首页 > 最新文献

Cybersecurity: Education, Science, Technique最新文献

英文 中文
CYBER SECURITY CULTURE LEVEL ASSESSMENT MODEL IN THE INFORMATION SYSTEM 信息系统中网络安全文化水平评估模型
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.13.158169
I. Skiter
The paper sets the task of formalizing the processes of assessing the culture of cybersecurity of the information system of the organization. The basis is a comprehensive model that takes into account the technical and organizational parameters of the information system and the risks associated with them. The level of security culture of the information system is assessed on the basis of building an additive model. The model includes the characteristics of system state clusters. Clusters are formed on the basis of arrays of factors that correspond to different classes of information security culture. Classes are formed on the basis of sets of factors. Their impact is assessed using the severity of the consequences for the level of cybersecurity of the information system. In addition, the probability of manifestation of this factor in a particular information system is determined. The value of coefficients and probability distributions for each cluster and set of factors is estimated by expert methods and on the basis of a survey. A feature of the formation of arrays of factors is the inclusion in each cluster of a factor that reflects the passive behavior of the user to negative factors. Thus, the model introduces the probability of rejection of negative factors and the probability of ideal behavior for the formation of the appropriate class of threats. It is proposed to determine the average weights of the factors of the level of influence on the cybersecurity of the information system on the basis of the weighted average indicator. A method of estimating weights based on the equally probable distribution of negative factors within the cluster
本文设定了形式化评估组织信息系统网络安全文化的过程的任务。其基础是一个综合模型,该模型考虑到信息系统的技术和组织参数以及与之相关的风险。在建立附加模型的基础上,对信息系统的安全文化水平进行了评估。该模型包含了系统状态簇的特征。集群是在一系列因素的基础上形成的,这些因素对应于不同类别的信息安全文化。阶级是在一系列因素的基础上形成的。使用信息系统网络安全水平后果的严重程度来评估其影响。此外,还确定了该因素在特定信息系统中出现的概率。每个聚类和因子集的系数值和概率分布是通过专家方法和调查来估计的。因素阵列形成的一个特征是在每一簇中包含一个反映用户对消极因素的被动行为的因素。因此,该模型引入了拒绝负面因素的概率和形成适当威胁类别的理想行为的概率。提出在加权平均指标的基础上确定信息系统网络安全影响程度各因素的平均权重。一种基于负因素在簇内的等概率分布估计权重的方法
{"title":"CYBER SECURITY CULTURE LEVEL ASSESSMENT MODEL IN THE INFORMATION SYSTEM","authors":"I. Skiter","doi":"10.28925/2663-4023.2021.13.158169","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.13.158169","url":null,"abstract":"The paper sets the task of formalizing the processes of assessing the culture of cybersecurity of the information system of the organization. The basis is a comprehensive model that takes into account the technical and organizational parameters of the information system and the risks associated with them. The level of security culture of the information system is assessed on the basis of building an additive model. The model includes the characteristics of system state clusters. Clusters are formed on the basis of arrays of factors that correspond to different classes of information security culture. Classes are formed on the basis of sets of factors. Their impact is assessed using the severity of the consequences for the level of cybersecurity of the information system. In addition, the probability of manifestation of this factor in a particular information system is determined. The value of coefficients and probability distributions for each cluster and set of factors is estimated by expert methods and on the basis of a survey. A feature of the formation of arrays of factors is the inclusion in each cluster of a factor that reflects the passive behavior of the user to negative factors. Thus, the model introduces the probability of rejection of negative factors and the probability of ideal behavior for the formation of the appropriate class of threats. It is proposed to determine the average weights of the factors of the level of influence on the cybersecurity of the information system on the basis of the weighted average indicator. A method of estimating weights based on the equally probable distribution of negative factors within the cluster","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS 智能自动化系统设备储备优化
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.14.8799
V. Chubaievskyi, V. Lakhno, B. Akhmetov, O. Kryvoruchko, D. Kasatkin, A. Desiatko, Taras Litovchenko
Algorithms for a neural network analyzer involved in the decision support system (DSS) during the selection of the composition of backup equipment (CBE) for intelligent automated control systems Smart City are proposed. A model, algorithms and software have been developed for solving the optimization problem of choosing a CBE capable of ensuring the uninterrupted operation of the IACS both in conditions of technological failures and in conditions of destructive interference in the operation of the IACS by the attackers. The proposed solutions help to reduce the cost of determining the optimal CBE for IACS by 15–17% in comparison with the results of known calculation methods. The results of computational experiments to study the degree of influence of the outputs of the neural network analyzer on the efficiency of the functioning of the CBE for IACS are presented.
提出了一种神经网络分析算法,用于智能城市自动控制系统中决策支持系统(DSS)的备用设备组成选择。本文提出了一种模型、算法和软件,用于解决在技术故障和攻击者破坏性干扰的情况下,选择能够确保IACS不间断运行的CBE的优化问题。与已知计算方法的结果相比,所提出的解决方案有助于将确定IACS最佳CBE的成本降低15-17%。给出了计算实验的结果,研究了神经网络分析仪的输出对IACS的CBE功能效率的影响程度。
{"title":"OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS","authors":"V. Chubaievskyi, V. Lakhno, B. Akhmetov, O. Kryvoruchko, D. Kasatkin, A. Desiatko, Taras Litovchenko","doi":"10.28925/2663-4023.2021.14.8799","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.8799","url":null,"abstract":"Algorithms for a neural network analyzer involved in the decision support system (DSS) during the selection of the composition of backup equipment (CBE) for intelligent automated control systems Smart City are proposed. A model, algorithms and software have been developed for solving the optimization problem of choosing a CBE capable of ensuring the uninterrupted operation of the IACS both in conditions of technological failures and in conditions of destructive interference in the operation of the IACS by the attackers. The proposed solutions help to reduce the cost of determining the optimal CBE for IACS by 15–17% in comparison with the results of known calculation methods. The results of computational experiments to study the degree of influence of the outputs of the neural network analyzer on the efficiency of the functioning of the CBE for IACS are presented.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117341347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EVALUATION OF PARAMETERS IN SOFTWARE IMPLEMENTATION BAR GRAPH DISPLAY DEVICES 参数评价软件实现条形图显示装置
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.16.142158
O. Bushma, A. Turukalo
The work is devoted to the estimation of resource consumption of the microcontroller for the synthesis of bar graph discrete-analog data display on the LED information field in bicyclic mode. The paper compares the programs of multicycle information output and its bicyclic analogue for discrete-analog means for the information display systems. The significance of the influence of bicyclic information models on the minimization of machine time resources of a single-chip microcontroller is shown. It is determined that in order to reduce resource consumption in the developed solutions it is necessary to focus on the maximum possible optimization of program blocks that are executed during interrupts and serve the I / O subsystem of the microcontroller. In this sense the bar graph displays based on the bicyclic additive information model has the best results. It was found that the traditional approach to assessing the effectiveness of programs using special benchmark programs, with subsequent measurement of code and execution time of the entire program does not allow to correctly assess the effectiveness of the program and the work of microcontroller at the device design stage. Therefore, as an alternative, it was proposed to use the size of the bytecode of the program and the speed of the main cycle - the procedure of information output to assess the effectiveness of the program. It was found that in terms of speed of execution and consumption of resources, the multicycle version significantly loses to the bicyclic program. Also, reducing the number of image formation cycles in the information field is one of the most effective way to minimize the consumption of microcontroller resources for display services.
本文研究了双环模式下LED信息场柱状图离散模拟数据显示综合的单片机资源消耗估算问题。比较了信息显示系统中离散模拟方式的多循环信息输出及其双循环模拟程序。说明了双环信息模型对单片机机器时间资源最小化的重要影响。确定的是,为了减少开发解决方案中的资源消耗,有必要关注在中断期间执行的程序块的最大可能优化,并为微控制器的I / O子系统服务。从这个意义上说,基于双环加性信息模型的条形图显示效果最好。研究发现,传统的评估程序有效性的方法是使用特殊的基准程序,随后测量整个程序的代码和执行时间,这不能正确评估程序的有效性和微控制器在器件设计阶段的工作。因此,作为替代方案,建议使用程序字节码的大小和主周期-信息输出过程的速度来评估程序的有效性。结果表明,在执行速度和资源消耗方面,多循环版本明显落后于双循环版本。此外,减少信息领域的图像形成周期数是最大限度地减少显示服务对微控制器资源消耗的最有效方法之一。
{"title":"EVALUATION OF PARAMETERS IN SOFTWARE IMPLEMENTATION BAR GRAPH DISPLAY DEVICES","authors":"O. Bushma, A. Turukalo","doi":"10.28925/2663-4023.2022.16.142158","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.142158","url":null,"abstract":"The work is devoted to the estimation of resource consumption of the microcontroller for the synthesis of bar graph discrete-analog data display on the LED information field in bicyclic mode. The paper compares the programs of multicycle information output and its bicyclic analogue for discrete-analog means for the information display systems. The significance of the influence of bicyclic information models on the minimization of machine time resources of a single-chip microcontroller is shown. It is determined that in order to reduce resource consumption in the developed solutions it is necessary to focus on the maximum possible optimization of program blocks that are executed during interrupts and serve the I / O subsystem of the microcontroller. In this sense the bar graph displays based on the bicyclic additive information model has the best results. It was found that the traditional approach to assessing the effectiveness of programs using special benchmark programs, with subsequent measurement of code and execution time of the entire program does not allow to correctly assess the effectiveness of the program and the work of microcontroller at the device design stage. Therefore, as an alternative, it was proposed to use the size of the bytecode of the program and the speed of the main cycle - the procedure of information output to assess the effectiveness of the program. It was found that in terms of speed of execution and consumption of resources, the multicycle version significantly loses to the bicyclic program. Also, reducing the number of image formation cycles in the information field is one of the most effective way to minimize the consumption of microcontroller resources for display services.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESEARCH OF OPTIMIZATION OF LAMES OF THE LASER SENSOR OF VIBRATION TO COUNTER LASER INTELLIGENCE SYSTEMS 对抗激光智能系统的激光振动传感器结构优化研究
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.110123
V. Dudykevych, I. Opirskyy, Nazariy Dzianyi, Larysa Rakobovchuk, P. Garanyuk
One of the most vulnerable issues in the technical protection of information is the receipt of data, private or confidential, due to leakage through the optoelectronic channel, the main source of data is laser acoustic intelligence systems or laser microphones. There are active and passive methods of protection against laser acoustic reconnaissance systems (ACS). Active methods use various noisy or vibrating devices that pose a danger to human health. With passive protection, it is recommended to use either special corrugated windows or completely closed shutters, which create some inconvenience now. Detecting a working laser microphone is very difficult and in some cases technically impossible. For example, the removal of information using ACS occurs through glass building structures, usually windows. This article is devoted to the analysis of the principle of operation of laser systems of acoustic intelligence and passive methods of reading acoustic information. Triangulation laser sensors are designed for non-contact measurement and control of position, movement, size, surface profile, deformation, vibration, sorting, recognition of technological objects, measuring the level of liquids and bulk materials. Accordingly, they can be used to study the vibrational properties of glass and films applied to them. It is described the method of working with laser triangulation vibration sensors, which allows to study the deviations of glass from different manufacturers from sound vibrations, thereby investigating the anti-laser properties of existing glass, as well as different types of spraying and films. In addition, this method allows you to conduct and test deviations from sound vibrations for new types of glass, films and spraying, proving the results of spectral studies and their impact on the amplitude of vibration of the glass. The vibration sensor was adjusted and the software parameters were experimentally optimized to obtain the truest deviation values ​​required to work with sprayed samples for passive protection.
信息技术保护中最脆弱的问题之一是接收数据,无论是私人的还是机密的,由于通过光电通道泄露,数据的主要来源是激光声学情报系统或激光麦克风。针对激光声侦察系统(ACS)的防护有主动和被动两种方法。主动方法使用各种对人体健康构成危险的噪声或振动装置。对于被动防护,建议使用特殊的波纹窗或全封闭的百叶窗,这在现在造成了一些不便。探测工作中的激光麦克风是非常困难的,在某些情况下在技术上是不可能的。例如,使用ACS可以通过玻璃建筑结构(通常是窗户)去除信息。本文分析了声智能激光系统的工作原理和被动读取声信息的方法。三角测量激光传感器是专为非接触式测量和控制的位置,运动,尺寸,表面轮廓,变形,振动,分类,识别技术对象,测量液体和散装材料的水平。因此,它们可以用来研究玻璃及其薄膜的振动特性。本文描述了使用激光三角振动传感器的方法,该方法可以研究不同制造商的玻璃与声音振动的偏差,从而研究现有玻璃的抗激光性能,以及不同类型的喷涂和薄膜。此外,该方法允许您对新型玻璃、薄膜和喷涂的声音振动偏差进行测试,证明光谱研究的结果及其对玻璃振动幅度的影响。对振动传感器进行了调整,并对软件参数进行了实验优化,以获得与喷涂样品进行被动保护所需的最真实偏差值。
{"title":"RESEARCH OF OPTIMIZATION OF LAMES OF THE LASER SENSOR OF VIBRATION TO COUNTER LASER INTELLIGENCE SYSTEMS","authors":"V. Dudykevych, I. Opirskyy, Nazariy Dzianyi, Larysa Rakobovchuk, P. Garanyuk","doi":"10.28925/2663-4023.2022.15.110123","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.110123","url":null,"abstract":"One of the most vulnerable issues in the technical protection of information is the receipt of data, private or confidential, due to leakage through the optoelectronic channel, the main source of data is laser acoustic intelligence systems or laser microphones. There are active and passive methods of protection against laser acoustic reconnaissance systems (ACS). Active methods use various noisy or vibrating devices that pose a danger to human health. With passive protection, it is recommended to use either special corrugated windows or completely closed shutters, which create some inconvenience now. Detecting a working laser microphone is very difficult and in some cases technically impossible. For example, the removal of information using ACS occurs through glass building structures, usually windows. This article is devoted to the analysis of the principle of operation of laser systems of acoustic intelligence and passive methods of reading acoustic information. Triangulation laser sensors are designed for non-contact measurement and control of position, movement, size, surface profile, deformation, vibration, sorting, recognition of technological objects, measuring the level of liquids and bulk materials. Accordingly, they can be used to study the vibrational properties of glass and films applied to them. It is described the method of working with laser triangulation vibration sensors, which allows to study the deviations of glass from different manufacturers from sound vibrations, thereby investigating the anti-laser properties of existing glass, as well as different types of spraying and films. In addition, this method allows you to conduct and test deviations from sound vibrations for new types of glass, films and spraying, proving the results of spectral studies and their impact on the amplitude of vibration of the glass. The vibration sensor was adjusted and the software parameters were experimentally optimized to obtain the truest deviation values ​​required to work with sprayed samples for passive protection.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131453655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
THE CURRENT STATE OF THE CYBERSECURITY OF CIVIL AVIATION OF UKRAINE AND THE WORLD 乌克兰和世界民航网络安全现状
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.9.2436
A. Ilyenko, Sergii Ilyenko, D. Kvasha
Considering computer-integrated aviation systems that provide a link between civil aviation activities within the ground-to-air and air-to-air channels, the question of the safe operation of such aviation systems from an ever-increasing cyber threats, and the decline in cybersecurity for the aviation industry as a whole. The protection status of ground-to-air and air-to-air channels in such aviation systems is at different levels and depends directly on the activity of all components of aviation activity (airport-aircraft-information network-air traffic management, etc.). To date, some communication channels are not secure at all and are in an open state, which provokes a rapid growth of cyber-attacks and requires the introduction and application of modern information and communication technologies in such communication channels. In view of the ever-increasing cyber statistics on the work of civil aviation worldwide, the authors of the article highlighted the current state of cyber security and protection of ground-to-air and air-to-air channels of the aircraft fleet of Ukrainian airlines, and take a closer look at the world experience. The authors comprehensively covered all components of the aviation system, with particular attention given to aircraft designed by Antonov Design Bureau with the time evolution of tire development and data networks of the world's leading aviation industry leaders (such as Airbus and Boeing). Also, attention is given to the present state and mechanisms of data transmission of the ground-to-air and air-to-air channels and the architecture of the modern air-network of computer-integrated aviation systems. The authors plan a number of scientific and technical solutions for the development and implementation of effective methods and means to ensure the requirements, principles and sub-approaches to ensure cyber security and the organization of protection of ground-to-air and air-to-air channels in experimental computer-integrated aviation systems.
考虑到在地对空和空对空通道内提供民用航空活动之间联系的计算机集成航空系统,此类航空系统在日益增加的网络威胁中安全运行的问题,以及整个航空业网络安全的下降。这种航空系统中地对空和空对空通道的保护状况是不同等级的,直接取决于航空活动各组成部分(机场-飞机-信息网络-空中交通管理等)的活动情况。目前,一些通信渠道根本不安全,处于开放状态,这引发了网络攻击的快速增长,需要在这些通信渠道中引入和应用现代信息通信技术。鉴于全球民航工作的网络统计数据不断增加,文章作者重点介绍了乌克兰航空公司机队的网络安全和地对空和空对空通道保护的现状,并仔细研究了世界经验。作者全面涵盖了航空系统的所有组成部分,特别关注安东诺夫设计局根据轮胎开发的时间演变和世界领先航空业领导者(如空中客车和波音)的数据网络设计的飞机。此外,还注意到地对空和空对空信道数据传输的现状和机制以及计算机综合航空系统的现代空中网络的结构。为制定和实施有效的方法和手段,确保计算机综合航空系统中网络安全的要求、原则和子途径,以及组织保护地对空和空对空通道,笔者规划了一些科技解决方案。
{"title":"THE CURRENT STATE OF THE CYBERSECURITY OF CIVIL AVIATION OF UKRAINE AND THE WORLD","authors":"A. Ilyenko, Sergii Ilyenko, D. Kvasha","doi":"10.28925/2663-4023.2020.9.2436","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.9.2436","url":null,"abstract":"Considering computer-integrated aviation systems that provide a link between civil aviation activities within the ground-to-air and air-to-air channels, the question of the safe operation of such aviation systems from an ever-increasing cyber threats, and the decline in cybersecurity for the aviation industry as a whole. The protection status of ground-to-air and air-to-air channels in such aviation systems is at different levels and depends directly on the activity of all components of aviation activity (airport-aircraft-information network-air traffic management, etc.). To date, some communication channels are not secure at all and are in an open state, which provokes a rapid growth of cyber-attacks and requires the introduction and application of modern information and communication technologies in such communication channels. In view of the ever-increasing cyber statistics on the work of civil aviation worldwide, the authors of the article highlighted the current state of cyber security and protection of ground-to-air and air-to-air channels of the aircraft fleet of Ukrainian airlines, and take a closer look at the world experience. The authors comprehensively covered all components of the aviation system, with particular attention given to aircraft designed by Antonov Design Bureau with the time evolution of tire development and data networks of the world's leading aviation industry leaders (such as Airbus and Boeing). Also, attention is given to the present state and mechanisms of data transmission of the ground-to-air and air-to-air channels and the architecture of the modern air-network of computer-integrated aviation systems. The authors plan a number of scientific and technical solutions for the development and implementation of effective methods and means to ensure the requirements, principles and sub-approaches to ensure cyber security and the organization of protection of ground-to-air and air-to-air channels in experimental computer-integrated aviation systems.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PARAMETER CLASSIFICATION SOFTWARE BASED ON CHARACTERIZERS AND KNOWLEDGE BASE FOR ELECTRONIC ENGINE CONTROL UNIT 基于特征和知识库的发动机电控单元参数分类软件
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.11.110123
S. Kuznichenko, T. Tereshchenko, I. Buchynska, Viktoriia Klepatska
The article discusses the issues of increasing the efficiency of the classification process of cards of electronic control units of a car engine. The analysis of the existing software for editing calibration tables in electronic engine control unit, which has tools for determining calibrations and data recognition, was carried out. The limits of use of such software products are conditioned by a small number of specified classes of calibration tables and low data processing speed. The analysis of testing results of classification methods using spectral decomposition demonstrated that a system based on this method requires complex transformations of the results of spectral decomposition. The use of spectral decomposition as a solution of the classification problem is possible if some characteristics of the input data are determined and used as data for classification. It was developed a data classification algorithm that uses characterizers to compute a clearly identified characteristic of the input matrix. The software package for the implementation of the developed algorithm was carried out by using the .NET Framework and the C # programming language. The testing of the classification system performance performed by using the developed software system on a small sample of maps. The results of preliminary testing showed that the system determines correctly the class of the provided card after training. Further testing on the Mercedes-Benz Bosch EDC16C31 / EDC16CP31 car block family showed that in cases of a large number of training images, the result meets the requirements. The performed tests allowed us to determine the optimal number of images for training and the time required for this.
本文讨论了提高汽车发动机电控单元卡片分类效率的问题。对现有的发动机电子控制单元标定表编辑软件进行了分析,该软件具有标定和数据识别工具。此类软件产品的使用局限于指定类别的校准表数量较少和数据处理速度较低。对光谱分解分类方法的测试结果分析表明,基于该方法的分类系统需要对光谱分解结果进行复杂的变换。如果确定输入数据的某些特征并将其用作分类数据,则可以使用光谱分解作为分类问题的解决方案。开发了一种数据分类算法,该算法使用特征符来计算输入矩阵的明确识别特征。采用。net框架和c#编程语言对所开发算法的软件包进行了实现。利用开发的软件系统在小样本地图上进行了分类系统的性能测试。初步测试结果表明,经过训练,系统能够正确判断所提供卡片的类别。在梅赛德斯-奔驰博世EDC16C31 / EDC16CP31车块家族上进一步测试表明,在训练图像数量较多的情况下,结果满足要求。执行的测试使我们能够确定用于训练的最佳图像数量和所需的时间。
{"title":"PARAMETER CLASSIFICATION SOFTWARE BASED ON CHARACTERIZERS AND KNOWLEDGE BASE FOR ELECTRONIC ENGINE CONTROL UNIT","authors":"S. Kuznichenko, T. Tereshchenko, I. Buchynska, Viktoriia Klepatska","doi":"10.28925/2663-4023.2021.11.110123","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.11.110123","url":null,"abstract":"The article discusses the issues of increasing the efficiency of the classification process of cards of electronic control units of a car engine. The analysis of the existing software for editing calibration tables in electronic engine control unit, which has tools for determining calibrations and data recognition, was carried out. The limits of use of such software products are conditioned by a small number of specified classes of calibration tables and low data processing speed. The analysis of testing results of classification methods using spectral decomposition demonstrated that a system based on this method requires complex transformations of the results of spectral decomposition. The use of spectral decomposition as a solution of the classification problem is possible if some characteristics of the input data are determined and used as data for classification. It was developed a data classification algorithm that uses characterizers to compute a clearly identified characteristic of the input matrix. The software package for the implementation of the developed algorithm was carried out by using the .NET Framework and the C # programming language. The testing of the classification system performance performed by using the developed software system on a small sample of maps. The results of preliminary testing showed that the system determines correctly the class of the provided card after training. Further testing on the Mercedes-Benz Bosch EDC16C31 / EDC16CP31 car block family showed that in cases of a large number of training images, the result meets the requirements. The performed tests allowed us to determine the optimal number of images for training and the time required for this.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134502254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INFORMATION TECHNOLOGIES OF COMPLEX ENVIRONMENTAL MONITORING BASED ON AEROSPACE AND GROUND RESEARCH DATA 基于航空航天和地面研究数据的复杂环境监测信息技术
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.187197
Y. Holovan
The article considers the possibilities of using geoinformation systems and remote land sensing systems in detecting the development of degradation processes of the soil cover. The use of satellite technologies for the detection of soil degradation and timely response to these processes requires timely information and the availability of a database. The environmental safety system is aimed at forecasting and preventing emergency situations of technogenic and ecological nature. It includes the development of forecasting models and algorithms, as well as the allocation of resources to take immediate action in the event of such situations, as well as information about potential hazards, risks and possible consequences. With the use of geodetic surveying and computer processing of the surveying results, the coordinates of land plot plans were obtained. Satellite images were used to obtain data on changes in soil cover over a large area and on a large scale. Aerial photographs reveal small changes in soil structure, indicating signs of erosion or other degradation processes. Digital electronic terrain maps provide geographic information about an area, including geological and geomorphological features. They are used to combine other data, such as satellite images or aerial photographs, and create a comprehensive picture of the state of the soil. In the course of research, the system of ecological monitoring of soil cover using the method of infrared spectrophotometry was improved. The method of physico-chemical analysis of soil samples is substantiated and the dependence between the state of soil contamination by individual chemical elements and their genesis is established. The creation of a computer database and the use of space images in combination with other geo-information technologies really allows for effective monitoring and analysis of soil degradation and other agricultural objects.
本文考虑了利用地理信息系统和遥感系统检测土壤覆盖退化过程发展的可能性。利用卫星技术探测土壤退化并及时对这些过程作出反应需要及时的资料和数据库的可用性。环境安全系统旨在预测和预防技术和生态性质的紧急情况。它包括开发预测模型和算法,以及分配资源以便在发生这种情况时立即采取行动,以及提供有关潜在危害、风险和可能后果的信息。利用大地测量和计算机对测量结果进行处理,得到地块平面图坐标。卫星图像被用来获取大范围、大尺度的土壤覆盖变化数据。航空照片显示土壤结构的微小变化,表明侵蚀或其他退化过程的迹象。数字电子地形图提供一个地区的地理信息,包括地质和地貌特征。它们被用来结合其他数据,如卫星图像或航空照片,并创建一个全面的土壤状况图片。在研究过程中,对红外分光光度法土壤覆盖生态监测系统进行了改进。证实了土壤样品的理化分析方法,建立了土壤中各化学元素污染状况与其成因之间的关系。建立一个计算机数据库和结合其他地理信息技术使用空间图像,确实可以有效地监测和分析土壤退化和其他农业目标。
{"title":"INFORMATION TECHNOLOGIES OF COMPLEX ENVIRONMENTAL MONITORING BASED ON AEROSPACE AND GROUND RESEARCH DATA","authors":"Y. Holovan","doi":"10.28925/2663-4023.2022.17.187197","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.187197","url":null,"abstract":"The article considers the possibilities of using geoinformation systems and remote land sensing systems in detecting the development of degradation processes of the soil cover. The use of satellite technologies for the detection of soil degradation and timely response to these processes requires timely information and the availability of a database. The environmental safety system is aimed at forecasting and preventing emergency situations of technogenic and ecological nature. It includes the development of forecasting models and algorithms, as well as the allocation of resources to take immediate action in the event of such situations, as well as information about potential hazards, risks and possible consequences. With the use of geodetic surveying and computer processing of the surveying results, the coordinates of land plot plans were obtained. Satellite images were used to obtain data on changes in soil cover over a large area and on a large scale. Aerial photographs reveal small changes in soil structure, indicating signs of erosion or other degradation processes. Digital electronic terrain maps provide geographic information about an area, including geological and geomorphological features. They are used to combine other data, such as satellite images or aerial photographs, and create a comprehensive picture of the state of the soil. In the course of research, the system of ecological monitoring of soil cover using the method of infrared spectrophotometry was improved. The method of physico-chemical analysis of soil samples is substantiated and the dependence between the state of soil contamination by individual chemical elements and their genesis is established. The creation of a computer database and the use of space images in combination with other geo-information technologies really allows for effective monitoring and analysis of soil degradation and other agricultural objects.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR 从网络聚类因子计算个人数据保护的方法
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.14.3649
V. Akhramovich
A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out.Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor.A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection.As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained.Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence.Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented.Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.
建立了数学模型,从网络聚类系数和社交网络中数据传输强度的角度对个人数据保护模型进行了研究。系统保护与系统规模(以及个人数据量)的依赖关系;信息安全威胁来自网络聚类因素。得到一个线性方程组,由等式组成:来自社会网络安全的信息流变化率和反映安全措施影响的系数、个人数据量、泄露率、来自网络聚类因素的信息保护变化、其大小、个人数据保护。通过求解微分方程组,得到了社会网络中个人数据保护指标在不同分量下的数学和图形依赖关系。考虑在系统稳态附近求解方程的三种选择,我们可以得出结论,基于耗散与固有频率之比的条件,后者衰减到某一值是周期性的,具有衰减幅度,或呈指数衰减规律。对系统行为进行更直观的分析,从方程的微分形式转向离散形式,并对系统存在的某个区间进行建模。给出了系统固有频率、振荡周期、衰减系数的数学关系和图形关系。对偏离系统静止位置的值进行了仿真建模。仿真结果表明,该社会网络保护系统是非线性的。
{"title":"METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR","authors":"V. Akhramovich","doi":"10.28925/2663-4023.2021.14.3649","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.3649","url":null,"abstract":"A mathematical model has been developed and a study of the model of personal data protection from network clustering coefficient and data transfer intensity in social networks has been carried out.\u0000\u0000Dependencies of protection of the system from the size of the system (and from the amount of personal data); information security threats from the network clustering factor.\u0000\u0000A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, change of information protection from network clustering factor, its size, personal data protection.\u0000\u0000As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network from different components are obtained.\u0000\u0000Considering three options for solving the equation near the steady state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a certain value is carried out periodically, with decaying amplitude, or by exponentially decaying law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system existence.\u0000\u0000Mathematical and graphical dependences of the system natural frequency, oscillation period, attenuation coefficient are presented.\u0000\u0000Simulation modeling for values with deviation from the stationary position of the system is carried out. As a result of simulation, it is proved that the social network protection system is nonlinear.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REAL SIMULATION OF A "WAR DRIVING" ATTACK ON A WIRELESS NETWORK 对无线网络的“战争驱动”攻击的真实模拟
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.99107
R. Korolkov, Serhii Laptiev
The inevitable spread of wireless networks and the growing traffic in them can lead to an increase in information security incidents. The main threats are aimed at interception, violation of the confidentiality and integrity of transmitted data, attacks on the availability of nodes of the transmission channel and their substitution. Due to its characteristics, the wireless data transmission environment creates potential conditions for eavesdropping on network traffic and uncontrolled connection to the wireless network by attackers who are in its range. Wireless networks, unlike wired networks, are extremely vulnerable to possible attacks and unauthorized access due to the use of radio spectrum and the broadcast nature of the physical layer. To intercept data, it is enough to be in the range of the Wi-Fi network. Therefore, an attacker, being at a safe distance, can use wireless devices to carry out attacks. The article analyzes a cyberattack of the "War Driving" type on wireless networks. The analysis carried out in the article showed that there are open wireless networks. Wireless networks are open or because the administrators who configure them are not security aware. A full-scale simulation of a "War Driving" attack was carried out. Real-time simulation data show that 10.1% of networks do not use any encryption. The detection error of access points not using encryption is from 8% to 12%. This is a very good result and confirms the adequacy of the conducted full-scale modeling. Based on the analysis of the results of live simulation, recommendations have been developed to protect the wireless network from a "War Driving" attack. The developed recommendations will protect wireless networks from "War Driving" attacks
无线网络的不可避免的普及和不断增长的流量会导致信息安全事件的增加。主要威胁是针对拦截、破坏传输数据的机密性和完整性、攻击传输通道节点的可用性及其替代。无线数据传输环境由于其自身的特点,为在其范围内的攻击者窃听网络流量和不受控制地连接无线网络创造了潜在的条件。无线网络与有线网络不同,由于使用无线电频谱和物理层的广播性质,无线网络极易受到可能的攻击和未经授权的访问。要拦截数据,只要在Wi-Fi网络的范围内就足够了。因此,攻击者可以在安全距离之外利用无线设备进行攻击。本文分析了一种基于无线网络的“战争驱动”型网络攻击。文中进行的分析表明,存在开放的无线网络。无线网络是开放的,或者是因为配置它们的管理员没有安全意识。对“战争驾驶”攻击进行了全面模拟。实时仿真数据显示,10.1%的网络没有使用任何加密。未加密接入点的检测错误率为8% ~ 12%。这是一个非常好的结果,证实了所进行的全尺寸建模的充分性。基于对实时仿真结果的分析,提出了保护无线网络免受“战争驱动”攻击的建议。制定的建议将保护无线网络免受“战争驱动”攻击
{"title":"REAL SIMULATION OF A \"WAR DRIVING\" ATTACK ON A WIRELESS NETWORK","authors":"R. Korolkov, Serhii Laptiev","doi":"10.28925/2663-4023.2022.18.99107","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.99107","url":null,"abstract":"The inevitable spread of wireless networks and the growing traffic in them can lead to an increase in information security incidents. The main threats are aimed at interception, violation of the confidentiality and integrity of transmitted data, attacks on the availability of nodes of the transmission channel and their substitution. Due to its characteristics, the wireless data transmission environment creates potential conditions for eavesdropping on network traffic and uncontrolled connection to the wireless network by attackers who are in its range. Wireless networks, unlike wired networks, are extremely vulnerable to possible attacks and unauthorized access due to the use of radio spectrum and the broadcast nature of the physical layer. To intercept data, it is enough to be in the range of the Wi-Fi network. Therefore, an attacker, being at a safe distance, can use wireless devices to carry out attacks. The article analyzes a cyberattack of the \"War Driving\" type on wireless networks. The analysis carried out in the article showed that there are open wireless networks. Wireless networks are open or because the administrators who configure them are not security aware. A full-scale simulation of a \"War Driving\" attack was carried out. Real-time simulation data show that 10.1% of networks do not use any encryption. The detection error of access points not using encryption is from 8% to 12%. This is a very good result and confirms the adequacy of the conducted full-scale modeling. Based on the analysis of the results of live simulation, recommendations have been developed to protect the wireless network from a \"War Driving\" attack. The developed recommendations will protect wireless networks from \"War Driving\" attacks","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE INFLUENCE OF NLU AND GENERATIVE AI ON THE DEVELOPMENT OF CYBER DEFENSE SYSTEMS nlu和生成式人工智能对网络防御系统发展的影响
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.187196
I. Sukaylo, Nataliia Korshun
The combination of cyber security systems and artificial intelligence is a logical step at this stage of information technology development. Today, many cybersecurity vendors are incorporating machine learning and artificial intelligence into their products or services. However, the effectiveness of investments in advanced machine learning and deep learning technologies in terms of generating meaningful measurable results from these products is a matter of debate. When designing such systems, there are problems with achieving accuracy and scaling. The article considers the classification of artificial intelligence systems, artificial intelligence models used by security products, their capabilities, recommendations that should be taken into account when using generative artificial intelligence technologies for cyber protection systems are given. ChatGPT's NLP capabilities can be used to simplify the configuration of policies in security products. An approach that considers both short-term and long-term metrics to measure progress, differentiation, and customer value through AI is appropriate. The issue of using generative AI based on platform solutions, which allows aggregating various user data, exchanging ideas and experience among a large community, and processing high-quality telemetry data, is also considered. Thanks to the network effect, there is an opportunity to retrain AI models and improve the effectiveness of cyber defense for all users. These benefits lead to a virtual cycle of increased user engagement and improved cyber security outcomes, making platform-based security solutions an attractive choice for businesses and individuals alike. When conducting a cyber security audit of any IT infrastructure using AI, the limits and depth of the audit are established taking into account previous experience.
网络安全系统与人工智能的结合是当前信息技术发展的必然趋势。如今,许多网络安全供应商正在将机器学习和人工智能整合到他们的产品或服务中。然而,就从这些产品中产生有意义的可衡量结果而言,投资于先进机器学习和深度学习技术的有效性是一个有争议的问题。在设计这样的系统时,存在实现精度和缩放的问题。本文考虑了人工智能系统的分类、安全产品使用的人工智能模型、其功能,并给出了在网络保护系统中使用生成式人工智能技术时应考虑的建议。ChatGPT的NLP功能可用于简化安全产品中的策略配置。通过人工智能考虑短期和长期指标来衡量进展、差异化和客户价值的方法是合适的。此外,还讨论了基于平台解决方案的生成式人工智能的使用问题,该解决方案可以聚合各种用户数据,在大型社区之间交换想法和经验,并处理高质量的遥测数据。由于网络效应,有机会重新训练人工智能模型,提高所有用户的网络防御效率。这些好处带来了用户参与度增加和网络安全结果改善的虚拟循环,使基于平台的安全解决方案成为企业和个人的一个有吸引力的选择。在使用人工智能对任何IT基础设施进行网络安全审计时,审计的限制和深度是根据以往的经验确定的。
{"title":"THE INFLUENCE OF NLU AND GENERATIVE AI ON THE DEVELOPMENT OF CYBER DEFENSE SYSTEMS","authors":"I. Sukaylo, Nataliia Korshun","doi":"10.28925/2663-4023.2022.18.187196","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.187196","url":null,"abstract":"The combination of cyber security systems and artificial intelligence is a logical step at this stage of information technology development. Today, many cybersecurity vendors are incorporating machine learning and artificial intelligence into their products or services. However, the effectiveness of investments in advanced machine learning and deep learning technologies in terms of generating meaningful measurable results from these products is a matter of debate. When designing such systems, there are problems with achieving accuracy and scaling. The article considers the classification of artificial intelligence systems, artificial intelligence models used by security products, their capabilities, recommendations that should be taken into account when using generative artificial intelligence technologies for cyber protection systems are given. ChatGPT's NLP capabilities can be used to simplify the configuration of policies in security products. An approach that considers both short-term and long-term metrics to measure progress, differentiation, and customer value through AI is appropriate. The issue of using generative AI based on platform solutions, which allows aggregating various user data, exchanging ideas and experience among a large community, and processing high-quality telemetry data, is also considered. Thanks to the network effect, there is an opportunity to retrain AI models and improve the effectiveness of cyber defense for all users. These benefits lead to a virtual cycle of increased user engagement and improved cyber security outcomes, making platform-based security solutions an attractive choice for businesses and individuals alike. When conducting a cyber security audit of any IT infrastructure using AI, the limits and depth of the audit are established taking into account previous experience.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity: Education, Science, Technique
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1