首页 > 最新文献

Cybersecurity: Education, Science, Technique最新文献

英文 中文
ANALYSIS OF METHODS FOR DATA CONFIDENTIALITY ENSURING DURING TRANSMITTING FROM UAV 无人机传输数据保密性保障方法分析
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.167186
S. Gnatyuk, Vasyl Kinzeryavyy, Yuliia Polishchuk, O. Nechyporuk, Bohdan Horbakha
The rapid development of unmanned aerial vehicles (UAVs), as well as the expansion of the list of actions performed by modern UAVs, led to increased requirements for the safety and reliability of data transmission. In the context of warfare, when confidential information is collected, the protection of such information is a top priority. The practical level of conducting aerial reconnaissance during current warfare demonstrates the urgent need to create UAV which capable of performing flight tasks and aerial reconnaissance in the mode of installed radio interference, and also emphasizes the importance of ensuring the data confidentiality about target objects transmitted by an optical channel for the implementation of their processing in automated systems. The paper provides a review and comparative analysis of modern cryptoalgorithms that are used to ensure data confidentiality during their transmission by radio channel from UAV to ground objects. There are the system of criteria (multi criteria analysis) was used to compare following cryptographic algorithms (similar to AES, NESSIE, etc competitions): block and key sizes; modes of operation; encryption speed; memory requirements; resistance (security) to cryptanalysis. The conducted analysis showed that each cryptographic algorithm has advantages and disadvantages. Also, there is no universal cryptographic algorithm that capable to resolve all privacy problems in UAV. According to the limited resources in the process of UAV operation, it is necessary to create a universal set (dataset) of cryptographic algorithms that could solve various problems in different conditions including different aspects of UAV exploitation. It is these studies that will be devoted to the further work of the authors within the framework of the ongoing scientific project.
无人驾驶飞行器(uav)的快速发展,以及现代uav执行的行动列表的扩展,导致对数据传输的安全性和可靠性的要求增加。在战争背景下,当收集机密信息时,保护这些信息是重中之重。在当前战争中进行空中侦察的实际水平表明,迫切需要制造能够在安装无线电干扰模式下执行飞行任务和空中侦察的无人机,并且也强调了确保通过光通道传输的目标物体的数据保密性对于在自动化系统中实现其处理的重要性。本文综述和比较分析了用于确保无人机通过无线电信道向地面物体传输数据保密性的现代加密算法。有系统的标准(多标准分析)用于比较以下加密算法(类似于AES, NESSIE等竞赛):块和密钥大小;操作方式;加密速度;内存需求;对密码分析的抵抗力(安全性)。分析表明,每种加密算法都有其优缺点。此外,目前还没有一种通用的加密算法能够解决无人机中的所有隐私问题。根据无人机运行过程中资源的有限性,有必要创建一个通用的加密算法集(数据集),以解决不同条件下的各种问题,包括无人机开发的不同方面。正是这些研究将在正在进行的科学项目框架内用于作者的进一步工作。
{"title":"ANALYSIS OF METHODS FOR DATA CONFIDENTIALITY ENSURING DURING TRANSMITTING FROM UAV","authors":"S. Gnatyuk, Vasyl Kinzeryavyy, Yuliia Polishchuk, O. Nechyporuk, Bohdan Horbakha","doi":"10.28925/2663-4023.2022.17.167186","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.167186","url":null,"abstract":"The rapid development of unmanned aerial vehicles (UAVs), as well as the expansion of the list of actions performed by modern UAVs, led to increased requirements for the safety and reliability of data transmission. In the context of warfare, when confidential information is collected, the protection of such information is a top priority. The practical level of conducting aerial reconnaissance during current warfare demonstrates the urgent need to create UAV which capable of performing flight tasks and aerial reconnaissance in the mode of installed radio interference, and also emphasizes the importance of ensuring the data confidentiality about target objects transmitted by an optical channel for the implementation of their processing in automated systems. The paper provides a review and comparative analysis of modern cryptoalgorithms that are used to ensure data confidentiality during their transmission by radio channel from UAV to ground objects. There are the system of criteria (multi criteria analysis) was used to compare following cryptographic algorithms (similar to AES, NESSIE, etc competitions): block and key sizes; modes of operation; encryption speed; memory requirements; resistance (security) to cryptanalysis. The conducted analysis showed that each cryptographic algorithm has advantages and disadvantages. Also, there is no universal cryptographic algorithm that capable to resolve all privacy problems in UAV. According to the limited resources in the process of UAV operation, it is necessary to create a universal set (dataset) of cryptographic algorithms that could solve various problems in different conditions including different aspects of UAV exploitation. It is these studies that will be devoted to the further work of the authors within the framework of the ongoing scientific project.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132386890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AUTOMATED LOGISTIC FLOW SYSTEM FOR TRADING ENTERPRISE 贸易企业自动化物流系统
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.7.7284
Svitlаnа Rzаiеvа, Dmуtrо Rzаiеv, V. Kraskevich, A. Roskladka, V. Gamaliy
The article addresses one of the most pressing problems for a trading enterprise, namely the problem of routing logistics flows for efficient enterprise management. To optimize itineraries, we use state-of-the-art electronic navigation and mapping systems that can be implemented in modern computer technology, from online services available on any computer to mobile devices. Navigation and mapping systems are distributed software complexes with an array of information stored in database management systems. They involve millions of static objects and huge amounts of dynamic data around the world.To optimize the logistics flows, an algorithm for an automated routing system is described. This system solves the problems of automatic calculation of the construction and recognition of the optimal route between the specified points of its beginning and the end, tracking of movement on a given route and, in the case of congested roads, redirection of logistics flows.Based on the researches and experiments on the formation of a cognitive map in the human mind and the perception of the route description, an algorithm for storing and displaying route data is considered. This algorithm takes into account the personal psychology of perception of cartographic information. Developing an algorithm for describing the routing of trading enterprise traffic flows is creating a model of automatically found path between the predetermined points of its beginning and end. This mapping information is personalized, easy to read, fast to remember, and insensitive to user errors.The proposed algorithm is universal and can be used to solve a wide range of problems of logistic flows optimization.
本文讨论了贸易企业面临的最紧迫的问题之一,即如何有效地进行企业管理的物流路线问题。为了优化行程,我们使用最先进的电子导航和地图系统,这些系统可以在现代计算机技术中实现,从任何计算机到移动设备都可以提供在线服务。导航和地图系统是分布式的软件综合体,其中包含存储在数据库管理系统中的一系列信息。它们涉及世界各地数百万静态对象和大量动态数据。为了优化物流流程,提出了一种自动路由系统的算法。该系统解决了自动计算构建和识别指定起点和终点之间的最优路线,跟踪给定路线上的运动,以及在道路拥挤的情况下,重新定向物流流的问题。基于认知地图在人脑中的形成和对路径描述的感知的研究和实验,提出了一种存储和显示路径数据的算法。该算法考虑了个人对地图信息的感知心理。开发一种描述贸易企业流量路由的算法,就是在预定的起点和终点之间建立一个自动找到路径的模型。这种映射信息是个性化的,易于阅读、快速记忆,并且对用户错误不敏感。该算法具有通用性,可用于解决各种物流优化问题。
{"title":"AUTOMATED LOGISTIC FLOW SYSTEM FOR TRADING ENTERPRISE","authors":"Svitlаnа Rzаiеvа, Dmуtrо Rzаiеv, V. Kraskevich, A. Roskladka, V. Gamaliy","doi":"10.28925/2663-4023.2020.7.7284","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.7.7284","url":null,"abstract":"The article addresses one of the most pressing problems for a trading enterprise, namely the problem of routing logistics flows for efficient enterprise management. To optimize itineraries, we use state-of-the-art electronic navigation and mapping systems that can be implemented in modern computer technology, from online services available on any computer to mobile devices. Navigation and mapping systems are distributed software complexes with an array of information stored in database management systems. They involve millions of static objects and huge amounts of dynamic data around the world.\u0000To optimize the logistics flows, an algorithm for an automated routing system is described. This system solves the problems of automatic calculation of the construction and recognition of the optimal route between the specified points of its beginning and the end, tracking of movement on a given route and, in the case of congested roads, redirection of logistics flows.\u0000Based on the researches and experiments on the formation of a cognitive map in the human mind and the perception of the route description, an algorithm for storing and displaying route data is considered. This algorithm takes into account the personal psychology of perception of cartographic information. Developing an algorithm for describing the routing of trading enterprise traffic flows is creating a model of automatically found path between the predetermined points of its beginning and end. This mapping information is personalized, easy to read, fast to remember, and insensitive to user errors.\u0000The proposed algorithm is universal and can be used to solve a wide range of problems of logistic flows optimization.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126467582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
INFORMATION PROTECTION IN “SMART CITY” TECHNOLOGIES 智慧城市技术中的信息保护
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.11.100109
M. Moshenchenko, Bohdan Zhurakovskyi
This article discusses the problems of information security in "SmartCity" systems. The comparison of existing solutions and data protocols for wired solutions, such as IPsec, SSL, TLS and wireless systems: ZigBee, Z-Wave, Thread, WeMo. The advantages and disadvantages of each of the existing systems are analyzed. The SmartCity system must be able to recognize a specific situation that arises in the house, city, workplace, when processing large amounts of data, to respond accordingly: one of the systems can control the behavior of other systems using a pre-designed algorithm. The main purpose of the "SmartCity" system is to save energy, which is becoming increasingly important due to their rise in price in Ukraine. Therefore, intellectualization is becoming increasingly popular, catching up with global trends in home automation. However, despite the development and gradual formal and informal standardization of smart city technologies, and any home automation, there is still the problem of choosing protocols for the transfer of information between controlled devices, sensors and other elements. This problem is especially serious when it is necessary to ensure the confidentiality and integrity of data circulating in the system. The purpose of this study is to find a secure network protocol that allows you to use it in automatic signaling equipment, so you can not use special software and hardware solutions to affect the confidentiality and integrity of information.In the article is not the last issue of information security such a house of the city government system or production, can cause very great damage to its owner. As remote management and access to information are quite common nowadays, secure schemes, encryption and protection schemes should be used to reduce the percentage of vulnerabilities and prevent intruders from causing harm.
本文讨论了“智慧城市”系统中的信息安全问题。有线解决方案的现有方案和数据协议的比较,如IPsec、SSL、TLS和无线系统:ZigBee、Z-Wave、Thread、WeMo。分析了现有系统的优缺点。当处理大量数据时,智能城市系统必须能够识别房屋、城市、工作场所中出现的特定情况,并做出相应的响应:其中一个系统可以使用预先设计的算法控制其他系统的行为。“智能城市”系统的主要目的是节约能源,由于乌克兰的价格上涨,这一点变得越来越重要。因此,智能化越来越受欢迎,赶上了全球家庭自动化的趋势。然而,尽管智能城市技术和任何家庭自动化的发展和逐步的正式和非正式的标准化,仍然存在选择协议在被控制设备、传感器和其他元素之间传输信息的问题。当需要保证在系统中流通的数据的保密性和完整性时,这个问题尤其严重。本研究的目的是寻找一种安全的网络协议,允许您在自动信令设备中使用它,因此您可以不使用特殊的软件和硬件解决方案来影响信息的保密性和完整性。在文章中并不是最后一个发布信息安全问题的城市政府系统或生产这样一个房子,会对其主人造成非常大的伤害。由于远程管理和信息访问在当今非常普遍,因此应该使用安全方案、加密和保护方案来减少漏洞的百分比,并防止入侵者造成伤害。
{"title":"INFORMATION PROTECTION IN “SMART CITY” TECHNOLOGIES","authors":"M. Moshenchenko, Bohdan Zhurakovskyi","doi":"10.28925/2663-4023.2021.11.100109","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.11.100109","url":null,"abstract":"This article discusses the problems of information security in \"SmartCity\" systems. The comparison of existing solutions and data protocols for wired solutions, such as IPsec, SSL, TLS and wireless systems: ZigBee, Z-Wave, Thread, WeMo. The advantages and disadvantages of each of the existing systems are analyzed. The SmartCity system must be able to recognize a specific situation that arises in the house, city, workplace, when processing large amounts of data, to respond accordingly: one of the systems can control the behavior of other systems using a pre-designed algorithm. The main purpose of the \"SmartCity\" system is to save energy, which is becoming increasingly important due to their rise in price in Ukraine. Therefore, intellectualization is becoming increasingly popular, catching up with global trends in home automation. However, despite the development and gradual formal and informal standardization of smart city technologies, and any home automation, there is still the problem of choosing protocols for the transfer of information between controlled devices, sensors and other elements. This problem is especially serious when it is necessary to ensure the confidentiality and integrity of data circulating in the system. The purpose of this study is to find a secure network protocol that allows you to use it in automatic signaling equipment, so you can not use special software and hardware solutions to affect the confidentiality and integrity of information.In the article is not the last issue of information security such a house of the city government system or production, can cause very great damage to its owner. As remote management and access to information are quite common nowadays, secure schemes, encryption and protection schemes should be used to reduce the percentage of vulnerabilities and prevent intruders from causing harm.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114205926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EXPERIMENTAL STUDIES OF THE STAND OF SIMULATION MODELING OF LASER MICROPHONE OPERATION FOR REMOVAL OF ACOUSTIC INFORMATION 激光传声器声学信息去除操作仿真建模的实验研究
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.14.131147
Maksym Martseniuk, P. Skladannyi, V. Astapenya
He who possesses information owns the world. This statement is becoming more relevant every day. It is information that has become a tool for modern management and development. Therefore, the role of information technology is also constantly growing along with the risk of their malicious use. Attackers use all possible methods and means of technical intelligence to use potentially possible and create new types of information leakage channels to intercept it. object of information activities. Such oscillations caused by a certain speech (acoustic) signal can be intercepted by means of long-range intelligence. Most often, a laser microphone is used as such. The essence of its action is to emit a laser on the surface of the selected OID, which circulates a speech signal that creates sound vibrations on this surface. The movement of the surface leads to the modulation of the wave by phase, which is manifested in the variable nature of the sound signal Doppler shift of the frequency of the received signal. Often, such a surface is the glass of the windows, which reflects the beam to the receiver, to which is connected a detector that can reproduce the sound from the OID. This study aims to study the dependence of the laser microphone on such factors as: the location of the radiation source and the beam receiver from the membrane; membrane surface material; receiver type; materials of fencing constructions OID. The goal is to create a stand to demonstrate the operation of a laser microphone. The research process is carried out on a smaller scale, which is why an improvised room in the form of a cardboard box was chosen as the OID. Available tools were used to reproduce the operation of the laser microphone, so a laser pointer was chosen as the illuminator, and devices such as a solar panel, a light sensor and a signal amplifier microphone were used as the receiver. The study of the influence of selected factors was performed by measuring the voltage and volume of the acoustic signal using a multimeter and a certified program on the tablet, respectively.
谁拥有信息,谁就拥有世界。这句话每天都变得越来越重要。信息已经成为现代管理和发展的工具。因此,信息技术的作用也随着其被恶意利用的风险不断增大。攻击者利用一切可能的技术情报方法和手段,利用潜在的可能和创造新型的信息泄露通道进行拦截。信息活动的对象。这种由某种语音(声)信号引起的振荡可以用远程情报手段拦截。大多数情况下,激光麦克风就是这样使用的。其作用的本质是在选定的OID表面发射激光,该激光循环语音信号,在该表面产生声音振动。表面的运动导致了波的相位调制,这表现在声音信号的多普勒频移的可变性上。通常,这样的表面是窗户的玻璃,它将光束反射到接收器,接收器上连接着一个探测器,可以从OID中复制声音。本研究旨在研究激光传声器对以下因素的依赖关系:辐射源的位置和来自膜的光束接收器;膜表面材料;接收机类型;围栏结构材料。目标是创建一个支架来演示激光麦克风的操作。研究过程是在一个较小的规模上进行的,这就是为什么选择一个纸箱形式的临时房间作为OID的原因。利用现有的工具来重现激光麦克风的操作,因此选择激光笔作为照明,并使用太阳能电池板,光传感器和信号放大器麦克风等设备作为接收器。所选因素的影响研究是通过在平板上分别使用万用表和认证程序测量声信号的电压和体积来进行的。
{"title":"EXPERIMENTAL STUDIES OF THE STAND OF SIMULATION MODELING OF LASER MICROPHONE OPERATION FOR REMOVAL OF ACOUSTIC INFORMATION","authors":"Maksym Martseniuk, P. Skladannyi, V. Astapenya","doi":"10.28925/2663-4023.2021.14.131147","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.131147","url":null,"abstract":"He who possesses information owns the world. This statement is becoming more relevant every day. It is information that has become a tool for modern management and development. Therefore, the role of information technology is also constantly growing along with the risk of their malicious use. Attackers use all possible methods and means of technical intelligence to use potentially possible and create new types of information leakage channels to intercept it. object of information activities. Such oscillations caused by a certain speech (acoustic) signal can be intercepted by means of long-range intelligence. Most often, a laser microphone is used as such. The essence of its action is to emit a laser on the surface of the selected OID, which circulates a speech signal that creates sound vibrations on this surface. The movement of the surface leads to the modulation of the wave by phase, which is manifested in the variable nature of the sound signal Doppler shift of the frequency of the received signal. Often, such a surface is the glass of the windows, which reflects the beam to the receiver, to which is connected a detector that can reproduce the sound from the OID. This study aims to study the dependence of the laser microphone on such factors as: the location of the radiation source and the beam receiver from the membrane; membrane surface material; receiver type; materials of fencing constructions OID. The goal is to create a stand to demonstrate the operation of a laser microphone. The research process is carried out on a smaller scale, which is why an improvised room in the form of a cardboard box was chosen as the OID. Available tools were used to reproduce the operation of the laser microphone, so a laser pointer was chosen as the illuminator, and devices such as a solar panel, a light sensor and a signal amplifier microphone were used as the receiver. The study of the influence of selected factors was performed by measuring the voltage and volume of the acoustic signal using a multimeter and a certified program on the tablet, respectively.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123859890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ISO 27001: ANALYSIS OF CHANGES AND COMPLIANCE FEATURES OF THE NEW VERSION OF THE STANDARD Iso 27001:分析新版标准的变化和符合性特征
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2023.19.4655
Yevhenii Kurii, I. Opirskyy
Managing information security in the organization may be a daunting task, especially considering that it may encompass many areas from physical and network security to human resources security and management of suppliers. This is where security frameworks come in handy and put formality into the process of the design and implementation of the security strategy. While there are a bunch of different information security frameworks out in the wild, the most commonly-found and preferred by security professionals worldwide is ISO/IEC 27001. It combines both the quite comprehensive set of security controls to cover the most important security areas and wide applicability which allows applying this framework to all kinds of organizations. While cyberspace is constantly changing, companies should also adapt their approaches to the organization of information security processes. In order to respond to new challenges and threats to cyber security, the International Organization for Standardization (ISO) at the end of 2022 has published an updated version of the ISO/IEC 27001:2022 standard, which from now on should be taken into account by all organizations that aim to implement and certify its information security management system (ISMS). The purpose of this article is to provide a brief overview of the new edition of the popular standard, фтв describe the key changes in the structure and description of security controls; as well as develop recommendations for achieving compliance with the requirements of the updated version of the standard.
管理组织中的信息安全可能是一项艰巨的任务,特别是考虑到它可能包含从物理和网络安全到人力资源安全和供应商管理的许多领域。这就是安全框架派上用场的地方,它使安全策略的设计和实现过程变得正式。虽然目前有很多不同的信息安全框架,但全球安全专业人员最常用和最喜欢的是ISO/IEC 27001。它结合了相当全面的安全控制集,涵盖了最重要的安全领域,并且具有广泛的适用性,允许将该框架应用于所有类型的组织。随着网络空间的不断变化,公司也应该调整他们的方法来组织信息安全流程。为了应对网络安全面临的新挑战和威胁,国际标准化组织(ISO)于2022年底发布了ISO/IEC 27001:2022标准的更新版本,从现在开始,所有旨在实施和认证其信息安全管理体系(ISMS)的组织都应考虑到这一标准。本文的目的是简要概述新版本的流行标准,фтв描述安全控制的结构和描述中的关键变化;并提出符合标准更新版本要求的建议。
{"title":"ISO 27001: ANALYSIS OF CHANGES AND COMPLIANCE FEATURES OF THE NEW VERSION OF THE STANDARD","authors":"Yevhenii Kurii, I. Opirskyy","doi":"10.28925/2663-4023.2023.19.4655","DOIUrl":"https://doi.org/10.28925/2663-4023.2023.19.4655","url":null,"abstract":"Managing information security in the organization may be a daunting task, especially considering that it may encompass many areas from physical and network security to human resources security and management of suppliers. This is where security frameworks come in handy and put formality into the process of the design and implementation of the security strategy. While there are a bunch of different information security frameworks out in the wild, the most commonly-found and preferred by security professionals worldwide is ISO/IEC 27001. It combines both the quite comprehensive set of security controls to cover the most important security areas and wide applicability which allows applying this framework to all kinds of organizations. While cyberspace is constantly changing, companies should also adapt their approaches to the organization of information security processes. In order to respond to new challenges and threats to cyber security, the International Organization for Standardization (ISO) at the end of 2022 has published an updated version of the ISO/IEC 27001:2022 standard, which from now on should be taken into account by all organizations that aim to implement and certify its information security management system (ISMS). The purpose of this article is to provide a brief overview of the new edition of the popular standard, фтв describe the key changes in the structure and description of security controls; as well as develop recommendations for achieving compliance with the requirements of the updated version of the standard.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125121611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MODEL OF INDICATORS FOR THE ASSESSMENT OF THE NATIONAL LEVEL OF DIGITALIZATION AND CYBER SECURITY OF THE COUNTRIES OF THE WORLD 世界各国数字化与网络安全国家水平评估指标模型
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.7385
N. Barchenko, Volodymyr Lubchak, Tetiana Lavryk
Digitalization is one of the main trends in the development of modern society and the growth factors of the global economy in the coming years. But the progress of technology and the new opportunities of digitalization lead to a rapid growth of cyber threats and cyber incidents. Achieving an appropriate level of digitization of the success of the economy and society is interdependent on the levels of development of information and communication technologies and their protection against possible cyber attacks. The purpose of this work is to develop, from the standpoint of system analysis, formal mathematical models for describing the determination of the national level of digital development of countries, taking into account the national level of cyber security and cyber protection. In order to realize the purpose of the study, data was collected and systematized according to four groups of indicators: the general level of development, the level of digital development of the country, the level of technical infrastructure, and the level of the ability to counter cyber threats. The conducted information analysis made it possible to determine the nomenclature of indicators of digitalization progress and the level of cyber security and cyber protection. Based on it, a structure of component models was formed that describe the necessary elements of the subject area of the task of determining the indicators of the national level of digitalization with the coordination of the indicators of the level of cyber security and cyber protection. The results of the study allow us to assert that the development of the digital economy is impossible without strengthening cyber security both at the state level and at the level of individual entities. Further research will focus on the development of mathematical models for an integral assessment of the state of the country's digital transformation, taking into account the country's ability to counter modern cyber threats.
数字化是现代社会发展的主要趋势之一,也是未来几年全球经济的增长因素。但是,技术的进步和数字化带来的新机遇导致网络威胁和网络事件的快速增长。实现经济和社会成功的适当数字化水平取决于信息和通信技术的发展水平及其防范可能的网络攻击的能力。这项工作的目的是从系统分析的角度出发,在考虑到国家网络安全和网络保护水平的情况下,开发用于描述确定各国数字发展水平的正式数学模型。为了实现研究目的,根据四组指标收集数据并进行系统化:总体发展水平、国家数字化发展水平、技术基础设施水平和应对网络威胁的能力水平。所进行的信息分析使确定数字化进展指标和网络安全和网络保护水平的术语成为可能。在此基础上,形成了一个组件模型结构,描述了在协调网络安全和网络保护水平指标的情况下确定国家数字化水平指标任务的主题领域的必要要素。研究结果使我们能够断言,如果不加强国家层面和个体层面的网络安全,数字经济的发展是不可能的。进一步的研究将侧重于开发数学模型,以全面评估该国的数字化转型状况,同时考虑到该国应对现代网络威胁的能力。
{"title":"MODEL OF INDICATORS FOR THE ASSESSMENT OF THE NATIONAL LEVEL OF DIGITALIZATION AND CYBER SECURITY OF THE COUNTRIES OF THE WORLD","authors":"N. Barchenko, Volodymyr Lubchak, Tetiana Lavryk","doi":"10.28925/2663-4023.2022.18.7385","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.7385","url":null,"abstract":"Digitalization is one of the main trends in the development of modern society and the growth factors of the global economy in the coming years. But the progress of technology and the new opportunities of digitalization lead to a rapid growth of cyber threats and cyber incidents. Achieving an appropriate level of digitization of the success of the economy and society is interdependent on the levels of development of information and communication technologies and their protection against possible cyber attacks. The purpose of this work is to develop, from the standpoint of system analysis, formal mathematical models for describing the determination of the national level of digital development of countries, taking into account the national level of cyber security and cyber protection. In order to realize the purpose of the study, data was collected and systematized according to four groups of indicators: the general level of development, the level of digital development of the country, the level of technical infrastructure, and the level of the ability to counter cyber threats. The conducted information analysis made it possible to determine the nomenclature of indicators of digitalization progress and the level of cyber security and cyber protection. Based on it, a structure of component models was formed that describe the necessary elements of the subject area of the task of determining the indicators of the national level of digitalization with the coordination of the indicators of the level of cyber security and cyber protection. The results of the study allow us to assert that the development of the digital economy is impossible without strengthening cyber security both at the state level and at the level of individual entities. Further research will focus on the development of mathematical models for an integral assessment of the state of the country's digital transformation, taking into account the country's ability to counter modern cyber threats.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"140 1-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122503333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVALUATION OF PARAMETERS IN SOFTWARE IMPLEMENTATION BAR GRAPH DISPLAY DEVICES 参数评价软件实现条形图显示装置
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.16.142158
O. Bushma, A. Turukalo
The work is devoted to the estimation of resource consumption of the microcontroller for the synthesis of bar graph discrete-analog data display on the LED information field in bicyclic mode. The paper compares the programs of multicycle information output and its bicyclic analogue for discrete-analog means for the information display systems. The significance of the influence of bicyclic information models on the minimization of machine time resources of a single-chip microcontroller is shown. It is determined that in order to reduce resource consumption in the developed solutions it is necessary to focus on the maximum possible optimization of program blocks that are executed during interrupts and serve the I / O subsystem of the microcontroller. In this sense the bar graph displays based on the bicyclic additive information model has the best results. It was found that the traditional approach to assessing the effectiveness of programs using special benchmark programs, with subsequent measurement of code and execution time of the entire program does not allow to correctly assess the effectiveness of the program and the work of microcontroller at the device design stage. Therefore, as an alternative, it was proposed to use the size of the bytecode of the program and the speed of the main cycle - the procedure of information output to assess the effectiveness of the program. It was found that in terms of speed of execution and consumption of resources, the multicycle version significantly loses to the bicyclic program. Also, reducing the number of image formation cycles in the information field is one of the most effective way to minimize the consumption of microcontroller resources for display services.
本文研究了双环模式下LED信息场柱状图离散模拟数据显示综合的单片机资源消耗估算问题。比较了信息显示系统中离散模拟方式的多循环信息输出及其双循环模拟程序。说明了双环信息模型对单片机机器时间资源最小化的重要影响。确定的是,为了减少开发解决方案中的资源消耗,有必要关注在中断期间执行的程序块的最大可能优化,并为微控制器的I / O子系统服务。从这个意义上说,基于双环加性信息模型的条形图显示效果最好。研究发现,传统的评估程序有效性的方法是使用特殊的基准程序,随后测量整个程序的代码和执行时间,这不能正确评估程序的有效性和微控制器在器件设计阶段的工作。因此,作为替代方案,建议使用程序字节码的大小和主周期-信息输出过程的速度来评估程序的有效性。结果表明,在执行速度和资源消耗方面,多循环版本明显落后于双循环版本。此外,减少信息领域的图像形成周期数是最大限度地减少显示服务对微控制器资源消耗的最有效方法之一。
{"title":"EVALUATION OF PARAMETERS IN SOFTWARE IMPLEMENTATION BAR GRAPH DISPLAY DEVICES","authors":"O. Bushma, A. Turukalo","doi":"10.28925/2663-4023.2022.16.142158","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.142158","url":null,"abstract":"The work is devoted to the estimation of resource consumption of the microcontroller for the synthesis of bar graph discrete-analog data display on the LED information field in bicyclic mode. The paper compares the programs of multicycle information output and its bicyclic analogue for discrete-analog means for the information display systems. The significance of the influence of bicyclic information models on the minimization of machine time resources of a single-chip microcontroller is shown. It is determined that in order to reduce resource consumption in the developed solutions it is necessary to focus on the maximum possible optimization of program blocks that are executed during interrupts and serve the I / O subsystem of the microcontroller. In this sense the bar graph displays based on the bicyclic additive information model has the best results. It was found that the traditional approach to assessing the effectiveness of programs using special benchmark programs, with subsequent measurement of code and execution time of the entire program does not allow to correctly assess the effectiveness of the program and the work of microcontroller at the device design stage. Therefore, as an alternative, it was proposed to use the size of the bytecode of the program and the speed of the main cycle - the procedure of information output to assess the effectiveness of the program. It was found that in terms of speed of execution and consumption of resources, the multicycle version significantly loses to the bicyclic program. Also, reducing the number of image formation cycles in the information field is one of the most effective way to minimize the consumption of microcontroller resources for display services.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PARAMETER CLASSIFICATION SOFTWARE BASED ON CHARACTERIZERS AND KNOWLEDGE BASE FOR ELECTRONIC ENGINE CONTROL UNIT 基于特征和知识库的发动机电控单元参数分类软件
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.11.110123
S. Kuznichenko, T. Tereshchenko, I. Buchynska, Viktoriia Klepatska
The article discusses the issues of increasing the efficiency of the classification process of cards of electronic control units of a car engine. The analysis of the existing software for editing calibration tables in electronic engine control unit, which has tools for determining calibrations and data recognition, was carried out. The limits of use of such software products are conditioned by a small number of specified classes of calibration tables and low data processing speed. The analysis of testing results of classification methods using spectral decomposition demonstrated that a system based on this method requires complex transformations of the results of spectral decomposition. The use of spectral decomposition as a solution of the classification problem is possible if some characteristics of the input data are determined and used as data for classification. It was developed a data classification algorithm that uses characterizers to compute a clearly identified characteristic of the input matrix. The software package for the implementation of the developed algorithm was carried out by using the .NET Framework and the C # programming language. The testing of the classification system performance performed by using the developed software system on a small sample of maps. The results of preliminary testing showed that the system determines correctly the class of the provided card after training. Further testing on the Mercedes-Benz Bosch EDC16C31 / EDC16CP31 car block family showed that in cases of a large number of training images, the result meets the requirements. The performed tests allowed us to determine the optimal number of images for training and the time required for this.
本文讨论了提高汽车发动机电控单元卡片分类效率的问题。对现有的发动机电子控制单元标定表编辑软件进行了分析,该软件具有标定和数据识别工具。此类软件产品的使用局限于指定类别的校准表数量较少和数据处理速度较低。对光谱分解分类方法的测试结果分析表明,基于该方法的分类系统需要对光谱分解结果进行复杂的变换。如果确定输入数据的某些特征并将其用作分类数据,则可以使用光谱分解作为分类问题的解决方案。开发了一种数据分类算法,该算法使用特征符来计算输入矩阵的明确识别特征。采用。net框架和c#编程语言对所开发算法的软件包进行了实现。利用开发的软件系统在小样本地图上进行了分类系统的性能测试。初步测试结果表明,经过训练,系统能够正确判断所提供卡片的类别。在梅赛德斯-奔驰博世EDC16C31 / EDC16CP31车块家族上进一步测试表明,在训练图像数量较多的情况下,结果满足要求。执行的测试使我们能够确定用于训练的最佳图像数量和所需的时间。
{"title":"PARAMETER CLASSIFICATION SOFTWARE BASED ON CHARACTERIZERS AND KNOWLEDGE BASE FOR ELECTRONIC ENGINE CONTROL UNIT","authors":"S. Kuznichenko, T. Tereshchenko, I. Buchynska, Viktoriia Klepatska","doi":"10.28925/2663-4023.2021.11.110123","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.11.110123","url":null,"abstract":"The article discusses the issues of increasing the efficiency of the classification process of cards of electronic control units of a car engine. The analysis of the existing software for editing calibration tables in electronic engine control unit, which has tools for determining calibrations and data recognition, was carried out. The limits of use of such software products are conditioned by a small number of specified classes of calibration tables and low data processing speed. The analysis of testing results of classification methods using spectral decomposition demonstrated that a system based on this method requires complex transformations of the results of spectral decomposition. The use of spectral decomposition as a solution of the classification problem is possible if some characteristics of the input data are determined and used as data for classification. It was developed a data classification algorithm that uses characterizers to compute a clearly identified characteristic of the input matrix. The software package for the implementation of the developed algorithm was carried out by using the .NET Framework and the C # programming language. The testing of the classification system performance performed by using the developed software system on a small sample of maps. The results of preliminary testing showed that the system determines correctly the class of the provided card after training. Further testing on the Mercedes-Benz Bosch EDC16C31 / EDC16CP31 car block family showed that in cases of a large number of training images, the result meets the requirements. The performed tests allowed us to determine the optimal number of images for training and the time required for this.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134502254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INFORMATION TECHNOLOGIES OF COMPLEX ENVIRONMENTAL MONITORING BASED ON AEROSPACE AND GROUND RESEARCH DATA 基于航空航天和地面研究数据的复杂环境监测信息技术
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.187197
Y. Holovan
The article considers the possibilities of using geoinformation systems and remote land sensing systems in detecting the development of degradation processes of the soil cover. The use of satellite technologies for the detection of soil degradation and timely response to these processes requires timely information and the availability of a database. The environmental safety system is aimed at forecasting and preventing emergency situations of technogenic and ecological nature. It includes the development of forecasting models and algorithms, as well as the allocation of resources to take immediate action in the event of such situations, as well as information about potential hazards, risks and possible consequences. With the use of geodetic surveying and computer processing of the surveying results, the coordinates of land plot plans were obtained. Satellite images were used to obtain data on changes in soil cover over a large area and on a large scale. Aerial photographs reveal small changes in soil structure, indicating signs of erosion or other degradation processes. Digital electronic terrain maps provide geographic information about an area, including geological and geomorphological features. They are used to combine other data, such as satellite images or aerial photographs, and create a comprehensive picture of the state of the soil. In the course of research, the system of ecological monitoring of soil cover using the method of infrared spectrophotometry was improved. The method of physico-chemical analysis of soil samples is substantiated and the dependence between the state of soil contamination by individual chemical elements and their genesis is established. The creation of a computer database and the use of space images in combination with other geo-information technologies really allows for effective monitoring and analysis of soil degradation and other agricultural objects.
本文考虑了利用地理信息系统和遥感系统检测土壤覆盖退化过程发展的可能性。利用卫星技术探测土壤退化并及时对这些过程作出反应需要及时的资料和数据库的可用性。环境安全系统旨在预测和预防技术和生态性质的紧急情况。它包括开发预测模型和算法,以及分配资源以便在发生这种情况时立即采取行动,以及提供有关潜在危害、风险和可能后果的信息。利用大地测量和计算机对测量结果进行处理,得到地块平面图坐标。卫星图像被用来获取大范围、大尺度的土壤覆盖变化数据。航空照片显示土壤结构的微小变化,表明侵蚀或其他退化过程的迹象。数字电子地形图提供一个地区的地理信息,包括地质和地貌特征。它们被用来结合其他数据,如卫星图像或航空照片,并创建一个全面的土壤状况图片。在研究过程中,对红外分光光度法土壤覆盖生态监测系统进行了改进。证实了土壤样品的理化分析方法,建立了土壤中各化学元素污染状况与其成因之间的关系。建立一个计算机数据库和结合其他地理信息技术使用空间图像,确实可以有效地监测和分析土壤退化和其他农业目标。
{"title":"INFORMATION TECHNOLOGIES OF COMPLEX ENVIRONMENTAL MONITORING BASED ON AEROSPACE AND GROUND RESEARCH DATA","authors":"Y. Holovan","doi":"10.28925/2663-4023.2022.17.187197","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.187197","url":null,"abstract":"The article considers the possibilities of using geoinformation systems and remote land sensing systems in detecting the development of degradation processes of the soil cover. The use of satellite technologies for the detection of soil degradation and timely response to these processes requires timely information and the availability of a database. The environmental safety system is aimed at forecasting and preventing emergency situations of technogenic and ecological nature. It includes the development of forecasting models and algorithms, as well as the allocation of resources to take immediate action in the event of such situations, as well as information about potential hazards, risks and possible consequences. With the use of geodetic surveying and computer processing of the surveying results, the coordinates of land plot plans were obtained. Satellite images were used to obtain data on changes in soil cover over a large area and on a large scale. Aerial photographs reveal small changes in soil structure, indicating signs of erosion or other degradation processes. Digital electronic terrain maps provide geographic information about an area, including geological and geomorphological features. They are used to combine other data, such as satellite images or aerial photographs, and create a comprehensive picture of the state of the soil. In the course of research, the system of ecological monitoring of soil cover using the method of infrared spectrophotometry was improved. The method of physico-chemical analysis of soil samples is substantiated and the dependence between the state of soil contamination by individual chemical elements and their genesis is established. The creation of a computer database and the use of space images in combination with other geo-information technologies really allows for effective monitoring and analysis of soil degradation and other agricultural objects.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR 从网络聚类因子计算个人数据保护的方法
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.14.3649
V. Akhramovich
A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out.Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor.A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection.As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained.Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence.Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented.Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.
建立了数学模型,从网络聚类系数和社交网络中数据传输强度的角度对个人数据保护模型进行了研究。系统保护与系统规模(以及个人数据量)的依赖关系;信息安全威胁来自网络聚类因素。得到一个线性方程组,由等式组成:来自社会网络安全的信息流变化率和反映安全措施影响的系数、个人数据量、泄露率、来自网络聚类因素的信息保护变化、其大小、个人数据保护。通过求解微分方程组,得到了社会网络中个人数据保护指标在不同分量下的数学和图形依赖关系。考虑在系统稳态附近求解方程的三种选择,我们可以得出结论,基于耗散与固有频率之比的条件,后者衰减到某一值是周期性的,具有衰减幅度,或呈指数衰减规律。对系统行为进行更直观的分析,从方程的微分形式转向离散形式,并对系统存在的某个区间进行建模。给出了系统固有频率、振荡周期、衰减系数的数学关系和图形关系。对偏离系统静止位置的值进行了仿真建模。仿真结果表明,该社会网络保护系统是非线性的。
{"title":"METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR","authors":"V. Akhramovich","doi":"10.28925/2663-4023.2021.14.3649","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.3649","url":null,"abstract":"A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out.\u0000\u0000Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor.\u0000\u0000A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection.\u0000\u0000As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained.\u0000\u0000Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence.\u0000\u0000Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented.\u0000\u0000Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity: Education, Science, Technique
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1