首页 > 最新文献

Risk Analysis XI最新文献

英文 中文
INTRUSION DETECTION METHOD FOR INDUSTRIAL CONTROL SYSTEMS USING SINGULAR SPECTRUM ANALYSIS 基于奇异谱分析的工业控制系统入侵检测方法
Pub Date : 2018-06-06 DOI: 10.2495/RISK180171
Asuka Terai, T. Chiba, Hideyuki Shintani, Shoya Kojima, Shingo Abe, I. Koshijima
Because of their automated processing capabilities, industrial control systems (ICSs) currently play a crucial role in plant operations. It was not long before ICS had been completely insulated from the Internet. However, because of the improved reliability of ICS devices and systems, we could find only a few plants that did not use ICS in conjunction with the Internet. As a result, the extended accessibility of almost every ICS component makes such systems vulnerable to cyber-attacks. Because of this, intrusion detection systems, which monitor ICS network traffic and detect suspicious activities within the components themselves, are extremely important. Previous studies argued that packet intervals could ideally be regarded as indicators of the hazardous status of ICSs against hacking activities, and proposed intrusion detection methodologies relying solely on packet intervals. However, these methodologies with supervised machine-learning have inevitably been compromised by cyber-attacks whose characteristics are different than those of the training dataset. We hypothesize that packet intervals in an ICS network used for automated industrial processes, which are forced to produce a certain type of periodicity, reflect a particular type of packet interval patterns. In other words, certain anomalous behaviors never fail to interfere with this pattern. This paper proposes an intrusion detection method using a singular spectrum analysis to monitor time series packets. We evaluated our proposed method on our cybersecurity testbed using penetration tests. The results verified the validity of our system realized in the packet interval periodicity. Furthermore, we examined the optimum parameter set for the singular spectrum analysis in the proposed method. From this experiment, we successfully designated criteria for the parameter-set based on the period of the packet intervals during normal operations. The proposed method successfully detected all three types of attacks within 4 sec, without producing a false alert during normal operations.
由于其自动化处理能力,工业控制系统(ics)目前在工厂运营中起着至关重要的作用。不久之后,ICS就完全与互联网隔绝了。然而,由于ICS设备和系统的可靠性得到了提高,我们发现只有少数工厂没有将ICS与互联网结合使用。因此,几乎每个ICS组件的扩展可访问性使此类系统容易受到网络攻击。因此,监视ICS网络流量并检测组件内部可疑活动的入侵检测系统就变得极其重要。以前的研究认为,包间隔可以理想地视为ics对黑客活动的危险状态的指标,并提出了仅依赖包间隔的入侵检测方法。然而,这些具有监督机器学习的方法不可避免地会受到网络攻击的影响,这些攻击的特征与训练数据集的特征不同。我们假设用于自动化工业过程的ICS网络中的数据包间隔反映了特定类型的数据包间隔模式,这些过程被迫产生某种类型的周期性。换句话说,某些异常行为总是会干扰这种模式。提出了一种利用奇异谱分析对时间序列数据包进行监控的入侵检测方法。我们使用渗透测试在我们的网络安全测试平台上评估了我们提出的方法。实验结果验证了系统在包间隔周期性下实现的有效性。在此基础上,研究了奇异谱分析的最佳参数集。在此实验中,我们成功地根据正常操作中数据包间隔的周期为参数集指定了标准。该方法成功地在4秒内检测到所有三种类型的攻击,并且在正常操作期间不会产生错误警报。
{"title":"INTRUSION DETECTION METHOD FOR INDUSTRIAL CONTROL SYSTEMS USING SINGULAR SPECTRUM ANALYSIS","authors":"Asuka Terai, T. Chiba, Hideyuki Shintani, Shoya Kojima, Shingo Abe, I. Koshijima","doi":"10.2495/RISK180171","DOIUrl":"https://doi.org/10.2495/RISK180171","url":null,"abstract":"Because of their automated processing capabilities, industrial control systems (ICSs) currently play a crucial role in plant operations. It was not long before ICS had been completely insulated from the Internet. However, because of the improved reliability of ICS devices and systems, we could find only a few plants that did not use ICS in conjunction with the Internet. As a result, the extended accessibility of almost every ICS component makes such systems vulnerable to cyber-attacks. Because of this, intrusion detection systems, which monitor ICS network traffic and detect suspicious activities within the components themselves, are extremely important. Previous studies argued that packet intervals could ideally be regarded as indicators of the hazardous status of ICSs against hacking activities, and proposed intrusion detection methodologies relying solely on packet intervals. However, these methodologies with supervised machine-learning have inevitably been compromised by cyber-attacks whose characteristics are different than those of the training dataset. We hypothesize that packet intervals in an ICS network used for automated industrial processes, which are forced to produce a certain type of periodicity, reflect a particular type of packet interval patterns. In other words, certain anomalous behaviors never fail to interfere with this pattern. This paper proposes an intrusion detection method using a singular spectrum analysis to monitor time series packets. We evaluated our proposed method on our cybersecurity testbed using penetration tests. The results verified the validity of our system realized in the packet interval periodicity. Furthermore, we examined the optimum parameter set for the singular spectrum analysis in the proposed method. From this experiment, we successfully designated criteria for the parameter-set based on the period of the packet intervals during normal operations. The proposed method successfully detected all three types of attacks within 4 sec, without producing a false alert during normal operations.","PeriodicalId":21504,"journal":{"name":"Risk Analysis XI","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84965544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
COASTAL FLOODING: DAMAGE CLASSIFICATION AND CASE STUDIES IN CALABRIA, ITALY 沿海洪水:意大利卡拉布里亚的灾害分类和案例研究
Pub Date : 2018-06-06 DOI: 10.2495/RISK180081
Antonella Nucera, G. Foti, Caterina Canale, P. Puntorieri, F. Minniti
Coastal flooding is a topic of particular interest both in scientific research and for public administration. In fact, effective management of both coastal erosion and coastal flood risk requires a mapping of flooding areas by current European legislation (Directive 2007/60/EC). Regarding Italy, coastal erosion is widely studied and mapped, but coastal flooding has not been uniformly examined across all regions. This paper analyses the main factors that influence coastal flooding, being mainly tidal excursion and run-up, and a new methodology is proposed for the classification of storm damage based on the effects produced by the coastal wave action. In fact, six classes of damage have been defined, sorted by increasing severity, namely: traffic interruption, infrastructure damage, maritime works damage, erosion of beaches and dunes, flooding to homes, and a combination of these various factors. The new classification was applied to two case studies, both in Calabria (Italy): Scilla on the Tyrrhenian coast, and Monasterace on the Ionian coast. The two locations were chosen because in Scilla the coastal morphology makes it particularly subject to storms that overreach the beach and reach local houses, even those located upstream of the seafront. In Monasterace, on the other hand, there is an important archaeological site on a coastal dune that, over the years, has often been damaged by sea storms. The analysis of the events was conducted starting with data present in the A.Si.Cal. (Historically flooded areas in Calabria) of the CNR-IRPI of Cosenza, which containing data relating to events of hydrogeological instability, including sea storms which have occurred in Calabria over the last few centuries, and from the MeteoCean group of the University of Genoa, which contains wave data for the period 1979–2017, which is reconstructed from the Climate Forecast System Reanalysis (CFSR) data.
沿海洪水是科学研究和公共管理特别感兴趣的话题。事实上,有效地管理海岸侵蚀和沿海洪水风险需要根据现行的欧洲立法(指令2007/60/EC)绘制洪水区域地图。就意大利而言,人们对海岸侵蚀进行了广泛的研究并绘制了地图,但并没有对所有地区的沿海洪水进行统一的研究。本文分析了影响海岸洪水的主要因素,主要是潮汐漂移和涨落,并提出了一种基于海岸波浪作用影响的风暴灾害分类新方法。事实上,根据严重程度的增加,已经定义了六类损害,即:交通中断,基础设施破坏,海事工程破坏,海滩和沙丘侵蚀,房屋被洪水淹没,以及这些不同因素的组合。新的分类应用于卡拉布里亚(意大利)的两个案例研究:第勒尼海岸的Scilla和爱奥尼亚海岸的Monasterace。之所以选择这两个地点,是因为在锡拉,沿海的地形使它特别容易受到风暴的影响,风暴会越过海滩,到达当地的房屋,甚至是那些位于海滨上游的房屋。另一方面,在Monasterace,在一个海岸沙丘上有一个重要的考古遗址,多年来,经常被海上风暴破坏。对这些事件的分析是从a.s.a.cal中的数据开始的。Cosenza的CNR-IRPI,其中包含与水文地质不稳定事件有关的数据,包括过去几个世纪发生在卡拉布里亚的海上风暴,以及热那亚大学的MeteoCean小组,其中包含1979-2017年期间的波浪数据,这些数据是根据气候预报系统再分析(CFSR)数据重建的。
{"title":"COASTAL FLOODING: DAMAGE CLASSIFICATION AND CASE STUDIES IN CALABRIA, ITALY","authors":"Antonella Nucera, G. Foti, Caterina Canale, P. Puntorieri, F. Minniti","doi":"10.2495/RISK180081","DOIUrl":"https://doi.org/10.2495/RISK180081","url":null,"abstract":"Coastal flooding is a topic of particular interest both in scientific research and for public administration. In fact, effective management of both coastal erosion and coastal flood risk requires a mapping of flooding areas by current European legislation (Directive 2007/60/EC). Regarding Italy, coastal erosion is widely studied and mapped, but coastal flooding has not been uniformly examined across all regions. This paper analyses the main factors that influence coastal flooding, being mainly tidal excursion and run-up, and a new methodology is proposed for the classification of storm damage based on the effects produced by the coastal wave action. In fact, six classes of damage have been defined, sorted by increasing severity, namely: traffic interruption, infrastructure damage, maritime works damage, erosion of beaches and dunes, flooding to homes, and a combination of these various factors. The new classification was applied to two case studies, both in Calabria (Italy): Scilla on the Tyrrhenian coast, and Monasterace on the Ionian coast. The two locations were chosen because in Scilla the coastal morphology makes it particularly subject to storms that overreach the beach and reach local houses, even those located upstream of the seafront. In Monasterace, on the other hand, there is an important archaeological site on a coastal dune that, over the years, has often been damaged by sea storms. The analysis of the events was conducted starting with data present in the A.Si.Cal. (Historically flooded areas in Calabria) of the CNR-IRPI of Cosenza, which containing data relating to events of hydrogeological instability, including sea storms which have occurred in Calabria over the last few centuries, and from the MeteoCean group of the University of Genoa, which contains wave data for the period 1979–2017, which is reconstructed from the Climate Forecast System Reanalysis (CFSR) data.","PeriodicalId":21504,"journal":{"name":"Risk Analysis XI","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88129955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SURFACE SUBSIDENCE FROM UNDERGROUND COAL MINING IMPACTING RESIDENTIAL HOUSING: A CASE STUDY OF RISK ANALYSIS, MITIGATION PROPOSAL AND ONGOING MONITORING 地下煤矿开采造成的地表沉降对住宅的影响:风险分析、缓解建议和持续监测案例研究
Pub Date : 2018-06-06 DOI: 10.2495/RISK180181
B. Poulsen, B. Shen
Two subsidence events twenty years apart resulted in damage and destruction of residential housing near Ipswich in the state of Queensland, Australia. Led by the Australian governments, Commonwealth Scientific and Industrial Research Organisation, a research program was undertaken to determine the cause of subsidence, identify areas at risk, propose a stabilising technology and monitor the site. Site investigation including surface to void drilling, three-dimensional seismic survey, evaluation of historical mining data and interviews with ex-mine site personnel identified the most likely cause of subsidence as the over-stressing and failure of inadequately sized remanent coal pillars. It was concluded that water from the ongoing flooding of workings may have impacted pillar stability. A factor-of-safety evaluation of over 1,100 remanent coal pillars together with risk analysis of future surface subsidence was undertaken and identified another panel of the abandoned colliery that placed housing at unacceptable risk of future damage. An evaluation of bulk backfill identified a mitigation technology to ameliorate that risk. Continuous monitoring for over seven years by an instrument array of geophones, extensometers and piezometers has evaluated and reported the stability of strata overlying the colliery. This paper describes (1) the novel technique developed for evaluation of risk of surface subsidence for many hundreds of coal pillars accounting for the unique spatial and geometric attributes of every individual pillar. Included in the risk analysis study is water and time impacts on each pillars Factor of Safety (FoS); (2) mitigation technology developed for the stabilisation of pillars; and (3) the results of over seven years of strata monitoring.
相隔20年的两次下沉事件导致澳大利亚昆士兰州伊普斯维奇附近的住宅受到破坏和破坏。在澳大利亚政府和联邦科学与工业研究组织的领导下,开展了一项研究计划,以确定下沉的原因,确定有风险的区域,提出一种稳定技术,并监测现场。现场调查包括地表至空洞钻孔、三维地震调查、历史采矿数据评估和对煤矿现场人员的采访,确定了最可能的下沉原因是残余煤柱的过大应力和破坏。得出的结论是,正在进行的工作面注水可能影响了矿柱的稳定性。对1100多个剩余煤柱进行了安全系数评估,并对未来地表沉降进行了风险分析,并确定了废弃煤矿的另一个面板,该面板将房屋置于未来不可接受的损坏风险中。对散装回填的评估确定了一种减轻风险的技术。由检波器、延伸计和压力计组成的仪器阵列进行了7年多的连续监测,评估并报告了煤矿上覆地层的稳定性。本文描述了(1)考虑每个煤柱独特的空间和几何属性,开发了用于评估数百个煤柱地表沉降风险的新技术。风险分析研究包括水和时间对各支柱的安全系数(FoS)影响;(2)为稳定矿柱而开发的减缓技术;(3) 7年多地层监测结果。
{"title":"SURFACE SUBSIDENCE FROM UNDERGROUND COAL MINING IMPACTING RESIDENTIAL HOUSING: A CASE STUDY OF RISK ANALYSIS, MITIGATION PROPOSAL AND ONGOING MONITORING","authors":"B. Poulsen, B. Shen","doi":"10.2495/RISK180181","DOIUrl":"https://doi.org/10.2495/RISK180181","url":null,"abstract":"Two subsidence events twenty years apart resulted in damage and destruction of residential housing near Ipswich in the state of Queensland, Australia. Led by the Australian governments, Commonwealth Scientific and Industrial Research Organisation, a research program was undertaken to determine the cause of subsidence, identify areas at risk, propose a stabilising technology and monitor the site. Site investigation including surface to void drilling, three-dimensional seismic survey, evaluation of historical mining data and interviews with ex-mine site personnel identified the most likely cause of subsidence as the over-stressing and failure of inadequately sized remanent coal pillars. It was concluded that water from the ongoing flooding of workings may have impacted pillar stability. A factor-of-safety evaluation of over 1,100 remanent coal pillars together with risk analysis of future surface subsidence was undertaken and identified another panel of the abandoned colliery that placed housing at unacceptable risk of future damage. An evaluation of bulk backfill identified a mitigation technology to ameliorate that risk. Continuous monitoring for over seven years by an instrument array of geophones, extensometers and piezometers has evaluated and reported the stability of strata overlying the colliery. This paper describes (1) the novel technique developed for evaluation of risk of surface subsidence for many hundreds of coal pillars accounting for the unique spatial and geometric attributes of every individual pillar. Included in the risk analysis study is water and time impacts on each pillars Factor of Safety (FoS); (2) mitigation technology developed for the stabilisation of pillars; and (3) the results of over seven years of strata monitoring.","PeriodicalId":21504,"journal":{"name":"Risk Analysis XI","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88654438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THERE IS NO SINGLE SOLUTION TO THE ‘INSIDER’ PROBLEM BUT THERE IS A VALUABLE WAY FORWARD “内部人”问题没有单一的解决方案,但有一条有价值的前进道路
Pub Date : 2018-06-06 DOI: 10.2495/RISK180121
D. Bilusich, Leung Chim, Rick Nunes-Vaz, S. Lord
The threat posed by insiders deliberately or inadvertently misusing their knowledge and access to sensitive information is a major security challenge. Finding effective, acceptable and affordable ways to manage the insider threat is non-trivial, involving the use of controls that range from technical to procedural. To make matters worse, insider activities range from inadvertent or accidental disclosure, through deliberate damage caused by disgruntled employees, to the pre-positioned mole who may undermine the organisation’s viability or purpose. The same controls will have different levels of effectiveness for each of these insider types. Based on these factors, attempting to find a single, optimised, universal solution to insider threats is illogical. However, the literature still contains statements such as ‘deterrence is the best approach for insiders’. There are dangers for security managers in drawing broad conclusions across the insider threat spectrum based on statements like these. Insider threats typically have a distribution of incidents where there are many of small consequence coexisting with a small number of incidents with very large consequences. This suggests that risk management techniques are a relevant, and arguably the most appropriate, framework for insider management. We have developed and applied a risk-based framework to model the spectrum of insider threat types, to enable the decision maker to determine the relative security effectiveness of alternative solutions. It allows decision makers to prioritise security investment to achieve the greatest benefit-cost using residual risk as the performance metric. Our framework provides a traceable and accountable method for organisations to balance their investments in controls, according to the complex spectrum of insider activity they are dealing with. They may also extend the approach, using robust analysis, to manage their uncertainties. Our framework supports security managers in customising security for their organisation based on its unique requirements.
内部人员故意或无意地滥用他们的知识和访问敏感信息所构成的威胁是一个主要的安全挑战。找到有效、可接受且负担得起的方法来管理内部威胁并非易事,涉及到从技术到程序的各种控制措施的使用。更糟糕的是,内部活动的范围从无意或意外的披露,通过心怀不满的员工故意造成的损害,到可能破坏组织生存能力或目的的预先安置的内奸。同样的控制对于每一种内部人员类型的有效性程度是不同的。基于这些因素,试图找到一个单一的、优化的、通用的解决方案来应对内部威胁是不合逻辑的。然而,文献仍然包含诸如“威慑是内部人员的最佳方法”之类的陈述。对于安全管理人员来说,基于这样的陈述在内部威胁范围内得出广泛的结论是有危险的。内部威胁通常具有事件分布,其中有许多小后果与少数具有非常大后果的事件共存。这表明,风险管理技术是内部管理的相关框架,而且可以说是最合适的框架。我们已经开发并应用了一个基于风险的框架来模拟各种内部威胁类型,使决策者能够确定替代解决方案的相对安全有效性。它允许决策者优先考虑安全投资,以实现最大的收益-成本,使用剩余风险作为绩效指标。我们的框架为组织提供了一种可追溯的、负责任的方法,根据它们正在处理的复杂内幕活动范围,平衡它们在控制方面的投资。他们也可以扩展方法,使用稳健分析来管理他们的不确定性。我们的框架支持安全管理人员根据其组织的独特需求定制安全。
{"title":"THERE IS NO SINGLE SOLUTION TO THE ‘INSIDER’ PROBLEM BUT THERE IS A VALUABLE WAY FORWARD","authors":"D. Bilusich, Leung Chim, Rick Nunes-Vaz, S. Lord","doi":"10.2495/RISK180121","DOIUrl":"https://doi.org/10.2495/RISK180121","url":null,"abstract":"The threat posed by insiders deliberately or inadvertently misusing their knowledge and access to sensitive information is a major security challenge. Finding effective, acceptable and affordable ways to manage the insider threat is non-trivial, involving the use of controls that range from technical to procedural. To make matters worse, insider activities range from inadvertent or accidental disclosure, through deliberate damage caused by disgruntled employees, to the pre-positioned mole who may undermine the organisation’s viability or purpose. The same controls will have different levels of effectiveness for each of these insider types. Based on these factors, attempting to find a single, optimised, universal solution to insider threats is illogical. However, the literature still contains statements such as ‘deterrence is the best approach for insiders’. There are dangers for security managers in drawing broad conclusions across the insider threat spectrum based on statements like these. Insider threats typically have a distribution of incidents where there are many of small consequence coexisting with a small number of incidents with very large consequences. This suggests that risk management techniques are a relevant, and arguably the most appropriate, framework for insider management. We have developed and applied a risk-based framework to model the spectrum of insider threat types, to enable the decision maker to determine the relative security effectiveness of alternative solutions. It allows decision makers to prioritise security investment to achieve the greatest benefit-cost using residual risk as the performance metric. Our framework provides a traceable and accountable method for organisations to balance their investments in controls, according to the complex spectrum of insider activity they are dealing with. They may also extend the approach, using robust analysis, to manage their uncertainties. Our framework supports security managers in customising security for their organisation based on its unique requirements.","PeriodicalId":21504,"journal":{"name":"Risk Analysis XI","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89481101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Risk Analysis XI
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1