首页 > 最新文献

Proceedings of the 15th Asian Internet Engineering Conference最新文献

英文 中文
Passive analysis for multipath TCP 多路径TCP被动分析
Pub Date : 2019-08-07 DOI: 10.1145/3340422.3343638
Matthieu Coudron
Multipath TCP (MPTCP) is a backward compatible extension of Transmission Control Protocol (TCP) designed to let an application send data over several TCP connections, usually called subflows. MPTCP presents several opportunities over legacy TCP, especially when these subflows follow disjoint paths: for instance bandwidth aggregation or seamless mobility across networks. While MPTCP is built as an extension of TCP, the scope of the modifications qualifies it almost as a new protocol. This means traditional TCP tools are not enough to analyze MPTCP performance. We thus develop and present an open source application able to analyze MPTCP specific metrics such as the aggregated goodput or inter-subflow retransmissions.
多路径TCP (MPTCP)是传输控制协议(TCP)的向后兼容扩展,旨在让应用程序通过几个TCP连接(通常称为子流)发送数据。与传统TCP相比,MPTCP提供了一些机会,特别是当这些子流遵循不相交的路径时:例如带宽聚合或跨网络的无缝移动。虽然MPTCP是作为TCP的扩展而构建的,但修改的范围使其几乎成为一个新协议。这意味着传统的TCP工具不足以分析MPTCP性能。因此,我们开发并提供了一个开源应用程序,能够分析MPTCP特定的指标,如聚合的货物发送或子流之间的重传。
{"title":"Passive analysis for multipath TCP","authors":"Matthieu Coudron","doi":"10.1145/3340422.3343638","DOIUrl":"https://doi.org/10.1145/3340422.3343638","url":null,"abstract":"Multipath TCP (MPTCP) is a backward compatible extension of Transmission Control Protocol (TCP) designed to let an application send data over several TCP connections, usually called subflows. MPTCP presents several opportunities over legacy TCP, especially when these subflows follow disjoint paths: for instance bandwidth aggregation or seamless mobility across networks. While MPTCP is built as an extension of TCP, the scope of the modifications qualifies it almost as a new protocol. This means traditional TCP tools are not enough to analyze MPTCP performance. We thus develop and present an open source application able to analyze MPTCP specific metrics such as the aggregated goodput or inter-subflow retransmissions.","PeriodicalId":206077,"journal":{"name":"Proceedings of the 15th Asian Internet Engineering Conference","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122375815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Accurate Packet Loss Emulation on a DPDK-based Network Emulator 基于dpdk的网络模拟器上的精确丢包仿真
Pub Date : 2019-08-07 DOI: 10.1145/3340422.3343635
Kanon Sasaki, Takahiro Hirofuchi, Saneyasu Yamaguchi, Ryousei Takano
A software-based network emulator is widely used for performance evaluation of communication software and protocols thanks to lower cost and higher extensibility compared with a hardware-based approach. However, NetEm, which is a popular software-based network emulator in Linux, suffers from inaccurate emulation capability on high speed networks. The DPDK-based network emulator (DEMU) is a promising tool to address this problem, but it does not support packet loss emulation. In this paper, we design and implement the Gilbert-Elliott packet loss model on DEMU. Through experiments of TCP performance on a 10 Gigabit network environment, we demonstrate that (1) the proposed method accurately controls the packet loss ratio and burstiness, and (2) the TCP offload engine mechanism can degrade packet loss accuracy. Consequently, the accuracy of DEMU is 305 times higher than that of NetEm for random packet loss emulation.
与基于硬件的网络仿真器相比,基于软件的网络仿真器具有成本低、可扩展性高等优点,被广泛用于通信软件和协议的性能评估。然而,Linux中流行的基于软件的网络仿真器NetEm在高速网络上的仿真能力不准确。基于dpdk的网络仿真器(DEMU)是解决这个问题的一个很有前途的工具,但是它不支持丢包仿真。在本文中,我们设计并实现了基于DEMU的Gilbert-Elliott丢包模型。通过在10千兆网络环境下的TCP性能实验,我们证明了:(1)所提出的方法能够准确地控制丢包率和突发,(2)TCP卸载引擎机制能够降低丢包精度。因此,DEMU的随机丢包仿真精度是NetEm的305倍。
{"title":"An Accurate Packet Loss Emulation on a DPDK-based Network Emulator","authors":"Kanon Sasaki, Takahiro Hirofuchi, Saneyasu Yamaguchi, Ryousei Takano","doi":"10.1145/3340422.3343635","DOIUrl":"https://doi.org/10.1145/3340422.3343635","url":null,"abstract":"A software-based network emulator is widely used for performance evaluation of communication software and protocols thanks to lower cost and higher extensibility compared with a hardware-based approach. However, NetEm, which is a popular software-based network emulator in Linux, suffers from inaccurate emulation capability on high speed networks. The DPDK-based network emulator (DEMU) is a promising tool to address this problem, but it does not support packet loss emulation. In this paper, we design and implement the Gilbert-Elliott packet loss model on DEMU. Through experiments of TCP performance on a 10 Gigabit network environment, we demonstrate that (1) the proposed method accurately controls the packet loss ratio and burstiness, and (2) the TCP offload engine mechanism can degrade packet loss accuracy. Consequently, the accuracy of DEMU is 305 times higher than that of NetEm for random packet loss emulation.","PeriodicalId":206077,"journal":{"name":"Proceedings of the 15th Asian Internet Engineering Conference","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114778073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed Hayabusa: Scalable Syslog Search Engine Optimized for Time-Dimensional Search 分布式隼鸟:可扩展的Syslog搜索引擎优化的时间维搜索
Pub Date : 2019-08-07 DOI: 10.1145/3340422.3343636
Hiroshi Abe, K. Shima, Daisuke Miyamoto, Y. Sekiya, Tomohiro Ishihara, Kazuya Okada, Ryo Nakamura, S. Matsuura
Network administrators usually collect and store logs generated by servers, networks, and security appliances so that when network trouble and/or security incidents occur, they can identify the source of the problem by investigating the contents of the logs. The size of the system needed to store and search the log messages tends to increase as the size of the managed network becomes large. A fast log storage and search system called Hayabusa was previously proposed that optimizes a time-dimensional search operation. In this paper, we propose a simple distributed system that adds scalability to the existing Hayabusa system. The evaluation results show that the Distributed Hayabusa system consisting of 10 servers (with multiple worker processes on each server) is 36 times faster than a standalone Hayabusa system. The time required to perform a full-text search over 14.4 billion data records is only about 7 s, which is sufficiently low for the daily operations of administrators managing a very-large-scale network.
网络管理员通常收集和存储服务器、网络和安全设备生成的日志,以便在发生网络故障和/或安全事件时,通过调查日志内容来确定问题的根源。存储和搜索日志消息所需的系统大小往往会随着所管理网络的规模变大而增加。一种名为隼鸟的快速日志存储和搜索系统先前被提出,它优化了时间维度的搜索操作。在本文中,我们提出了一个简单的分布式系统,为现有的Hayabusa系统增加了可扩展性。评估结果表明,由10个服务器组成的分布式隼鸟系统(每个服务器上有多个工作进程)比单独的隼鸟系统快36倍。对144亿条数据记录进行全文搜索所需的时间仅为7秒左右,这对于管理超大规模网络的管理员的日常操作来说已经足够低了。
{"title":"Distributed Hayabusa: Scalable Syslog Search Engine Optimized for Time-Dimensional Search","authors":"Hiroshi Abe, K. Shima, Daisuke Miyamoto, Y. Sekiya, Tomohiro Ishihara, Kazuya Okada, Ryo Nakamura, S. Matsuura","doi":"10.1145/3340422.3343636","DOIUrl":"https://doi.org/10.1145/3340422.3343636","url":null,"abstract":"Network administrators usually collect and store logs generated by servers, networks, and security appliances so that when network trouble and/or security incidents occur, they can identify the source of the problem by investigating the contents of the logs. The size of the system needed to store and search the log messages tends to increase as the size of the managed network becomes large. A fast log storage and search system called Hayabusa was previously proposed that optimizes a time-dimensional search operation. In this paper, we propose a simple distributed system that adds scalability to the existing Hayabusa system. The evaluation results show that the Distributed Hayabusa system consisting of 10 servers (with multiple worker processes on each server) is 36 times faster than a standalone Hayabusa system. The time required to perform a full-text search over 14.4 billion data records is only about 7 s, which is sufficiently low for the daily operations of administrators managing a very-large-scale network.","PeriodicalId":206077,"journal":{"name":"Proceedings of the 15th Asian Internet Engineering Conference","volume":"397 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124696416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Android Malware Prediction Using Extreme Learning Machine with Different Kernel Functions 基于不同内核函数的极限学习机的Android恶意软件预测
Pub Date : 2019-08-07 DOI: 10.1145/3340422.3343639
L. Kumar, C. Hota, Arvind Mahindru, Lalita Bhanu Murthy Neti
Android is currently the most popular smartphone platform which occupied 88% of global sale by the end of 2nd quarter 2018. With the popularity of these applications, it is also inviting cybercriminals to develop malware application for accessing important information from smartphones. The major objective of cybercriminals to develop Malware apps or Malicious apps to threaten the organization privacy data, user privacy data, and device integrity. Early identification of such malware apps can help the android user to save private data and device integrity. In this study, features extracted from intermediate code representations obtained using decompilation of APK file are used for providing requisite input data to develop the models for predicting android malware applications. These models are trained using extreme learning with multiple kernel functions ans also compared with the model trained using most frequently used classifiers like linear regression, decision tree, polynomial regression, and logistic regression. This paper also focuses on the effectiveness of data sampling techniques for balancing data and feature selection methods for selecting right sets of significant uncorrelated metrics. The high-value of accuracy and AUC confirm the predicting capability of data sampling, sets of metrics, and training algorithms to malware and normal applications.
安卓是目前最受欢迎的智能手机平台,截至2018年第二季度末,安卓占据了全球销量的88%。随着这些应用程序的普及,它也在邀请网络犯罪分子开发恶意软件,以获取智能手机上的重要信息。网络犯罪分子的主要目标是开发恶意软件或恶意应用程序来威胁组织隐私数据、用户隐私数据和设备完整性。早期识别此类恶意软件可以帮助android用户保存私人数据和设备完整性。在本研究中,从APK文件反编译获得的中间代码表示中提取的特征用于提供必要的输入数据,以开发预测android恶意软件应用的模型。这些模型使用具有多个核函数的极限学习进行训练,并与使用最常用的分类器(如线性回归、决策树、多项式回归和逻辑回归)训练的模型进行比较。本文还侧重于数据采样技术的有效性,以平衡数据和特征选择方法,以选择正确的重要不相关指标集。高精确度和AUC值确认了数据采样、度量集和训练算法对恶意软件和正常应用程序的预测能力。
{"title":"Android Malware Prediction Using Extreme Learning Machine with Different Kernel Functions","authors":"L. Kumar, C. Hota, Arvind Mahindru, Lalita Bhanu Murthy Neti","doi":"10.1145/3340422.3343639","DOIUrl":"https://doi.org/10.1145/3340422.3343639","url":null,"abstract":"Android is currently the most popular smartphone platform which occupied 88% of global sale by the end of 2nd quarter 2018. With the popularity of these applications, it is also inviting cybercriminals to develop malware application for accessing important information from smartphones. The major objective of cybercriminals to develop Malware apps or Malicious apps to threaten the organization privacy data, user privacy data, and device integrity. Early identification of such malware apps can help the android user to save private data and device integrity. In this study, features extracted from intermediate code representations obtained using decompilation of APK file are used for providing requisite input data to develop the models for predicting android malware applications. These models are trained using extreme learning with multiple kernel functions ans also compared with the model trained using most frequently used classifiers like linear regression, decision tree, polynomial regression, and logistic regression. This paper also focuses on the effectiveness of data sampling techniques for balancing data and feature selection methods for selecting right sets of significant uncorrelated metrics. The high-value of accuracy and AUC confirm the predicting capability of data sampling, sets of metrics, and training algorithms to malware and normal applications.","PeriodicalId":206077,"journal":{"name":"Proceedings of the 15th Asian Internet Engineering Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128523351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effects of a Simple Relay Network on the Bitcoin Network 简单中继网络对比特币网络的影响
Pub Date : 2019-08-07 DOI: 10.1145/3340422.3343640
Kai Otsuki, Yusuke Aoki, Ryohei Banno, Kazuyuki Shudo
Bitcoin has a low transaction throughput. In order to allow for an increase of this throughput without increasing orphan blocks, decreasing the block propagation time is important. One of the techniques to improve its block propagation time is to utilize relay networks. However, the effects of utilizing relay networks is not apparent. Existing studies and measurements on relay networks have not focused on the effect of relay networks on the individual miners. Moreover, the relation between the degree of the effect and relay network utilization rate is unknown. Herein, we performed simulations while finely changing the proportion of nodes utilizing a relay network. Moreover we quantitatively evaluated the effect of relay networks on the entire Bitcoin network and individual miners. Results show that the propagation time decrease to approximately 77% of the original value if the utilization rate is set to 3%. This rate is close to the actual utilization rate of relay network "Falcon". We also found that the probability of blocks created by utilizing nodes to become orphan blocks is surprisingly smaller than that of the non-utilizing nodes. Even in the worst case, the value of utilizing nodes is 15% of the value of non-utilizing nodes.
比特币的交易吞吐量很低。为了在不增加孤立块的情况下增加吞吐量,减少块传播时间非常重要。利用中继网络是提高其块传播时间的技术之一。然而,利用中继网络的效果并不明显。现有的关于中继网络的研究和测量并没有关注中继网络对矿工个体的影响。此外,影响程度与中继网络利用率之间的关系是未知的。在此,我们在利用中继网络精细改变节点比例的同时进行了模拟。此外,我们定量评估了中继网络对整个比特币网络和个体矿工的影响。结果表明,如果将利用率设置为3%,传播时间将减少到原始值的大约77%。这一利用率接近于中继网络“猎鹰”的实际利用率。我们还发现,通过利用节点创建的块成为孤立块的概率比不利用节点的概率要小得多。即使在最坏的情况下,利用节点的价值也是未利用节点价值的15%。
{"title":"Effects of a Simple Relay Network on the Bitcoin Network","authors":"Kai Otsuki, Yusuke Aoki, Ryohei Banno, Kazuyuki Shudo","doi":"10.1145/3340422.3343640","DOIUrl":"https://doi.org/10.1145/3340422.3343640","url":null,"abstract":"Bitcoin has a low transaction throughput. In order to allow for an increase of this throughput without increasing orphan blocks, decreasing the block propagation time is important. One of the techniques to improve its block propagation time is to utilize relay networks. However, the effects of utilizing relay networks is not apparent. Existing studies and measurements on relay networks have not focused on the effect of relay networks on the individual miners. Moreover, the relation between the degree of the effect and relay network utilization rate is unknown. Herein, we performed simulations while finely changing the proportion of nodes utilizing a relay network. Moreover we quantitatively evaluated the effect of relay networks on the entire Bitcoin network and individual miners. Results show that the propagation time decrease to approximately 77% of the original value if the utilization rate is set to 3%. This rate is close to the actual utilization rate of relay network \"Falcon\". We also found that the probability of blocks created by utilizing nodes to become orphan blocks is surprisingly smaller than that of the non-utilizing nodes. Even in the worst case, the value of utilizing nodes is 15% of the value of non-utilizing nodes.","PeriodicalId":206077,"journal":{"name":"Proceedings of the 15th Asian Internet Engineering Conference","volume":"213 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133322678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Estimation of Data Propagation Time on the Bitcoin Network 比特币网络上数据传播时间的估计
Pub Date : 2019-08-07 DOI: 10.1145/3340422.3343641
Reiki Kanda, Kazuyuki Shudo
The goal of this research is to estimate the data propagation time on the Bitcoin network. Using network coordinates, we estimate the communication latency between computers. Such latency estimation contributes future optimization of data propagation. In this research, we report an experiment on computing the network coordinates. In the current Bitcoin network, it is very difficult to acquire internode delay because the network topology is not available. In this study, we calculate the delay based on our topology estimation and describe the effectiveness of the network coordinates using various topology estimation parameters.
本研究的目的是估计比特币网络上的数据传播时间。利用网络坐标,我们估计了计算机之间的通信延迟。这种延迟估计有助于未来数据传播的优化。在本研究中,我们报告了一个计算网络坐标的实验。在当前的比特币网络中,由于网络拓扑不可用,很难获得节点间延迟。在本研究中,我们基于我们的拓扑估计计算延迟,并使用各种拓扑估计参数描述网络坐标的有效性。
{"title":"Estimation of Data Propagation Time on the Bitcoin Network","authors":"Reiki Kanda, Kazuyuki Shudo","doi":"10.1145/3340422.3343641","DOIUrl":"https://doi.org/10.1145/3340422.3343641","url":null,"abstract":"The goal of this research is to estimate the data propagation time on the Bitcoin network. Using network coordinates, we estimate the communication latency between computers. Such latency estimation contributes future optimization of data propagation. In this research, we report an experiment on computing the network coordinates. In the current Bitcoin network, it is very difficult to acquire internode delay because the network topology is not available. In this study, we calculate the delay based on our topology estimation and describe the effectiveness of the network coordinates using various topology estimation parameters.","PeriodicalId":206077,"journal":{"name":"Proceedings of the 15th Asian Internet Engineering Conference","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123339172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tagging based Packet Loss Detection and Recovery of IP Multicast in SDN SDN中基于标记的IP组播丢包检测与恢复
Pub Date : 2019-08-07 DOI: 10.1145/3340422.3343637
Siva Sairam Prasad Kodali, Prashanth Podili, Kotaro Kataoka
Multicast is a one-to-many communication model that is important for video streaming like IPTV. However, multicast does not guarantee the reliability of data transfer, and packet loss beyond the performance of error correction mechanism introduce significant degradation of the quality of Multicast streaming. Monitoring quality of multicast streaming is difficult because a) generally intermediate multicast routers and switches do not maintain the fine-grained state about multicast flow and b) sampling QoS statistics from destination clients introduces significant operational overhead. Therefore, it is difficult to properly locate where packet losses happen and how severe they are. This paper proposes selective packet tagging based monitoring (SPTM) mechanism to detect and locate packet losses in real-time using a packet tagging technique in Software-Defined Network(SDN). The proposed system also re-calculates the Multicast Delivery Tree(MDT) upon the detection of packet losses in the tree links. The evaluation results show the feasibility of the proposed approach to detect, locate as well as recover the MDTs from the packet loss.
多播是一种一对多的通信模式,对于像IPTV这样的视频流非常重要。然而,组播并不能保证数据传输的可靠性,超过纠错机制性能的丢包会导致组播流质量的严重下降。监控组播流的质量是困难的,因为a)通常中间组播路由器和交换机不保持关于组播流的细粒度状态,b)从目标客户端采样QoS统计数据会引入大量的操作开销。因此,很难准确定位丢包发生的位置和严重程度。在软件定义网络(SDN)中,提出了一种基于选择性分组标记的监控(SPTM)机制,利用分组标记技术实时检测和定位分组丢失。该系统还在检测到树链路中的丢包后重新计算组播交付树(MDT)。评估结果表明,该方法在检测、定位mdt以及从丢包中恢复mdt方面是可行的。
{"title":"Tagging based Packet Loss Detection and Recovery of IP Multicast in SDN","authors":"Siva Sairam Prasad Kodali, Prashanth Podili, Kotaro Kataoka","doi":"10.1145/3340422.3343637","DOIUrl":"https://doi.org/10.1145/3340422.3343637","url":null,"abstract":"Multicast is a one-to-many communication model that is important for video streaming like IPTV. However, multicast does not guarantee the reliability of data transfer, and packet loss beyond the performance of error correction mechanism introduce significant degradation of the quality of Multicast streaming. Monitoring quality of multicast streaming is difficult because a) generally intermediate multicast routers and switches do not maintain the fine-grained state about multicast flow and b) sampling QoS statistics from destination clients introduces significant operational overhead. Therefore, it is difficult to properly locate where packet losses happen and how severe they are. This paper proposes selective packet tagging based monitoring (SPTM) mechanism to detect and locate packet losses in real-time using a packet tagging technique in Software-Defined Network(SDN). The proposed system also re-calculates the Multicast Delivery Tree(MDT) upon the detection of packet losses in the tree links. The evaluation results show the feasibility of the proposed approach to detect, locate as well as recover the MDTs from the packet loss.","PeriodicalId":206077,"journal":{"name":"Proceedings of the 15th Asian Internet Engineering Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122274319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 15th Asian Internet Engineering Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1