首页 > 最新文献

2020 IEEE 45th Conference on Local Computer Networks (LCN)最新文献

英文 中文
Determining a tight worst-case delay of switched Ethernet network in IEC 61850 architectures 确定IEC 61850体系结构中交换式以太网的严格最坏情况延迟
Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314800
Théo Docquier, Yeqiong Song, V. Chevrier, Ludovic Pontnau, Abdelaziz Ahmed Nacer
IEC 61850 has become the reference standard for Substation Automation Systems (SAS) in smart power grids. Switched Ethernet is used for machine to machine communication within SAS. In order to meet stringent real-time constraints, the IEC 61850 application layer protocols can be mapped into different IEEE802.1Q priorities according to their real-time constraints and application criticality. However, the delay evaluation to guarantee real-time requirements can be difficult to perform, especially for lower priority but still real-time constrained traffic. In fact, most existing end-to-end worst-case delay analyses provide upper-bounds, leading to some pessimism and consequently network resource over-provision. In this paper, we present a new method for determining a tight worst-case delay. This method is based on the study of flow characteristics from a given network path. As a flow is interfered by other concurrent flows on its path, their relative offsets with the considered flow greatly impact on its delay. Studying all combinations to find the actual worst-case delay results in high complexity. We show that this complexity can be reduced by only analysing local worst-case delay at each switch in stead of the whole path where the change at each switch would need re-analysing the already analysed switches. An algorithm is also proposed to perform the analysis. An illustrating example shows that our method can reduce the pessimism as it provides the tight worst-case delay instead of the upper-bound of the worst-case delay.
IEC 61850已成为智能电网中变电站自动化系统(SAS)的参考标准。交换以太网用于SAS内的机器对机器通信。为了满足严格的实时约束,IEC 61850应用层协议可以根据其实时约束和应用临界性,映射为不同的IEEE802.1Q优先级。然而,保证实时需求的延迟评估可能很难执行,特别是对于低优先级但仍然实时受限的流量。事实上,大多数现有的端到端最坏情况延迟分析提供了上限,导致一些悲观情绪,从而导致网络资源过度供应。本文提出了一种确定紧最坏延时的新方法。该方法基于对给定网络路径的流特性的研究。当一个流在其路径上受到其他并发流的干扰时,它们与被考虑流的相对偏移量对其延迟有很大影响。研究所有的组合来找出实际的最坏情况延迟导致高复杂性。我们表明,这种复杂性可以通过只分析每个开关的局部最坏情况延迟来降低,而不是整个路径,因为每个开关的变化需要重新分析已经分析过的开关。本文还提出了一种算法来进行分析。一个实例表明,该方法提供了紧的最坏情况延迟,而不是最坏情况延迟的上界,可以减少悲观情绪。
{"title":"Determining a tight worst-case delay of switched Ethernet network in IEC 61850 architectures","authors":"Théo Docquier, Yeqiong Song, V. Chevrier, Ludovic Pontnau, Abdelaziz Ahmed Nacer","doi":"10.1109/LCN48667.2020.9314800","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314800","url":null,"abstract":"IEC 61850 has become the reference standard for Substation Automation Systems (SAS) in smart power grids. Switched Ethernet is used for machine to machine communication within SAS. In order to meet stringent real-time constraints, the IEC 61850 application layer protocols can be mapped into different IEEE802.1Q priorities according to their real-time constraints and application criticality. However, the delay evaluation to guarantee real-time requirements can be difficult to perform, especially for lower priority but still real-time constrained traffic. In fact, most existing end-to-end worst-case delay analyses provide upper-bounds, leading to some pessimism and consequently network resource over-provision. In this paper, we present a new method for determining a tight worst-case delay. This method is based on the study of flow characteristics from a given network path. As a flow is interfered by other concurrent flows on its path, their relative offsets with the considered flow greatly impact on its delay. Studying all combinations to find the actual worst-case delay results in high complexity. We show that this complexity can be reduced by only analysing local worst-case delay at each switch in stead of the whole path where the change at each switch would need re-analysing the already analysed switches. An algorithm is also proposed to perform the analysis. An illustrating example shows that our method can reduce the pessimism as it provides the tight worst-case delay instead of the upper-bound of the worst-case delay.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Triplet Mining-based Phishing Webpage Detection 基于三元组挖掘的钓鱼网页检测
Pub Date : 2020-11-11 DOI: 10.1109/LCN48667.2020.9314828
Kalana Abeywardena, Jiawei Zhao, Lexi Brent, Suranga Seneviratne, Ralph Holz
Phishing web pages impersonate legitimate websites to trick users into entering sensitive information such as their credentials. In many high profile data breaches, the initial entry points have been traced back to phishing attacks. Attackers are using increasingly sophisticated methods such as code obfuscation to bypass existing phishing detection systems. Since phishing websites show very high visual similarity to the respective target pages, recent advances in Convolutional Neural Networks (CNN) can be leveraged to build better phishing detection systems. In this work, we propose a novel CNN architecture consisting of two paths to capture the content similarity and structural similarity between web pages. Leveraging the fact that web pages of the same web site are visually similar, we use triplet learning to train our model without any labelled phishing examples.
网络钓鱼网页冒充合法网站,诱骗用户输入诸如凭据之类的敏感信息。在许多引人注目的数据泄露事件中,最初的入口点都可以追溯到网络钓鱼攻击。攻击者正在使用越来越复杂的方法,如代码混淆来绕过现有的网络钓鱼检测系统。由于网络钓鱼网站与各自的目标页面显示出非常高的视觉相似性,卷积神经网络(CNN)的最新进展可以用来构建更好的网络钓鱼检测系统。在这项工作中,我们提出了一种新颖的CNN架构,该架构由两条路径组成,用于捕获网页之间的内容相似性和结构相似性。利用同一网站的网页在视觉上相似的事实,我们使用三元学习来训练我们的模型,而不需要任何标记的网络钓鱼示例。
{"title":"Triplet Mining-based Phishing Webpage Detection","authors":"Kalana Abeywardena, Jiawei Zhao, Lexi Brent, Suranga Seneviratne, Ralph Holz","doi":"10.1109/LCN48667.2020.9314828","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314828","url":null,"abstract":"Phishing web pages impersonate legitimate websites to trick users into entering sensitive information such as their credentials. In many high profile data breaches, the initial entry points have been traced back to phishing attacks. Attackers are using increasingly sophisticated methods such as code obfuscation to bypass existing phishing detection systems. Since phishing websites show very high visual similarity to the respective target pages, recent advances in Convolutional Neural Networks (CNN) can be leveraged to build better phishing detection systems. In this work, we propose a novel CNN architecture consisting of two paths to capture the content similarity and structural similarity between web pages. Leveraging the fact that web pages of the same web site are visually similar, we use triplet learning to train our model without any labelled phishing examples.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134308988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps 镜子下的安全应用:Android安全应用的实证分析
Pub Date : 2020-07-08 DOI: 10.1109/LCN48667.2020.9314784
Weixian Yao, Yexuan Li, Weiye Lin, Tianhui Hu, I. Chowdhury, Rahat Masood, Suranga Seneviratne
Third-party security apps are an integral part of the Android app ecosystem. Many users install them as an extra layer of protection for their devices. By installing security apps, the smartphone users place a significant amount of trust on them allowing access to many smartphone resources that contain personal information such as the storage, text messages, email, and browser history. As such, it is essential to understand the mobile security apps ecosystem. In this paper, we present the first empirical study of Android security apps. We analyse 100 Android security apps from multiple aspects and offer insights to their operations and behaviours. Our results show that 20% of the security apps resell the data they collect to third parties; in some cases, even without the user consent. Also, we show that around 50% of the security apps fail to identify known malware.
第三方安全应用程序是Android应用程序生态系统中不可或缺的一部分。许多用户将其安装为设备的额外保护层。通过安装安全应用程序,智能手机用户对它们给予了极大的信任,允许访问许多包含个人信息的智能手机资源,如存储、短信、电子邮件和浏览器历史记录。因此,了解移动安全应用程序生态系统至关重要。在本文中,我们首次对Android安全应用进行了实证研究。我们从多个方面分析了100款Android安全应用,并对其运营和行为提供了见解。我们的研究结果显示,20%的安全应用程序将它们收集的数据转售给第三方;在某些情况下,甚至未经用户同意。此外,我们发现大约50%的安全应用程序无法识别已知的恶意软件。
{"title":"Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps","authors":"Weixian Yao, Yexuan Li, Weiye Lin, Tianhui Hu, I. Chowdhury, Rahat Masood, Suranga Seneviratne","doi":"10.1109/LCN48667.2020.9314784","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314784","url":null,"abstract":"Third-party security apps are an integral part of the Android app ecosystem. Many users install them as an extra layer of protection for their devices. By installing security apps, the smartphone users place a significant amount of trust on them allowing access to many smartphone resources that contain personal information such as the storage, text messages, email, and browser history. As such, it is essential to understand the mobile security apps ecosystem. In this paper, we present the first empirical study of Android security apps. We analyse 100 Android security apps from multiple aspects and offer insights to their operations and behaviours. Our results show that 20% of the security apps resell the data they collect to third parties; in some cases, even without the user consent. Also, we show that around 50% of the security apps fail to identify known malware.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127180619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning LFQ:使用深度强化学习的每流排队策略在线学习
Pub Date : 2020-07-06 DOI: 10.1109/LCN48667.2020.9314771
Maximilian Bachl, J. Fabini, T. Zseby
The increasing number of different, incompatible congestion control algorithms has led to an increased deployment of fair queuing. Fair queuing isolates each network flow and can thus guarantee fairness for each flow even if the flows’ congestion controls are not inherently fair. So far, each queue in the fair queuing system either has a fixed, static maximum size or is managed by an Active Queue Management (AQM) algorithm like CoDel. In this paper we design an AQM mechanism (Learning Fair Qdisc (LFQ)) that dynamically learns the optimal buffer size for each flow according to a specified reward function online. We show that our Deep Learning based algorithm can dynamically assign the optimal queue size to each flow depending on its congestion control, delay and bandwidth. Comparing to competing fair AQM schedulers, it provides significantly smaller queues while achieving the same or higher throughput.
越来越多的不同的、不兼容的拥塞控制算法导致公平排队的部署增加。公平排队隔离了每个网络流,因此即使流的拥塞控制本身不公平,也可以保证每个流的公平性。到目前为止,公平排队系统中的每个队列要么具有固定的静态最大大小,要么由CoDel等活动队列管理(AQM)算法管理。本文设计了一种AQM机制(Learning Fair Qdisc, LFQ),它根据给定的奖励函数在线动态学习每个流的最优缓冲区大小。我们展示了我们基于深度学习的算法可以根据其拥塞控制、延迟和带宽动态地为每个流分配最佳队列大小。与竞争的公平AQM调度器相比,它提供了更小的队列,同时实现了相同或更高的吞吐量。
{"title":"LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning","authors":"Maximilian Bachl, J. Fabini, T. Zseby","doi":"10.1109/LCN48667.2020.9314771","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314771","url":null,"abstract":"The increasing number of different, incompatible congestion control algorithms has led to an increased deployment of fair queuing. Fair queuing isolates each network flow and can thus guarantee fairness for each flow even if the flows’ congestion controls are not inherently fair. So far, each queue in the fair queuing system either has a fixed, static maximum size or is managed by an Active Queue Management (AQM) algorithm like CoDel. In this paper we design an AQM mechanism (Learning Fair Qdisc (LFQ)) that dynamically learns the optimal buffer size for each flow according to a specified reward function online. We show that our Deep Learning based algorithm can dynamically assign the optimal queue size to each flow depending on its congestion control, delay and bandwidth. Comparing to competing fair AQM schedulers, it provides significantly smaller queues while achieving the same or higher throughput.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131195843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Message from the TPC Chairs 来自TPC主席的信息
Pub Date : 2020-07-01 DOI: 10.1109/lanman49260.2020.9153255
E. Bulut, Tina Gaerlan, Lanman, K. Kar
LANMAN 2020 features a central theme chosen to illustrate some of the key challenges facing networks today. This year’s theme of “Ultra-Broadband Wireless Networks: 5G and Beyond” emphasizes emerging communication technologies such as mmWave and THz communications, that offer a tremendous opportunity for unprecedented data rates and low latency. At the same time, they raise numerous challenges–such as positioning, localization, intermittency–that impact networking, communication, and hardware design, often requiring cross-layer approaches to solve them. We have selected a program that broadly reflects this theme, its key challenges, and broader topics in networking.
LANMAN 2020的中心主题旨在说明当今网络面临的一些关键挑战。今年的主题是“超宽带无线网络:5G及以后”,强调毫米波和太赫兹通信等新兴通信技术,这些技术为实现前所未有的数据速率和低延迟提供了巨大的机会。与此同时,它们提出了许多挑战——比如定位、本地化、间歇性——这些挑战会影响网络、通信和硬件设计,通常需要跨层方法来解决这些问题。我们选择了一个广泛反映这一主题、其主要挑战和更广泛的网络主题的项目。
{"title":"Message from the TPC Chairs","authors":"E. Bulut, Tina Gaerlan, Lanman, K. Kar","doi":"10.1109/lanman49260.2020.9153255","DOIUrl":"https://doi.org/10.1109/lanman49260.2020.9153255","url":null,"abstract":"LANMAN 2020 features a central theme chosen to illustrate some of the key challenges facing networks today. This year’s theme of “Ultra-Broadband Wireless Networks: 5G and Beyond” emphasizes emerging communication technologies such as mmWave and THz communications, that offer a tremendous opportunity for unprecedented data rates and low latency. At the same time, they raise numerous challenges–such as positioning, localization, intermittency–that impact networking, communication, and hardware design, often requiring cross-layer approaches to solve them. We have selected a program that broadly reflects this theme, its key challenges, and broader topics in networking.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114485139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications 树链:物联网应用的快速轻量级共识算法
Pub Date : 2020-05-19 DOI: 10.1109/LCN48667.2020.9314831
A. Dorri, R. Jurdak
Blockchain has received tremendous attention in non-monetary applications including the Internet of Things (IoT) due to its salient features including decentralization, security, auditability, and anonymity. Most conventional blockchains rely on computationally expensive validator selection and consensus algorithms, have limited throughput, and high transaction delays. In this paper, we propose tree-chain a scalable fast blockchain instantiation that introduces two levels of randomization among the validators: i) transaction level where the validator of each transaction is selected randomly based on the most significant characters of the hash function output (known as consensus code), and ii) blockchain level where validator is randomly allocated to a particular consensus code based on the hash of their public key. Tree-chain introduces parallel chain branches where each validator commits the corresponding transactions in a unique ledger.
区块链由于其去中心化、安全性、可审计性和匿名性等显著特征,在包括物联网(IoT)在内的非货币应用中受到了极大的关注。大多数传统的区块链依赖于计算昂贵的验证器选择和共识算法,吞吐量有限,交易延迟高。在本文中,我们提出了一种可扩展的快速区块链实例化,该实例化在验证器中引入了两个级别的随机化:i)事务级别,其中每个事务的验证器是根据哈希函数输出的最重要字符随机选择的(称为共识代码),ii)区块链级别,其中验证器根据其公钥的哈希值随机分配到特定的共识代码。Tree-chain引入了并行链分支,其中每个验证器在一个唯一的分类账中提交相应的事务。
{"title":"Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications","authors":"A. Dorri, R. Jurdak","doi":"10.1109/LCN48667.2020.9314831","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314831","url":null,"abstract":"Blockchain has received tremendous attention in non-monetary applications including the Internet of Things (IoT) due to its salient features including decentralization, security, auditability, and anonymity. Most conventional blockchains rely on computationally expensive validator selection and consensus algorithms, have limited throughput, and high transaction delays. In this paper, we propose tree-chain a scalable fast blockchain instantiation that introduces two levels of randomization among the validators: i) transaction level where the validator of each transaction is selected randomly based on the most significant characters of the hash function output (known as consensus code), and ii) blockchain level where validator is randomly allocated to a particular consensus code based on the hash of their public key. Tree-chain introduces parallel chain branches where each validator commits the corresponding transactions in a unique ledger.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115201791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Best Paper Awards for Prior IEEE Local Computer Networks (LCN) Conferences IEEE本地计算机网络(LCN)会议最佳论文奖
Pub Date : 2019-10-01 DOI: 10.1109/lcn48667.2020.9314783
{"title":"Best Paper Awards for Prior IEEE Local Computer Networks (LCN) Conferences","authors":"","doi":"10.1109/lcn48667.2020.9314783","DOIUrl":"https://doi.org/10.1109/lcn48667.2020.9314783","url":null,"abstract":"","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129861589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LCN Steering Committee LCN指导委员会
Pub Date : 2018-10-01 DOI: 10.1109/lcnw.2018.8628583
K. Akkaya
Nils Aschenbruck, University of Osnabrück, Germany Joe Bumblis, University of Wisconsin-Stout, USA Ken Christensen, University of South Florida, USA Ehab Elmallah, University of Alberta, Canada Matthias Frank, University of Bonn, Germany Anura Jayasumana, Colorado State University, USA Gary Kessler, Embry-Riddle Aeronautical University, USA Burkhard Stiller, University of Zürich and ETH Zürich, Switzerland Tim Strayer, BBN, USA Damla Turgut, University of Central Florida, USA Mohamed Younis, University of Maryland, Baltimore County, USA
Nils Aschenbruck,德国奥斯纳布尔大学Joe Bumblis,美国威斯康星大学斯托特分校Ken Christensen,美国南佛罗里达大学Ehab Elmallah,加拿大阿尔伯塔大学Matthias Frank,德国波恩大学Anura Jayasumana,美国科罗拉多州立大学Gary Kessler,美国安柏瑞德航空大学Burkhard Stiller,瑞士z里奇大学和ETH z里奇大学Tim Strayer,美国BBN Damla Turgut,美国中佛罗里达大学Mohamed Younis,马里兰大学,巴尔的摩县,美国
{"title":"LCN Steering Committee","authors":"K. Akkaya","doi":"10.1109/lcnw.2018.8628583","DOIUrl":"https://doi.org/10.1109/lcnw.2018.8628583","url":null,"abstract":"Nils Aschenbruck, University of Osnabrück, Germany Joe Bumblis, University of Wisconsin-Stout, USA Ken Christensen, University of South Florida, USA Ehab Elmallah, University of Alberta, Canada Matthias Frank, University of Bonn, Germany Anura Jayasumana, Colorado State University, USA Gary Kessler, Embry-Riddle Aeronautical University, USA Burkhard Stiller, University of Zürich and ETH Zürich, Switzerland Tim Strayer, BBN, USA Damla Turgut, University of Central Florida, USA Mohamed Younis, University of Maryland, Baltimore County, USA","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE 45th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1