首页 > 最新文献

Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization最新文献

英文 中文
IDS Alert Priority Determination Based on Traffic Behavior 基于流量行为的IDS警报优先级确定
Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima, H. Takakura
{"title":"IDS Alert Priority Determination Based on Traffic Behavior","authors":"Shohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima, H. Takakura","doi":"10.1007/978-3-030-26834-3_11","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_11","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"30 1","pages":"189-206"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76668025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How to Solve Multiple Short-Exponent Discrete Logarithm Problem 如何解决多重短指数离散对数问题
K. Kurosawa, Akinaga Ueda, Hayato Matsuhashi, Y. Sakagami
{"title":"How to Solve Multiple Short-Exponent Discrete Logarithm Problem","authors":"K. Kurosawa, Akinaga Ueda, Hayato Matsuhashi, Y. Sakagami","doi":"10.1007/978-3-030-26834-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_4","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"1 1","pages":"53-64"},"PeriodicalIF":0.0,"publicationDate":"2019-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88556037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain Future for Secure Clinical Data Sharing: A Position Paper 安全临床数据共享的区块链未来:立场文件
Yan Luo, Hao Jin, Peilong Li
In the digital healthcare era, it is utmost important to harness medical information scattered across healthcare institutions to support in-depth data analysis. However, the boundaries of cyberinfrastructure of healthcare providers place obstacles on data sharing. In this position paper, we firstly identify the challenges of medical data sharing and management. Then we introduce the background and give a brief survey on the state-of-the-art. Finally, we conclude the paper by discussing a few possible research directions to cope with the challenges in current medical information sharing.
在数字医疗时代,利用分散在医疗机构中的医疗信息来支持深入的数据分析至关重要。然而,医疗保健提供商的网络基础设施的边界给数据共享带来了障碍。在这篇立场文件中,我们首先确定了医疗数据共享和管理的挑战。然后介绍了研究背景,并简要介绍了研究现状。最后,我们讨论了应对当前医学信息共享挑战的几个可能的研究方向。
{"title":"A Blockchain Future for Secure Clinical Data Sharing: A Position Paper","authors":"Yan Luo, Hao Jin, Peilong Li","doi":"10.1145/3309194.3309198","DOIUrl":"https://doi.org/10.1145/3309194.3309198","url":null,"abstract":"In the digital healthcare era, it is utmost important to harness medical information scattered across healthcare institutions to support in-depth data analysis. However, the boundaries of cyberinfrastructure of healthcare providers place obstacles on data sharing. In this position paper, we firstly identify the challenges of medical data sharing and management. Then we introduce the background and give a brief survey on the state-of-the-art. Finally, we conclude the paper by discussing a few possible research directions to cope with the challenges in current medical information sharing.","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90940405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Securing Large-scale Data Transfers in Campus Networks: Experiences, Issues, and Challenges 保护校园网中的大规模数据传输:经验、问题和挑战
Deepak Nadig, B. Ramamurthy
Increasingly, campus networks manage a multitude of large-scale data transfers. Big data plays a pivotal role in university research and impacts domains such as engineering, agriculture, natural sciences, and humanities. Over the years, numerous solutions have been proposed to manage and secure large-scale data transfers efficiently. Examples consist of the inclusion of security policies at the network edge, optimized middlebox management, and the Science Demilitarized Zone (Science DMZ). These solutions either severely degrade data transfer performance or result in data flows completely bypassing the campus network security controls. In this paper, we present our experience with the design, development, and management of large-scale data transfers using software defined networking (SDN) and network functions virtualization (NFV). We also discuss the issues and challenges associated with securing large-scale data transfers in campus networks.
越来越多的校园网管理大量的大规模数据传输。大数据在大学研究中发挥着关键作用,影响着工程、农业、自然科学和人文科学等领域。多年来,人们提出了许多有效管理和保护大规模数据传输的解决方案。示例包括在网络边缘包含安全策略、优化的中间盒管理和科学非军事区(Science DMZ)。这些解决方案要么严重降低数据传输性能,要么导致数据流完全绕过校园网安全控制。在本文中,我们介绍了我们使用软件定义网络(SDN)和网络功能虚拟化(NFV)设计、开发和管理大规模数据传输的经验。我们还讨论了与确保校园网中大规模数据传输相关的问题和挑战。
{"title":"Securing Large-scale Data Transfers in Campus Networks: Experiences, Issues, and Challenges","authors":"Deepak Nadig, B. Ramamurthy","doi":"10.1145/3309194.3309444","DOIUrl":"https://doi.org/10.1145/3309194.3309444","url":null,"abstract":"Increasingly, campus networks manage a multitude of large-scale data transfers. Big data plays a pivotal role in university research and impacts domains such as engineering, agriculture, natural sciences, and humanities. Over the years, numerous solutions have been proposed to manage and secure large-scale data transfers efficiently. Examples consist of the inclusion of security policies at the network edge, optimized middlebox management, and the Science Demilitarized Zone (Science DMZ). These solutions either severely degrade data transfer performance or result in data flows completely bypassing the campus network security controls. In this paper, we present our experience with the design, development, and management of large-scale data transfers using software defined networking (SDN) and network functions virtualization (NFV). We also discuss the issues and challenges associated with securing large-scale data transfers in campus networks.","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"13 2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80738221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Formal Access Control Model for SE-Floodlight Controller se泛光灯控制器的形式化访问控制模型
Abdullah Al-Alaj, R. Sandhu, R. Krishnan
Software defined networking (SDN) offers a promising approach for the next generation of networking technology. However, at present there is no widely accepted model for network applications authorization. One reason for lack of access control system is the absence of clear definition of an authorization model in SDN. Porras et al citeporras2015securing recently developed SE-Floodlight for this purpose. They partly employed the notion of the well-known role-based access control (RBAC) model. They informally presented a role-based authorization system to manage applications access rights to network operations, submitted during the interaction between the application layer and the switch-side infrastructure. In this paper we develop a formal role-based authorization model in SDN using SE-Floodlight as a reference controller. Based on the formal model we discuss security aspects and propose some extensions. We also provide an administrative model for the authorization system. We show a configuration of the formal model for a use case scenario and discuss the security aspects of the authorization model and describe some security issues related to over-privileged apps, limitations of role hierarchy, app upgrading, and app downgrading problem. Finally, we propose a refined role hierarchy to address these problems.
软件定义网络(SDN)为下一代网络技术提供了一种很有前途的方法。但是,目前还没有一种被广泛接受的网络应用授权模型。SDN中缺乏访问控制系统的一个原因是没有明确的授权模型定义。Porras等人在2015年保护了最近开发的se泛光灯。他们部分采用了众所周知的基于角色的访问控制(RBAC)模型的概念。他们非正式地提出了一个基于角色的授权系统来管理应用程序对网络操作的访问权限,在应用层和交换端基础设施之间的交互期间提交。本文以se -泛光灯作为参考控制器,开发了SDN中基于角色的正式授权模型。在形式化模型的基础上,讨论了安全方面的问题,并提出了一些扩展。我们还为授权系统提供了一个管理模型。我们展示了一个用例场景的正式模型的配置,讨论了授权模型的安全方面,并描述了一些与过度特权应用程序、角色层次限制、应用程序升级和应用程序降级问题相关的安全问题。最后,我们提出了一个精细的角色层次结构来解决这些问题。
{"title":"A Formal Access Control Model for SE-Floodlight Controller","authors":"Abdullah Al-Alaj, R. Sandhu, R. Krishnan","doi":"10.1145/3309194.3309195","DOIUrl":"https://doi.org/10.1145/3309194.3309195","url":null,"abstract":"Software defined networking (SDN) offers a promising approach for the next generation of networking technology. However, at present there is no widely accepted model for network applications authorization. One reason for lack of access control system is the absence of clear definition of an authorization model in SDN. Porras et al citeporras2015securing recently developed SE-Floodlight for this purpose. They partly employed the notion of the well-known role-based access control (RBAC) model. They informally presented a role-based authorization system to manage applications access rights to network operations, submitted during the interaction between the application layer and the switch-side infrastructure. In this paper we develop a formal role-based authorization model in SDN using SE-Floodlight as a reference controller. Based on the formal model we discuss security aspects and propose some extensions. We also provide an administrative model for the authorization system. We show a configuration of the formal model for a use case scenario and discuss the security aspects of the authorization model and describe some security issues related to over-privileged apps, limitations of role hierarchy, app upgrading, and app downgrading problem. Finally, we propose a refined role hierarchy to address these problems.","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90802197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN 启用基于异常的IDS和SDN动态网络访问控制
Hongda Li, Feng Wei, Hongxin Hu
In the Software Defined Networking (SDN) and Network Function Virtualization (NFV) era, it is critical to enable dynamic network access control. Traditionally, network access control policies are statically predefined as router entries or firewall rules. SDN enables more flexibility by re-actively installing flow rules into the switches to achieve dynamic network access control. However, SDN is limited in capturing network anomalies, which are usually important signs of security threats. In this paper, we propose to employ anomaly-based Intrusion Detection System (IDS) to capture network anomalies and generate SDN flow rules to enable dynamic network access control. We gain the knowledge of network anomalies from anomaly-based IDS by training an interpretable model to explain its outcome. Based on the explanation, we derive access control policies. We demonstrate the feasibility of our approach by explaining the outcome of an anomaly-based IDS built upon a Recurrent Neural Network (RNN) and generating SDN flow rules based on our explanation.
在SDN (Software Defined Networking)和NFV (Network Function Virtualization)时代,启用动态网络访问控制至关重要。传统的网络访问控制策略是静态地预定义为路由器表项或防火墙规则。SDN通过在交换机中重新安装流规则来实现动态的网络访问控制,从而提供了更大的灵活性。然而,SDN在捕获网络异常方面是有限的,而网络异常通常是安全威胁的重要标志。在本文中,我们建议采用基于异常的入侵检测系统(IDS)来捕获网络异常并生成SDN流规则,以实现动态网络访问控制。我们通过训练一个可解释的模型来解释其结果,从基于异常的IDS中获得网络异常的知识。根据解释,我们推导出访问控制策略。我们通过解释基于递归神经网络(RNN)的基于异常的IDS的结果,并根据我们的解释生成SDN流规则,证明了我们方法的可行性。
{"title":"Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN","authors":"Hongda Li, Feng Wei, Hongxin Hu","doi":"10.1145/3309194.3309199","DOIUrl":"https://doi.org/10.1145/3309194.3309199","url":null,"abstract":"In the Software Defined Networking (SDN) and Network Function Virtualization (NFV) era, it is critical to enable dynamic network access control. Traditionally, network access control policies are statically predefined as router entries or firewall rules. SDN enables more flexibility by re-actively installing flow rules into the switches to achieve dynamic network access control. However, SDN is limited in capturing network anomalies, which are usually important signs of security threats. In this paper, we propose to employ anomaly-based Intrusion Detection System (IDS) to capture network anomalies and generate SDN flow rules to enable dynamic network access control. We gain the knowledge of network anomalies from anomaly-based IDS by training an interpretable model to explain its outcome. Based on the explanation, we derive access control policies. We demonstrate the feasibility of our approach by explaining the outcome of an anomaly-based IDS built upon a Recurrent Neural Network (RNN) and generating SDN flow rules based on our explanation.","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87628985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
SDNSOC: Object Oriented SDN Framework 面向对象的SDN框架
Ankur Chowdhary, Dijiang Huang, Gail-Joon Ahn, Myong H. Kang, Anya Kim, Alexander Velazquez
The cloud networks managed by SDN can have multi-tier policy and rule conflicts. The application plane can have conflicting user-defined policies, and the infrastructure layer can have OpenFlow rules conflicting with each other. There is no scalable, and, automated programming framework to detect and resolve multi-tier conflicts in SDN-based cloud networks. We present an object-oriented programming framework - SDN Security Operation Center (SDNSOC), which handles policy composition at application plane, flow rule conflict detection and resolution at the control plane. We follow the design principles of object-oriented paradigm such as code-re-utilization, methods abstraction, aggregation for the implementation of SDNSOC on a multi-tenant cloud network. The key benefits obtained using this approach are (i) The network administrator is abstracted from complex-implementation details of SFC. The end-to-end policy composition of different network functions is handled by an object-oriented framework in an automated fashion. We achieve 37% lower latency in SFC composition compared to nearest competitors - SICS and PGA. (ii) Policy conflict detection between the existing traffic rules and incoming traffic is handled by SDNSOC in a scalable manner. The solution scales well on a large cloud network., and 18% faster security policy conflict detection on a cloud network with 100k OpenFlow rules compared to similar works - Brew, and Flowguard.
SDN管理的云网络可能存在多层策略和规则冲突。应用平面可能存在冲突的自定义策略,基础架构层可能存在冲突的OpenFlow规则。在基于sdn的云网络中,没有可扩展的自动化编程框架来检测和解决多层冲突。我们提出了一个面向对象的编程框架——SDN安全操作中心(SDN Security Operation Center, SDN),它在应用平面处理策略组合,在控制平面处理流规则冲突检测和解决。我们遵循代码重用、方法抽象、聚合等面向对象范式的设计原则,在多租户云网络上实现snsoc。使用这种方法获得的主要好处是:(i)网络管理员从SFC的复杂实现细节中抽象出来,不同网络功能的端到端策略组合由面向对象的框架以自动化的方式处理。与最接近的竞争对手(SICS和PGA)相比,我们在SFC组合中实现了37%的低延迟。(ii)由SDNSOC以可扩展的方式处理现有流量规则与传入流量之间的策略冲突检测。该解决方案在大型云网络上可很好地扩展。在使用100k OpenFlow规则的云网络上,与Brew和Flowguard等类似产品相比,安全策略冲突检测速度提高了18%。
{"title":"SDNSOC: Object Oriented SDN Framework","authors":"Ankur Chowdhary, Dijiang Huang, Gail-Joon Ahn, Myong H. Kang, Anya Kim, Alexander Velazquez","doi":"10.1145/3309194.3309196","DOIUrl":"https://doi.org/10.1145/3309194.3309196","url":null,"abstract":"The cloud networks managed by SDN can have multi-tier policy and rule conflicts. The application plane can have conflicting user-defined policies, and the infrastructure layer can have OpenFlow rules conflicting with each other. There is no scalable, and, automated programming framework to detect and resolve multi-tier conflicts in SDN-based cloud networks. We present an object-oriented programming framework - SDN Security Operation Center (SDNSOC), which handles policy composition at application plane, flow rule conflict detection and resolution at the control plane. We follow the design principles of object-oriented paradigm such as code-re-utilization, methods abstraction, aggregation for the implementation of SDNSOC on a multi-tenant cloud network. The key benefits obtained using this approach are (i) The network administrator is abstracted from complex-implementation details of SFC. The end-to-end policy composition of different network functions is handled by an object-oriented framework in an automated fashion. We achieve 37% lower latency in SFC composition compared to nearest competitors - SICS and PGA. (ii) Policy conflict detection between the existing traffic rules and incoming traffic is handled by SDNSOC in a scalable manner. The solution scales well on a large cloud network., and 18% faster security policy conflict detection on a cloud network with 100k OpenFlow rules compared to similar works - Brew, and Flowguard.","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80029412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations 带否定的CNF公式的常大小属性证明匿名凭证系统
Ryo Okishima, T. Nakanishi
{"title":"An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations","authors":"Ryo Okishima, T. Nakanishi","doi":"10.1007/978-3-030-26834-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-26834-3_6","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"272 1","pages":"89-106"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75028313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem 基于保序分配问题的加密数据库推理攻击
Sota Onozawa, N. Kunihiro, M. Yoshino, Ken Naganuma
{"title":"Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem","authors":"Sota Onozawa, N. Kunihiro, M. Yoshino, Ken Naganuma","doi":"10.1007/978-3-319-97916-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-97916-8_3","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"281 1","pages":"35-47"},"PeriodicalIF":0.0,"publicationDate":"2018-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77897040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT 三子集中间相遇攻击的整数线性规划:在GIFT中的应用
Yu Sasaki
{"title":"Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT","authors":"Yu Sasaki","doi":"10.1007/978-3-319-97916-8_15","DOIUrl":"https://doi.org/10.1007/978-3-319-97916-8_15","url":null,"abstract":"","PeriodicalId":20513,"journal":{"name":"Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization","volume":"114 1","pages":"227-243"},"PeriodicalIF":0.0,"publicationDate":"2018-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80774690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1