首页 > 最新文献

2018 Resilience Week (RWS)最新文献

英文 中文
Metrics-Driven Evaluation of Cybersecurity for Critical Railway Infrastructure 关键铁路基础设施网络安全的指标驱动评估
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473542
H. Neema, Bradley Potteiger, X. Koutsoukos, Cheeyee Tang, K. Stouffer
In the past couple of years, railway infrastructure has been growing more connected, resembling more of a traditional Cyber-Physical System [1] model. Due to the tightly coupled nature between the cyber and physical domains, new attack vectors are emerging that create an avenue for remote hijacking of system components not designed to withstand such attacks. As such, best practice cybersecurity techniques need to be put in place to ensure the safety and resiliency of future railway designs, as well as infrastructure already in the field. However, traditional large-scale experimental evaluation that involves evaluating a large set of variables by running a design of experiments (DOE) may not always be practical and might not provide conclusive results [2]. In addition, to achieve scalable experimentation, the modeling abstractions, simulation configurations, and experiment scenarios must be designed according to the analysis goals of the evaluations. Thus, it is useful to target a set of key operational metrics for evaluation and configure and extend the traditional DOE methods using these metrics. In this work, we present a metricsdriven evaluation approach for evaluating the security and resilience of railway critical infrastructure using a distributed simulation framework. A case study with experiment results is provided that demonstrates the capabilities of our testbed.
在过去的几年里,铁路基础设施的连接越来越紧密,更像传统的网络物理系统[1]模型。由于网络和物理领域之间的紧密耦合性质,新的攻击媒介正在出现,为远程劫持系统组件创造了途径,这些组件的设计无法承受此类攻击。因此,需要实施最佳实践网络安全技术,以确保未来铁路设计的安全性和弹性,以及该领域已经存在的基础设施。然而,传统的大规模实验评估,即通过运行实验设计(DOE)来评估大量变量,可能并不总是实用的,也可能无法提供结论性的结果[2]。此外,为了实现可扩展的实验,必须根据评估的分析目标设计建模抽象、仿真配置和实验场景。因此,针对一组关键的操作指标进行评估,并使用这些指标配置和扩展传统的DOE方法是有用的。在这项工作中,我们提出了一种指标驱动的评估方法,用于使用分布式仿真框架评估铁路关键基础设施的安全性和弹性。给出了一个带有实验结果的案例研究,证明了我们的测试平台的功能。
{"title":"Metrics-Driven Evaluation of Cybersecurity for Critical Railway Infrastructure","authors":"H. Neema, Bradley Potteiger, X. Koutsoukos, Cheeyee Tang, K. Stouffer","doi":"10.1109/RWEEK.2018.8473542","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473542","url":null,"abstract":"In the past couple of years, railway infrastructure has been growing more connected, resembling more of a traditional Cyber-Physical System [1] model. Due to the tightly coupled nature between the cyber and physical domains, new attack vectors are emerging that create an avenue for remote hijacking of system components not designed to withstand such attacks. As such, best practice cybersecurity techniques need to be put in place to ensure the safety and resiliency of future railway designs, as well as infrastructure already in the field. However, traditional large-scale experimental evaluation that involves evaluating a large set of variables by running a design of experiments (DOE) may not always be practical and might not provide conclusive results [2]. In addition, to achieve scalable experimentation, the modeling abstractions, simulation configurations, and experiment scenarios must be designed according to the analysis goals of the evaluations. Thus, it is useful to target a set of key operational metrics for evaluation and configure and extend the traditional DOE methods using these metrics. In this work, we present a metricsdriven evaluation approach for evaluating the security and resilience of railway critical infrastructure using a distributed simulation framework. A case study with experiment results is provided that demonstrates the capabilities of our testbed.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"34 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Integrated Approach to Improving Power Grid Reliability: Merging of Probabilistic Risk Assessment with Resilience Metrics 提高电网可靠性的综合方法:概率风险评估与弹性指标的融合
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473500
B. Vaagensmith, T. McJunkin, Kurt Vedros, J. S. Reeves, Jason Wayment, Liam Boire, C. Rieger, J. Case
The resilience of a system is often disconnected from its reliability. For many types of systems the sacrifice of nonessential processes may be acceptable for maintaining a resilient set of core operations. For the electric grid, however, this often translates to load shedding. Combining Idaho National Laboratory’s probabilistic risk assessment tool SAPHIRE and adaptive capacity measurement software PowDDER can provide insights for improving the electric grids ability to absorb disturbances. A quick survey of major power outages revealed that high wind related storms causing toppled power lines and failed transformers were most commonly associated with major power outages. These findings validated SAPHIRE’s output of most critical components for the IEEE 14 bus model during a windstorm scenario. SAPHIRE provided the probabilities of critical equipment being unavailable, providing insight into the likelihood a particular threat scenario would play out. An analysis of PowDDER revealed sensitivities within the system’s overall resilience could be improved by reducing the reliability of Load 10 (via load shedding). Combining information from both PowDDER and SAPHIRE enables one to consider preemptive strategies that would improve system resilience and system wide reliability simultaneously.
系统的弹性常常与其可靠性脱节。对于许多类型的系统来说,牺牲非必要的流程来维护一组有弹性的核心操作是可以接受的。然而,对于电网来说,这通常意味着负荷减少。结合爱达荷国家实验室的概率风险评估工具sapphire和自适应容量测量软件PowDDER,可以为提高电网吸收干扰的能力提供见解。一项对主要停电的快速调查显示,与大风有关的风暴导致电线倒塌和变压器故障是与主要停电最常见的联系。这些发现验证了sapphire在暴风雨场景下为IEEE 14总线模型提供的最关键组件的输出。sapphire提供了关键设备不可用的概率,提供了对特定威胁场景发生可能性的洞察。PowDDER分析显示,通过降低负载10的可靠性(通过减载),可以提高系统整体弹性的敏感性。结合来自PowDDER和sapphire的信息,可以考虑先发制人的策略,同时提高系统的弹性和系统范围的可靠性。
{"title":"An Integrated Approach to Improving Power Grid Reliability: Merging of Probabilistic Risk Assessment with Resilience Metrics","authors":"B. Vaagensmith, T. McJunkin, Kurt Vedros, J. S. Reeves, Jason Wayment, Liam Boire, C. Rieger, J. Case","doi":"10.1109/RWEEK.2018.8473500","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473500","url":null,"abstract":"The resilience of a system is often disconnected from its reliability. For many types of systems the sacrifice of nonessential processes may be acceptable for maintaining a resilient set of core operations. For the electric grid, however, this often translates to load shedding. Combining Idaho National Laboratory’s probabilistic risk assessment tool SAPHIRE and adaptive capacity measurement software PowDDER can provide insights for improving the electric grids ability to absorb disturbances. A quick survey of major power outages revealed that high wind related storms causing toppled power lines and failed transformers were most commonly associated with major power outages. These findings validated SAPHIRE’s output of most critical components for the IEEE 14 bus model during a windstorm scenario. SAPHIRE provided the probabilities of critical equipment being unavailable, providing insight into the likelihood a particular threat scenario would play out. An analysis of PowDDER revealed sensitivities within the system’s overall resilience could be improved by reducing the reliability of Load 10 (via load shedding). Combining information from both PowDDER and SAPHIRE enables one to consider preemptive strategies that would improve system resilience and system wide reliability simultaneously.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123821308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
[Title page] (标题页)
Pub Date : 2018-08-01 DOI: 10.1109/rweek.2018.8473521
{"title":"[Title page]","authors":"","doi":"10.1109/rweek.2018.8473521","DOIUrl":"https://doi.org/10.1109/rweek.2018.8473521","url":null,"abstract":"","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133972330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Characterization and Classification of Malware Using Deep Learning 基于深度学习的恶意软件高效表征与分类
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473556
L. D. L. Rosa, Sean Kilgallon, T. Vanderbruggen, John Cavazos
Bad actors have embraced automation to construct malware, and current analysis systems cannot keep up with the ever-increasing load of malware being created daily. Additionally, some static analysis of malware can be computationally expensive, and not all static analysis should be considered for every sample that is part of a large malware dataset. As a result, highly expressive and inexpensive characterizations of malicious code, coupled with low resource machine learning classification platforms are required. In this paper, we use deep learning to build a meta-model that finds the simplest classifiers to characterize and assign malware into their corresponding families. Using static analysis of malware, we generate descriptive features to be used in conjunction with deep learning, in order to predict malware families. Our meta-model can determine when simple and less expensive malware characterization will suffice to accurately classify malicious executables, or when more computationally expensive descriptions are required. Finally, our meta-model is able to predict the simplest features and models to classify malware with an accuracy of up to 90%.
恶意行为者已经采用自动化来构建恶意软件,而当前的分析系统无法跟上每天不断增加的恶意软件负载。此外,恶意软件的一些静态分析在计算上可能会很昂贵,并且不应该对大型恶意软件数据集的每个样本都考虑所有静态分析。因此,需要高度表达和廉价的恶意代码特征描述,以及低资源的机器学习分类平台。在本文中,我们使用深度学习来构建一个元模型,该模型可以找到最简单的分类器来描述恶意软件并将其分配到相应的家族中。使用恶意软件的静态分析,我们生成描述性特征,与深度学习结合使用,以预测恶意软件家族。我们的元模型可以确定何时简单且成本较低的恶意软件特征足以准确分类恶意可执行文件,或者何时需要更多计算成本较高的描述。最后,我们的元模型能够预测最简单的特征和模型来分类恶意软件,准确率高达90%。
{"title":"Efficient Characterization and Classification of Malware Using Deep Learning","authors":"L. D. L. Rosa, Sean Kilgallon, T. Vanderbruggen, John Cavazos","doi":"10.1109/RWEEK.2018.8473556","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473556","url":null,"abstract":"Bad actors have embraced automation to construct malware, and current analysis systems cannot keep up with the ever-increasing load of malware being created daily. Additionally, some static analysis of malware can be computationally expensive, and not all static analysis should be considered for every sample that is part of a large malware dataset. As a result, highly expressive and inexpensive characterizations of malicious code, coupled with low resource machine learning classification platforms are required. In this paper, we use deep learning to build a meta-model that finds the simplest classifiers to characterize and assign malware into their corresponding families. Using static analysis of malware, we generate descriptive features to be used in conjunction with deep learning, in order to predict malware families. Our meta-model can determine when simple and less expensive malware characterization will suffice to accurately classify malicious executables, or when more computationally expensive descriptions are required. Finally, our meta-model is able to predict the simplest features and models to classify malware with an accuracy of up to 90%.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114300517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
[Title page] (标题页)
Pub Date : 2018-08-01 DOI: 10.1109/rweek.2018.8473560
{"title":"[Title page]","authors":"","doi":"10.1109/rweek.2018.8473560","DOIUrl":"https://doi.org/10.1109/rweek.2018.8473560","url":null,"abstract":"","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130385801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cyber Secure Communication Architecture for Multi-Site Hardware_in_the_Loop Co_Simulation of DER Control 一种基于多站点硬件在环的网络安全通信体系结构
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473506
S. Gourisetti, Jacob Hansen, William Hofer, David O. Manz, K. Kalsi, J. Fuller, S. Niddodi, Holger Kley, C. Clarke, Keunmo Kang, Hayden Reeve, M. Chiodo, Jesse Bishopric
Existing approaches coordinating distributed energy resources (DERs) for grid services do not adequately evaluate the performance of such DER integration. Most studies are based on a single type of DER used for a single type of service, rather than the real-world requirements of coordinating a heterogeneous mix of DERs to provide multiple different grid services at different time-scales. Facilities also often face cybersecurity and interoperability challenges to experimenting and testing methodologies in this area. To overcome all of these challenges, Pacific Northwest National Laboratory, United Technologies Research Center, Southern California Edison, and Spirae coordinated to develop a federation between their organizations. This federation implements a cybersecure connection that facilitates near real-time communication between the four different physical sites. This not only enables control of DERs at different physical locations but also lets the software and hardware objects perform control experiments in a cybersecure environment at different time-scales. The hardware systems can consist of microgrids, building management systems, and emulated power systems objects. This paper provides a detailed overview of the federation setup and describes what this federation can be used for.
现有的电网服务分布式能源协调方法没有充分评估这种分布式能源集成的性能。大多数研究都是基于用于单一类型服务的单一类型的DER,而不是基于协调异构DER组合以在不同时间尺度上提供多种不同网格服务的现实需求。设施还经常面临网络安全和互操作性方面的挑战,以试验和测试该领域的方法。为了克服所有这些挑战,太平洋西北国家实验室、联合技术研究中心、南加州爱迪生公司和Spirae协调在他们的组织之间建立了一个联盟。该联盟实现了一个网络安全连接,促进了四个不同物理站点之间近乎实时的通信。这不仅可以控制不同物理位置的der,还可以让软件和硬件对象在不同时间尺度的网络安全环境中进行控制实验。硬件系统可以由微电网、建筑管理系统和仿真电力系统对象组成。本文提供了联合设置的详细概述,并描述了该联合的用途。
{"title":"A Cyber Secure Communication Architecture for Multi-Site Hardware_in_the_Loop Co_Simulation of DER Control","authors":"S. Gourisetti, Jacob Hansen, William Hofer, David O. Manz, K. Kalsi, J. Fuller, S. Niddodi, Holger Kley, C. Clarke, Keunmo Kang, Hayden Reeve, M. Chiodo, Jesse Bishopric","doi":"10.1109/RWEEK.2018.8473506","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473506","url":null,"abstract":"Existing approaches coordinating distributed energy resources (DERs) for grid services do not adequately evaluate the performance of such DER integration. Most studies are based on a single type of DER used for a single type of service, rather than the real-world requirements of coordinating a heterogeneous mix of DERs to provide multiple different grid services at different time-scales. Facilities also often face cybersecurity and interoperability challenges to experimenting and testing methodologies in this area. To overcome all of these challenges, Pacific Northwest National Laboratory, United Technologies Research Center, Southern California Edison, and Spirae coordinated to develop a federation between their organizations. This federation implements a cybersecure connection that facilitates near real-time communication between the four different physical sites. This not only enables control of DERs at different physical locations but also lets the software and hardware objects perform control experiments in a cybersecure environment at different time-scales. The hardware systems can consist of microgrids, building management systems, and emulated power systems objects. This paper provides a detailed overview of the federation setup and describes what this federation can be used for.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mission Resilience for Future Army Tactical Networks 未来陆军战术网络的任务弹性
Pub Date : 2018-08-01 DOI: 10.1109/RWEEK.2018.8473522
Daniel J Sullivan, E. Colbert, Jennifer Cowley
Cyber-physical systems are an integral component of weapons, sensors, and autonomous vehicles, as well as cyber assets directly supporting tactical forces. Mission resilience of tactical networks affects command and control, which is important for successful military operations. Traditional engineering methods for mission assurance will not scale during battlefield operations. Commanders need useful mission resilience metrics to help them evaluate the ability of cyber assets to recover from incidents to fulfill mission essential functions. We develop 6 cyber resilience metrics for tactical network architectures. We also illuminate how psychometric modeling is necessary for future research to identify resilience metrics that are both applicable to the dynamic mission state and meaningful to commanders and planners.
网络物理系统是武器、传感器和自动驾驶车辆的组成部分,也是直接支持战术部队的网络资产。战术网络的任务弹性影响指挥和控制,对军事行动的成功至关重要。传统的任务保证工程方法在战场作战中无法实现规模化。指挥官需要有用的任务弹性指标来帮助他们评估网络资产从事件中恢复的能力,以履行任务的基本功能。我们为战术网络架构开发了6个网络弹性指标。我们还阐明了心理测量模型对未来研究的必要性,以确定既适用于动态任务状态又对指挥官和规划者有意义的弹性指标。
{"title":"Mission Resilience for Future Army Tactical Networks","authors":"Daniel J Sullivan, E. Colbert, Jennifer Cowley","doi":"10.1109/RWEEK.2018.8473522","DOIUrl":"https://doi.org/10.1109/RWEEK.2018.8473522","url":null,"abstract":"Cyber-physical systems are an integral component of weapons, sensors, and autonomous vehicles, as well as cyber assets directly supporting tactical forces. Mission resilience of tactical networks affects command and control, which is important for successful military operations. Traditional engineering methods for mission assurance will not scale during battlefield operations. Commanders need useful mission resilience metrics to help them evaluate the ability of cyber assets to recover from incidents to fulfill mission essential functions. We develop 6 cyber resilience metrics for tactical network architectures. We also illuminate how psychometric modeling is necessary for future research to identify resilience metrics that are both applicable to the dynamic mission state and meaningful to commanders and planners.","PeriodicalId":206638,"journal":{"name":"2018 Resilience Week (RWS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125471272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2018 Resilience Week (RWS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1