首页 > 最新文献

Cybersecurity: Education, Science, Technique最新文献

英文 中文
INFORMATION WAR: PROBLEMS, THREATS AND ANTIDES 信息战:问题、威胁和对策
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2019.3.8896
Z. Brzhevska, N. Dovzhenko, R. Kyrychok, G. Gaidur, Andriy O. Anosov
{"title":"INFORMATION WAR: PROBLEMS, THREATS AND ANTIDES","authors":"Z. Brzhevska, N. Dovzhenko, R. Kyrychok, G. Gaidur, Andriy O. Anosov","doi":"10.28925/2663-4023.2019.3.8896","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.3.8896","url":null,"abstract":"","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117334123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DEVELOPMENT OF OBJECT MOVEMENT ALGORITHM BY THE NEURAL NETWORK FOR THE CCTV SYSTEM 基于神经网络的闭路电视系统目标移动算法的开发
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2019.6.105111
Vitaliy Petlitsky, Svitlana Shevchenko, N. Mazur
This article addresses the problem of protecting the private property of a protected object, namely: it offers an algorithm for recognizing object movements using a neural network for the CCTV system. The ability of the perception of the outside world in the form of images allows to investigate with certain probability the properties of an infinite number of objects on the basis of acquaintance with their finite number, and the objective nature of the basic property of the images allows to model the process of their recognition. , namely "image", "feature", "vector implementation". The approaches, methods and technologies of object motion recognition are investigated, their qualitative characteristics and disadvantages are highlighted. Artificial neural networks have been found to be the most effective method for solving the object motion recognition task due to result accuracy, simplicity and speed. On the basis of the block diagram of the complex algorithm for image processing and analysis, the algorithm of object motion recognition using neural network for the video surveillance system was developed.
{"title":"DEVELOPMENT OF OBJECT MOVEMENT ALGORITHM BY THE NEURAL NETWORK FOR THE CCTV SYSTEM","authors":"Vitaliy Petlitsky, Svitlana Shevchenko, N. Mazur","doi":"10.28925/2663-4023.2019.6.105111","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.105111","url":null,"abstract":"This article addresses the problem of protecting the private property of a protected object, namely: it offers an algorithm for recognizing object movements using a neural network for the CCTV system. The ability of the perception of the outside world in the form of images allows to investigate with certain probability the properties of an infinite number of objects on the basis of acquaintance with their finite number, and the objective nature of the basic property of the images allows to model the process of their recognition. , namely \"image\", \"feature\", \"vector implementation\". The approaches, methods and technologies of object motion recognition are investigated, their qualitative characteristics and disadvantages are highlighted. Artificial neural networks have been found to be the most effective method for solving the object motion recognition task due to result accuracy, simplicity and speed. On the basis of the block diagram of the complex algorithm for image processing and analysis, the algorithm of object motion recognition using neural network for the video surveillance system was developed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121307453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE DIVIDE AND CONQUER METHOD IN THE DENIABLE ENCRYPTION ALGORITHMS 可否认加密算法中的分而治之法
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.10.2944
A. Halchenko, S. Choporov
The deniable encryption algorithms productivity increasing is investigated in this paper. This investigation is relevant because of effective schemes for information and its users protection. But these algorithms is very complex and lumped. It really affects them. That's why deniable encryption algorithms have not been widespread in data processing and information security systems. The execution time reducing methods and tools exploration is the main goal of this work. The divide and conquer method has been discussed and investigated in this paper. It has been implemented into the data processing system of the deniable encryption algorithms. Nothing modifies have been implemented into the base algorithm. It allows to make it universal and apply to other deniable encryption algorithms. The series of experiments have been completed by authors to verify the hypothesis. The base deniable encryption algorithm discussing is the first stage of investigation. Its vulnerabilities have been found and investigated. Another algorithm is based on the divide and conquer method applying. It has been implemented into the modified data processing system. The both algorithms efficiency has been investigated by the experiments with the real with public and secret information files. The experiments have been completed on the prepared equipment. This equipment simulates the user's workplace with real hardware and software. According to the results the deniable encryption algorithms productivity has been reached by the divide and rule method. Also the method has been verified by the different size encryption keys. The base deniable encryption algorithms have not been modified. The results have been compared with other authors' investigations. In the end authors' hypothesis has been proved. But some restrictions of this results reaching have been set by the authors.
本文研究了可否认加密算法的生产率提高问题。这项调查是相关的,因为有有效的方案来保护信息及其用户。但是这些算法是非常复杂和集总的。这真的会影响他们。这就是为什么可否认的加密算法在数据处理和信息安全系统中没有广泛应用的原因。减少执行时间的方法和工具的探索是本工作的主要目标。本文对分治法进行了探讨和研究。并将其实现到可否认加密算法的数据处理系统中。基本算法中没有任何修改。它允许使其通用并适用于其他可否认的加密算法。作者已经完成了一系列的实验来验证这一假设。讨论的基础可否认加密算法是研究的第一阶段。它的漏洞已经被发现和调查。另一种算法是基于分治法的应用。并将其应用于改进后的数据处理系统中。通过实际的公开和秘密信息文件实验,验证了这两种算法的有效性。在所研制的设备上完成了实验。该设备用真实的硬件和软件模拟用户的工作场所。结果表明,分治法达到了可否认加密算法的生产率。并对不同大小的加密密钥进行了验证。基本的可否认加密算法没有被修改。结果与其他作者的研究结果进行了比较。最后,作者的假设得到了验证。但作者对这一结果的达成设定了一些限制。
{"title":"THE DIVIDE AND CONQUER METHOD IN THE DENIABLE ENCRYPTION ALGORITHMS","authors":"A. Halchenko, S. Choporov","doi":"10.28925/2663-4023.2020.10.2944","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.2944","url":null,"abstract":"The deniable encryption algorithms productivity increasing is investigated in this paper. This investigation is relevant because of effective schemes for information and its users protection. But these algorithms is very complex and lumped. It really affects them. That's why deniable encryption algorithms have not been widespread in data processing and information security systems. The execution time reducing methods and tools exploration is the main goal of this work. The divide and conquer method has been discussed and investigated in this paper. It has been implemented into the data processing system of the deniable encryption algorithms. Nothing modifies have been implemented into the base algorithm. It allows to make it universal and apply to other deniable encryption algorithms. The series of experiments have been completed by authors to verify the hypothesis. The base deniable encryption algorithm discussing is the first stage of investigation. Its vulnerabilities have been found and investigated. Another algorithm is based on the divide and conquer method applying. It has been implemented into the modified data processing system. The both algorithms efficiency has been investigated by the experiments with the real with public and secret information files. The experiments have been completed on the prepared equipment. This equipment simulates the user's workplace with real hardware and software. According to the results the deniable encryption algorithms productivity has been reached by the divide and rule method. Also the method has been verified by the different size encryption keys. The base deniable encryption algorithms have not been modified. The results have been compared with other authors' investigations. In the end authors' hypothesis has been proved. But some restrictions of this results reaching have been set by the authors.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122831590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MATHEMATICAL METHODS IN CYBERSECURITY: CATASTROPHE THEORY 网络安全中的数学方法:突变理论
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2023.19.165175
Svitlana Shevchenko, Yuliia Zhdanovа, S. Spasiteleva
The improvement of protection systems is based on the introduction and use of a mathematical apparatus. Ensuring the confidentiality, integrity and availability of information is an urgent and important problem in the modern world. Crisis processes are characteristic phenomena in security systems, so stochastic models cannot always describe their functioning and give a solution. An effective tool for solving this problem can be the use of dynamic models based on the provisions of catastrophe theory. This study is devoted to the analysis of modern approaches to the use of the basic provisions of catastrophe theory in cybersecurity systems. The work presents a brief historical view of the development of this theory and highlights the main definitions: bifurcations, attractors, catastrophes. Elementary catastrophes, their forms and features are characterized. A review of the literary sources of the use of catastrophe theory in information and cyber security was carried out. The analysis made it possible to single out that this theory has not yet been widely implemented, but there are point scientific developments in the process of detecting network anomalies in the cloud environment. The considered approaches to the application of catastrophe theory in information and cyber security can be used to train specialists in the specialty 125 Cybersecurity in the process of research
保护系统的改进是建立在引入和使用数学仪器的基础上的。确保信息的保密性、完整性和可用性是当今世界一个紧迫而重要的问题。危机过程是安全系统的特征现象,随机模型并不总是能够描述危机过程的功能并给出解决方案。解决这一问题的有效工具是利用基于突变理论规定的动态模型。本研究致力于分析在网络安全系统中使用灾变理论基本规定的现代方法。该工作提出了这一理论发展的简要历史观点,并强调了主要的定义:分岔,吸引子,灾难。阐述了基本灾变的形式和特征。回顾了在信息和网络安全中使用突变理论的文献来源。通过分析可以看出,该理论尚未得到广泛应用,但在云环境下的网络异常检测过程中有了一定的科学进展。考虑到突变理论在信息和网络安全中的应用方法,可以在研究过程中用于培训专业125网络安全专家
{"title":"MATHEMATICAL METHODS IN CYBERSECURITY: CATASTROPHE THEORY","authors":"Svitlana Shevchenko, Yuliia Zhdanovа, S. Spasiteleva","doi":"10.28925/2663-4023.2023.19.165175","DOIUrl":"https://doi.org/10.28925/2663-4023.2023.19.165175","url":null,"abstract":"The improvement of protection systems is based on the introduction and use of a mathematical apparatus. Ensuring the confidentiality, integrity and availability of information is an urgent and important problem in the modern world. Crisis processes are characteristic phenomena in security systems, so stochastic models cannot always describe their functioning and give a solution. An effective tool for solving this problem can be the use of dynamic models based on the provisions of catastrophe theory. This study is devoted to the analysis of modern approaches to the use of the basic provisions of catastrophe theory in cybersecurity systems. The work presents a brief historical view of the development of this theory and highlights the main definitions: bifurcations, attractors, catastrophes. Elementary catastrophes, their forms and features are characterized. A review of the literary sources of the use of catastrophe theory in information and cyber security was carried out. The analysis made it possible to single out that this theory has not yet been widely implemented, but there are point scientific developments in the process of detecting network anomalies in the cloud environment. The considered approaches to the application of catastrophe theory in information and cyber security can be used to train specialists in the specialty 125 Cybersecurity in the process of research","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123392367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WAVELET TRANSFORMATION ATEB-GABOR FILTERS TO BIOMETRIC IMAGES 生物特征图像的小波变换ateb-gabor滤波
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.7.115130
M. Nazarkevych, Yaroslav Voznyi, Sergiy Dmytryk
Biometric images were pre-processed and filtered in two ways, by wavelet- Gabor and wavelet Ateb-gabor filtration. Ateb-based Gabor filter is effective for filtration because it contains generalizations of trigonometric functions. The wavelet transform of Ateb-Gabor function was developed. The function dependence on seven parameters was shown, each of them significantly changes the filtering results of biometric images. The Ateb-Gabor wavelet research was performed. Graphic dependencies of the wavelet Gabor filter and the wavelet Ateb-Gabor filter were constructed. The appliance of wavelet transform makes it possible to reduce the complexity of calculating an Ateb-Gabor filter by simplifying function calculations and reducing filtering time. The complexities of algorithms for calculating the wavelet Gabor filter and the wavelet Ateb-Gabor filter have been evaluated. Ateb-Gabor filtration allows you to adjust the intensity of the entire image, and to change certain ranges, thereby changing certain areas of the image. Biometric images should have this property, on which the minucius should be contrasting and clear. Ateb functions have the property of changing two rational parameters, which will allow to make more flexible control of filtration. The properties of the Ateb function, as well as the possibility of changing the amplitude of the function, the oscillation frequency by the numerical values of the Ateb-Gabor filter, were investigated. By using the parameters of the Ateb function, you can get a much larger range of shapes and sizes, which expands the number of possible filtration options. You can also perform filtration once, taking into account the direction of the minucius and reliably determine the sharpness of the edges, rather than perform filtration many times. The reliability of results were tested using NIST Special Database 302 and good filtration results were shown. This is confirmed by the comparison experiment between the wavelet-Gabor filter and the wavelet Ateb-Gabor function based on the PSNR signal-to-noise ratio measurement.
采用小波- Gabor滤波和小波Ateb-gabor滤波两种方法对生物特征图像进行预处理和滤波。基于ateb的Gabor滤波器是有效的滤波,因为它包含了三角函数的一般化。提出了Ateb-Gabor函数的小波变换。给出了7个参数的函数依赖关系,每一个参数都会显著改变生物特征图像的滤波结果。进行了Ateb-Gabor小波研究。构造了小波Gabor滤波器和小波Ateb-Gabor滤波器的图形依赖关系。小波变换的应用简化了函数计算,减少了滤波时间,从而降低了Ateb-Gabor滤波器的计算复杂度。计算小波Gabor滤波器和小波Ateb-Gabor滤波器的算法的复杂性进行了评估。Ateb-Gabor过滤允许您调整整个图像的强度,并改变某些范围,从而改变图像的某些区域。生物识别图像应该具有这种特性,其上的负号应该对比鲜明且清晰。Ateb函数具有改变两个有理参数的特性,这将使过滤控制更加灵活。研究了Ateb函数的性质,以及用Ateb- gabor滤波器的数值改变函数的幅值和振荡频率的可能性。通过使用Ateb函数的参数,您可以获得更大范围的形状和尺寸,这扩展了可能的过滤选项的数量。您也可以执行过滤一次,考虑到负号的方向,并可靠地确定边缘的清晰度,而不是执行过滤多次。采用NIST专用数据库302对结果进行了可靠性测试,得到了良好的过滤效果。通过基于PSNR信噪比测量的小波- gabor滤波器与小波Ateb-Gabor函数的对比实验证实了这一点。
{"title":"WAVELET TRANSFORMATION ATEB-GABOR FILTERS TO BIOMETRIC IMAGES","authors":"M. Nazarkevych, Yaroslav Voznyi, Sergiy Dmytryk","doi":"10.28925/2663-4023.2020.7.115130","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.7.115130","url":null,"abstract":"Biometric images were pre-processed and filtered in two ways, by wavelet- Gabor and wavelet Ateb-gabor filtration. Ateb-based Gabor filter is effective for filtration because it contains generalizations of trigonometric functions. The wavelet transform of Ateb-Gabor function was developed. The function dependence on seven parameters was shown, each of them significantly changes the filtering results of biometric images. The Ateb-Gabor wavelet research was performed. Graphic dependencies of the wavelet Gabor filter and the wavelet Ateb-Gabor filter were constructed. The appliance of wavelet transform makes it possible to reduce the complexity of calculating an Ateb-Gabor filter by simplifying function calculations and reducing filtering time. The complexities of algorithms for calculating the wavelet Gabor filter and the wavelet Ateb-Gabor filter have been evaluated. Ateb-Gabor filtration allows you to adjust the intensity of the entire image, and to change certain ranges, thereby changing certain areas of the image. Biometric images should have this property, on which the minucius should be contrasting and clear. Ateb functions have the property of changing two rational parameters, which will allow to make more flexible control of filtration. The properties of the Ateb function, as well as the possibility of changing the amplitude of the function, the oscillation frequency by the numerical values of the Ateb-Gabor filter, were investigated. By using the parameters of the Ateb function, you can get a much larger range of shapes and sizes, which expands the number of possible filtration options. You can also perform filtration once, taking into account the direction of the minucius and reliably determine the sharpness of the edges, rather than perform filtration many times. The reliability of results were tested using NIST Special Database 302 and good filtration results were shown. This is confirmed by the comparison experiment between the wavelet-Gabor filter and the wavelet Ateb-Gabor function based on the PSNR signal-to-noise ratio measurement.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124013990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HYBRID CONSTRUCTION OF CYBER SECURITY SYSTEM: ADMINISTRATIVE AND LEGAL PRINCIPLES OF MILITARY-CIVIL COOPERATION 网络安全体系的混合构建:军民合作的行政与法律原则
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2023.19.109121
O. Ponomarov, Serhii Pyvovarchuk, L. Kozubtsova, I. Kozubtsov, T. Bondarenko, T. Tereshchenko
National security of the state is one of the main factors of stable development of society. However, Ukraine and the Armed Forces of Ukraine are forced to counter a hybrid war using cyberspace. It has been established that currently there is no unified vision regarding the methodology of countering wars in a hybrid form. The lack of a countermeasure methodology requires a review of existing approaches to guaranteeing and maintaining state security. The purpose of the article. Justification of the need to create hybrid troops to neutralize cyber threats to the Armed Forces of Ukraine and methods of its implementation on the basis of military-civilian cooperation. Materials and methods. To solve the tasks, a set of theoretical research methods was used: historical analysis and generalization of scientific literature on the research problem; structural and genetic analysis and synthesis when specifying the object and subject of research; the method of going from the abstract to the concrete; the method of analytical and comparative analysis in the analytical and comparative evaluation of the novelty of research results; synthesis and generalization - to justify the methodological and methodical foundations of the research; generalization – formulation of conclusions and recommendations regarding the continuation of further research. Result. A key hypothesis was formed that an effective tool in countering hybrid warfare can be achieved through the use of hybrid troops. Developing this hypothesis substantiates the philosophical idea of the need to create hybrid cyber armies on the basis of military-civilian formations. Foreign experience confirms the high efficiency of military-civilian formations. On the basis of the current legal acts, a method of implementation is proposed. The practical significance of the study lies in the possibility of obtaining advantages in the cyberspace of the Armed Forces of Ukraine during active hybrid wars due to the formation of units of hybrid troops of the Armed Forces of Ukraine.
国家安全是社会稳定发展的主要因素之一。然而,乌克兰和乌克兰武装部队被迫利用网络空间对抗一场混合战争。已经确定的是,目前对以混合形式对抗战争的方法没有统一的看法。缺乏对策方法需要对现有的保障和维护国家安全的方法进行审查。文章的目的。建立混合部队以消除对乌克兰武装部队的网络威胁的必要性的理由及其在军民合作基础上的实施方法。材料和方法。为了解决这一问题,本文采用了一套理论研究方法:对研究问题的科学文献进行历史分析和归纳;在指定研究对象和主题时进行结构和遗传分析和综合;从抽象到具体的方法;研究成果新颖性分析与比较评价中的分析与比较分析法综合和概括-证明研究的方法和方法基础;概括-就进一步研究的继续提出结论和建议。结果。形成了一个关键假设,即通过使用混合部队可以实现对抗混合战争的有效工具。发展这一假设证实了需要在军民编队的基础上创建混合网络军队的哲学思想。国外的经验证实了军民编队的高效率。在现行法律行为的基础上,提出了一种实施方法。研究的现实意义在于,乌克兰武装部队混合部队的组建,使乌克兰武装部队在主动混合战争中获得网络空间优势的可能性。
{"title":"HYBRID CONSTRUCTION OF CYBER SECURITY SYSTEM: ADMINISTRATIVE AND LEGAL PRINCIPLES OF MILITARY-CIVIL COOPERATION","authors":"O. Ponomarov, Serhii Pyvovarchuk, L. Kozubtsova, I. Kozubtsov, T. Bondarenko, T. Tereshchenko","doi":"10.28925/2663-4023.2023.19.109121","DOIUrl":"https://doi.org/10.28925/2663-4023.2023.19.109121","url":null,"abstract":"National security of the state is one of the main factors of stable development of society. However, Ukraine and the Armed Forces of Ukraine are forced to counter a hybrid war using cyberspace. It has been established that currently there is no unified vision regarding the methodology of countering wars in a hybrid form. The lack of a countermeasure methodology requires a review of existing approaches to guaranteeing and maintaining state security. The purpose of the article. Justification of the need to create hybrid troops to neutralize cyber threats to the Armed Forces of Ukraine and methods of its implementation on the basis of military-civilian cooperation. Materials and methods. To solve the tasks, a set of theoretical research methods was used: historical analysis and generalization of scientific literature on the research problem; structural and genetic analysis and synthesis when specifying the object and subject of research; the method of going from the abstract to the concrete; the method of analytical and comparative analysis in the analytical and comparative evaluation of the novelty of research results; synthesis and generalization - to justify the methodological and methodical foundations of the research; generalization – formulation of conclusions and recommendations regarding the continuation of further research. Result. A key hypothesis was formed that an effective tool in countering hybrid warfare can be achieved through the use of hybrid troops. Developing this hypothesis substantiates the philosophical idea of the need to create hybrid cyber armies on the basis of military-civilian formations. Foreign experience confirms the high efficiency of military-civilian formations. On the basis of the current legal acts, a method of implementation is proposed. The practical significance of the study lies in the possibility of obtaining advantages in the cyberspace of the Armed Forces of Ukraine during active hybrid wars due to the formation of units of hybrid troops of the Armed Forces of Ukraine.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132537620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHODS TO IMPROVE THE FAULT-TOLERANCE OF INTERNET SERVICES 提高Internet服务容错性的方法
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2019.3.104111
V. Yaskevych, O. Klochko
. The article deals with the problem of ensuring the fault-tolerance of Internet services. It is becoming increasingly important due to the growth of the quantitative parameters of the functioning of information systems (users, servers, volumes of information in databases) and the level of complexity. Due to the heavy load on the servers on which the applications are deployed, there is a failure of hardware or software. The urgency of finding additional ways to ensure the fault tolerance, reliability and uninterrupted functioning of computer systems operating in real time, due to the increasing requirements for the security of running processes or objects, access to which is limited. Despite the use of existing methods for ensuring fault tolerance in cloud infrastructures, there is a problem of inconsistency between the actual availability of systems and the levels of "fault tolerance" (Fault Tolerance) and "High Availability" (High Availability) for critical and business critical web applications. Also, less attention is paid to methods of improving fault tolerance for highly loaded systems. Therefore, the search for new opportunities for scaling and load balancing when building cloud systems is of particular importance. To conduct a comparative analysis of load balancing algorithms, functional characteristics were proposed, according to which it is possible to make an informed choice of algorithms that most closely correspond to specific practical circumstances and the requirements of users and providers. The basic principles for implementing a resiliency strategy now include redundancy, diagnostics, reconfiguration, and recovery. As an additional indicator of failover control, it is proposed to apply the completeness of the booking of elements and components of the system, the completeness and reliability of the control, the probability of reserve recovery. The first two strategies assume that a system that correctly performs its functioning algorithm is safe. The safe behavior strategy for failures is used specifically for safe systems and consists in the transition of the system to a protective irreversible state in the event of a failure.
. 本文研究了保证Internet服务容错的问题。由于信息系统(用户、服务器、数据库中的信息量)的功能的数量参数的增长和复杂性的程度,它正变得越来越重要。由于部署应用程序的服务器负载过重,可能会出现硬件或软件故障。由于对运行过程或对象的安全性要求越来越高,因此迫切需要寻找其他方法来确保实时运行的计算机系统的容错性、可靠性和不间断功能。尽管使用了现有的方法来确保云基础设施中的容错,但对于关键和业务关键型web应用程序,系统的实际可用性与“容错”(fault tolerance)和“高可用性”(High availability)级别之间存在不一致的问题。此外,对提高高负载系统容错能力的方法关注较少。因此,在构建云系统时寻找扩展和负载平衡的新机会尤为重要。为了对负载均衡算法进行比较分析,提出了功能特征,根据这些特征,可以明智地选择最符合具体实际情况以及用户和提供商需求的算法。现在实现弹性策略的基本原则包括冗余、诊断、重新配置和恢复。作为故障切换控制的附加指标,提出了应用系统各要素和部件的预订完备性、控制的完备性和可靠性、备用恢复概率等指标来进行故障切换控制。前两种策略假设正确执行其功能算法的系统是安全的。故障的安全行为策略是专门用于安全系统的,它包括在发生故障时系统向保护不可逆状态的过渡。
{"title":"METHODS TO IMPROVE THE FAULT-TOLERANCE OF INTERNET SERVICES","authors":"V. Yaskevych, O. Klochko","doi":"10.28925/2663-4023.2019.3.104111","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.3.104111","url":null,"abstract":". The article deals with the problem of ensuring the fault-tolerance of Internet services. It is becoming increasingly important due to the growth of the quantitative parameters of the functioning of information systems (users, servers, volumes of information in databases) and the level of complexity. Due to the heavy load on the servers on which the applications are deployed, there is a failure of hardware or software. The urgency of finding additional ways to ensure the fault tolerance, reliability and uninterrupted functioning of computer systems operating in real time, due to the increasing requirements for the security of running processes or objects, access to which is limited. Despite the use of existing methods for ensuring fault tolerance in cloud infrastructures, there is a problem of inconsistency between the actual availability of systems and the levels of \"fault tolerance\" (Fault Tolerance) and \"High Availability\" (High Availability) for critical and business critical web applications. Also, less attention is paid to methods of improving fault tolerance for highly loaded systems. Therefore, the search for new opportunities for scaling and load balancing when building cloud systems is of particular importance. To conduct a comparative analysis of load balancing algorithms, functional characteristics were proposed, according to which it is possible to make an informed choice of algorithms that most closely correspond to specific practical circumstances and the requirements of users and providers. The basic principles for implementing a resiliency strategy now include redundancy, diagnostics, reconfiguration, and recovery. As an additional indicator of failover control, it is proposed to apply the completeness of the booking of elements and components of the system, the completeness and reliability of the control, the probability of reserve recovery. The first two strategies assume that a system that correctly performs its functioning algorithm is safe. The safe behavior strategy for failures is used specifically for safe systems and consists in the transition of the system to a protective irreversible state in the event of a failure.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132095520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TOOLS OF IMPROVING THE DIGITAL COMPETENCE LEVEL OF CYBER SECURITY PROFESSIONALS IN THE EDUCATIONAL PROCESS 在教育过程中提高网络安全专业人员数字能力水平的工具
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.93109
L. Arsenovych
The article analyzes the accrued national and foreign developments regarding the problems of digital competence formation and effective use of information technology in education. The components of digital competence are considered, which provide for a confident, critical and responsible interaction with digital technology for education, work and participation in social activities. The results of a global information security research are presented along with surveys of employees of leading cyber companies around the world, including Ukraine, that testify to the necessity of further application and implementation of an integrated approach to education using organizational measures, software and hardware means and management processes at all activity levels of any organization, as well as using the appropriate tools to raise the digital competence level. The essence of the importance of digital tools in the field of cyber security is formulated, which means a set of Internet tools (resources) to protect network environment entities against various information and cyber threats, ensuring proper organization of countering their effect, formation, functioning and evolution of cyber space and development of educational cyber technology and the information society as a whole. Three main groups of digital cyber security tools were analyzed, identified and proposed (professional cyber tools, education cyber tools and communicative cyber tools) that enable the use, access, filtering, evaluating, creating, programming and communicating digital content, managing and protecting information, content, data and digital identities, as well as working effectively with software, devices, artificial intelligence, robots and more. It is proved that present-day work with digital cyber tools and their content requires a reflective, critical and at the same time inquisitive, open and promising attitude to their development, as well as an ethical, safe, effective and responsible approach to their use
本文分析了国内外关于数字能力形成和信息技术在教育中的有效应用问题的发展情况。考虑了数字能力的组成部分,它们为教育、工作和参与社会活动提供了自信、关键和负责任的与数字技术的互动。全球信息安全研究的结果,以及对包括乌克兰在内的全球领先网络公司员工的调查,证明了在任何组织的所有活动层面进一步应用和实施综合教育方法的必要性,使用组织措施,软件和硬件手段和管理流程,以及使用适当的工具来提高数字能力水平。阐述了数字工具在网络安全领域重要性的本质,即一套保护网络环境实体免受各种信息和网络威胁的互联网工具(资源),确保正确组织应对其影响、网络空间的形成、功能和演变,以及教育网络技术和整个信息社会的发展。分析、确定并提出了三种主要的数字网络安全工具(专业网络工具、教育网络工具和通信网络工具),它们能够使用、访问、过滤、评估、创建、编程和交流数字内容,管理和保护信息、内容、数据和数字身份,以及与软件、设备、人工智能、机器人等有效合作。事实证明,当今使用数字网络工具及其内容的工作需要对其发展采取反思,批判,同时好奇,开放和有希望的态度,以及道德,安全,有效和负责任的使用方法
{"title":"TOOLS OF IMPROVING THE DIGITAL COMPETENCE LEVEL OF CYBER SECURITY PROFESSIONALS IN THE EDUCATIONAL PROCESS","authors":"L. Arsenovych","doi":"10.28925/2663-4023.2022.15.93109","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.93109","url":null,"abstract":"The article analyzes the accrued national and foreign developments regarding the problems of digital competence formation and effective use of information technology in education. The components of digital competence are considered, which provide for a confident, critical and responsible interaction with digital technology for education, work and participation in social activities. The results of a global information security research are presented along with surveys of employees of leading cyber companies around the world, including Ukraine, that testify to the necessity of further application and implementation of an integrated approach to education using organizational measures, software and hardware means and management processes at all activity levels of any organization, as well as using the appropriate tools to raise the digital competence level. The essence of the importance of digital tools in the field of cyber security is formulated, which means a set of Internet tools (resources) to protect network environment entities against various information and cyber threats, ensuring proper organization of countering their effect, formation, functioning and evolution of cyber space and development of educational cyber technology and the information society as a whole. Three main groups of digital cyber security tools were analyzed, identified and proposed (professional cyber tools, education cyber tools and communicative cyber tools) that enable the use, access, filtering, evaluating, creating, programming and communicating digital content, managing and protecting information, content, data and digital identities, as well as working effectively with software, devices, artificial intelligence, robots and more. It is proved that present-day work with digital cyber tools and their content requires a reflective, critical and at the same time inquisitive, open and promising attitude to their development, as well as an ethical, safe, effective and responsible approach to their use","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSIS OF OS WINDOWS 10 FILE OBJECTS FOR SYSTEM PARTITION SPACE CLEANING AND OPTIMIZATION 分析Windows 10操作系统文件对象,用于系统分区空间清理和优化
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.7184
Vitalii Bulatetskyi, Lesia Bulatetska, Tetiana Hryshanovych
The paper analyzes the causes and ways of solving the problem of free space lack on the system partition during the OS Windows exploitation. The peculiarities of the system partition organization during the installation of common Microsoft operating systems are analyzed. The main system file objects, paths to them, their purpose and role in the use of system partition space and in the functioning of the operating system are considered. Represented the list of paths to the files of the folders that occupy the largest volumes on the system partition. Thees folders correct cleaning or configuring may save a lot of space on the system partition. The main tools of the operating system for the cleaning methods implementation are considered: command line interpretator, PowerShell environment, system registry editing tools, and system library function calling tools. Particular attention is paid to batch files as the simplest and most effective means of implementing automated use of system utilities, taking into account the peculiarities of the command line interpreter. One of the ways to manipulate objects with commands is to use the PowerShell environment. This environment is able not to process commands, but to generate streams of objects related to this command and form their processed representation using both command and graphical interface. Described the logical and physical structure of the registry as one of the tools for managing Windows settings. Was made the comparative analysis of some software products, such as the system console utility for servicing deployment and management images, as well as a number of free software. It has generated the list of functions used for the system partition optimization and cleaning from excessive data. Based on the generated list, the efficiency of using the considered software tools for cleaning the system partition is analyzed.
分析了Windows操作系统开发过程中系统分区空闲空间不足的原因及解决方法。分析了常用Microsoft操作系统安装过程中系统分区组织的特点。考虑了主要的系统文件对象、它们的路径、它们在使用系统分区空间和操作系统功能中的目的和作用。表示在系统分区上占用最大卷的文件夹的文件的路径列表。这些文件夹的正确清理或配置可以节省大量的系统分区空间。清洗方法实现的主要操作系统工具有:命令行解释器、PowerShell环境、系统注册表编辑工具和系统库函数调用工具。考虑到命令行解释器的特性,将批处理文件作为实现自动使用系统实用程序的最简单和最有效的方法给予特别关注。使用命令操作对象的方法之一是使用PowerShell环境。此环境不能处理命令,但可以生成与该命令相关的对象流,并使用命令和图形界面形成已处理的表示形式。描述注册表的逻辑和物理结构,作为管理Windows设置的工具之一。对一些软件产品进行了比较分析,如用于服务部署和管理映像的系统控制台实用程序,以及一些免费软件。它生成了用于系统分区优化和清除过多数据的函数列表。根据生成的列表,分析了使用所考虑的软件工具清理系统分区的效率。
{"title":"ANALYSIS OF OS WINDOWS 10 FILE OBJECTS FOR SYSTEM PARTITION SPACE CLEANING AND OPTIMIZATION","authors":"Vitalii Bulatetskyi, Lesia Bulatetska, Tetiana Hryshanovych","doi":"10.28925/2663-4023.2022.15.7184","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.7184","url":null,"abstract":"The paper analyzes the causes and ways of solving the problem of free space lack on the system partition during the OS Windows exploitation. The peculiarities of the system partition organization during the installation of common Microsoft operating systems are analyzed. The main system file objects, paths to them, their purpose and role in the use of system partition space and in the functioning of the operating system are considered. Represented the list of paths to the files of the folders that occupy the largest volumes on the system partition. Thees folders correct cleaning or configuring may save a lot of space on the system partition. The main tools of the operating system for the cleaning methods implementation are considered: command line interpretator, PowerShell environment, system registry editing tools, and system library function calling tools. Particular attention is paid to batch files as the simplest and most effective means of implementing automated use of system utilities, taking into account the peculiarities of the command line interpreter. One of the ways to manipulate objects with commands is to use the PowerShell environment. This environment is able not to process commands, but to generate streams of objects related to this command and form their processed representation using both command and graphical interface. Described the logical and physical structure of the registry as one of the tools for managing Windows settings. Was made the comparative analysis of some software products, such as the system console utility for servicing deployment and management images, as well as a number of free software. It has generated the list of functions used for the system partition optimization and cleaning from excessive data. Based on the generated list, the efficiency of using the considered software tools for cleaning the system partition is analyzed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130633331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DESIGN OF KNOWLEDGE BASE FOR CYBER SECURITY SYSTEMS ON THE BASIS OF SUBJECT IDENTIFICATION METHOD 基于主体识别方法的网络安全系统知识库设计
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.8.135148
V. Lakhno, D. Kasatkin, Maksym Misiura, Borys Husiev
The article presents the results of research performed in the process of designing an expert system (ES) designed to assess the threats to information security (IS) of critical information facilities (CIF). The approach to designing of expert system on the basis of syllogisms and logic of predicates, and also a method of meaningful identification of objects of knowledge base (KB) is offered. The essence of the method is that each object of the database of the projected EU, is matched by a tuple of keywords (ToK), the significance of which is determined by experts. Thus, each database object is placed in accordance with the element of the finite fuzzy topological space of the database objects. Meaningful identification takes place on the distance between the objects of the database. The approach proposed in the work, in comparison with the decisions of other authors, has a number of advantages. Namely, it allows: to model different variants of cyber threat scenarios for CIF and their consequences; determine the contribution of each of the factors or components of the architecture of the IS CIF to the overall picture of the probability of a cyber threat to the CIF; model the interaction of all IS factors and, if necessary, visualize this interaction; calculate and further rank the values of cyber threat probabilities for CIF for specific threat scenarios; automate the processes of threat modeling through the use of developed software and significantly reduce the time for audit of threats. It is shown that the use of the method of meaningful identification allows to increase the adequacy of the models of the selected subject area, as well as to prevent erroneous introduction of the same judgments of experts and goals in the EU database, in particular by combining hierarchies of goals formed by different expert groups. It is shown that the method can also be used to find the goals of the hierarchy, the exact wording of which, according to keywords, is unknown.
本文介绍了在设计一个专家系统(ES)的过程中进行的研究结果,该系统旨在评估关键信息设施(CIF)对信息安全(IS)的威胁。提出了基于三段论和谓词逻辑的专家系统设计方法,以及知识库对象的有意义识别方法。该方法的本质是,预测欧盟数据库的每个对象都由关键字元组(ToK)匹配,关键字元组的重要性由专家确定。因此,每个数据库对象都按照数据库对象的有限模糊拓扑空间的元素来放置。有意义的识别发生在数据库对象之间的距离上。与其他作者的决定相比,工作中提出的方法有许多优点。也就是说,它允许:对CIF的不同网络威胁情景及其后果进行建模;确定IS CIF架构的每个因素或组成部分对CIF遭受网络威胁可能性的总体情况的贡献;模拟所有信息系统因素的相互作用,如有必要,可视化这种相互作用;对特定威胁场景的CIF网络威胁概率值进行计算并进一步排序;通过使用已开发的软件实现威胁建模过程的自动化,并显著减少对威胁进行审计的时间。研究表明,使用有意义的识别方法可以增加所选主题领域模型的充分性,并防止错误地引入欧盟数据库中专家和目标的相同判断,特别是通过结合由不同专家组形成的目标层次。结果表明,该方法也可用于寻找层次结构的目标,根据关键字,其确切措辞是未知的。
{"title":"DESIGN OF KNOWLEDGE BASE FOR CYBER SECURITY SYSTEMS ON THE BASIS OF SUBJECT IDENTIFICATION METHOD","authors":"V. Lakhno, D. Kasatkin, Maksym Misiura, Borys Husiev","doi":"10.28925/2663-4023.2020.8.135148","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.8.135148","url":null,"abstract":"The article presents the results of research performed in the process of designing an expert system (ES) designed to assess the threats to information security (IS) of critical information facilities (CIF). The approach to designing of expert system on the basis of syllogisms and logic of predicates, and also a method of meaningful identification of objects of knowledge base (KB) is offered. The essence of the method is that each object of the database of the projected EU, is matched by a tuple of keywords (ToK), the significance of which is determined by experts. Thus, each database object is placed in accordance with the element of the finite fuzzy topological space of the database objects. Meaningful identification takes place on the distance between the objects of the database. The approach proposed in the work, in comparison with the decisions of other authors, has a number of advantages. Namely, it allows: to model different variants of cyber threat scenarios for CIF and their consequences; determine the contribution of each of the factors or components of the architecture of the IS CIF to the overall picture of the probability of a cyber threat to the CIF; model the interaction of all IS factors and, if necessary, visualize this interaction; calculate and further rank the values of cyber threat probabilities for CIF for specific threat scenarios; automate the processes of threat modeling through the use of developed software and significantly reduce the time for audit of threats. It is shown that the use of the method of meaningful identification allows to increase the adequacy of the models of the selected subject area, as well as to prevent erroneous introduction of the same judgments of experts and goals in the EU database, in particular by combining hierarchies of goals formed by different expert groups. It is shown that the method can also be used to find the goals of the hierarchy, the exact wording of which, according to keywords, is unknown.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114696407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Cybersecurity: Education, Science, Technique
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1