首页 > 最新文献

2015 IEEE 16th International Symposium on High Assurance Systems Engineering最新文献

英文 中文
The Need for a Confidence View of CPS Support Environments (Fast Abstract) CPS支持环境置信度视图的需求(快速摘要)
F. Asplund, Martin Törngren, R. Hawkins, J. Mcdermid
Multi-View Modelling Integration Frameworks (MVMIFs) may help mitigate complexity associated with the development of CPS, but may also have implications on safety. Safety-related standards do not provide guidance to mitigate this problem. We therefore suggest that MVMIFs are extended with a confidence view to support the creation of an assurance case that covers issues related to risks in the support environment.
多视图建模集成框架(MVMIFs)可能有助于降低与CPS开发相关的复杂性,但也可能对安全性产生影响。与安全相关的标准并没有提供减轻这个问题的指导。因此,我们建议从信心的角度扩展mvmif,以支持创建涵盖与支持环境中的风险相关问题的保证案例。
{"title":"The Need for a Confidence View of CPS Support Environments (Fast Abstract)","authors":"F. Asplund, Martin Törngren, R. Hawkins, J. Mcdermid","doi":"10.1109/HASE.2015.14","DOIUrl":"https://doi.org/10.1109/HASE.2015.14","url":null,"abstract":"Multi-View Modelling Integration Frameworks (MVMIFs) may help mitigate complexity associated with the development of CPS, but may also have implications on safety. Safety-related standards do not provide guidance to mitigate this problem. We therefore suggest that MVMIFs are extended with a confidence view to support the creation of an assurance case that covers issues related to risks in the support environment.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"1099 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and Verifying the Ballooning in Xen with CSP 基于CSP的Xen气球建模与验证
Luyao Wang, Fengwei Sui, Yanhong Huang, Huibiao Zhu
As a dynamic memory virtualization technique, ballooning is widely applied in many virtualization platforms, i.e. Xen and VMware ESX Server. Since ballooning technology enables the guest OS to surrender unused memory back to the host during runtime, and it can increase utilization and flexibility of memory. Despite the rapid development and extensive use of memory virtualization technologies, it is still a challenge to analyze and verify its validity and some major properties through formal methods. In this paper, we model the ballooning under Xen architecture including Xen hyper visor, a set of virtual machines and balloon drivers using the process algebra Communication Sequential Process (CSP) in order to verify some resource control properties of ballooning. The model is implemented with Process Analysis Toolkit (PAT). As a result, the ballooning used in Xen architecture satisfies these major resource control properties in VM requirement document.
膨胀作为一种动态内存虚拟化技术,在Xen和VMware ESX Server等多个虚拟化平台上得到了广泛的应用。由于膨胀技术允许客户机操作系统在运行时将未使用的内存交还给主机,因此可以提高内存的利用率和灵活性。尽管内存虚拟化技术得到了迅速的发展和广泛的应用,但通过形式化的方法分析和验证其有效性和一些主要特性仍然是一个挑战。本文利用进程代数通信顺序进程(CSP)对Xen架构下的气球建模,包括Xen hypervisor、一组虚拟机和气球驱动程序,以验证气球的一些资源控制特性。该模型由过程分析工具包(Process Analysis Toolkit, PAT)实现。因此,Xen架构中使用的膨胀可以满足VM需求文档中的这些主要资源控制属性。
{"title":"Modeling and Verifying the Ballooning in Xen with CSP","authors":"Luyao Wang, Fengwei Sui, Yanhong Huang, Huibiao Zhu","doi":"10.1109/HASE.2015.12","DOIUrl":"https://doi.org/10.1109/HASE.2015.12","url":null,"abstract":"As a dynamic memory virtualization technique, ballooning is widely applied in many virtualization platforms, i.e. Xen and VMware ESX Server. Since ballooning technology enables the guest OS to surrender unused memory back to the host during runtime, and it can increase utilization and flexibility of memory. Despite the rapid development and extensive use of memory virtualization technologies, it is still a challenge to analyze and verify its validity and some major properties through formal methods. In this paper, we model the ballooning under Xen architecture including Xen hyper visor, a set of virtual machines and balloon drivers using the process algebra Communication Sequential Process (CSP) in order to verify some resource control properties of ballooning. The model is implemented with Process Analysis Toolkit (PAT). As a result, the ballooning used in Xen architecture satisfies these major resource control properties in VM requirement document.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
HCPN Modeling for ERTMS Requirements Specification 面向ERTMS需求规范的HCPN建模
Zakaryae Boudi, E. El-Koursi, S. C. Dutilleul
Ensuring railway interoperability in Europe implies that the functional specifications have a common understanding by all the stakeholders. One solution to guarantee that point is the formalization of the specification. Under the French project called "PERFECT", we aim to formalize railway specifications and validate various systems in order to determine, using software tools, the compliance between ERTMS and National railway requirements. The big challenge is to provide a user-friendly formalization with verification tools. In this paper, we present our preliminary exploration of the use of Hierarchical Colored Petri Net (HCPN) in modeling ERTMS/ETCS (European Rail Traffic Management System/European Train Control System) functional specifications. The purpose of this contribution is to point the benefits in using HCPNs, which are widely used among railway operators, for understanding the specification and analyzing system safety features. The present work focuses on modeling the functional terms of establishing a communication session between the on-board equipment and the Radio Block Center specified in the System Requirements Specification (SRS).
确保欧洲铁路的互操作性意味着所有利益相关者对功能规范有共同的理解。保证这一点的一个解决方案是规范的形式化。在名为“PERFECT”的法国项目中,我们的目标是将铁路规范正式化并验证各种系统,以便使用软件工具确定ERTMS与国家铁路要求之间的合规性。最大的挑战是提供一个用户友好的形式化的验证工具。在本文中,我们提出了使用层次彩色Petri网(HCPN)对ERTMS/ETCS(欧洲铁路交通管理系统/欧洲列车控制系统)功能规范建模的初步探索。这篇文章的目的是指出使用hcpn的好处,hcpn在铁路运营商中广泛使用,用于理解规范和分析系统安全特性。目前的工作重点是在系统需求规范(SRS)中指定的机载设备和无线电块中心之间建立通信会话的功能术语建模。
{"title":"HCPN Modeling for ERTMS Requirements Specification","authors":"Zakaryae Boudi, E. El-Koursi, S. C. Dutilleul","doi":"10.1109/HASE.2015.11","DOIUrl":"https://doi.org/10.1109/HASE.2015.11","url":null,"abstract":"Ensuring railway interoperability in Europe implies that the functional specifications have a common understanding by all the stakeholders. One solution to guarantee that point is the formalization of the specification. Under the French project called \"PERFECT\", we aim to formalize railway specifications and validate various systems in order to determine, using software tools, the compliance between ERTMS and National railway requirements. The big challenge is to provide a user-friendly formalization with verification tools. In this paper, we present our preliminary exploration of the use of Hierarchical Colored Petri Net (HCPN) in modeling ERTMS/ETCS (European Rail Traffic Management System/European Train Control System) functional specifications. The purpose of this contribution is to point the benefits in using HCPNs, which are widely used among railway operators, for understanding the specification and analyzing system safety features. The present work focuses on modeling the functional terms of establishing a communication session between the on-board equipment and the Radio Block Center specified in the System Requirements Specification (SRS).","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115344603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Verilog Synthesis in the Higher-Order Transformation Framework of TL TL高阶变换框架中的Verilog综合
V. Winter, Shiraz Hussain
The complexity of formalizing the semantics of Verilog is significant. This presents an impediment when attempting to provide high assurance in the correctness of Verilog synthesis. This paper explores the use of higher-order transformation as a paradigm for implementing a synthesis system for a small subset of Verilog. The resulting system is capable of synthesizing net lists in the Xilinx Net list Format that are suitable for downloading to an FPGA. Transformations realizing the synthesis are based on algebraic laws whose correctness can be justified in terms of the operational semantics of Verilog.
形式化Verilog语义的复杂性是显著的。当试图提供Verilog合成正确性的高保证时,这提出了一个障碍。本文探讨了使用高阶变换作为实现Verilog小子集的综合系统的范例。该系统能够以Xilinx网络列表格式合成适合下载到FPGA的网络列表。实现综合的转换基于代数定律,其正确性可以根据Verilog的操作语义来证明。
{"title":"Verilog Synthesis in the Higher-Order Transformation Framework of TL","authors":"V. Winter, Shiraz Hussain","doi":"10.1109/HASE.2015.13","DOIUrl":"https://doi.org/10.1109/HASE.2015.13","url":null,"abstract":"The complexity of formalizing the semantics of Verilog is significant. This presents an impediment when attempting to provide high assurance in the correctness of Verilog synthesis. This paper explores the use of higher-order transformation as a paradigm for implementing a synthesis system for a small subset of Verilog. The resulting system is capable of synthesizing net lists in the Xilinx Net list Format that are suitable for downloading to an FPGA. Transformations realizing the synthesis are based on algebraic laws whose correctness can be justified in terms of the operational semantics of Verilog.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128537677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signal Processing Oriented Approach for Big Data Privacy 面向信号处理的大数据隐私保护方法
Xiaohua Li, Thomas T. Yang
This paper addresses the challenge of big data security by exploiting signal processing theories. We propose a new big data privacy protocol that scrambles data via artificial noise and secret transform matrices. The utility of the scrambled data is maintained, as demonstrated by a cyber-physical system application. We further outline the proof of the proposed protocol's privacy by considering the limitations of blind source separation and compressive sensing.
本文利用信号处理理论解决了大数据安全的挑战。提出了一种利用人工噪声和秘密变换矩阵对数据进行加密的大数据保密协议。如网络物理系统应用程序所示,维护了加密数据的效用。通过考虑盲源分离和压缩感知的局限性,我们进一步概述了所提出协议的隐私证明。
{"title":"Signal Processing Oriented Approach for Big Data Privacy","authors":"Xiaohua Li, Thomas T. Yang","doi":"10.1109/HASE.2015.23","DOIUrl":"https://doi.org/10.1109/HASE.2015.23","url":null,"abstract":"This paper addresses the challenge of big data security by exploiting signal processing theories. We propose a new big data privacy protocol that scrambles data via artificial noise and secret transform matrices. The utility of the scrambled data is maintained, as demonstrated by a cyber-physical system application. We further outline the proof of the proposed protocol's privacy by considering the limitations of blind source separation and compressive sensing.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133985807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deriving Safety Contracts to Support Architecture Design of Safety Critical Systems 导出安全合同以支持安全关键系统的体系结构设计
Irfan Šljivo, Omar Jaradat, I. Bate, P. Graydon
The use of contracts to enhance the maintainability of safety-critical systems has received a significant amount of research effort in recent years. However some key issues have been identified: the difficulty in dealing with the wide range of properties of systems and deriving contracts to capture those properties, and the challenge of dealing with the inevitable incompleteness of the contracts. In this paper, we explore how the derivation of contracts can be performed based on the results of failure analysis. We use the concept of safety kernels to alleviate the issues. Firstly the safety kernel means that the properties of the system that we may wish to manage can be dealt with at a more abstract level, reducing the challenges of representation and completeness of the "safety" contracts. Secondly the set of safety contracts is reduced so it is possible to reason about their satisfaction in a more rigorous manner.
近年来,使用合同来增强安全关键系统的可维护性已经获得了大量的研究工作。然而,已经确定了一些关键问题:处理系统的广泛属性和派生捕获这些属性的合同的困难,以及处理不可避免的合同不完整性的挑战。在本文中,我们探讨了如何在失效分析结果的基础上推导契约。我们使用安全内核的概念来缓解这些问题。首先,安全内核意味着我们可能希望管理的系统属性可以在更抽象的层面上处理,从而减少了“安全”契约的表示和完整性的挑战。其次,安全合同的集合减少了,因此有可能以更严格的方式对其满意度进行推理。
{"title":"Deriving Safety Contracts to Support Architecture Design of Safety Critical Systems","authors":"Irfan Šljivo, Omar Jaradat, I. Bate, P. Graydon","doi":"10.1109/HASE.2015.27","DOIUrl":"https://doi.org/10.1109/HASE.2015.27","url":null,"abstract":"The use of contracts to enhance the maintainability of safety-critical systems has received a significant amount of research effort in recent years. However some key issues have been identified: the difficulty in dealing with the wide range of properties of systems and deriving contracts to capture those properties, and the challenge of dealing with the inevitable incompleteness of the contracts. In this paper, we explore how the derivation of contracts can be performed based on the results of failure analysis. We use the concept of safety kernels to alleviate the issues. Firstly the safety kernel means that the properties of the system that we may wish to manage can be dealt with at a more abstract level, reducing the challenges of representation and completeness of the \"safety\" contracts. Secondly the set of safety contracts is reduced so it is possible to reason about their satisfaction in a more rigorous manner.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"944 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Method for Validating Intent Model Behavior in DSVMs dssvm中意图模型行为的验证方法
K. Morris, Peter J. Clarke, Xudong He, F. Costa, M. Allison
The direct runtime interpretation and execution of domain-specific models through the use of a Domain Specific Virtual Machine (DSVM) is an area of emerging relevance in the model-driven engineering community. This is due in part to the increased efficiency and decreased complexity achieved through specialization of the architecture in disparate domains. An approach to the design of a DSVM is to include a middleware that is responsible for the delivery and management of domain-specific services. It is the job of this middleware to help realize user intent through the execution of received commands while ensuring adherence to system policies based on changing environmental context. To provide assurance of functionality, the DSVM middleware must be policy and context-aware and facilitate variability in its operations. It achieves this variability by dynamically generating behavioral models for execution in response to commands. The dynamic generation of models poses the challenge of ensuring their correctness at runtime. To guarantee the correctness of generated models, we adopted model validation techniques to ensure policy compliance and employed the Alloy Analyzer in our prototype to demonstrate the efficacy of this approach. This granted us use of the Alloy specification language, which, by utilizing first-order logic, enhanced our model validation process by allowing more expressive policies. We demonstrate the increased capabilities and assurance realized by this approach through a case study with a DSVM middleware instance for the communication domain.
通过使用特定于领域的虚拟机(DSVM)对特定于领域的模型进行直接的运行时解释和执行,是模型驱动工程社区中一个新兴的相关领域。这在一定程度上是由于通过对不同领域的体系结构进行专门化实现了效率的提高和复杂性的降低。设计DSVM的一种方法是包含一个中间件,该中间件负责交付和管理特定于领域的服务。该中间件的工作是通过执行接收到的命令来帮助实现用户意图,同时确保根据不断变化的环境上下文遵守系统策略。为了保证功能,DSVM中间件必须能够感知策略和上下文,并促进其操作中的可变性。它通过动态生成响应命令执行的行为模型来实现这种可变性。模型的动态生成提出了在运行时确保其正确性的挑战。为了保证生成模型的正确性,我们采用了模型验证技术来确保策略的遵从性,并在我们的原型中使用了Alloy Analyzer来证明这种方法的有效性。这允许我们使用Alloy规范语言,该语言通过利用一阶逻辑,通过允许更具表现力的策略来增强我们的模型验证过程。我们通过对通信域的DSVM中间件实例的案例研究,演示了这种方法所实现的增强的功能和保证。
{"title":"A Method for Validating Intent Model Behavior in DSVMs","authors":"K. Morris, Peter J. Clarke, Xudong He, F. Costa, M. Allison","doi":"10.1109/HASE.2015.43","DOIUrl":"https://doi.org/10.1109/HASE.2015.43","url":null,"abstract":"The direct runtime interpretation and execution of domain-specific models through the use of a Domain Specific Virtual Machine (DSVM) is an area of emerging relevance in the model-driven engineering community. This is due in part to the increased efficiency and decreased complexity achieved through specialization of the architecture in disparate domains. An approach to the design of a DSVM is to include a middleware that is responsible for the delivery and management of domain-specific services. It is the job of this middleware to help realize user intent through the execution of received commands while ensuring adherence to system policies based on changing environmental context. To provide assurance of functionality, the DSVM middleware must be policy and context-aware and facilitate variability in its operations. It achieves this variability by dynamically generating behavioral models for execution in response to commands. The dynamic generation of models poses the challenge of ensuring their correctness at runtime. To guarantee the correctness of generated models, we adopted model validation techniques to ensure policy compliance and employed the Alloy Analyzer in our prototype to demonstrate the efficacy of this approach. This granted us use of the Alloy specification language, which, by utilizing first-order logic, enhanced our model validation process by allowing more expressive policies. We demonstrate the increased capabilities and assurance realized by this approach through a case study with a DSVM middleware instance for the communication domain.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MPISE: Symbolic Execution of MPI Programs MPISE: MPI程序的符号执行
Xianjin Fu, Zhenbang Chen, Yufeng Zhang, Chun Huang, Wei Dong, J. Wang
Message Passing Interfaces (MPI) plays an important role in parallel computing. Many parallel applications are implemented as MPI programs. The existing methods of bug detection for MPI programs have the shortage of providing both input and non-determinism coverage, leading to missed bugs. In this paper, we employ symbolic execution to ensure the input coverage, and propose an on-the-fly schedule algorithm to reduce the interleaving explorations for non-determinism coverage, while ensuring the soundness and completeness. We have implemented our approach as a tool, called MPISE, which can automatically detect the deadlock and runtime bugs in MPI programs. The results of the experiments on benchmark programs and real world MPI programs indicate that MPISE finds bugs effectively and efficiently. In addition, our tool also provides diagnostic information and replay mechanism to help understand bugs.
消息传递接口(Message Passing interface, MPI)在并行计算中起着重要的作用。许多并行应用程序是作为MPI程序实现的。现有的MPI程序错误检测方法缺乏输入覆盖和非确定性覆盖,导致错误被遗漏。在本文中,我们采用符号执行来保证输入覆盖,并提出了一种动态调度算法来减少对不确定性覆盖的交错探索,同时保证完整性和可靠性。我们已经将我们的方法实现为一个名为MPISE的工具,它可以自动检测MPI程序中的死锁和运行时错误。在基准程序和实际MPI程序上的实验结果表明,MPISE能够有效地发现错误。此外,我们的工具还提供诊断信息和重播机制,以帮助理解错误。
{"title":"MPISE: Symbolic Execution of MPI Programs","authors":"Xianjin Fu, Zhenbang Chen, Yufeng Zhang, Chun Huang, Wei Dong, J. Wang","doi":"10.1109/HASE.2015.35","DOIUrl":"https://doi.org/10.1109/HASE.2015.35","url":null,"abstract":"Message Passing Interfaces (MPI) plays an important role in parallel computing. Many parallel applications are implemented as MPI programs. The existing methods of bug detection for MPI programs have the shortage of providing both input and non-determinism coverage, leading to missed bugs. In this paper, we employ symbolic execution to ensure the input coverage, and propose an on-the-fly schedule algorithm to reduce the interleaving explorations for non-determinism coverage, while ensuring the soundness and completeness. We have implemented our approach as a tool, called MPISE, which can automatically detect the deadlock and runtime bugs in MPI programs. The results of the experiments on benchmark programs and real world MPI programs indicate that MPISE finds bugs effectively and efficiently. In addition, our tool also provides diagnostic information and replay mechanism to help understand bugs.","PeriodicalId":248645,"journal":{"name":"2015 IEEE 16th International Symposium on High Assurance Systems Engineering","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115686543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2015 IEEE 16th International Symposium on High Assurance Systems Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1