首页 > 最新文献

Cybersecurity: Education, Science, Technique最新文献

英文 中文
CLUSTERING NETWORK ATTACK FEATURES IN INFORMATION SECURITY ANALYSIS TASKS 信息安全分析任务中的网络攻击特征
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2020.9.4558
V. Lakhno, Borys Husiev, A. Blozva, D. Kasatkin, T.Yu. Osypova
The paper proposes an algorithm with self-learning elements for intrusion detection systems, as well as an improved clustering technique which is recorded by the data system concerning information security events. The proposed approaches differ from those known using an entropy approach allowing data to be presented as homogeneous groups, moreover, each such group (or cluster) may correspond to predetermined parameters. The proposed solutions relate to the possibilities of assessing dynamic dependencies between clusters characterizing the analysed classes of invasions. The studies have found that in case of manifestation of new signs of information security events, the corresponding scale changes and describes the distances between clusters. A computational experiment was conducted to verify the operability and adequacy of the proposed solutions. During the computational experiment, it has been found that step-by-step calculation of parameters of informative characteristics of network attacks allows to form sufficiently informative cluster structures of data having characteristic attributes. These attributes further become the basis for the knowledge base of intelligent network attack detection systems. Dynamic dependencies between clusters are calculated allowing for a sufficiently accurate definition of the many information security events that can become the source data for further automatic assessment of current threats extent detected by attack detection systems. The methodology and algorithm presented in the paper for clustering the signs of network attacks, in our opinion it is simpler for software implementation than existing analogues.
本文提出了一种用于入侵检测系统的具有自学习元素的算法,以及一种由信息安全事件数据系统记录的改进聚类技术。所提出的方法不同于已知的使用熵方法的方法,熵方法允许数据作为同质组呈现,而且,每个这样的组(或簇)可能对应于预定的参数。提出的解决方案涉及评估描述所分析的入侵类别的集群之间动态依赖关系的可能性。研究发现,当信息安全事件出现新的迹象时,相应的尺度发生变化,描述了集群之间的距离。通过计算实验验证了所提方案的可操作性和充分性。在计算实验中发现,逐步计算网络攻击的信息特征参数,可以形成具有特征属性的数据的足够信息的聚类结构。这些属性进一步成为智能网络攻击检测系统知识库的基础。计算集群之间的动态依赖关系,允许对许多信息安全事件进行足够准确的定义,这些事件可以成为攻击检测系统检测到的进一步自动评估当前威胁程度的源数据。本文提出的聚类网络攻击迹象的方法和算法,在软件实现上比现有的类似方法更简单。
{"title":"CLUSTERING NETWORK ATTACK FEATURES IN INFORMATION SECURITY ANALYSIS TASKS","authors":"V. Lakhno, Borys Husiev, A. Blozva, D. Kasatkin, T.Yu. Osypova","doi":"10.28925/2663-4023.2020.9.4558","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.9.4558","url":null,"abstract":"The paper proposes an algorithm with self-learning elements for intrusion detection systems, as well as an improved clustering technique which is recorded by the data system concerning information security events. The proposed approaches differ from those known using an entropy approach allowing data to be presented as homogeneous groups, moreover, each such group (or cluster) may correspond to predetermined parameters. The proposed solutions relate to the possibilities of assessing dynamic dependencies between clusters characterizing the analysed classes of invasions. The studies have found that in case of manifestation of new signs of information security events, the corresponding scale changes and describes the distances between clusters. A computational experiment was conducted to verify the operability and adequacy of the proposed solutions. During the computational experiment, it has been found that step-by-step calculation of parameters of informative characteristics of network attacks allows to form sufficiently informative cluster structures of data having characteristic attributes. These attributes further become the basis for the knowledge base of intelligent network attack detection systems. Dynamic dependencies between clusters are calculated allowing for a sufficiently accurate definition of the many information security events that can become the source data for further automatic assessment of current threats extent detected by attack detection systems. The methodology and algorithm presented in the paper for clustering the signs of network attacks, in our opinion it is simpler for software implementation than existing analogues.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ANALYSIS OF METHODS, METHODS, MECHANISMS, TOOLS THEORIES OF DECISION-MAKING FOR MODELING INFORMATION PROTECTION SYSTEM 信息保护系统建模的方法、方法、机制、决策工具理论分析
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.16.159171
Oleksandr Avtushenko, Vira Hyrda, Yuliia Kozhedub, Andrii Maksymets
The article presents a detailed analysis of methods, methods, mechanisms, tools of decision theory for modeling information security systems. The basic terminological concepts are given, and their detailed definition is given. The combination of elements of decision theory with information security systems is shown. The connecting link for this is probability theory. The issue of decision-making procedure as a process is studied. Emphasis is placed on the qualitative parameters of the decision-making procedure that may be suitable for information protection purposes. Analogies have been made that indicate the applicability of decision theory methods to create a model of information security system. Implementation mechanisms are shown in decision-making algorithms. With the help of decision-making theory tools, it has been established that the modeling process can be formalized since both mathematical icons and verbalization. In general, the step-by-step process of designing an information security system is described. It is concluded that formalization as a type of symbolic modeling simultaneously with the application of decision theory is the best option for the descriptive part of the information security system. Modeling has been found to be the best scientific tool for combining theoretical calculations and the practical application of a wide range of research issues, including information security. To support the decision-making of the decision-maker, in other words the offender, in the field of information protection, it is important that the security officer or system administrator has experience and skills in regulated actions. Such actions are both well-known developments in this field of activity and a synthesis of already known algorithms to achieve the state of information security in general. Automation in decision-making is possible through the introduction of a decision support system that is widely used in automated systems: computer systems and networks, especially where there is a need to analyze significant data flows.
本文详细分析了信息安全系统建模的决策理论方法、方法、机制和工具。给出了基本的术语概念,并给出了它们的详细定义。展示了决策理论要素与信息安全系统的结合。与之相关的是概率论。研究决策过程作为一个过程的问题。重点放在可能适合信息保护目的的决策程序的定性参数上。类比表明决策理论方法在建立信息安全系统模型中的适用性。决策算法显示了实现机制。在决策理论工具的帮助下,已经建立了建模过程可以形式化,因为数学符号和语言化。一般来说,描述了设计信息安全系统的一步一步的过程。结果表明,形式化作为一种与决策理论同时应用的符号建模是信息安全系统描述部分的最佳选择。建模已被发现是将理论计算与广泛的研究问题(包括信息安全)的实际应用相结合的最佳科学工具。为了在信息保护领域支持决策者(即违法者)的决策,安全官员或系统管理员必须具有规范操作方面的经验和技能。这些行动既是该活动领域中众所周知的发展,也是实现一般信息安全状态的已知算法的综合。决策自动化可以通过采用广泛应用于自动化系统(计算机系统和网络)的决策支持系统来实现,特别是在需要分析重要数据流的地方。
{"title":"ANALYSIS OF METHODS, METHODS, MECHANISMS, TOOLS THEORIES OF DECISION-MAKING FOR MODELING INFORMATION PROTECTION SYSTEM","authors":"Oleksandr Avtushenko, Vira Hyrda, Yuliia Kozhedub, Andrii Maksymets","doi":"10.28925/2663-4023.2022.16.159171","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.159171","url":null,"abstract":"The article presents a detailed analysis of methods, methods, mechanisms, tools of decision theory for modeling information security systems. The basic terminological concepts are given, and their detailed definition is given. The combination of elements of decision theory with information security systems is shown. The connecting link for this is probability theory. The issue of decision-making procedure as a process is studied. Emphasis is placed on the qualitative parameters of the decision-making procedure that may be suitable for information protection purposes. Analogies have been made that indicate the applicability of decision theory methods to create a model of information security system. Implementation mechanisms are shown in decision-making algorithms. With the help of decision-making theory tools, it has been established that the modeling process can be formalized since both mathematical icons and verbalization. In general, the step-by-step process of designing an information security system is described. It is concluded that formalization as a type of symbolic modeling simultaneously with the application of decision theory is the best option for the descriptive part of the information security system. Modeling has been found to be the best scientific tool for combining theoretical calculations and the practical application of a wide range of research issues, including information security. To support the decision-making of the decision-maker, in other words the offender, in the field of information protection, it is important that the security officer or system administrator has experience and skills in regulated actions. Such actions are both well-known developments in this field of activity and a synthesis of already known algorithms to achieve the state of information security in general. Automation in decision-making is possible through the introduction of a decision support system that is widely used in automated systems: computer systems and networks, especially where there is a need to analyze significant data flows.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130322286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GENERATION OF GABOR FILTERS BASED ON ATEB FUNCTIONS 基于ateb函数的gabor滤波器的生成
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2019.6.142153
M. Nazarkevich, Yaroslav Vozny
{"title":"GENERATION OF GABOR FILTERS BASED ON ATEB FUNCTIONS","authors":"M. Nazarkevich, Yaroslav Vozny","doi":"10.28925/2663-4023.2019.6.142153","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.142153","url":null,"abstract":"","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115304432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMARTCITY WIRELESS FENCE AND INTERACTIVE INFRASTRUCTURE MODEL 智能城市无线围栏及交互基础设施模型
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.13.6380
Nikita Moshenchenko, Bohdan Zhurakovskyi
This article considers the problem of the process of using robots and their control in catering establishments with the help of wireless networks, shows the main features of existing solutions in the field of robotics and networks, their advantages and disadvantages. Wireless networks for their application in robot control have been studied.The main task of wireless networks is to provide high-speed local access to services and data in a certain area, the exchange of information between users within the territory.Building wireless Wi-Fi (IEEE 802.11) networks is now in high demand due to a host of benefits. Among the main advantages of this technology are the most attractive: low cost of equipment; flexibility of equipment use; high data rate.This technology provides the ability to run a number of custom applications. The infrastructure of wireless networks is the basis on which the further implementation of custom applications is built and the support of key services for the company is provided. Such services include network management, information security and service quality assurance (QoS) mechanisms.A virtual environment with the appropriate software was configured, a network simulation was performed, and its results were recorded. This solution can be used in catering establishments. It allows to introduce new technologies into the sphere of human life and increase the profits of food business owners.
本文考虑了利用无线网络在餐饮场所使用机器人及其控制的过程中的问题,展示了机器人和网络领域现有解决方案的主要特点,以及它们的优缺点。研究了无线网络在机器人控制中的应用。无线网络的主要任务是提供高速本地接入某一地区的业务和数据,在该地区内用户之间交换信息。由于许多好处,现在对无线Wi-Fi (IEEE 802.11)网络的需求很大。该技术的主要优点是最具吸引力的:设备成本低;设备使用的灵活性;数据速率高。该技术提供了运行多个自定义应用程序的能力。无线网络的基础设施是构建定制应用程序的进一步实现和为公司提供关键服务支持的基础。这些服务包括网络管理、信息安全和服务质量保证(QoS)机制。配置了具有相应软件的虚拟环境,进行了网络仿真,并记录了仿真结果。此解决方案可用于餐饮场所。它允许将新技术引入人类生活领域,并增加食品企业主的利润。
{"title":"SMARTCITY WIRELESS FENCE AND INTERACTIVE INFRASTRUCTURE MODEL","authors":"Nikita Moshenchenko, Bohdan Zhurakovskyi","doi":"10.28925/2663-4023.2021.13.6380","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.13.6380","url":null,"abstract":"This article considers the problem of the process of using robots and their control in catering establishments with the help of wireless networks, shows the main features of existing solutions in the field of robotics and networks, their advantages and disadvantages. Wireless networks for their application in robot control have been studied.\u0000\u0000The main task of wireless networks is to provide high-speed local access to services and data in a certain area, the exchange of information between users within the territory.\u0000\u0000Building wireless Wi-Fi (IEEE 802.11) networks is now in high demand due to a host of benefits. Among the main advantages of this technology are the most attractive: low cost of equipment; flexibility of equipment use; high data rate.\u0000\u0000This technology provides the ability to run a number of custom applications. The infrastructure of wireless networks is the basis on which the further implementation of custom applications is built and the support of key services for the company is provided. Such services include network management, information security and service quality assurance (QoS) mechanisms.\u0000\u0000A virtual environment with the appropriate software was configured, a network simulation was performed, and its results were recorded. This solution can be used in catering establishments. It allows to introduce new technologies into the sphere of human life and increase the profits of food business owners.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115922734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SMART CITY INFORMATION SYSTEM BASED ON LORA TECHNOLOGYANNOTATION 基于lora技术的智慧城市信息系统
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.16.113128
Olga Borkivska, Bohdan Zhurakovskyi, Artem Platonenko
This article discusses issues related to the concept of the Internet of Things and its application to the development of the Smart City. Smart City or "Smart City" is a new concept for the introduction of technologies (information and communication) to manage the life of the modern city. Existing technologies for long-distance data transmission in the Internet of Things are analyzed. Based on the calculations, the justification of the efficiency of LORA technology is substantiated, the energy potential of the communication line for LORA technology is given, the capacity of the LoRa network is determined. The network architecture has the best relationship between increasing the battery life of IoT devices and providing communication range. The protocol operates in a non-licensed range, and this is its uniqueness in cost and speed of implementation. Based on the study of the experience of implementing the protocol in the city of Lviv, the advantages and problems of implementation were identified. The possibility of using the technology in large cities was assessed. Software has been developed that allows the user to check that everything in his house is in order and that there are no gas leaks, water leaks and no movement in the house. The practical use of IoT in the "Smart City", the use of LoRaWAN technology, the principle of the network are shown. The experience of using the LoRaWAN protocol in Ukraine has been studied and analyzed. The experience of cities on the introduction of Internet of Things technologies in the housing system is considered.
本文讨论了物联网的概念及其在智慧城市发展中的应用。智慧城市或“智慧城市”是引入技术(信息和通信)来管理现代城市生活的新概念。分析了物联网中现有的远距离数据传输技术。在此基础上,验证了LORA技术效率的合理性,给出了LORA技术通信线路的能量势能,确定了LORA网络的容量。网络架构在增加物联网设备的电池寿命和提供通信范围之间具有最佳关系。该协议在非许可范围内运行,这是它在成本和实现速度方面的独特性。通过对利沃夫市实施该协议的经验研究,找出了实施该协议的优势和存在的问题。评估了在大城市使用该技术的可能性。已经开发出一种软件,使用户可以检查家里的一切是否井然有序,没有煤气泄漏,水泄漏,房子里没有动静。对物联网在“智慧城市”中的实际应用、LoRaWAN技术的应用、组网原理等进行了阐述。对乌克兰使用LoRaWAN协议的经验进行了研究和分析。考虑了城市在住房系统中引入物联网技术的经验。
{"title":"SMART CITY INFORMATION SYSTEM BASED ON LORA TECHNOLOGYANNOTATION","authors":"Olga Borkivska, Bohdan Zhurakovskyi, Artem Platonenko","doi":"10.28925/2663-4023.2022.16.113128","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.16.113128","url":null,"abstract":"This article discusses issues related to the concept of the Internet of Things and its application to the development of the Smart City. Smart City or \"Smart City\" is a new concept for the introduction of technologies (information and communication) to manage the life of the modern city. Existing technologies for long-distance data transmission in the Internet of Things are analyzed. Based on the calculations, the justification of the efficiency of LORA technology is substantiated, the energy potential of the communication line for LORA technology is given, the capacity of the LoRa network is determined. The network architecture has the best relationship between increasing the battery life of IoT devices and providing communication range. The protocol operates in a non-licensed range, and this is its uniqueness in cost and speed of implementation. Based on the study of the experience of implementing the protocol in the city of Lviv, the advantages and problems of implementation were identified. The possibility of using the technology in large cities was assessed. Software has been developed that allows the user to check that everything in his house is in order and that there are no gas leaks, water leaks and no movement in the house. The practical use of IoT in the \"Smart City\", the use of LoRaWAN technology, the principle of the network are shown. The experience of using the LoRaWAN protocol in Ukraine has been studied and analyzed. The experience of cities on the introduction of Internet of Things technologies in the housing system is considered.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122751024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TESTING THE ORGANIZATION'S CORPORATE NETWORK FOR UNAUTHORIZED ACCESS 测试组织的公司网络是否有未经授权的访问
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.18.3948
Ivan Tyshyk
In today's world, the number of cyber attacks is increasing every year. These attacks lead to massive loss of confidential data, disruption of critical infrastructure. The number of cyberattacks has only increased since the beginning of the pandemic and carries with it significant financial and reputational risks for any company. The work considers possible methods of testing the security of the organization's corporate network against unauthorized penetration. Simulation of testing for unauthorized access to selected information resources was carried out and possible attacks after obtaining such access were characterized.The most typical methods of exploitation of possible vulnerabilities in corporate networks are given. The Kali Linux distribution was chosen because it contains many tools for penetration testing, which allows for periodic testing of networks and nodes, as well as corporate network security audits in order to identify existing vulnerabilities, configuration flaws and close them before they can be used by attackers. During the study, it was found that each system is unique in its own way due to the use of different types of signatures and applications. Such a representation requires in-depth knowledge of attacks and system-specific documentation from the developer to configure the system itself to monitor specific applications. Conducted simulations of the process of detecting network attacks based on the Kali Linux OS utilities showed that this tool is a practical choice for a security administrator and allows him to detect threats to the information system in a timely manner and conduct effective monitoring of the operating environment in real time. Thanks to the utilities of the proposed system, on the basis of which a network attack on the object of protection is implemented, it is possible to eliminate a certain type of vulnerability of the information system or its constituent parts, which will make it impossible to implement many types of attacks. The directions of further research can be aimed at the development of network utilities to implement the protection of various types of operating systems against unauthorized interventions and their subsequent integration into the system of utilities for the appropriate operating environment, as well as to increase the effectiveness of monitoring the information system as a whole for the purpose of detecting various types of vulnerabilities on its assets , which will improve its protection against many types of network attacks.
当今世界,网络攻击的数量每年都在增加。这些攻击导致大量机密数据丢失,关键基础设施中断。自大流行开始以来,网络攻击的数量只会增加,并给任何公司带来重大的财务和声誉风险。这项工作考虑了测试组织公司网络的安全性以防止未经授权的渗透的可能方法。对所选信息资源进行了未经授权访问的仿真测试,并对获得未经授权访问后可能发生的攻击进行了表征。给出了利用企业网络中可能存在的漏洞的最典型方法。之所以选择Kali Linux发行版,是因为它包含许多用于渗透测试的工具,这些工具允许对网络和节点进行定期测试,以及公司网络安全审计,以便识别现有的漏洞和配置缺陷,并在攻击者使用之前关闭它们。在研究过程中,由于使用不同类型的签名和应用程序,每个系统都有自己的独特之处。这种表示需要开发人员深入了解攻击和系统特定的文档,以便配置系统本身来监视特定的应用程序。基于Kali Linux操作系统实用程序对网络攻击检测过程进行了模拟,表明该工具对于安全管理员来说是一个实用的选择,可以让他及时发现对信息系统的威胁,并对操作环境进行实时有效的监控。由于所提出的系统的实用性,在其基础上实施对保护对象的网络攻击,可以消除信息系统或其组成部分的某类漏洞,从而使多种类型的攻击无法实施。进一步研究的方向可以是发展网络公用事业,以保护各种类型的操作系统不受未经授权的干预,并随后将其纳入公用事业系统,以提供适当的操作环境,以及提高监测整个信息系统的效率,以便发现其资产上的各种脆弱性。这将提高它对多种网络攻击的保护。
{"title":"TESTING THE ORGANIZATION'S CORPORATE NETWORK FOR UNAUTHORIZED ACCESS","authors":"Ivan Tyshyk","doi":"10.28925/2663-4023.2022.18.3948","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.18.3948","url":null,"abstract":"In today's world, the number of cyber attacks is increasing every year. These attacks lead to massive loss of confidential data, disruption of critical infrastructure. The number of cyberattacks has only increased since the beginning of the pandemic and carries with it significant financial and reputational risks for any company. The work considers possible methods of testing the security of the organization's corporate network against unauthorized penetration. Simulation of testing for unauthorized access to selected information resources was carried out and possible attacks after obtaining such access were characterized.\u0000\u0000The most typical methods of exploitation of possible vulnerabilities in corporate networks are given. The Kali Linux distribution was chosen because it contains many tools for penetration testing, which allows for periodic testing of networks and nodes, as well as corporate network security audits in order to identify existing vulnerabilities, configuration flaws and close them before they can be used by attackers. During the study, it was found that each system is unique in its own way due to the use of different types of signatures and applications. Such a representation requires in-depth knowledge of attacks and system-specific documentation from the developer to configure the system itself to monitor specific applications. Conducted simulations of the process of detecting network attacks based on the Kali Linux OS utilities showed that this tool is a practical choice for a security administrator and allows him to detect threats to the information system in a timely manner and conduct effective monitoring of the operating environment in real time. Thanks to the utilities of the proposed system, on the basis of which a network attack on the object of protection is implemented, it is possible to eliminate a certain type of vulnerability of the information system or its constituent parts, which will make it impossible to implement many types of attacks. The directions of further research can be aimed at the development of network utilities to implement the protection of various types of operating systems against unauthorized interventions and their subsequent integration into the system of utilities for the appropriate operating environment, as well as to increase the effectiveness of monitoring the information system as a whole for the purpose of detecting various types of vulnerabilities on its assets , which will improve its protection against many types of network attacks.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128613589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETY 基础设施安全炎症风险增加假设方向的确定策略
Pub Date : 1900-01-01 DOI: 10.28925/10.28925/2663-4023.2019.3.97103
Yanina Roy, N. Mazur, Olena Riabchun
In this article, a mathematical apparatus for comparative analysis of the set of threats of state information resources (DIR) is proposed for consideration, which combines methods and approaches to assess their qualitative and quantitative indicators. The main feature of the study is that the proposed approach to solving the problem of choice does not require a complete restoration of the principle of optimality, but allows to limit only information that will be sufficient to select the "reference sample". The essence of the ranking procedure lies in the fact that the expert poses the threat of an IP in the order that, in his opinion, is the most rational. For each of them the expert assigns specific numbers from a natural series - ranks. In this case, the highest rank receives the threat that has the highest priority. The order scale to be obtained as a result of ranking should satisfy the condition of equality of the number of ranks of the number of ranked threats. In this case, the less complex value of the numerical value will correspond to the least dangerous threat. The essence of the method lies in the fact that the expert must put each threat considered in a certain place in accordance with the degree of availability of one or another property, or in accordance with the proposed by the same expert, the coefficient of significance. In this case, the larger value of a complex assessment corresponds to the least dangerous threat. The basic mathematical method for assessing the threat of threats from the "general population" of the IB classes of threats is the method of formation and research of generalized indicators (criteria), the results of complex combination of which determine the trends of qualitative growth of their significance. Methods of expert assessments are used to increase the reliability of the results of assessing the levels of potential hazards of each threat from the "general population" of IB threat classes. The application of the proposed method will reduce the time to assess the state of the security of information resources and will allow, firstly, to identify the most significant threats that could inflict the greatest damage to information security and, secondly, to direct them the necessary means and safeguards.
本文提出了一种对国家信息资源(DIR)威胁集进行比较分析的数学装置,以供考虑,该装置结合了评估其定性和定量指标的方法和途径。这项研究的主要特点是,所提出的解决选择问题的方法不需要完全恢复最优性原则,而只允许限制足以选择“参考样本”的信息。排序程序的本质在于,专家按照他认为最合理的顺序对知识产权构成威胁。对于每一个问题,专家从一个自然序列——排名中分配特定的数字。在这种情况下,最高的级别接收到具有最高优先级的威胁。排序得到的排序尺度应满足排序威胁数的排序数相等的条件。在这种情况下,数值的复杂度越低,威胁的危险性就越小。该方法的实质在于,专家必须根据一个或另一个属性的可用性程度,或根据同一专家提出的显著性系数,将所考虑的每个威胁放在一定的位置。在这种情况下,复杂评估的较大值对应于最不危险的威胁。评估来自IB类威胁“一般群体”的威胁的基本数学方法是广义指标(标准)的形成和研究方法,其复杂组合的结果决定了其显著性质的增长趋势。专家评估方法用于提高评估来自IB威胁类别的“一般人群”的每种威胁的潜在危害水平的结果的可靠性。所建议方法的应用将减少评估信息资源安全状况的时间,并允许,首先,识别可能对信息安全造成最大损害的最重大威胁,其次,指导他们采取必要的手段和保障措施。
{"title":"STRATEGY OF DETERMINATION OF THE HYPOTHETIC DIRECTION OF INCREASING THE RISK OF INFLAMMATION OF THE INFRASTRUCTURE SAFETY","authors":"Yanina Roy, N. Mazur, Olena Riabchun","doi":"10.28925/10.28925/2663-4023.2019.3.97103","DOIUrl":"https://doi.org/10.28925/10.28925/2663-4023.2019.3.97103","url":null,"abstract":"In this article, a mathematical apparatus for comparative analysis of the set of threats of state information resources (DIR) is proposed for consideration, which combines methods and approaches to assess their qualitative and quantitative indicators. The main feature of the study is that the proposed approach to solving the problem of choice does not require a complete restoration of the principle of optimality, but allows to limit only information that will be sufficient to select the \"reference sample\". The essence of the ranking procedure lies in the fact that the expert poses the threat of an IP in the order that, in his opinion, is the most rational. For each of them the expert assigns specific numbers from a natural series - ranks. In this case, the highest rank receives the threat that has the highest priority. The order scale to be obtained as a result of ranking should satisfy the condition of equality of the number of ranks of the number of ranked threats. In this case, the less complex value of the numerical value will correspond to the least dangerous threat. The essence of the method lies in the fact that the expert must put each threat considered in a certain place in accordance with the degree of availability of one or another property, or in accordance with the proposed by the same expert, the coefficient of significance. In this case, the larger value of a complex assessment corresponds to the least dangerous threat. The basic mathematical method for assessing the threat of threats from the \"general population\" of the IB classes of threats is the method of formation and research of generalized indicators (criteria), the results of complex combination of which determine the trends of qualitative growth of their significance. Methods of expert assessments are used to increase the reliability of the results of assessing the levels of potential hazards of each threat from the \"general population\" of IB threat classes. The application of the proposed method will reduce the time to assess the state of the security of information resources and will allow, firstly, to identify the most significant threats that could inflict the greatest damage to information security and, secondly, to direct them the necessary means and safeguards.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124484977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ALGORITHM FOR DETERMINING THE MEASURE OF EXISTENCE OF UNRELIABLE INFORMATION IN THE CONDITIONS OF INFORMATION CONFLICT 在信息冲突条件下确定不可靠信息存在度量的算法
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2021.14.1525
Tetiana Laptievа
Social interaction of subjects in the modern world, in addition to positive forms, also has negative ones. One of such forms is information confrontation, the conceptual basis of which is to spread in the information space of the enemy unreliable information to influence the assessments, intentions, and orientation of the population and decision-makers. In this case, information becomes a more important resource than material or energy resources.The analysis of laws and properties of existence and distribution of information in the conditions of information confrontation is carried out. Based on the analysis of the above laws and studying the properties of information, the main features of the perception of information by the subjects are formulated. These are selectivity, attitude to certain information, authority (reputation), imaginary secrecy of receiving information. It is shown that on the basis of the formulated features of perception of information of subjects it is possible to create visibility of reliability of the information, and then no force will convince that it is specially made for the purpose of incorrect estimation, the negative orientation of the population and decision-makers.The main advantage of the proposed algorithm is that the parameters of information evaluation are used as a measure of the probability of propagation of inaccurate information. The degree of probability of dissemination of unreliable information is determined for each law of existence of information separately. The general estimation of the probability of distribution of unreliable information consists of the production of values of measures of each law in the person. Depending on the preference of a particular law for a particular type of information, the value of the measure will vary. That is, the proposed algorithm, in contrast to existing methods of evaluating information, additionally takes into account the type and class of information.The direction of further research: development of a scale of measures to assess the probability of spreading inaccurate information. Using as coefficients of the model the parameters of the developed scale of measures to assess the probability of propagation of inaccurate information. Creation of a mathematical model of distribution of unreliable information in the conditions of information confrontation.
现代社会主体的社会互动除了积极的形式外,也有消极的形式。其中一种形式是信息对抗,其概念基础是在敌人的信息空间中传播不可靠的信息,以影响民众和决策者的评估、意图和方向。在这种情况下,信息成为比物质或能源更重要的资源。分析了信息对抗条件下信息存在和分布的规律和性质。在分析上述规律的基础上,通过对信息属性的研究,提出了主体对信息感知的主要特征。这些是选择性,对某些信息的态度,权威(声誉),接收信息的想象保密性。研究表明,根据被试对信息的感知特征,有可能创造信息可靠性的可见性,然后没有力量会说服它是专门为不正确的估计,人口和决策者的负面导向而制作的。该算法的主要优点是使用信息评估参数作为不准确信息传播概率的度量。对每一条信息存在规律分别确定不可靠信息传播的概率程度。对不可靠信息分布概率的一般估计,包括对人的每条规律的度量值的产生。根据特定法则对特定类型信息的偏好,度量的价值会有所不同。也就是说,与现有的信息评价方法相比,本文提出的算法额外考虑了信息的类型和类别。进一步研究的方向是:制定一套衡量不准确信息传播概率的量表。利用所开发的度量尺度的参数作为模型的系数来评估不准确信息传播的概率。建立在信息对抗条件下不可靠信息分布的数学模型。
{"title":"ALGORITHM FOR DETERMINING THE MEASURE OF EXISTENCE OF UNRELIABLE INFORMATION IN THE CONDITIONS OF INFORMATION CONFLICT","authors":"Tetiana Laptievа","doi":"10.28925/2663-4023.2021.14.1525","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.14.1525","url":null,"abstract":"Social interaction of subjects in the modern world, in addition to positive forms, also has negative ones. One of such forms is information confrontation, the conceptual basis of which is to spread in the information space of the enemy unreliable information to influence the assessments, intentions, and orientation of the population and decision-makers. In this case, information becomes a more important resource than material or energy resources.\u0000\u0000The analysis of laws and properties of existence and distribution of information in the conditions of information confrontation is carried out. Based on the analysis of the above laws and studying the properties of information, the main features of the perception of information by the subjects are formulated. These are selectivity, attitude to certain information, authority (reputation), imaginary secrecy of receiving information. It is shown that on the basis of the formulated features of perception of information of subjects it is possible to create visibility of reliability of the information, and then no force will convince that it is specially made for the purpose of incorrect estimation, the negative orientation of the population and decision-makers.\u0000\u0000The main advantage of the proposed algorithm is that the parameters of information evaluation are used as a measure of the probability of propagation of inaccurate information. The degree of probability of dissemination of unreliable information is determined for each law of existence of information separately. The general estimation of the probability of distribution of unreliable information consists of the production of values of measures of each law in the person. Depending on the preference of a particular law for a particular type of information, the value of the measure will vary. That is, the proposed algorithm, in contrast to existing methods of evaluating information, additionally takes into account the type and class of information.\u0000\u0000The direction of further research: development of a scale of measures to assess the probability of spreading inaccurate information. Using as coefficients of the model the parameters of the developed scale of measures to assess the probability of propagation of inaccurate information. Creation of a mathematical model of distribution of unreliable information in the conditions of information confrontation.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117287958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
HOW TO CONSTRUCT CSIDH ON QUADRATIC AND TWISTED EDWARDS CURVES 如何在二次和扭曲的Edwards曲线上构造csidh
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2022.15.148163
A. Bessalov
In one of the famous works, an incorrect formulation and an incorrect solution of the implementation problem of the CSIDH algorithm on Edwards curves is discovered. A detailed critique of this work with a proof of the fallacy of its concept is given. Specific properties of three non-isomorphic classes of supersingular curves in the generalized Edwards form is considered: complete, quadratic, and twisted Edwards curves. Conditions for the existence of curves of all classes with the order p+1 of curves over a prime field are determined. The implementation of the CSIDH algorithm on isogenies of odd prime degrees based on the use of quadratic twist pairs of elliptic curves. To this end, the CSIDH algorithm can be construct both on complete Edwards curves with quadratic twist within this class, and on quadratic and twisted Edwards curves forming pairs of quadratic twist. In contrast to this, the authors of a well-known work are trying to prove theorems with statement about existing a solution within one class of curves with a parameter that is a square. The critical analysis of theorems, lemmas, and erroneous statements in this work is given. Theorem 2 on quadratic twist in classes of Edwards curves is proved. A modification of the CSIDH algorithm based on isogenies of quadratic and twisted Edwards curves is presented. To illustrate the correct solution of the problem, an example of Alice and Bob calculations in the secret sharing scheme according to the CSIDH algorithm is considered.
在其中一篇著名的著作中,发现了CSIDH算法在Edwards曲线上的实现问题的一个不正确的表述和一个不正确的解。对这项工作的详细批评,并证明了其概念的谬误。研究了三种非同构的广义Edwards型超奇异曲线的特殊性质:完全曲线、二次曲线和扭曲Edwards曲线。确定了素域上所有类曲线p+1阶曲线存在的条件。利用椭圆曲线的二次扭转对实现奇素数度等同源的CSIDH算法。为此,CSIDH算法既可以构造在该类中具有二次扭转的完全Edwards曲线上,也可以构造在具有二次扭转对的二次和扭转Edwards曲线上。与此相反,一个著名作品的作者正试图用关于在一类参数为平方的曲线内存在解的陈述来证明定理。在这项工作中,对定理、引理和错误陈述进行了批判性分析。证明了一类Edwards曲线的二次扭转定理2。提出了一种基于二次曲线和扭曲爱德华兹曲线等同源性的CSIDH算法的改进。为了说明问题的正确解,本文考虑了秘密共享方案中基于CSIDH算法的Alice和Bob计算的一个例子。
{"title":"HOW TO CONSTRUCT CSIDH ON QUADRATIC AND TWISTED EDWARDS CURVES","authors":"A. Bessalov","doi":"10.28925/2663-4023.2022.15.148163","DOIUrl":"https://doi.org/10.28925/2663-4023.2022.15.148163","url":null,"abstract":"In one of the famous works, an incorrect formulation and an incorrect solution of the implementation problem of the CSIDH algorithm on Edwards curves is discovered. A detailed critique of this work with a proof of the fallacy of its concept is given. Specific properties of three non-isomorphic classes of supersingular curves in the generalized Edwards form is considered: complete, quadratic, and twisted Edwards curves. Conditions for the existence of curves of all classes with the order p+1 of curves over a prime field are determined. The implementation of the CSIDH algorithm on isogenies of odd prime degrees based on the use of quadratic twist pairs of elliptic curves. To this end, the CSIDH algorithm can be construct both on complete Edwards curves with quadratic twist within this class, and on quadratic and twisted Edwards curves forming pairs of quadratic twist. In contrast to this, the authors of a well-known work are trying to prove theorems with statement about existing a solution within one class of curves with a parameter that is a square. The critical analysis of theorems, lemmas, and erroneous statements in this work is given. Theorem 2 on quadratic twist in classes of Edwards curves is proved. A modification of the CSIDH algorithm based on isogenies of quadratic and twisted Edwards curves is presented. To illustrate the correct solution of the problem, an example of Alice and Bob calculations in the secret sharing scheme according to the CSIDH algorithm is considered.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
THEORETIC NUMBER BASIC METHODS OF INFORMATION TECHNOLOGIES FOR DIAGNOSTATION OF TECHNOLOGICAL OBJECTS OF THE OIL & GAS INDUSTRY 油气工业技术对象诊断信息技术的理论与基本方法
Pub Date : 1900-01-01 DOI: 10.28925/2663-4023.2019.3.122133
V. Pikh, M. Bestylnyy, V. Sheketa
. The existing methods of formation and coding of technological data at the grass-roots levels of distributed computerized systems for diagnosing technological objects in the oil and gas industry are analyzed. Methods of processing signals are analyzed. The mathematical model of multibase spectral cosine signal transformation, with the possibility of using different theorems of numerical bases, is considered. Correlation analysis of signals can be performed on the basis of different automobile and inter-correlation functions, but the highest speed and the smallest hardware complexity are characterized by functions in the theory of the Haar numerical basis. Where it is evident that in practice the widest use has been found in the form of information converters based on an analog digital converter of various types. The research of analog digital converters has been carried out on hardware complexity as well as on time complexity. The research was carried out on single-channel analogue digital converters with source codes, the theorem of the numerical basis of Haar, Krestinson, Rademacher and unitary basis. The paper deals with the development of digital correlators and transducers where among many structures of analog digital converters the most commonly used with source codes in different theorems of numerical bases and methods of formation of source codes are identified. The structure of the analog digital converter is proposed for the use of comparators with paraphase outputs and the implementation of a logical element that excludes OR on logical elements of I-NE with paraphase inputs and are connected by inverted outputs. Thus, the proposed improvement of the structure allows to increase its speed and reduce the time complexity of transformations by 2.5 -3 times. This reduces hardware complexity by about 30%. The method and structures of the transformation of the input analog signal by the multi-base ADA of Haar-Krestenson using the comparators with paraphase outputs in discrete digital samples for diagnostics of technological objects in the oil and gas industry and further calculation in computer technology are developed.
. 分析了目前油气行业技术对象诊断分布式计算机系统基层技术数据的形成和编码方法。分析了信号处理的方法。考虑了多基谱余弦信号变换的数学模型,并考虑了使用不同的数值基定理的可能性。信号的相关分析可以基于不同的汽车和相互关联函数进行,但在Haar数值基理论中,速度最快和硬件复杂度最小的特征是函数。显然,在实践中最广泛的应用是基于各种类型的模拟数字转换器的信息转换器。模拟数字变换器的研究既有硬件复杂度的研究,也有时间复杂度的研究。利用源代码、Haar、Krestinson、Rademacher的数值基定理和酉基对单通道模拟数字转换器进行了研究。本文讨论了数字相关器和换能器的发展,在许多模拟数字转换器的结构中,识别了最常用的具有不同数值基定理的源代码和源代码的形成方法。本文提出了模拟数字转换器的结构,用于使用具有反转输出的比较器和实现一个逻辑元件,该逻辑元件排除具有反转输入并通过反向输出连接的I-NE的逻辑元件上的OR。因此,提出的结构改进可以提高其速度,并将转换的时间复杂度降低2.5 -3倍。这减少了大约30%的硬件复杂性。本文提出了用Haar-Krestenson多碱基ADA对输入模拟信号进行变换的方法和结构,该方法利用离散数字样本中有错相输出的比较器对输入模拟信号进行变换,并在计算机技术中进行进一步计算。
{"title":"THEORETIC NUMBER BASIC METHODS OF INFORMATION TECHNOLOGIES FOR DIAGNOSTATION OF TECHNOLOGICAL OBJECTS OF THE OIL & GAS INDUSTRY","authors":"V. Pikh, M. Bestylnyy, V. Sheketa","doi":"10.28925/2663-4023.2019.3.122133","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.3.122133","url":null,"abstract":". The existing methods of formation and coding of technological data at the grass-roots levels of distributed computerized systems for diagnosing technological objects in the oil and gas industry are analyzed. Methods of processing signals are analyzed. The mathematical model of multibase spectral cosine signal transformation, with the possibility of using different theorems of numerical bases, is considered. Correlation analysis of signals can be performed on the basis of different automobile and inter-correlation functions, but the highest speed and the smallest hardware complexity are characterized by functions in the theory of the Haar numerical basis. Where it is evident that in practice the widest use has been found in the form of information converters based on an analog digital converter of various types. The research of analog digital converters has been carried out on hardware complexity as well as on time complexity. The research was carried out on single-channel analogue digital converters with source codes, the theorem of the numerical basis of Haar, Krestinson, Rademacher and unitary basis. The paper deals with the development of digital correlators and transducers where among many structures of analog digital converters the most commonly used with source codes in different theorems of numerical bases and methods of formation of source codes are identified. The structure of the analog digital converter is proposed for the use of comparators with paraphase outputs and the implementation of a logical element that excludes OR on logical elements of I-NE with paraphase inputs and are connected by inverted outputs. Thus, the proposed improvement of the structure allows to increase its speed and reduce the time complexity of transformations by 2.5 -3 times. This reduces hardware complexity by about 30%. The method and structures of the transformation of the input analog signal by the multi-base ADA of Haar-Krestenson using the comparators with paraphase outputs in discrete digital samples for diagnostics of technological objects in the oil and gas industry and further calculation in computer technology are developed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybersecurity: Education, Science, Technique
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1