId":19145,"journal":{"name":"Network","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135202975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions 云安全框架、问题及解决方案分析
Pub Date : 2023-09-12 DOI: 10.3390/network3030018
Milan Chauhan, Stavros Shiaeles
The rapidly growing use of cloud computing raises security concerns. This study paper seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting solutions. This research provides greater knowledge of the various frameworks, assisting in making educated decisions about selecting and implementing suitable security measures for cloud-based systems. The study begins with introducing cloud technology, its issues and frameworks to secure infrastructure, and an examination of the various cloud security frameworks available in the industry. A full comparison is performed to assess the framework’s focus, scope, approach, strength, limitations, implementation steps and tools required in the implementation process. The frameworks focused on in the paper are COBIT5, NIST (National Institute of Standards and Technology), ISO (International Organization for Standardization), CSA (Cloud Security Alliance) STAR and AWS (Amazon Web Services) well-architected framework. Later, the study digs into identifying and analyzing prevalent cloud security issues. This contains attack vectors that are inherent in cloud settings. Plus, this part includes the risk factor of top cloud security threats and their effect on cloud platforms. Also, it presents ideas and countermeasures to reduce the observed difficulties.
云计算的快速增长引起了人们对安全的担忧。本研究旨在研究云安全框架,解决与云相关的问题并提出解决方案。这项研究提供了更多关于各种框架的知识,有助于为基于云的系统选择和实施合适的安全措施做出明智的决策。该研究首先介绍了云技术,其问题和框架,以确保基础设施的安全,并检查了行业中可用的各种云安全框架。进行全面比较,以评估框架的重点、范围、方法、强度、限制、实施步骤和实施过程中所需的工具。本文关注的框架是COBIT5、NIST(美国国家标准与技术研究所)、ISO(国际标准化组织)、CSA(云安全联盟)、STAR和AWS(亚马逊网络服务)架构良好的框架。随后,该研究深入探讨了识别和分析流行的云安全问题。这包含了云设置中固有的攻击向量。此外,这一部分还包括顶级云安全威胁的风险因素及其对云平台的影响。并提出了减少观察到的困难的思路和对策。
{"title":"An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions","authors":"Milan Chauhan, Stavros Shiaeles","doi":"10.3390/network3030018","DOIUrl":"https://doi.org/10.3390/network3030018","url":null,"abstract":"The rapidly growing use of cloud computing raises security concerns. This study paper seeks to examine cloud security frameworks, addressing cloud-associated issues and suggesting solutions. This research provides greater knowledge of the various frameworks, assisting in making educated decisions about selecting and implementing suitable security measures for cloud-based systems. The study begins with introducing cloud technology, its issues and frameworks to secure infrastructure, and an examination of the various cloud security frameworks available in the industry. A full comparison is performed to assess the framework’s focus, scope, approach, strength, limitations, implementation steps and tools required in the implementation process. The frameworks focused on in the paper are COBIT5, NIST (National Institute of Standards and Technology), ISO (International Organization for Standardization), CSA (Cloud Security Alliance) STAR and AWS (Amazon Web Services) well-architected framework. Later, the study digs into identifying and analyzing prevalent cloud security issues. This contains attack vectors that are inherent in cloud settings. Plus, this part includes the risk factor of top cloud security threats and their effect on cloud platforms. Also, it presents ideas and countermeasures to reduce the observed difficulties.","PeriodicalId":19145,"journal":{"name":"Network","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135886069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Network
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1