首页 > 最新文献

2014 Workshop on Socio-Technical Aspects in Security and Trust最新文献

英文 中文
Modeling Human Behaviour with Higher Order Logic: Insider Threats 用高阶逻辑建模人类行为:内部威胁
Pub Date : 2014-07-18 DOI: 10.1109/STAST.2014.13
J. Boender, M. Ivanova, F. Kammüller, G. Primiero
In this paper, we approach the problem of modeling the human component in technical systems with a view on the difference between the use of model and theory in sociology and computer science. One aim of this essay is to show that building of theories and models for sociology can be compared to and implemented in Higher Order Logic. We validate this working hypothesis by revisiting Weber's understanding explanation. We focus on constructive realism in the context of logical explanation. We review Higher Order Logic (HOL) as a foundation for computer science and summarize its use of theories relating it to the sociological process of logical explanation. As a case study on modeling human behaviour, we present the modeling and analysis of insider threats as a Higher Order Logic theory in Isabelle/HOL. We show how each of the three step process of sociological explanation can be seen in our modeling of insider's state, its context within an organisation and the effects on security as outcomes of a theorem proving analysis.
在本文中,我们从社会学和计算机科学中模型和理论使用的区别的角度来探讨技术系统中人的组成部分的建模问题。本文的目的之一是表明社会学的理论和模型的建立可以与高阶逻辑进行比较和实施。我们通过重新审视韦伯的理解解释来验证这一工作假设。我们关注的是逻辑解释背景下的建设性现实主义。我们回顾了高阶逻辑(HOL)作为计算机科学的基础,并总结了与逻辑解释的社会学过程相关的理论。作为人类行为建模的案例研究,我们将内部威胁建模和分析作为Isabelle/HOL的高阶逻辑理论。我们展示了社会学解释的三步过程中的每一步是如何在我们的内部状态模型中被看到的,它在组织内的背景,以及作为定理证明分析的结果对安全的影响。
{"title":"Modeling Human Behaviour with Higher Order Logic: Insider Threats","authors":"J. Boender, M. Ivanova, F. Kammüller, G. Primiero","doi":"10.1109/STAST.2014.13","DOIUrl":"https://doi.org/10.1109/STAST.2014.13","url":null,"abstract":"In this paper, we approach the problem of modeling the human component in technical systems with a view on the difference between the use of model and theory in sociology and computer science. One aim of this essay is to show that building of theories and models for sociology can be compared to and implemented in Higher Order Logic. We validate this working hypothesis by revisiting Weber's understanding explanation. We focus on constructive realism in the context of logical explanation. We review Higher Order Logic (HOL) as a foundation for computer science and summarize its use of theories relating it to the sociological process of logical explanation. As a case study on modeling human behaviour, we present the modeling and analysis of insider threats as a Higher Order Logic theory in Isabelle/HOL. We show how each of the three step process of sociological explanation can be seen in our modeling of insider's state, its context within an organisation and the effects on security as outcomes of a theorem proving analysis.","PeriodicalId":201239,"journal":{"name":"2014 Workshop on Socio-Technical Aspects in Security and Trust","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128077977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Decision Justifications for Wireless Network Selection 无线网络选择的决策依据
Pub Date : 2014-07-18 DOI: 10.1109/STAST.2014.9
Debora Jeske, L. Coventry, P. Briggs
A number of security risks are associated with the selection of wireless networks. We examined wireless network choices in a study involving 104 undergraduate social science students. One research goal was to examine the extent to which features (such as padlocks) and colours could be used to 'nudge' individuals towards more secure network and away from open (unsecured) network options. Another goal was to better understand the basis for their decision-making. Using qualitative as well as quantitative data, we were able to differentiate groups whose decision were driven by security concerns, those who made convenience-based decisions, and those whose motives were unclear or undefined. These groups made different network choices, in part due to different perceived functionality of the padlock. We further observed significant effects for the use of colour when nudging participants towards more secure choices. We also wanted to examine the role of individual differences in relation to the choices individuals make. Perceived controllability of risk played a role in terms of the extent to which participants would make more secure vs. Unsecure choices, although we obtained no significant group differences when we examined these variables in relation to the different decision justification groups. This indicates that perceived risk perceptions and reasons for decisions may relate differently to the actual behavioural choices individuals make, with perceptions of risk not necessarily relating to the reasons that participants consider when making security decisions.
许多安全风险与无线网络的选择有关。我们对104名社会科学专业本科生的无线网络选择进行了研究。其中一个研究目标是研究在多大程度上,特征(如挂锁)和颜色可以用来“推动”个人走向更安全的网络,远离开放(不安全)的网络选项。另一个目标是更好地理解他们决策的基础。通过使用定性和定量数据,我们能够区分哪些人的决策是由安全考虑驱动的,哪些人的决策是基于方便的,哪些人的动机是不明确的。这些组做出了不同的网络选择,部分原因是由于对挂锁的不同感知功能。我们进一步观察到,在推动参与者做出更安全的选择时,颜色的使用会产生显著的影响。我们还想研究个体差异在个体选择中的作用。风险的感知可控性在参与者做出更安全与不安全选择的程度上发挥了作用,尽管我们在不同的决策论证组中检查这些变量时没有得到显著的组差异。这表明,感知到的风险感知和决策原因可能与个人做出的实际行为选择有不同的关系,风险感知不一定与参与者在做出安全决策时考虑的原因有关。
{"title":"Decision Justifications for Wireless Network Selection","authors":"Debora Jeske, L. Coventry, P. Briggs","doi":"10.1109/STAST.2014.9","DOIUrl":"https://doi.org/10.1109/STAST.2014.9","url":null,"abstract":"A number of security risks are associated with the selection of wireless networks. We examined wireless network choices in a study involving 104 undergraduate social science students. One research goal was to examine the extent to which features (such as padlocks) and colours could be used to 'nudge' individuals towards more secure network and away from open (unsecured) network options. Another goal was to better understand the basis for their decision-making. Using qualitative as well as quantitative data, we were able to differentiate groups whose decision were driven by security concerns, those who made convenience-based decisions, and those whose motives were unclear or undefined. These groups made different network choices, in part due to different perceived functionality of the padlock. We further observed significant effects for the use of colour when nudging participants towards more secure choices. We also wanted to examine the role of individual differences in relation to the choices individuals make. Perceived controllability of risk played a role in terms of the extent to which participants would make more secure vs. Unsecure choices, although we obtained no significant group differences when we examined these variables in relation to the different decision justification groups. This indicates that perceived risk perceptions and reasons for decisions may relate differently to the actual behavioural choices individuals make, with perceptions of risk not necessarily relating to the reasons that participants consider when making security decisions.","PeriodicalId":201239,"journal":{"name":"2014 Workshop on Socio-Technical Aspects in Security and Trust","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modelling User Devices in Security Ceremonies 安全仪式中的用户设备建模
Pub Date : 2014-07-18 DOI: 10.1109/STAST.2014.11
Taciane Martimiano, J. E. Martina, M. Olembo, Marcelo Carlomagno Carlos
User constrained devices such as smart cards are commonly used in human-protocol interaction. Modelling these devices as part of human-protocol interaction is still an open problem. Examining the interaction of these devices as part of security ceremonies offers greater insight. This paper highlights two such cases: modelling extra channels between humans and devices in the ceremony, and modelling possession when the device also acts as an agent in the ceremony. Case studies where such devices are used during authentication ceremonies are presented to demonstrate these use cases.
用户约束设备如智能卡通常用于人机协议交互。将这些设备建模为人类协议交互的一部分仍然是一个悬而未决的问题。检查这些设备的相互作用,作为安全仪式的一部分,提供了更深入的了解。本文重点介绍了两种情况:在仪式中模拟人与设备之间的额外通道,以及在仪式中模拟设备作为代理时的占有。介绍了在身份验证过程中使用这些设备的案例研究,以演示这些用例。
{"title":"Modelling User Devices in Security Ceremonies","authors":"Taciane Martimiano, J. E. Martina, M. Olembo, Marcelo Carlomagno Carlos","doi":"10.1109/STAST.2014.11","DOIUrl":"https://doi.org/10.1109/STAST.2014.11","url":null,"abstract":"User constrained devices such as smart cards are commonly used in human-protocol interaction. Modelling these devices as part of human-protocol interaction is still an open problem. Examining the interaction of these devices as part of security ceremonies offers greater insight. This paper highlights two such cases: modelling extra channels between humans and devices in the ceremony, and modelling possession when the device also acts as an agent in the ceremony. Case studies where such devices are used during authentication ceremonies are presented to demonstrate these use cases.","PeriodicalId":201239,"journal":{"name":"2014 Workshop on Socio-Technical Aspects in Security and Trust","volume":"53 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125773825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Social Engineering Personality Framework 社会工程人格框架
Pub Date : 2014-07-18 DOI: 10.1109/STAST.2014.12
Sven Übelacker, S. Quiel
We explore Information and Communication Technology (ICT) security in a socio-technical world and focus in particular on the susceptibility to social engineering attacks. We pursue the question if and how personality traits influence this susceptibility. We use Cialdini's principles of influence to categorise social engineering attacks. First we show with a comprehensive literature review how existent research approaches social engineering susceptibility. Based on this review we construct suggestions for plausible relations between personality traits of the Five-Factor Model (Big 5) and the principles of influence. We propose our - at this stage theory-based - "Social Engineering Personality Framework" (SEPF) which we will evaluate in future empiric research. The characteristics of victims' personality traits in the SEPF will support and guide security researchers and practitioners in developing detection, mitigation, and prevention strategies while dealing with human factors in social engineering attacks.
我们探索信息和通信技术(ICT)安全在社会技术的世界,并特别关注对社会工程攻击的敏感性。我们研究的问题是人格特征是否以及如何影响这种易感性。我们使用Cialdini的影响原理对社会工程攻击进行分类。首先,我们通过全面的文献综述来展示现有的研究如何处理社会工程易感性。在此基础上,我们构建了五因素模型人格特征与影响原则之间的似是而非的关系。我们在此阶段提出了基于理论的“社会工程人格框架”(SEPF),我们将在未来的实证研究中对其进行评估。SEPF中受害者人格特征的特征将支持和指导安全研究人员和从业人员在处理社会工程攻击中的人为因素时制定检测、缓解和预防策略。
{"title":"The Social Engineering Personality Framework","authors":"Sven Übelacker, S. Quiel","doi":"10.1109/STAST.2014.12","DOIUrl":"https://doi.org/10.1109/STAST.2014.12","url":null,"abstract":"We explore Information and Communication Technology (ICT) security in a socio-technical world and focus in particular on the susceptibility to social engineering attacks. We pursue the question if and how personality traits influence this susceptibility. We use Cialdini's principles of influence to categorise social engineering attacks. First we show with a comprehensive literature review how existent research approaches social engineering susceptibility. Based on this review we construct suggestions for plausible relations between personality traits of the Five-Factor Model (Big 5) and the principles of influence. We propose our - at this stage theory-based - \"Social Engineering Personality Framework\" (SEPF) which we will evaluate in future empiric research. The characteristics of victims' personality traits in the SEPF will support and guide security researchers and practitioners in developing detection, mitigation, and prevention strategies while dealing with human factors in social engineering attacks.","PeriodicalId":201239,"journal":{"name":"2014 Workshop on Socio-Technical Aspects in Security and Trust","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123840519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
What You Enter Is What You Sign: Input Integrity in an Online Banking Environment 你所输入的就是你所签署的:在网上银行环境中输入的完整性
Pub Date : 2014-07-18 DOI: 10.1109/STAST.2014.14
Sven Kiljan, H. Vranken, M. V. Eekelen
One problem with most currently used transaction authentication methods is that they depend on the customer's computer for integrity of the information flow between customer and bank. This allows man-in-the-middle attacks to be conducted using malware for financial fraud. Some banks are implementing new authentication methods that allow customers to verify transactions received by a bank without depending on the customer's computer to provide information integrity. These new methods are more complex compared to traditional authentication methods and need the customer's attention to be effective, since it is up to the customer to verify the information that was received by his or her bank. By examining the intrinsic problems of traditional and new transaction authentication methods as used by banks, we designed an alternative authentication method named 'Entered Single Transaction Authentication'. Our method ensures that the bank receives information as the customer entered it without requiring further verification by the customer. We introduce the concept 'What You Enter Is What You Sign', which ensures the digital integrity of information as soon as it is entered. Our proposal is theoretical and high-level, but opens the way for secure transaction authentication methods that rely less on the authenticating party to provide correct information, thereby reducing errors and improving user friendliness.
目前使用的大多数事务验证方法的一个问题是,它们依赖于客户计算机来保证客户和银行之间信息流的完整性。这使得中间人攻击可以使用恶意软件进行金融欺诈。一些银行正在实施新的身份验证方法,允许客户验证银行收到的交易,而无需依赖客户的计算机来提供信息完整性。与传统的身份验证方法相比,这些新方法更加复杂,并且需要客户的注意才能有效,因为要由客户来验证其银行收到的信息。通过分析银行使用的传统交易认证方法和新交易认证方法的内在问题,我们设计了一种名为“输入单交易认证”的替代认证方法。我们的方法确保银行收到客户输入的信息,而不需要客户进一步验证。我们引入了“输入即签名”的概念,确保信息在输入时的数字完整性。我们的建议是理论性的和高层次的,但为安全事务认证方法开辟了道路,这种方法较少依赖于认证方提供正确的信息,从而减少错误并提高用户友好性。
{"title":"What You Enter Is What You Sign: Input Integrity in an Online Banking Environment","authors":"Sven Kiljan, H. Vranken, M. V. Eekelen","doi":"10.1109/STAST.2014.14","DOIUrl":"https://doi.org/10.1109/STAST.2014.14","url":null,"abstract":"One problem with most currently used transaction authentication methods is that they depend on the customer's computer for integrity of the information flow between customer and bank. This allows man-in-the-middle attacks to be conducted using malware for financial fraud. Some banks are implementing new authentication methods that allow customers to verify transactions received by a bank without depending on the customer's computer to provide information integrity. These new methods are more complex compared to traditional authentication methods and need the customer's attention to be effective, since it is up to the customer to verify the information that was received by his or her bank. By examining the intrinsic problems of traditional and new transaction authentication methods as used by banks, we designed an alternative authentication method named 'Entered Single Transaction Authentication'. Our method ensures that the bank receives information as the customer entered it without requiring further verification by the customer. We introduce the concept 'What You Enter Is What You Sign', which ensures the digital integrity of information as soon as it is entered. Our proposal is theoretical and high-level, but opens the way for secure transaction authentication methods that rely less on the authenticating party to provide correct information, thereby reducing errors and improving user friendliness.","PeriodicalId":201239,"journal":{"name":"2014 Workshop on Socio-Technical Aspects in Security and Trust","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124453664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using Statistical Information to Communicate Android Permission Risks to Users 利用统计信息向用户传达Android权限风险
Pub Date : 2014-07-18 DOI: 10.1109/STAST.2014.15
Lydia Kraus, I. Wechsung, S. Möller
The Android OS has a permission-based security system that controls the third party applications' access to sensitive information on the smartphone. The risk evaluation is left to the user who has to evaluate whether or not the requested permissions are appropriate. However, former work has shown that users lack attention to and understanding of the permissions which makes it difficult for them to make appropriate decisions. To support users with better understandable information we provide statistical information about permissions, grouped by functionality. We use methods from health risk communication to communicate this information to the users. In a lab experiment with 48 participants we find that users tend to choose more often the app with a lower number of permissions when statistical information is provided together with graphics. We also find that the privacy-intrusiveness and trustworthiness of apps is perceived differently when statistical information is given.
Android操作系统有一个基于权限的安全系统,可以控制第三方应用程序对智能手机上敏感信息的访问。风险评估留给用户,用户必须评估所请求的权限是否合适。然而,以前的工作表明,用户缺乏对权限的关注和理解,这使得他们很难做出适当的决定。为了帮助用户更好地理解信息,我们提供了关于权限的统计信息,按功能分组。我们使用健康风险沟通的方法将这些信息传达给用户。在一个有48名参与者的实验室实验中,我们发现当统计信息和图形一起提供时,用户倾向于选择权限数量较少的应用程序。我们还发现,当给出统计信息时,应用程序的隐私侵犯性和可信度被感知不同。
{"title":"Using Statistical Information to Communicate Android Permission Risks to Users","authors":"Lydia Kraus, I. Wechsung, S. Möller","doi":"10.1109/STAST.2014.15","DOIUrl":"https://doi.org/10.1109/STAST.2014.15","url":null,"abstract":"The Android OS has a permission-based security system that controls the third party applications' access to sensitive information on the smartphone. The risk evaluation is left to the user who has to evaluate whether or not the requested permissions are appropriate. However, former work has shown that users lack attention to and understanding of the permissions which makes it difficult for them to make appropriate decisions. To support users with better understandable information we provide statistical information about permissions, grouped by functionality. We use methods from health risk communication to communicate this information to the users. In a lab experiment with 48 participants we find that users tend to choose more often the app with a lower number of permissions when statistical information is provided together with graphics. We also find that the privacy-intrusiveness and trustworthiness of apps is perceived differently when statistical information is given.","PeriodicalId":201239,"journal":{"name":"2014 Workshop on Socio-Technical Aspects in Security and Trust","volume":"142 6-7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114047175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat 企业安全策略应对意外内部威胁能力的思考
Pub Date : 2014-07-18 DOI: 10.1109/STAST.2014.10
Oliver Buckley, Jason R. C. Nurse, P. Legg, M. Goldsmith, S. Creese
An enterprise's information security policy is an exceptionally important control as it provides the employees of an organisation with details of what is expected of them, and what they can expect from the organisation's security teams, as well as informing the culture within that organisation. The threat from accidental insiders is a reality across all enterprises and can be extremely damaging to the systems, data and reputation of an organisation. Recent industry reports and academic literature underline the fact that the risk of accidental insider compromise is potentially more pressing than that posed by a malicious insider. In this paper we focus on the ability of enterprises' information security policies to mitigate the accidental insider threat. Specifically we perform an analysis of real-world cases of accidental insider threat to define the key reasons, actions and impacts of these events -- captured as a grounded insider threat classification scheme. This scheme is then used to performa review of a set of organisational security policies to highlight their strengths and weaknesses when considering the prevention of incidents of accidental insider compromise. We present a set of questions that can be used to analyse an existing security policy to help control the risk of the accidental insider threat.
企业的信息安全策略是一项非常重要的控制措施,因为它向组织的员工提供了对他们的期望,以及他们对组织安全团队的期望,以及告知组织内部的文化。来自意外内部人员的威胁是所有企业的现实,可能对组织的系统、数据和声誉造成极大的破坏。最近的行业报告和学术文献强调了这样一个事实,即意外的内部人员泄露的风险可能比恶意的内部人员造成的风险更大。本文重点研究了企业信息安全策略减轻意外内部威胁的能力。具体来说,我们对现实世界中的意外内部威胁案例进行了分析,以定义这些事件的关键原因、行动和影响——作为一个接地的内部威胁分类方案。然后,在考虑防止意外的内部人员入侵事件时,使用此计划对一套组织安全政策进行审查,以突出其优点和缺点。我们提出了一组问题,可用于分析现有的安全策略,以帮助控制意外内部威胁的风险。
{"title":"Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat","authors":"Oliver Buckley, Jason R. C. Nurse, P. Legg, M. Goldsmith, S. Creese","doi":"10.1109/STAST.2014.10","DOIUrl":"https://doi.org/10.1109/STAST.2014.10","url":null,"abstract":"An enterprise's information security policy is an exceptionally important control as it provides the employees of an organisation with details of what is expected of them, and what they can expect from the organisation's security teams, as well as informing the culture within that organisation. The threat from accidental insiders is a reality across all enterprises and can be extremely damaging to the systems, data and reputation of an organisation. Recent industry reports and academic literature underline the fact that the risk of accidental insider compromise is potentially more pressing than that posed by a malicious insider. In this paper we focus on the ability of enterprises' information security policies to mitigate the accidental insider threat. Specifically we perform an analysis of real-world cases of accidental insider threat to define the key reasons, actions and impacts of these events -- captured as a grounded insider threat classification scheme. This scheme is then used to performa review of a set of organisational security policies to highlight their strengths and weaknesses when considering the prevention of incidents of accidental insider compromise. We present a set of questions that can be used to analyse an existing security policy to help control the risk of the accidental insider threat.","PeriodicalId":201239,"journal":{"name":"2014 Workshop on Socio-Technical Aspects in Security and Trust","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2014 Workshop on Socio-Technical Aspects in Security and Trust
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1