Pub Date : 2012-04-20DOI: 10.1109/JNS2.2012.6249244
A. Blilat, A. Bouayad, N. El Houda Chaoui, M. E. Ghazi
With the advent of low-power wireless sensor networks, a wealth of new applications at the interface of the real and digital worlds is emerging. A distributed computing platform that can measure properties of the real world, formulate intelligent inferences, and instrument responses, requires strong foundations in distributed computing, artificial intelligence, databases, control theory, and security. Before these intelligent systems can be deployed in critical infrastructures such as emergency rooms and powerplants, the security properties of sensors must be fully understood. Existing wisdom has been to apply the traditional security models and techniques to sensor networks. However, sensor networks are not traditional computing devices, and as a result, existing security models and methods are ill suited. In this position paper, we take the first steps towards producing a comprehensive security model that is tailored for sensor networks. Incorporating work from Internet security, ubiquitous computing, and distributed systems, we outline security properties that must be considered when designing a secure sensor network. We propose challenges for sensor networks - security obstacles that, when overcome, will move us closer to decreasing the divide between computers and the physical world.
{"title":"Wireless sensor network: Security challenges","authors":"A. Blilat, A. Bouayad, N. El Houda Chaoui, M. E. Ghazi","doi":"10.1109/JNS2.2012.6249244","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249244","url":null,"abstract":"With the advent of low-power wireless sensor networks, a wealth of new applications at the interface of the real and digital worlds is emerging. A distributed computing platform that can measure properties of the real world, formulate intelligent inferences, and instrument responses, requires strong foundations in distributed computing, artificial intelligence, databases, control theory, and security. Before these intelligent systems can be deployed in critical infrastructures such as emergency rooms and powerplants, the security properties of sensors must be fully understood. Existing wisdom has been to apply the traditional security models and techniques to sensor networks. However, sensor networks are not traditional computing devices, and as a result, existing security models and methods are ill suited. In this position paper, we take the first steps towards producing a comprehensive security model that is tailored for sensor networks. Incorporating work from Internet security, ubiquitous computing, and distributed systems, we outline security properties that must be considered when designing a secure sensor network. We propose challenges for sensor networks - security obstacles that, when overcome, will move us closer to decreasing the divide between computers and the physical world.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121859174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-20DOI: 10.1109/JNS2.2012.6249253
A. Khiyaita, H. Bakkali, M. Zbakh, Dafir El Kettani
The rapid development of Internet has given birth to a new business model: Cloud Computing. This new paradigm has experienced a fantastic rise in recent years. Because of its infancy, it remains a model to be developed. In particular, it must offer the same features of services than traditional systems. The cloud computing is large distributed systems that employ distributed resources to deliver a service to end users by implementing several technologies. Hence providing acceptable response time for end users, presents a major challenge for cloud computing. All components must cooperate to meet this challenge, in particular through load balancing algorithms. This will enhance the availability and will gain the end user confidence. In this paper we try to give an overview of load balancing in the cloud computing by exposing the most important research challenges.
{"title":"Load balancing cloud computing: State of art","authors":"A. Khiyaita, H. Bakkali, M. Zbakh, Dafir El Kettani","doi":"10.1109/JNS2.2012.6249253","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249253","url":null,"abstract":"The rapid development of Internet has given birth to a new business model: Cloud Computing. This new paradigm has experienced a fantastic rise in recent years. Because of its infancy, it remains a model to be developed. In particular, it must offer the same features of services than traditional systems. The cloud computing is large distributed systems that employ distributed resources to deliver a service to end users by implementing several technologies. Hence providing acceptable response time for end users, presents a major challenge for cloud computing. All components must cooperate to meet this challenge, in particular through load balancing algorithms. This will enhance the availability and will gain the end user confidence. In this paper we try to give an overview of load balancing in the cloud computing by exposing the most important research challenges.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130790799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-20DOI: 10.1109/JNS2.2012.6249247
A. Elmrabti, A. A. E. Kalam, A. A. Ouahman
Le Cloud Computing prend de plus en plus sa place dans le monde du Business des systèmes d'information. Il propose plusieurs avantages et plusieurs opportunités dans le futur pour les entreprises. Dans cet article, nous présentons les caractéristiques, avantages et faiblesses du Cloud Computing (CC) en particulier ceux liés à la sécurité. Nous discutons également certaines questions relatives à la conformité réglementaire dans le Cloud. Par la suite, nous proposons quelques stratégies de sécurité pour augmenter le niveau de sécurité dans le CC.
{"title":"Les défis de sécurité dans le Cloud Computing: Problèmes et solutions de la sécurité en Cloud Computing","authors":"A. Elmrabti, A. A. E. Kalam, A. A. Ouahman","doi":"10.1109/JNS2.2012.6249247","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249247","url":null,"abstract":"Le Cloud Computing prend de plus en plus sa place dans le monde du Business des systèmes d'information. Il propose plusieurs avantages et plusieurs opportunités dans le futur pour les entreprises. Dans cet article, nous présentons les caractéristiques, avantages et faiblesses du Cloud Computing (CC) en particulier ceux liés à la sécurité. Nous discutons également certaines questions relatives à la conformité réglementaire dans le Cloud. Par la suite, nous proposons quelques stratégies de sécurité pour augmenter le niveau de sécurité dans le CC.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-20DOI: 10.1109/JNS2.2012.6249242
Mohamed Chiny, Miloud Lahmaim, A. A. E. Kalam, A. A. Ouahman
Depuis quelques années, le Maroc connaît une croissance considérable d'attaques relevant de la cybercriminalité. Ces attaques ont comme cibles les réseaux et systèmes appartenant à des individus, entreprises, organisations et administrations. Cette croissance évolue en parallèle avec l'informatisation accrue que connaît le pays depuis plus d'une décennie. Cependant, il n'existe, à notre connaissance, aucune étude scientifique complète quantifiant et évaluant avec précision les paramètres relatifs aux attaques. Dans cet objectif, nous avons mis en place des pots de miel à l'ENSA de Marrakech. Dans cet article, nous présentons nos résultats d'observation et d'analyse des attaques, à savoir : les provenances des menaces, les intentions des pirates, le niveau de coopération entre les attaquants, etc.
{"title":"Evaluation de la cybercriminalité au Maroc: Cas d'un établissement universitaire","authors":"Mohamed Chiny, Miloud Lahmaim, A. A. E. Kalam, A. A. Ouahman","doi":"10.1109/JNS2.2012.6249242","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249242","url":null,"abstract":"Depuis quelques années, le Maroc connaît une croissance considérable d'attaques relevant de la cybercriminalité. Ces attaques ont comme cibles les réseaux et systèmes appartenant à des individus, entreprises, organisations et administrations. Cette croissance évolue en parallèle avec l'informatisation accrue que connaît le pays depuis plus d'une décennie. Cependant, il n'existe, à notre connaissance, aucune étude scientifique complète quantifiant et évaluant avec précision les paramètres relatifs aux attaques. Dans cet objectif, nous avons mis en place des pots de miel à l'ENSA de Marrakech. Dans cet article, nous présentons nos résultats d'observation et d'analyse des attaques, à savoir : les provenances des menaces, les intentions des pirates, le niveau de coopération entre les attaquants, etc.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130179608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-20DOI: 10.1109/JNS2.2012.6249243
Donglai Sun, H. Benaboud, Mikou Noufissa, Jianhua Li
In this paper, scheduling scheme under physical layer security is studied. This emerging technology is introduced to provide perfect secrecy to wireless ad-hoc network. However, a big loss of network performance is also imported to the system. As links with different physical layers coexist in the wireless network, service qualities like overall throughput are affected if traditional scheduling schemes are applied. Thus, new MAC layer scheduling scheme has to be developed. Here, opportunistic scheduling with scaled transmission rate is used to solve the problem. A weighted scaling function is applied on different transmission rate of diversified links, and optimal stopping theory is employed to ensure that only the good part of each link is used for transmitting. A pure threshold policy can be derived for the scheduling scheme. The scenario with distributed ad-hoc network is also considered, a Nash equilibrium can be conducted using game theory for the selection of individual weights.
{"title":"Exploring opportunistic scheduling in ad-hoc network with physical layer security","authors":"Donglai Sun, H. Benaboud, Mikou Noufissa, Jianhua Li","doi":"10.1109/JNS2.2012.6249243","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249243","url":null,"abstract":"In this paper, scheduling scheme under physical layer security is studied. This emerging technology is introduced to provide perfect secrecy to wireless ad-hoc network. However, a big loss of network performance is also imported to the system. As links with different physical layers coexist in the wireless network, service qualities like overall throughput are affected if traditional scheduling schemes are applied. Thus, new MAC layer scheduling scheme has to be developed. Here, opportunistic scheduling with scaled transmission rate is used to solve the problem. A weighted scaling function is applied on different transmission rate of diversified links, and optimal stopping theory is employed to ensure that only the good part of each link is used for transmitting. A pure threshold policy can be derived for the scheduling scheme. The scenario with distributed ad-hoc network is also considered, a Nash equilibrium can be conducted using game theory for the selection of individual weights.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129699130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-20DOI: 10.1109/JNS2.2012.6249248
Maha Tebaa, S. Hajji, A. E. Ghazi
When the data transferred to the Cloud we use standard encryption methods to secure this data, but when we want to do the calculations on data located on a remote server, it is necessary that the Cloud provider has access to the raw data, and then it will decrypt them. In this paper we propose the application of a method to perform the operation on encrypted data without decrypted and provide the same result as well that the calculations were carried out on raw data.
{"title":"Homomorphic encryption method applied to Cloud Computing","authors":"Maha Tebaa, S. Hajji, A. E. Ghazi","doi":"10.1109/JNS2.2012.6249248","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249248","url":null,"abstract":"When the data transferred to the Cloud we use standard encryption methods to secure this data, but when we want to do the calculations on data located on a remote server, it is necessary that the Cloud provider has access to the raw data, and then it will decrypt them. In this paper we propose the application of a method to perform the operation on encrypted data without decrypted and provide the same result as well that the calculations were carried out on raw data.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-20DOI: 10.1109/JNS2.2012.6249252
Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi
Vehicular Ad-Hoc Networks (VANETs) are special forms of Mobile Ad-Hoc Networks (MANETs) that allows vehicles to communicate together in the absence of fixed infrastructure. In this type of network beaconing is the means used to discover the nodes in its neighborhood. Successful delivery of the message beacons containing speed, direction and position of a car is extremely important. Otherwise, routing information should not be modified/manipulated during transmission without detection, in order to ensure the routing information, messages must be signed and provided with a certificate to attest valid network participants. In this work we present a beaconing protocol with key exchange to prepare the generation of a signature to protect the routing information protocol ‘Greedy Perimeter Stateless Routing’.
{"title":"Une approche beaconing avec échange de clés dans les réseaux ad hoc de véhicules","authors":"Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi","doi":"10.1109/JNS2.2012.6249252","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249252","url":null,"abstract":"Vehicular Ad-Hoc Networks (VANETs) are special forms of Mobile Ad-Hoc Networks (MANETs) that allows vehicles to communicate together in the absence of fixed infrastructure. In this type of network beaconing is the means used to discover the nodes in its neighborhood. Successful delivery of the message beacons containing speed, direction and position of a car is extremely important. Otherwise, routing information should not be modified/manipulated during transmission without detection, in order to ensure the routing information, messages must be signed and provided with a certificate to attest valid network participants. In this work we present a beaconing protocol with key exchange to prepare the generation of a signature to protect the routing information protocol ‘Greedy Perimeter Stateless Routing’.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-20DOI: 10.1109/JNS2.2012.6249232
Mohamed Madani, Mohammed Erradi
Les applications collaboratives sont des applications distribuées à travers lesquelles plusieurs utilisateurs peuvent interagir et partager les mêmes objets pour atteindre un objectif commun. Ainsi la sécurité des interactions entre les membres d'un groupe collaboratif constitue un défi majeur auquel il faut faire face. Ceci afin d'assurer des interactions sécurisées et offrir un bon degré de confiance dans l'utilisation d'une application collaborative. Ce travail présente un mécanisme de sécurité lors d'une session collaborative, appelé « sécurité à base de session ». L'approche proposée est basée sur le modèle de contrôle d'accès OrBAC, en l'augmentant d'un niveau intermédiaire appelé « Niveau Session » entre le niveau organisationnel et le niveau concret du modèle OrBAC. Ensuite, une démarche formelle à base de règles et d'arbres de permissions est proposée pour être intégrée à ce modèle, afin de contrôler l'accès au niveau des sessions collaboratives. Enfin, nous présentons une spécification formelle de notre approche pour une application collaborative distribuée pour le télédiagnostic dans le domaine de la neuroscience. Cette spécification est implémentée et vérifiée à l'aide du langage Prolog (Programmation Logique).
{"title":"Formalisation d'une session collaborative sécurisée","authors":"Mohamed Madani, Mohammed Erradi","doi":"10.1109/JNS2.2012.6249232","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249232","url":null,"abstract":"Les applications collaboratives sont des applications distribuées à travers lesquelles plusieurs utilisateurs peuvent interagir et partager les mêmes objets pour atteindre un objectif commun. Ainsi la sécurité des interactions entre les membres d'un groupe collaboratif constitue un défi majeur auquel il faut faire face. Ceci afin d'assurer des interactions sécurisées et offrir un bon degré de confiance dans l'utilisation d'une application collaborative. Ce travail présente un mécanisme de sécurité lors d'une session collaborative, appelé « sécurité à base de session ». L'approche proposée est basée sur le modèle de contrôle d'accès OrBAC, en l'augmentant d'un niveau intermédiaire appelé « Niveau Session » entre le niveau organisationnel et le niveau concret du modèle OrBAC. Ensuite, une démarche formelle à base de règles et d'arbres de permissions est proposée pour être intégrée à ce modèle, afin de contrôler l'accès au niveau des sessions collaboratives. Enfin, nous présentons une spécification formelle de notre approche pour une application collaborative distribuée pour le télédiagnostic dans le domaine de la neuroscience. Cette spécification est implémentée et vérifiée à l'aide du langage Prolog (Programmation Logique).","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127191563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-20DOI: 10.1109/JNS2.2012.6249240
Abderrahim Sabour
Cet article présente les résultats de l'analyse des caractéristiques dynamiques de l'algorithme R.A NMJ qui est un régénérateur de suites binaires cryptographiquement sûres. L'objectif été de mettre à l'évidence le comportement chaotique de ce régénérateur à travers le calcul du plus grand exposant de Lyapunov suite à divers type de perturbation tout en expliquant l'intérêt de cette étude sur l'ANALYSE DE LA vulnérabilité de L'algorithme, puisque le faite d'injecter une perturbation à le même effet quune erreur d'estimation d'où l'intérêt de cette étude.
{"title":"Analyse de la prédictibilité de l'algorithme R.A NMJ","authors":"Abderrahim Sabour","doi":"10.1109/JNS2.2012.6249240","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249240","url":null,"abstract":"Cet article présente les résultats de l'analyse des caractéristiques dynamiques de l'algorithme R.A NMJ qui est un régénérateur de suites binaires cryptographiquement sûres. L'objectif été de mettre à l'évidence le comportement chaotique de ce régénérateur à travers le calcul du plus grand exposant de Lyapunov suite à divers type de perturbation tout en expliquant l'intérêt de cette étude sur l'ANALYSE DE LA vulnérabilité de L'algorithme, puisque le faite d'injecter une perturbation à le même effet quune erreur d'estimation d'où l'intérêt de cette étude.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116500399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-04-20DOI: 10.1109/JNS2.2012.6249237
Yahya Benkaouz, Mohammed Erradi
La protection de la vie privée de toute personne représente un droit à préserver. Alors quavec l'extension des technologies de l'information, la collecte des données personnelles devient un objectif de plus en plus facile à atteindre. Dans cette perspective, nous présentons dans ce travail le concept de calcul multiparti sécurisé. Dans lequel, différents participants effectuent des calculs sur leurs propres données. Cet article présente les travaux et les stratégies les plus importantes pour assurer la confidentialité dans les calculs multipartis sécurisés « CMS ». Ainsi que les domaines d'applications de ce type de solution. Une comparaison des travaux les plus importants sur les CMS a été présentée.
{"title":"A propos du calcul multiparti sécurisé","authors":"Yahya Benkaouz, Mohammed Erradi","doi":"10.1109/JNS2.2012.6249237","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249237","url":null,"abstract":"La protection de la vie privée de toute personne représente un droit à préserver. Alors quavec l'extension des technologies de l'information, la collecte des données personnelles devient un objectif de plus en plus facile à atteindre. Dans cette perspective, nous présentons dans ce travail le concept de calcul multiparti sécurisé. Dans lequel, différents participants effectuent des calculs sur leurs propres données. Cet article présente les travaux et les stratégies les plus importantes pour assurer la confidentialité dans les calculs multipartis sécurisés « CMS ». Ainsi que les domaines d'applications de ce type de solution. Une comparaison des travaux les plus importants sur les CMS a été présentée.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131076407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}