首页 > 最新文献

Cybersecurity: Education, Science, Technique最新文献

英文 中文
OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS 智能自动化系统设备储备优化
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.14.8799
V. Chubaievskyi, V. Lakhno, B. Akhmetov, O. Kryvoruchko, D. Kasatkin, A. Desiatko, Taras Litovchenko
Algorithms for a neural network analyzer involved in the decision support system (DSS) during the selection of the composition of backup equipment (CBE) for intelligent automated control systems Smart City are proposed. A model, algorithms and software have been developed for solving the optimization problem of choosing a CBE capable of ensuring the uninterrupted operation of the IACS both in conditions of technological failures and in conditions of destructive interference in the operation of the IACS by the attackers. The proposed solutions help to reduce the cost of determining the optimal CBE for IACS by 15–17% in comparison with the results of known calculation methods. The results of computational experiments to study the degree of influence of the outputs of the neural network analyzer on the efficiency of the functioning of the CBE for IACS are presented.
提出了一种神经网络分析算法,用于智能城市自动控制系统中决策支持系统(DSS)的备用设备组成选择。本文提出了一种模型、算法和软件,用于解决在技术故障和攻击者破坏性干扰的情况下,选择能够确保IACS不间断运行的CBE的优化问题。与已知计算方法的结果相比,所提出的解决方案有助于将确定IACS最佳CBE的成本降低15-17%。给出了计算实验的结果,研究了神经网络分析仪的输出对IACS的CBE功能效率的影响程度。
{"title":"OPTIMIZATION OF EQUIPMENT RESERVE FOR INTELLECTUAL AUTOMATED SYSTEMS","authors":"V. Chubaievskyi, V. Lakhno, B. Akhmetov, O. Kryvoruchko, D. Kasatkin, A. Desiatko, Taras Litovchenko","doi":"10.28925/2663-4023.2021.14.8799","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.8799","url":null,"abstract":"Algorithms for a neural network analyzer involved in the decision support system (DSS) during the selection of the composition of backup equipment (CBE) for intelligent automated control systems Smart City are proposed. A model, algorithms and software have been developed for solving the optimization problem of choosing a CBE capable of ensuring the uninterrupted operation of the IACS both in conditions of technological failures and in conditions of destructive interference in the operation of the IACS by the attackers. The proposed solutions help to reduce the cost of determining the optimal CBE for IACS by 15–17% in comparison with the results of known calculation methods. The results of computational experiments to study the degree of influence of the outputs of the neural network analyzer on the efficiency of the functioning of the CBE for IACS are presented.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117341347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
THE METHOD OF DEVELOPING A CLASSIFIER USING THE BAYES THEOREM FOR MAKING A DECISION ON THE DETERMINATION OF TRUE INFORMATION 利用贝叶斯定理开发分类器以确定真信息的方法
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.108123
N. Lukova-Chuiko, Tetiana Laptieva
The range of application of cluster analysis is very wide: it is used in archeology, medicine, psychology, biology, public administration, regional economy, marketing, sociology and other disciplines. Each discipline has its own requirements for primary data and rules for forming groups. Obviously, there will be different methodological approaches to market segmentation, the purpose of which is to identify groups of objects that are similar in terms of features and properties and to the formation of clusters that unite to strengthen their competitive advantages. Thus, when processing information in the information space, the methodology is usually aimed at building a mathematical model of cluster analysis of the object or phenomenon under study, and even obtaining an answer to the question: "Is the information true or not." Detecting false information in the digital world is an important task in overcoming the widespread spread of rumors and prejudices.The paper analyzes the existing methods of information classification in the information age. Formulate the signs of the information age, in the context of determining the veracity of information. Based on the main features of the information age, a method of creating a classifier has been developed to solve the problems of determining the veracity of information.Mathematical modeling was carried out using the developed classifier to confirm the developed method of decision-making about the veracity of information using the Bayes theorem. The obtained results proved the efficiency of the proposed method of developing a classifier for which, when applying the Bayes theorem for decision-making, it is possible to determine the veracity of information.But the developed Bayesian classifier is based on the fact that the a priori probabilities of the hypotheses are known. Therefore, the direction of further research is the development or improvement of methods and algorithms for determining the a priori probability of hypotheses.
聚类分析的应用范围非常广泛:它被应用于考古学、医学、心理学、生物学、公共管理、区域经济、市场营销、社会学等学科。每个学科对原始数据有自己的要求,对分组有自己的规则。显然,市场细分将有不同的方法方法,其目的是识别在特征和属性方面相似的对象组,并形成集群,联合起来加强其竞争优势。因此,该方法在处理信息空间中的信息时,通常以建立对所研究的对象或现象进行聚类分析的数学模型为目的,甚至得到“该信息是真还是假”的答案。在数字世界中发现虚假信息是克服谣言和偏见广泛传播的重要任务。分析了信息时代现有的信息分类方法。制定信息时代的标志,在确定信息真实性的背景下。针对信息时代的主要特征,提出了一种创建分类器的方法来解决信息准确性的判定问题。利用所开发的分类器进行数学建模,以验证所开发的基于贝叶斯定理的信息准确性决策方法。得到的结果证明了所提出的分类器开发方法的有效性,当应用贝叶斯定理进行决策时,可以确定信息的准确性。但是发展起来的贝叶斯分类器是基于假设的先验概率是已知的这一事实。因此,进一步研究的方向是发展或改进确定假设先验概率的方法和算法。
{"title":"THE METHOD OF DEVELOPING A CLASSIFIER USING THE BAYES THEOREM FOR MAKING A DECISION ON THE DETERMINATION OF TRUE INFORMATION","authors":"N. Lukova-Chuiko, Tetiana Laptieva","doi":"10.28925/2663-4023.2022.18.108123","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.108123","url":null,"abstract":"The range of application of cluster analysis is very wide: it is used in archeology, medicine, psychology, biology, public administration, regional economy, marketing, sociology and other disciplines. Each discipline has its own requirements for primary data and rules for forming groups. Obviously, there will be different methodological approaches to market segmentation, the purpose of which is to identify groups of objects that are similar in terms of features and properties and to the formation of clusters that unite to strengthen their competitive advantages. Thus, when processing information in the information space, the methodology is usually aimed at building a mathematical model of cluster analysis of the object or phenomenon under study, and even obtaining an answer to the question: \"Is the information true or not.\" Detecting false information in the digital world is an important task in overcoming the widespread spread of rumors and prejudices.\u0000\u0000The paper analyzes the existing methods of information classification in the information age. Formulate the signs of the information age, in the context of determining the veracity of information. Based on the main features of the information age, a method of creating a classifier has been developed to solve the problems of determining the veracity of information.\u0000\u0000Mathematical modeling was carried out using the developed classifier to confirm the developed method of decision-making about the veracity of information using the Bayes theorem. The obtained results proved the efficiency of the proposed method of developing a classifier for which, when applying the Bayes theorem for decision-making, it is possible to determine the veracity of information.\u0000\u0000But the developed Bayesian classifier is based on the fact that the a priori probabilities of the hypotheses are known. Therefore, the direction of further research is the development or improvement of methods and algorithms for determining the a priori probability of hypotheses.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115168891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD OF INFORMATION SECURITY MANAGEMENT SYSTEMS FUNCTIONAL ANALYSIS 信息安全管理系统功能分析方法
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.8.192201
Vasyl Tsurkan
The process of functional analysis of information security management systems was considered. The relevance of their presentation with many interrelated functions with internal and external interfaces is shown. Taking this into account, the methods of functional analysis of information security management systems are analyzed. Among them, graphic notation IDEF0 is highlighted. This choice is based on the ability to display both interfaces of functions and the conditions and resources of their execution. The orientation of the graphic notation IDEF0 use is established mainly for the presentation of the international standards ISO/IEC 27k series, the display of the main stages of the information security management systems life cycle, the development of individual elements of information security management systems, in particular, risk management. These limitations have been overcome by the method of information security management systems in functional analysis. This was preceded by the definition of the theoretical foundations of this method. Its use allows to allocate their functions at both levels of the system, and levels of its structural elements (subsystems, complexes, components). To do this, define the purpose, viewpoint and establishes information security management as the main activity. It is represented by a set of hierarchically related functions that are represented by a family tree. Each function of this tree defines incoming, outgoing data, management, and mechanisms. This makes it possible to establish their consistency with the organizational structure at the “activity-system”, “process-subsystem”, “operation-module (complex)” and “action-block (component)” levels. In future studies, it is planned to define a hierarchy of functions and develop a logical structure of information security management systems based on the proposed method of functional analysis.
考虑了信息安全管理系统的功能分析过程。显示了它们的表示与许多具有内部和外部接口的相互关联的功能的相关性。在此基础上,分析了信息安全管理系统功能分析的方法。其中,图形符号IDEF0是突出显示的。这种选择是基于显示函数接口及其执行的条件和资源的能力。IDEF0使用图形符号的定位主要是为了表示ISO/IEC 27k系列国际标准,显示信息安全管理体系生命周期的主要阶段,信息安全管理体系的各个要素的发展,特别是风险管理。这些局限性已被信息安全管理系统功能分析方法所克服。在此之前,定义了该方法的理论基础。它的使用允许在系统的两个层次以及它的结构元素(子系统、复合体、组件)的层次上分配它们的功能。为此,定义目的、观点,并将信息安全管理确立为主要活动。它由一组层次相关的函数表示,这些函数由家族树表示。此树的每个函数定义传入、传出数据、管理和机制。这就有可能在“活动-系统”、“过程-子系统”、“操作-模块(复杂)”和“行动块(组件)”各级建立它们与组织结构的一致性。在未来的研究中,计划在提出的功能分析方法的基础上定义一个功能层次,并开发一个信息安全管理系统的逻辑结构。
{"title":"METHOD OF INFORMATION SECURITY MANAGEMENT SYSTEMS FUNCTIONAL ANALYSIS","authors":"Vasyl Tsurkan","doi":"10.28925/2663-4023.2020.8.192201","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.8.192201","url":null,"abstract":"The process of functional analysis of information security management systems was considered. The relevance of their presentation with many interrelated functions with internal and external interfaces is shown. Taking this into account, the methods of functional analysis of information security management systems are analyzed. Among them, graphic notation IDEF0 is highlighted. This choice is based on the ability to display both interfaces of functions and the conditions and resources of their execution. The orientation of the graphic notation IDEF0 use is established mainly for the presentation of the international standards ISO/IEC 27k series, the display of the main stages of the information security management systems life cycle, the development of individual elements of information security management systems, in particular, risk management. These limitations have been overcome by the method of information security management systems in functional analysis. This was preceded by the definition of the theoretical foundations of this method. Its use allows to allocate their functions at both levels of the system, and levels of its structural elements (subsystems, complexes, components). To do this, define the purpose, viewpoint and establishes information security management as the main activity. It is represented by a set of hierarchically related functions that are represented by a family tree. Each function of this tree defines incoming, outgoing data, management, and mechanisms. This makes it possible to establish their consistency with the organizational structure at the “activity-system”, “process-subsystem”, “operation-module (complex)” and “action-block (component)” levels. In future studies, it is planned to define a hierarchy of functions and develop a logical structure of information security management systems based on the proposed method of functional analysis.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125187451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VULNERABILITIES OF SHORT MESSAGE ENCRYPTION IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS 关键基础设施对象移动信息通信系统短消息加密漏洞研究
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.145158
Hennadii Hulak, Yuliia Zhdanovа, P. Skladannyi, Yevhen Hulak, Viktor Korniiets
The article considers the possibility of implementing attacks on information exchange in mobile information and communication systems (ICS), which are protected for additional practical cryptographic transformations. Information exchange in the IСS of critical infrastructure objects is often implemented by means of transmission, receiving and paying fees of apparently short notices. Such improvements can be used to formalize control commands and data on the flow mill of objects, alert signals, alerts about suspected activity in computer networks or data for the formation of multiple secrets (keys) in cyber defense systems. Short message services (Short Message Service - SMS) or add-ons on mobile platforms - messengers are analyzed for the exchange of apparently short notifications. Informed about the possibility of an attack on cryptographic systems with a method of designating a streaming station, the object of critical infrastructure and methods of its implementation. Formulated practical recommendations about how to prevent significant attacks, as well as direct further charges.
本文考虑了在移动信息和通信系统(ICS)中对信息交换实施攻击的可能性,这些信息和通信系统受到额外实际加密转换的保护。在关键基础设施对象的IСS中,信息交换通常通过传输、接收和支付明显较短的通知来实现。这些改进可用于形式化控制命令和对象流动mill的数据,警报信号,计算机网络中可疑活动的警报或网络防御系统中形成多个秘密(密钥)的数据。短消息服务(短消息服务- SMS)或移动平台上的附加组件-信使被分析为交换明显的短通知。通过指定流媒体站的方法、关键基础设施的目标及其实现方法,了解对加密系统进行攻击的可能性。就如何防止重大攻击提出切实可行的建议,并提出进一步的指控。
{"title":"VULNERABILITIES OF SHORT MESSAGE ENCRYPTION IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS OF CRITICAL INFRASTRUCTURE OBJECTS","authors":"Hennadii Hulak, Yuliia Zhdanovа, P. Skladannyi, Yevhen Hulak, Viktor Korniiets","doi":"10.28925/2663-4023.2022.17.145158","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.145158","url":null,"abstract":"The article considers the possibility of implementing attacks on information exchange in mobile information and communication systems (ICS), which are protected for additional practical cryptographic transformations. Information exchange in the IСS of critical infrastructure objects is often implemented by means of transmission, receiving and paying fees of apparently short notices. Such improvements can be used to formalize control commands and data on the flow mill of objects, alert signals, alerts about suspected activity in computer networks or data for the formation of multiple secrets (keys) in cyber defense systems. Short message services (Short Message Service - SMS) or add-ons on mobile platforms - messengers are analyzed for the exchange of apparently short notifications. Informed about the possibility of an attack on cryptographic systems with a method of designating a streaming station, the object of critical infrastructure and methods of its implementation. Formulated practical recommendations about how to prevent significant attacks, as well as direct further charges.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130493939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CYBER SECURITY CULTURE LEVEL ASSESSMENT MODEL IN THE INFORMATION SYSTEM 信息系统中网络安全文化水平评估模型
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.13.158169
I. Skiter
The paper sets the task of formalizing the processes of assessing the culture of cybersecurity of the information system of the organization. The basis is a comprehensive model that takes into account the technical and organizational parameters of the information system and the risks associated with them. The level of security culture of the information system is assessed on the basis of building an additive model. The model includes the characteristics of system state clusters. Clusters are formed on the basis of arrays of factors that correspond to different classes of information security culture. Classes are formed on the basis of sets of factors. Their impact is assessed using the severity of the consequences for the level of cybersecurity of the information system. In addition, the probability of manifestation of this factor in a particular information system is determined. The value of coefficients and probability distributions for each cluster and set of factors is estimated by expert methods and on the basis of a survey. A feature of the formation of arrays of factors is the inclusion in each cluster of a factor that reflects the passive behavior of the user to negative factors. Thus, the model introduces the probability of rejection of negative factors and the probability of ideal behavior for the formation of the appropriate class of threats. It is proposed to determine the average weights of the factors of the level of influence on the cybersecurity of the information system on the basis of the weighted average indicator. A method of estimating weights based on the equally probable distribution of negative factors within the cluster
本文设定了形式化评估组织信息系统网络安全文化的过程的任务。其基础是一个综合模型,该模型考虑到信息系统的技术和组织参数以及与之相关的风险。在建立附加模型的基础上,对信息系统的安全文化水平进行了评估。该模型包含了系统状态簇的特征。集群是在一系列因素的基础上形成的,这些因素对应于不同类别的信息安全文化。阶级是在一系列因素的基础上形成的。使用信息系统网络安全水平后果的严重程度来评估其影响。此外,还确定了该因素在特定信息系统中出现的概率。每个聚类和因子集的系数值和概率分布是通过专家方法和调查来估计的。因素阵列形成的一个特征是在每一簇中包含一个反映用户对消极因素的被动行为的因素。因此,该模型引入了拒绝负面因素的概率和形成适当威胁类别的理想行为的概率。提出在加权平均指标的基础上确定信息系统网络安全影响程度各因素的平均权重。一种基于负因素在簇内的等概率分布估计权重的方法
{"title":"CYBER SECURITY CULTURE LEVEL ASSESSMENT MODEL IN THE INFORMATION SYSTEM","authors":"I. Skiter","doi":"10.28925/2663-4023.2021.13.158169","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.13.158169","url":null,"abstract":"The paper sets the task of formalizing the processes of assessing the culture of cybersecurity of the information system of the organization. The basis is a comprehensive model that takes into account the technical and organizational parameters of the information system and the risks associated with them. The level of security culture of the information system is assessed on the basis of building an additive model. The model includes the characteristics of system state clusters. Clusters are formed on the basis of arrays of factors that correspond to different classes of information security culture. Classes are formed on the basis of sets of factors. Their impact is assessed using the severity of the consequences for the level of cybersecurity of the information system. In addition, the probability of manifestation of this factor in a particular information system is determined. The value of coefficients and probability distributions for each cluster and set of factors is estimated by expert methods and on the basis of a survey. A feature of the formation of arrays of factors is the inclusion in each cluster of a factor that reflects the passive behavior of the user to negative factors. Thus, the model introduces the probability of rejection of negative factors and the probability of ideal behavior for the formation of the appropriate class of threats. It is proposed to determine the average weights of the factors of the level of influence on the cybersecurity of the information system on the basis of the weighted average indicator. A method of estimating weights based on the equally probable distribution of negative factors within the cluster","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131127833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE CURRENT STATE OF THE CYBERSECURITY OF CIVIL AVIATION OF UKRAINE AND THE WORLD 乌克兰和世界民航网络安全现状
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.9.2436
A. Ilyenko, Sergii Ilyenko, D. Kvasha
Considering computer-integrated aviation systems that provide a link between civil aviation activities within the ground-to-air and air-to-air channels, the question of the safe operation of such aviation systems from an ever-increasing cyber threats, and the decline in cybersecurity for the aviation industry as a whole. The protection status of ground-to-air and air-to-air channels in such aviation systems is at different levels and depends directly on the activity of all components of aviation activity (airport-aircraft-information network-air traffic management, etc.). To date, some communication channels are not secure at all and are in an open state, which provokes a rapid growth of cyber-attacks and requires the introduction and application of modern information and communication technologies in such communication channels. In view of the ever-increasing cyber statistics on the work of civil aviation worldwide, the authors of the article highlighted the current state of cyber security and protection of ground-to-air and air-to-air channels of the aircraft fleet of Ukrainian airlines, and take a closer look at the world experience. The authors comprehensively covered all components of the aviation system, with particular attention given to aircraft designed by Antonov Design Bureau with the time evolution of tire development and data networks of the world's leading aviation industry leaders (such as Airbus and Boeing). Also, attention is given to the present state and mechanisms of data transmission of the ground-to-air and air-to-air channels and the architecture of the modern air-network of computer-integrated aviation systems. The authors plan a number of scientific and technical solutions for the development and implementation of effective methods and means to ensure the requirements, principles and sub-approaches to ensure cyber security and the organization of protection of ground-to-air and air-to-air channels in experimental computer-integrated aviation systems.
考虑到在地对空和空对空通道内提供民用航空活动之间联系的计算机集成航空系统,此类航空系统在日益增加的网络威胁中安全运行的问题,以及整个航空业网络安全的下降。这种航空系统中地对空和空对空通道的保护状况是不同等级的,直接取决于航空活动各组成部分(机场-飞机-信息网络-空中交通管理等)的活动情况。目前,一些通信渠道根本不安全,处于开放状态,这引发了网络攻击的快速增长,需要在这些通信渠道中引入和应用现代信息通信技术。鉴于全球民航工作的网络统计数据不断增加,文章作者重点介绍了乌克兰航空公司机队的网络安全和地对空和空对空通道保护的现状,并仔细研究了世界经验。作者全面涵盖了航空系统的所有组成部分,特别关注安东诺夫设计局根据轮胎开发的时间演变和世界领先航空业领导者(如空中客车和波音)的数据网络设计的飞机。此外,还注意到地对空和空对空信道数据传输的现状和机制以及计算机综合航空系统的现代空中网络的结构。为制定和实施有效的方法和手段,确保计算机综合航空系统中网络安全的要求、原则和子途径,以及组织保护地对空和空对空通道,笔者规划了一些科技解决方案。
{"title":"THE CURRENT STATE OF THE CYBERSECURITY OF CIVIL AVIATION OF UKRAINE AND THE WORLD","authors":"A. Ilyenko, Sergii Ilyenko, D. Kvasha","doi":"10.28925/2663-4023.2020.9.2436","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.9.2436","url":null,"abstract":"Considering computer-integrated aviation systems that provide a link between civil aviation activities within the ground-to-air and air-to-air channels, the question of the safe operation of such aviation systems from an ever-increasing cyber threats, and the decline in cybersecurity for the aviation industry as a whole. The protection status of ground-to-air and air-to-air channels in such aviation systems is at different levels and depends directly on the activity of all components of aviation activity (airport-aircraft-information network-air traffic management, etc.). To date, some communication channels are not secure at all and are in an open state, which provokes a rapid growth of cyber-attacks and requires the introduction and application of modern information and communication technologies in such communication channels. In view of the ever-increasing cyber statistics on the work of civil aviation worldwide, the authors of the article highlighted the current state of cyber security and protection of ground-to-air and air-to-air channels of the aircraft fleet of Ukrainian airlines, and take a closer look at the world experience. The authors comprehensively covered all components of the aviation system, with particular attention given to aircraft designed by Antonov Design Bureau with the time evolution of tire development and data networks of the world's leading aviation industry leaders (such as Airbus and Boeing). Also, attention is given to the present state and mechanisms of data transmission of the ground-to-air and air-to-air channels and the architecture of the modern air-network of computer-integrated aviation systems. The authors plan a number of scientific and technical solutions for the development and implementation of effective methods and means to ensure the requirements, principles and sub-approaches to ensure cyber security and the organization of protection of ground-to-air and air-to-air channels in experimental computer-integrated aviation systems.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128206591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PROSPECTIVE DIRECTIONS OF TRAFFIC ANALYSIS AND INTRUSION DETECTION BASED ON NEURAL NETWORKS 基于神经网络的流量分析与入侵检测的发展方向
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.17.4656
A. Ilyenko, Sergii Ilyenko, I. Kravchuk, Marharyta Herasymenko
The main problems of the network security at the moment are the difficulty of combining existing systems from different vendors and ensuring their stable interaction with each other. Intrusion detection is one of the main tasks of a proper level of network security, because it is they who notify about attacks and can block them when detected. Today, monitoring and analyzing the quality of traffic in the network, detecting and preventing intrusions is helped by IDS systems and IDS systems of the new generation IPS. However, they have been found to have certain drawbacks, such as the limitations of signature-based systems, as static attack signatures limit the flexibility of systems and pose the threat of missing detection of other attacks not entered into the database. This gives rise to the creation of more and more new hybrid systems, but the challenge is to ensure their efficiency and flexibility, which is helped by the use of artificial neural networks (ANNs). This paper considers ways to improve the use of the convolutional neural network model itself by means of modified processing, data analysis, the use of Softmax and FocalLoss functions to avoid the problem of uneven distribution of sample data by the ratio of positive and negative samples, based on training using the KDD99 dataset. The article provides practical examples of possible integration of IDS and ANN systems. Combinations of backpropagation neural networks and radiant-basis neural networks, which showed some of the best results and proved that the combination of networks helps to increase the efficiency of these systems and create a flexible network adjusted to the needs and requirements of the systems. Although the use of artificial neural networks is a popular tool, it has identified a number of disadvantages: critical dependence on the quality of the dataset, which pours both the quality of networking and the amount of data (the more data, the better and more accurate the network training). But if the data is excessive, there is a chance of missing such implicit, but also dangerous attacks as R2L and U2R.
目前网络安全的主要问题是难以将不同厂商的现有系统组合起来,并保证它们之间的稳定交互。入侵检测是适当级别的网络安全的主要任务之一,因为是它们通知攻击并在检测到攻击时阻止攻击。如今,监控和分析网络中的流量质量,检测和防御入侵,都离不开IDS系统和新一代IPS的IDS系统。然而,人们发现它们有一定的缺点,例如基于签名的系统的局限性,因为静态攻击签名限制了系统的灵活性,并造成对未进入数据库的其他攻击的遗漏检测的威胁。这导致了越来越多的新混合系统的产生,但挑战在于确保它们的效率和灵活性,这需要使用人工神经网络(ann)。本文在使用KDD99数据集进行训练的基础上,通过改进处理、数据分析、使用Softmax和FocalLoss函数来避免样本数据正负比分布不均匀的问题,考虑如何改进卷积神经网络模型本身的使用。本文提供了IDS和ANN系统可能集成的实际示例。将反向传播神经网络与辐射基神经网络相结合,得到了一些较好的结果,并证明了网络的组合有助于提高系统的效率,并创建一个灵活的网络,以适应系统的需要和要求。尽管人工神经网络的使用是一种流行的工具,但它已经发现了许多缺点:严重依赖数据集的质量,这既影响了网络的质量,也影响了数据的数量(数据越多,网络训练越好,越准确)。但是,如果数据过多,就有可能错过R2L和U2R等隐含的、但也很危险的攻击。
{"title":"PROSPECTIVE DIRECTIONS OF TRAFFIC ANALYSIS AND INTRUSION DETECTION BASED ON NEURAL NETWORKS","authors":"A. Ilyenko, Sergii Ilyenko, I. Kravchuk, Marharyta Herasymenko","doi":"10.28925/2663-4023.2022.17.4656","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.17.4656","url":null,"abstract":"The main problems of the network security at the moment are the difficulty of combining existing systems from different vendors and ensuring their stable interaction with each other. Intrusion detection is one of the main tasks of a proper level of network security, because it is they who notify about attacks and can block them when detected. Today, monitoring and analyzing the quality of traffic in the network, detecting and preventing intrusions is helped by IDS systems and IDS systems of the new generation IPS. However, they have been found to have certain drawbacks, such as the limitations of signature-based systems, as static attack signatures limit the flexibility of systems and pose the threat of missing detection of other attacks not entered into the database. This gives rise to the creation of more and more new hybrid systems, but the challenge is to ensure their efficiency and flexibility, which is helped by the use of artificial neural networks (ANNs). This paper considers ways to improve the use of the convolutional neural network model itself by means of modified processing, data analysis, the use of Softmax and FocalLoss functions to avoid the problem of uneven distribution of sample data by the ratio of positive and negative samples, based on training using the KDD99 dataset. The article provides practical examples of possible integration of IDS and ANN systems. Combinations of backpropagation neural networks and radiant-basis neural networks, which showed some of the best results and proved that the combination of networks helps to increase the efficiency of these systems and create a flexible network adjusted to the needs and requirements of the systems. Although the use of artificial neural networks is a popular tool, it has identified a number of disadvantages: critical dependence on the quality of the dataset, which pours both the quality of networking and the amount of data (the more data, the better and more accurate the network training). But if the data is excessive, there is a chance of missing such implicit, but also dangerous attacks as R2L and U2R.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122576083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RESEARCH OF OPTIMIZATION OF LAMES OF THE LASER SENSOR OF VIBRATION TO COUNTER LASER INTELLIGENCE SYSTEMS 对抗激光智能系统的激光振动传感器结构优化研究
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.110123
V. Dudykevych, I. Opirskyy, Nazariy Dzianyi, Larysa Rakobovchuk, P. Garanyuk
One of the most vulnerable issues in the technical protection of information is the receipt of data, private or confidential, due to leakage through the optoelectronic channel, the main source of data is laser acoustic intelligence systems or laser microphones. There are active and passive methods of protection against laser acoustic reconnaissance systems (ACS). Active methods use various noisy or vibrating devices that pose a danger to human health. With passive protection, it is recommended to use either special corrugated windows or completely closed shutters, which create some inconvenience now. Detecting a working laser microphone is very difficult and in some cases technically impossible. For example, the removal of information using ACS occurs through glass building structures, usually windows. This article is devoted to the analysis of the principle of operation of laser systems of acoustic intelligence and passive methods of reading acoustic information. Triangulation laser sensors are designed for non-contact measurement and control of position, movement, size, surface profile, deformation, vibration, sorting, recognition of technological objects, measuring the level of liquids and bulk materials. Accordingly, they can be used to study the vibrational properties of glass and films applied to them. It is described the method of working with laser triangulation vibration sensors, which allows to study the deviations of glass from different manufacturers from sound vibrations, thereby investigating the anti-laser properties of existing glass, as well as different types of spraying and films. In addition, this method allows you to conduct and test deviations from sound vibrations for new types of glass, films and spraying, proving the results of spectral studies and their impact on the amplitude of vibration of the glass. The vibration sensor was adjusted and the software parameters were experimentally optimized to obtain the truest deviation values ​​required to work with sprayed samples for passive protection.
信息技术保护中最脆弱的问题之一是接收数据,无论是私人的还是机密的,由于通过光电通道泄露,数据的主要来源是激光声学情报系统或激光麦克风。针对激光声侦察系统(ACS)的防护有主动和被动两种方法。主动方法使用各种对人体健康构成危险的噪声或振动装置。对于被动防护,建议使用特殊的波纹窗或全封闭的百叶窗,这在现在造成了一些不便。探测工作中的激光麦克风是非常困难的,在某些情况下在技术上是不可能的。例如,使用ACS可以通过玻璃建筑结构(通常是窗户)去除信息。本文分析了声智能激光系统的工作原理和被动读取声信息的方法。三角测量激光传感器是专为非接触式测量和控制的位置,运动,尺寸,表面轮廓,变形,振动,分类,识别技术对象,测量液体和散装材料的水平。因此,它们可以用来研究玻璃及其薄膜的振动特性。本文描述了使用激光三角振动传感器的方法,该方法可以研究不同制造商的玻璃与声音振动的偏差,从而研究现有玻璃的抗激光性能,以及不同类型的喷涂和薄膜。此外,该方法允许您对新型玻璃、薄膜和喷涂的声音振动偏差进行测试,证明光谱研究的结果及其对玻璃振动幅度的影响。对振动传感器进行了调整,并对软件参数进行了实验优化,以获得与喷涂样品进行被动保护所需的最真实偏差值。
{"title":"RESEARCH OF OPTIMIZATION OF LAMES OF THE LASER SENSOR OF VIBRATION TO COUNTER LASER INTELLIGENCE SYSTEMS","authors":"V. Dudykevych, I. Opirskyy, Nazariy Dzianyi, Larysa Rakobovchuk, P. Garanyuk","doi":"10.28925/2663-4023.2022.15.110123","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.110123","url":null,"abstract":"One of the most vulnerable issues in the technical protection of information is the receipt of data, private or confidential, due to leakage through the optoelectronic channel, the main source of data is laser acoustic intelligence systems or laser microphones. There are active and passive methods of protection against laser acoustic reconnaissance systems (ACS). Active methods use various noisy or vibrating devices that pose a danger to human health. With passive protection, it is recommended to use either special corrugated windows or completely closed shutters, which create some inconvenience now. Detecting a working laser microphone is very difficult and in some cases technically impossible. For example, the removal of information using ACS occurs through glass building structures, usually windows. This article is devoted to the analysis of the principle of operation of laser systems of acoustic intelligence and passive methods of reading acoustic information. Triangulation laser sensors are designed for non-contact measurement and control of position, movement, size, surface profile, deformation, vibration, sorting, recognition of technological objects, measuring the level of liquids and bulk materials. Accordingly, they can be used to study the vibrational properties of glass and films applied to them. It is described the method of working with laser triangulation vibration sensors, which allows to study the deviations of glass from different manufacturers from sound vibrations, thereby investigating the anti-laser properties of existing glass, as well as different types of spraying and films. In addition, this method allows you to conduct and test deviations from sound vibrations for new types of glass, films and spraying, proving the results of spectral studies and their impact on the amplitude of vibration of the glass. The vibration sensor was adjusted and the software parameters were experimentally optimized to obtain the truest deviation values ​​required to work with sprayed samples for passive protection.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131453655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
REAL SIMULATION OF A "WAR DRIVING" ATTACK ON A WIRELESS NETWORK 对无线网络的“战争驱动”攻击的真实模拟
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.99107
R. Korolkov, Serhii Laptiev
The inevitable spread of wireless networks and the growing traffic in them can lead to an increase in information security incidents. The main threats are aimed at interception, violation of the confidentiality and integrity of transmitted data, attacks on the availability of nodes of the transmission channel and their substitution. Due to its characteristics, the wireless data transmission environment creates potential conditions for eavesdropping on network traffic and uncontrolled connection to the wireless network by attackers who are in its range. Wireless networks, unlike wired networks, are extremely vulnerable to possible attacks and unauthorized access due to the use of radio spectrum and the broadcast nature of the physical layer. To intercept data, it is enough to be in the range of the Wi-Fi network. Therefore, an attacker, being at a safe distance, can use wireless devices to carry out attacks. The article analyzes a cyberattack of the "War Driving" type on wireless networks. The analysis carried out in the article showed that there are open wireless networks. Wireless networks are open or because the administrators who configure them are not security aware. A full-scale simulation of a "War Driving" attack was carried out. Real-time simulation data show that 10.1% of networks do not use any encryption. The detection error of access points not using encryption is from 8% to 12%. This is a very good result and confirms the adequacy of the conducted full-scale modeling. Based on the analysis of the results of live simulation, recommendations have been developed to protect the wireless network from a "War Driving" attack. The developed recommendations will protect wireless networks from "War Driving" attacks
无线网络的不可避免的普及和不断增长的流量会导致信息安全事件的增加。主要威胁是针对拦截、破坏传输数据的机密性和完整性、攻击传输通道节点的可用性及其替代。无线数据传输环境由于其自身的特点,为在其范围内的攻击者窃听网络流量和不受控制地连接无线网络创造了潜在的条件。无线网络与有线网络不同,由于使用无线电频谱和物理层的广播性质,无线网络极易受到可能的攻击和未经授权的访问。要拦截数据,只要在Wi-Fi网络的范围内就足够了。因此,攻击者可以在安全距离之外利用无线设备进行攻击。本文分析了一种基于无线网络的“战争驱动”型网络攻击。文中进行的分析表明,存在开放的无线网络。无线网络是开放的,或者是因为配置它们的管理员没有安全意识。对“战争驾驶”攻击进行了全面模拟。实时仿真数据显示,10.1%的网络没有使用任何加密。未加密接入点的检测错误率为8% ~ 12%。这是一个非常好的结果,证实了所进行的全尺寸建模的充分性。基于对实时仿真结果的分析,提出了保护无线网络免受“战争驱动”攻击的建议。制定的建议将保护无线网络免受“战争驱动”攻击
{"title":"REAL SIMULATION OF A \"WAR DRIVING\" ATTACK ON A WIRELESS NETWORK","authors":"R. Korolkov, Serhii Laptiev","doi":"10.28925/2663-4023.2022.18.99107","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.99107","url":null,"abstract":"The inevitable spread of wireless networks and the growing traffic in them can lead to an increase in information security incidents. The main threats are aimed at interception, violation of the confidentiality and integrity of transmitted data, attacks on the availability of nodes of the transmission channel and their substitution. Due to its characteristics, the wireless data transmission environment creates potential conditions for eavesdropping on network traffic and uncontrolled connection to the wireless network by attackers who are in its range. Wireless networks, unlike wired networks, are extremely vulnerable to possible attacks and unauthorized access due to the use of radio spectrum and the broadcast nature of the physical layer. To intercept data, it is enough to be in the range of the Wi-Fi network. Therefore, an attacker, being at a safe distance, can use wireless devices to carry out attacks. The article analyzes a cyberattack of the \"War Driving\" type on wireless networks. The analysis carried out in the article showed that there are open wireless networks. Wireless networks are open or because the administrators who configure them are not security aware. A full-scale simulation of a \"War Driving\" attack was carried out. Real-time simulation data show that 10.1% of networks do not use any encryption. The detection error of access points not using encryption is from 8% to 12%. This is a very good result and confirms the adequacy of the conducted full-scale modeling. Based on the analysis of the results of live simulation, recommendations have been developed to protect the wireless network from a \"War Driving\" attack. The developed recommendations will protect wireless networks from \"War Driving\" attacks","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE INFLUENCE OF NLU AND GENERATIVE AI ON THE DEVELOPMENT OF CYBER DEFENSE SYSTEMS nlu和生成式人工智能对网络防御系统发展的影响
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.187196
I. Sukaylo, Nataliia Korshun
The combination of cyber security systems and artificial intelligence is a logical step at this stage of information technology development. Today, many cybersecurity vendors are incorporating machine learning and artificial intelligence into their products or services. However, the effectiveness of investments in advanced machine learning and deep learning technologies in terms of generating meaningful measurable results from these products is a matter of debate. When designing such systems, there are problems with achieving accuracy and scaling. The article considers the classification of artificial intelligence systems, artificial intelligence models used by security products, their capabilities, recommendations that should be taken into account when using generative artificial intelligence technologies for cyber protection systems are given. ChatGPT's NLP capabilities can be used to simplify the configuration of policies in security products. An approach that considers both short-term and long-term metrics to measure progress, differentiation, and customer value through AI is appropriate. The issue of using generative AI based on platform solutions, which allows aggregating various user data, exchanging ideas and experience among a large community, and processing high-quality telemetry data, is also considered. Thanks to the network effect, there is an opportunity to retrain AI models and improve the effectiveness of cyber defense for all users. These benefits lead to a virtual cycle of increased user engagement and improved cyber security outcomes, making platform-based security solutions an attractive choice for businesses and individuals alike. When conducting a cyber security audit of any IT infrastructure using AI, the limits and depth of the audit are established taking into account previous experience.
网络安全系统与人工智能的结合是当前信息技术发展的必然趋势。如今,许多网络安全供应商正在将机器学习和人工智能整合到他们的产品或服务中。然而,就从这些产品中产生有意义的可衡量结果而言,投资于先进机器学习和深度学习技术的有效性是一个有争议的问题。在设计这样的系统时,存在实现精度和缩放的问题。本文考虑了人工智能系统的分类、安全产品使用的人工智能模型、其功能,并给出了在网络保护系统中使用生成式人工智能技术时应考虑的建议。ChatGPT的NLP功能可用于简化安全产品中的策略配置。通过人工智能考虑短期和长期指标来衡量进展、差异化和客户价值的方法是合适的。此外,还讨论了基于平台解决方案的生成式人工智能的使用问题,该解决方案可以聚合各种用户数据,在大型社区之间交换想法和经验,并处理高质量的遥测数据。由于网络效应,有机会重新训练人工智能模型,提高所有用户的网络防御效率。这些好处带来了用户参与度增加和网络安全结果改善的虚拟循环,使基于平台的安全解决方案成为企业和个人的一个有吸引力的选择。在使用人工智能对任何IT基础设施进行网络安全审计时,审计的限制和深度是根据以往的经验确定的。
{"title":"THE INFLUENCE OF NLU AND GENERATIVE AI ON THE DEVELOPMENT OF CYBER DEFENSE SYSTEMS","authors":"I. Sukaylo, Nataliia Korshun","doi":"10.28925/2663-4023.2022.18.187196","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.187196","url":null,"abstract":"The combination of cyber security systems and artificial intelligence is a logical step at this stage of information technology development. Today, many cybersecurity vendors are incorporating machine learning and artificial intelligence into their products or services. However, the effectiveness of investments in advanced machine learning and deep learning technologies in terms of generating meaningful measurable results from these products is a matter of debate. When designing such systems, there are problems with achieving accuracy and scaling. The article considers the classification of artificial intelligence systems, artificial intelligence models used by security products, their capabilities, recommendations that should be taken into account when using generative artificial intelligence technologies for cyber protection systems are given. ChatGPT's NLP capabilities can be used to simplify the configuration of policies in security products. An approach that considers both short-term and long-term metrics to measure progress, differentiation, and customer value through AI is appropriate. The issue of using generative AI based on platform solutions, which allows aggregating various user data, exchanging ideas and experience among a large community, and processing high-quality telemetry data, is also considered. Thanks to the network effect, there is an opportunity to retrain AI models and improve the effectiveness of cyber defense for all users. These benefits lead to a virtual cycle of increased user engagement and improved cyber security outcomes, making platform-based security solutions an attractive choice for businesses and individuals alike. When conducting a cyber security audit of any IT infrastructure using AI, the limits and depth of the audit are established taking into account previous experience.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128807767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity: Education, Science, Technique
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1