首页 > 最新文献

European Conference on Cyber Warfare and Security最新文献

英文 中文
A Survey on National Cyber Emergency Plans 国家网络应急预案调查
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1039
Konstantinos Adamos, Ioannis Filippopoulos, G. Stergiopoulos, D. Gritzalis
Operators of Essential services (OESs) and Critical infrastructures (CIs), whether private companies or public organizations are going through a digital transformation to pace with the evolution of technology and to bring better services to customers and countries’ citizens. Operational Technology (OT) systems like Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) used to control and monitor functions in such infrastructures are converging with Information Technology (IT) environments. This convergence has exposed infrastructures to new cyber risks. For this reason, EU Member States have been trying to build resilience against cyber-attacks to ensure the stable operation of their states. Several countries have established cybersecurity incident response procedures as well as steps or phases of response before, during, and after a cyber incident. The sum of these procedures and guidelines constitutes their national cyber emergency plans (NCEPs). Still, these NCEPs differ widely in their approaches. These differences manifest as both managerial, governmental, legal, and technical, creating a complex environment worldwide. In this paper, we gather four major NCEPs worldwide to analyze and compare them with prominent standards and industry guidelines in cybersecurity, like the ISO 27001 and NIST 800 series. We investigate NCEP approaches to building cyber resilience based on their response models, their involved entities, the cooperation between agencies and other countries, and their risk-based categorization for cyber incidents. We elaborate on their differences, potential issues and divergences and argue whether these plans can be combined to bridge potential weaknesses. We selected and surveyed four (4) cyber emergency plans from four (4) countries that are frequent targets of cyber-attacks and have long experience in managing and responding to cyber incidents.
基本服务(OESs)和关键基础设施(ci)的运营商,无论是私营公司还是公共组织,都在经历数字化转型,以跟上技术的发展,为客户和国家公民提供更好的服务。操作技术(OT)系统,如监控和数据采集(SCADA)和分布式控制系统(DCS),用于控制和监控这些基础设施中的功能,正在与信息技术(IT)环境融合。这种融合使基础设施面临新的网络风险。因此,欧盟成员国一直在努力建立抵御网络攻击的弹性,以确保其国家的稳定运行。一些国家已经建立了网络安全事件响应程序,以及在网络事件发生之前、期间和之后的响应步骤或阶段。这些程序和准则的总和构成其国家网络应急计划(ncep)。尽管如此,这些ncep在方法上存在很大差异。这些差异体现在管理、政府、法律和技术方面,创造了一个复杂的全球环境。在本文中,我们收集了全球四个主要的ncep,并将其与网络安全方面的突出标准和行业指南(如ISO 27001和NIST 800系列)进行分析和比较。我们根据NCEP的响应模型、参与实体、机构与其他国家之间的合作以及基于风险的网络事件分类,研究了NCEP建立网络弹性的方法。我们详细阐述了它们之间的差异、潜在的问题和分歧,并讨论了这些计划是否可以结合起来弥合潜在的弱点。我们选择并调查了来自四(4)个国家的四(4)个网络应急计划,这些国家经常成为网络攻击的目标,并且在管理和响应网络事件方面具有长期经验。
{"title":"A Survey on National Cyber Emergency Plans","authors":"Konstantinos Adamos, Ioannis Filippopoulos, G. Stergiopoulos, D. Gritzalis","doi":"10.34190/eccws.22.1.1039","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1039","url":null,"abstract":"Operators of Essential services (OESs) and Critical infrastructures (CIs), whether private companies or public organizations are going through a digital transformation to pace with the evolution of technology and to bring better services to customers and countries’ citizens. Operational Technology (OT) systems like Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) used to control and monitor functions in such infrastructures are converging with Information Technology (IT) environments. This convergence has exposed infrastructures to new cyber risks. For this reason, EU Member States have been trying to build resilience against cyber-attacks to ensure the stable operation of their states. Several countries have established cybersecurity incident response procedures as well as steps or phases of response before, during, and after a cyber incident. The sum of these procedures and guidelines constitutes their national cyber emergency plans (NCEPs). Still, these NCEPs differ widely in their approaches. These differences manifest as both managerial, governmental, legal, and technical, creating a complex environment worldwide. In this paper, we gather four major NCEPs worldwide to analyze and compare them with prominent standards and industry guidelines in cybersecurity, like the ISO 27001 and NIST 800 series. We investigate NCEP approaches to building cyber resilience based on their response models, their involved entities, the cooperation between agencies and other countries, and their risk-based categorization for cyber incidents. We elaborate on their differences, potential issues and divergences and argue whether these plans can be combined to bridge potential weaknesses. We selected and surveyed four (4) cyber emergency plans from four (4) countries that are frequent targets of cyber-attacks and have long experience in managing and responding to cyber incidents.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Critical Cybersecurity Controls for Industrial Control Systems 工业控制系统关键网络安全控制分析
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1157
Nkata Sekonya, S. Sithungu
Industrial Control Systems (ICS) comprise software, hardware, network systems, and people that manage and operate industrial processes. Supervisory Control and Data Acquisition Systems (SCADA) and Distributed Control Systems (DCS) are two of the most prevalent ICS. An ICS facilitates the effective and efficient management and operation of industrial sectors, including critical infrastructure sectors like utilities, manufacturing, and water treatment facilities. An ICS collects and integrates data from various field controllers deployed in industrial contexts, enabling operators to make data-driven decisions in managing industrial operations. Historically, ICS were isolated from the internet, functioning as part of air-gapped networks. However, the efficiency improvements brought about by the emergence of Information Technology necessitated a shift towards a more connected industrial environment. The convergence of Information and Operational Technology (IT/OT) has made ICS vulnerable to cyberattacks. Due to the crucial nature of the infrastructure that ICS manage, cyberattacks against ICS may cause critical infrastructure sectors to experience downtime. This may have a crippling impact on a country's well-being and essential economic activities. Given the proliferation of cyber warfare, cyberattacks against ICS are increasingly significant at present, as was the case during the 2015 attack on Ukraine's power infrastructure, which was successful in causing a blackout that affected over 200 000 persons. The threat actors used malicious software known as "BlackEnergy3", which was created to interfere with the regular operation of the ICS in charge of controlling electrical substations. This was the first known instance of malicious software causing blackouts.  In response to increasing cyberattacks against ICS, the SANS Institute, in a whitepaper titled “The Five ICS Cybersecurity Critical Controls”, present five critical controls for an ICS cybersecurity strategy. This paper discusses ICS and the increased convergence of IT and OT. The paper also outlines significant cyberattacks directed at ICS. The paper then follows an exploratory research methodology done in response to the Five ICS Cybersecurity Critical Controls to determine the state of ICS literature that can help ICS operators secure their environments in accordance with the framework. Additionally, the ICS Cybersecurity Critical Controls are mapped to the NERC CIP standards, which provide guidance on the security of the Bulk Electric System (BES) and associated critical assets in North America.
工业控制系统(ICS)包括软件、硬件、网络系统以及管理和操作工业过程的人员。监控和数据采集系统(SCADA)和分布式控制系统(DCS)是两种最流行的ICS。ICS促进了工业部门的有效和高效管理和运营,包括公用事业、制造业和水处理设施等关键基础设施部门。ICS可以收集和集成来自工业环境中部署的各种现场控制器的数据,使作业者能够在管理工业作业时做出数据驱动的决策。从历史上看,ICS是与互联网隔离的,作为气隙网络的一部分发挥作用。然而,信息技术的出现带来的效率的提高,需要向一个更紧密联系的工业环境转变。信息和操作技术(IT/OT)的融合使ICS容易受到网络攻击。由于ICS管理的基础设施的关键性质,针对ICS的网络攻击可能导致关键基础设施部门停机。这可能对一个国家的福祉和基本经济活动产生严重影响。鉴于网络战争的扩散,目前针对工业控制系统的网络攻击日益严重,例如2015年对乌克兰电力基础设施的攻击,成功造成停电,影响超过20万人。攻击者使用了名为“BlackEnergy3”的恶意软件,该软件旨在干扰负责控制变电站的ICS的正常运行。这是已知的第一起恶意软件导致停电的案例。为了应对越来越多的针对ICS的网络攻击,SANS研究所在一份名为“五个ICS网络安全关键控制”的白皮书中提出了ICS网络安全战略的五个关键控制。本文讨论了ICS以及IT和OT的日益融合。该报告还概述了针对ICS的重大网络攻击。然后,本文遵循响应五个ICS网络安全关键控制所做的探索性研究方法,以确定可以帮助ICS运营商根据框架保护其环境的ICS文献的状态。此外,ICS网络安全关键控制被映射到NERC CIP标准,该标准为北美散装电气系统(BES)和相关关键资产的安全提供指导。
{"title":"An Analysis of Critical Cybersecurity Controls for Industrial Control Systems","authors":"Nkata Sekonya, S. Sithungu","doi":"10.34190/eccws.22.1.1157","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1157","url":null,"abstract":"Industrial Control Systems (ICS) comprise software, hardware, network systems, and people that manage and operate industrial processes. Supervisory Control and Data Acquisition Systems (SCADA) and Distributed Control Systems (DCS) are two of the most prevalent ICS. An ICS facilitates the effective and efficient management and operation of industrial sectors, including critical infrastructure sectors like utilities, manufacturing, and water treatment facilities. An ICS collects and integrates data from various field controllers deployed in industrial contexts, enabling operators to make data-driven decisions in managing industrial operations. Historically, ICS were isolated from the internet, functioning as part of air-gapped networks. However, the efficiency improvements brought about by the emergence of Information Technology necessitated a shift towards a more connected industrial environment. The convergence of Information and Operational Technology (IT/OT) has made ICS vulnerable to cyberattacks. Due to the crucial nature of the infrastructure that ICS manage, cyberattacks against ICS may cause critical infrastructure sectors to experience downtime. This may have a crippling impact on a country's well-being and essential economic activities. Given the proliferation of cyber warfare, cyberattacks against ICS are increasingly significant at present, as was the case during the 2015 attack on Ukraine's power infrastructure, which was successful in causing a blackout that affected over 200 000 persons. The threat actors used malicious software known as \"BlackEnergy3\", which was created to interfere with the regular operation of the ICS in charge of controlling electrical substations. This was the first known instance of malicious software causing blackouts.  In response to increasing cyberattacks against ICS, the SANS Institute, in a whitepaper titled “The Five ICS Cybersecurity Critical Controls”, present five critical controls for an ICS cybersecurity strategy. This paper discusses ICS and the increased convergence of IT and OT. The paper also outlines significant cyberattacks directed at ICS. The paper then follows an exploratory research methodology done in response to the Five ICS Cybersecurity Critical Controls to determine the state of ICS literature that can help ICS operators secure their environments in accordance with the framework. Additionally, the ICS Cybersecurity Critical Controls are mapped to the NERC CIP standards, which provide guidance on the security of the Bulk Electric System (BES) and associated critical assets in North America.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126898538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
We see what we want to see: Pitfalls of Perception and Decision-making in Security Management 我们看到了我们想看到的:安全管理中感知和决策的陷阱
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1451
Helvi Salminen
We human beings are often convinced of having a clear picture of reality and believe ourselves to be thoroughly rational in our thinking and decision-making. However, our perception of reality is limited and prone to errors, and our decision-making is often guided by emotions and instincts instead of facts and rational thinking. If we don’t stop to think we often jump to conclusions based on partial or erroneous information, and eloquently justify our decisions with apparently rational arguments. In many areas of human activities, including security management, limits of perception and errors in decision-making can have harmful, even disastrous consequences. Very often in security management the decision-making process is not sufficiently challenged by critical thinking as decisions are often made hidden behind the veil of secrets. Cognitive biases - systematic errors in thinking affecting decisions and judgments - have been identified and analysed in various contexts, and the results have been applied to improve decision-making processes. However, in the heavily regulated and compliance-dominated world of security management sufficient attention hasn’t been paid to cognitive biases and their impacts. As result of insufficient attention an important risk factor is regularly underestimated. This paper includes an introduction to the concept of cognitive biases and the research on the phenomenon. The biases which in the author’s experience have a particularly harmful impact on security management are described in detail. This introduction is followed by description of scenarios and real-life examples where erroneous perception and decision-making of security actors leads to disasters. De-biasing is the strategy which aims at eliminating or at least limiting of the impact of cognitive biases. This strategy has been successfully implemented in various types of environments. This paper presents ideas how de-biasing strategies could be implemented in security management in order to improve the quality of decision-making.
我们人类经常相信自己对现实有清晰的认识,并相信自己在思考和决策方面是完全理性的。然而,我们对现实的感知是有限的,容易出错,我们的决策往往是由情绪和本能引导的,而不是事实和理性思考。如果我们不停下来思考,我们往往会根据部分或错误的信息得出结论,并用看似理性的论点雄辩地为我们的决定辩护。在人类活动的许多领域,包括安全管理,感知的限制和决策中的错误可能会产生有害的,甚至是灾难性的后果。在安全管理中,决策过程往往没有受到批判性思维的充分挑战,因为决策往往隐藏在秘密的面纱后面。认知偏差——影响决策和判断的系统性思维错误——已经在各种情况下被识别和分析,其结果已被应用于改进决策过程。然而,在严格监管和遵从性主导的安全管理领域,认知偏差及其影响并没有得到足够的重视。由于注意不足,一个重要的危险因素经常被低估。本文介绍了认知偏差的概念及其研究现状。在作者的经验中,对安全管理有特别有害影响的偏见进行了详细描述。本介绍之后是对场景和现实生活中的示例的描述,其中安全参与者的错误感知和决策导致了灾难。去偏见是一种旨在消除或至少限制认知偏见影响的策略。该策略已在各种类型的环境中成功实现。本文提出了如何在安全管理中实施去偏策略以提高决策质量的想法。
{"title":"We see what we want to see: Pitfalls of Perception and Decision-making in Security Management","authors":"Helvi Salminen","doi":"10.34190/eccws.22.1.1451","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1451","url":null,"abstract":"We human beings are often convinced of having a clear picture of reality and believe ourselves to be thoroughly rational in our thinking and decision-making. However, our perception of reality is limited and prone to errors, and our decision-making is often guided by emotions and instincts instead of facts and rational thinking. If we don’t stop to think we often jump to conclusions based on partial or erroneous information, and eloquently justify our decisions with apparently rational arguments. In many areas of human activities, including security management, limits of perception and errors in decision-making can have harmful, even disastrous consequences. Very often in security management the decision-making process is not sufficiently challenged by critical thinking as decisions are often made hidden behind the veil of secrets. Cognitive biases - systematic errors in thinking affecting decisions and judgments - have been identified and analysed in various contexts, and the results have been applied to improve decision-making processes. However, in the heavily regulated and compliance-dominated world of security management sufficient attention hasn’t been paid to cognitive biases and their impacts. As result of insufficient attention an important risk factor is regularly underestimated. This paper includes an introduction to the concept of cognitive biases and the research on the phenomenon. The biases which in the author’s experience have a particularly harmful impact on security management are described in detail. This introduction is followed by description of scenarios and real-life examples where erroneous perception and decision-making of security actors leads to disasters. De-biasing is the strategy which aims at eliminating or at least limiting of the impact of cognitive biases. This strategy has been successfully implemented in various types of environments. This paper presents ideas how de-biasing strategies could be implemented in security management in order to improve the quality of decision-making.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116914077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determination of the end device risk likelihood using the Bayesian network tools 使用贝叶斯网络工具确定终端设备风险的可能性
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1184
T. Ncubukezi
All institutions use end devices for information processing which includes sending and receiving on the network. This process helps them to improve their business production as well as perform daily activities at a faster rate. However, the increased usage of end devices by both employees and criminals raises concerns and exposes businesses to a range of cyber risks. End devices can sometimes be used as agents and weapons to expose internal business operations. The vulnerability of the end devices to cyber threats and attacks compromises business data, its safety, and security. This paper determines the risk likelihood of the end devices using the Bayesian network tools. To achieve this, the study illustrates the connections of the end device variables to simulate the risk likelihood and its impact. The analysis and interpretation of the simulation are performed using decision tree analysis (DTA), scenario analysis, and sensitivity analysis techniques (Tornado graphs, conditional probability tables (CPT), and value of information configuration (VOI)). The relationship of the variables is demonstrated on the AgenaRisk package. Results revealed variables that influence the risk probability and its impact.  End device risks can be caused by insiders and cyber criminals. The risks associated with end devices are influenced by the level of security implementation on different levels. The impact of the cyber risks was also accounted for and the concluding remarks were also made.
所有机构都使用终端设备进行信息处理,包括在网络上发送和接收信息。这个过程帮助他们提高业务生产,并以更快的速度执行日常活动。然而,员工和犯罪分子越来越多地使用终端设备引发了人们的担忧,并使企业面临一系列网络风险。终端设备有时可以用作暴露内部业务操作的代理和武器。终端设备容易受到网络威胁和攻击,危及业务数据的安全性和安全性。本文利用贝叶斯网络工具确定了终端设备的风险可能性。为了实现这一目标,研究说明了终端设备变量之间的联系,以模拟风险可能性及其影响。使用决策树分析(DTA)、场景分析和敏感性分析技术(龙卷风图、条件概率表(CPT)和信息配置值(VOI))对模拟进行分析和解释。变量之间的关系在genarisk包中得到了演示。结果揭示了影响风险概率的变量及其影响。终端设备风险可能是由内部人员和网络罪犯造成的。与终端设备相关的风险受到不同级别安全实现级别的影响。会议还讨论了网络风险的影响,并做了总结发言。
{"title":"Determination of the end device risk likelihood using the Bayesian network tools","authors":"T. Ncubukezi","doi":"10.34190/eccws.22.1.1184","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1184","url":null,"abstract":"All institutions use end devices for information processing which includes sending and receiving on the network. This process helps them to improve their business production as well as perform daily activities at a faster rate. However, the increased usage of end devices by both employees and criminals raises concerns and exposes businesses to a range of cyber risks. End devices can sometimes be used as agents and weapons to expose internal business operations. The vulnerability of the end devices to cyber threats and attacks compromises business data, its safety, and security. This paper determines the risk likelihood of the end devices using the Bayesian network tools. To achieve this, the study illustrates the connections of the end device variables to simulate the risk likelihood and its impact. The analysis and interpretation of the simulation are performed using decision tree analysis (DTA), scenario analysis, and sensitivity analysis techniques (Tornado graphs, conditional probability tables (CPT), and value of information configuration (VOI)). The relationship of the variables is demonstrated on the AgenaRisk package. Results revealed variables that influence the risk probability and its impact.  End device risks can be caused by insiders and cyber criminals. The risks associated with end devices are influenced by the level of security implementation on different levels. The impact of the cyber risks was also accounted for and the concluding remarks were also made.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124171317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of Cyber Security risks: A Smart Terminal Process 网络安全风险评估:一个智能终端过程
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1060
J. Pöyhönen
In Finland, the connections to global maritime transportation logistics systems are an essential part of the national critical infrastructure. As a part of maritime logistics systems, the port's operations are important elements for global maritime traffic and the transportation supply chain. Digitalization of seaport services makes it possible to increase the efficiency of terminal systems in the logistic processes. At the same time, port logistic processes can notably reduce its CO2 emissions by optimizing port operations. The improvement of port processes relies very much on the development of Information and Communication Technology (ICT) and Industrial Control Systems (ICS) or Operation Technologies (OT) systems. In port environment there are parts that are controlled (ICS/OT) from the cyber environment but directly interact with the physical surroundings. These are called Cyber-Physical Systems (CPS). In this environment, the cyber security aspects of the port logistic need to be addressed. In Finland, the Port SMARTER research program has been on the way since 2021. The aim of the program is to create port services within new technology solutions, and that way improve cargo and people flows while improving the experience for all stakeholders. However, this development increase also complicated system dimensions in the use of ports and makes port operations complex systems of systems environment characterized by a conglomeration of interconnected networks and dependencies. This paper describes a practical approach to risk assessment work regarding the SMARTER research case. It provides a comprehensive cyber security investigation approach to port operations at the system level. In risk assessment work, the paper emphasizes the importation of description of probabilities to defend the system element against estimated probabilities of cyber-attacks at all parts of port processes. The findings of the study are related to the comprehensive cyber security architecture of the SMARTER research goals. The following research interests are related to the issue: "How a comprehensive cyber security investigation can be conducted in smart ports operations?” This paper emphasizes cyber security risks assessment work should be covered from services for operation, information flows in and between systems, as well as electricity supplies to achieve holistic risks assessment in the smart terminal process.
在芬兰,与全球海运物流系统的连接是国家关键基础设施的重要组成部分。作为海上物流系统的一部分,港口的运作是全球海上交通和运输供应链的重要组成部分。港口服务的数字化使码头系统在物流过程中的效率得以提高。同时,港口物流过程可以通过优化港口运营显著减少其二氧化碳排放。港口流程的改进在很大程度上依赖于信息和通信技术(ICT)和工业控制系统(ICS)或操作技术(OT)系统的发展。在端口环境中,有些部件是由网络环境控制的(ICS/OT),但直接与物理环境交互。这些被称为网络物理系统(CPS)。在这种环境下,需要解决港口物流的网络安全问题。在芬兰,智能港口研究项目自2021年以来一直在进行中。该计划的目的是在新技术解决方案中创建港口服务,从而改善货物和人员流动,同时改善所有利益相关者的体验。然而,这种发展也增加了港口使用的复杂系统维度,并使港口操作成为以相互连接的网络和依赖关系聚集为特征的复杂系统环境系统。本文描述了一种关于SMARTER研究案例的风险评估工作的实用方法。它在系统层面为港口运营提供了全面的网络安全调查方法。在风险评估工作中,本文强调引入概率描述,以保护系统元素免受端口进程各部分估计的网络攻击概率。研究结果与SMARTER研究目标的综合网络安全架构有关。以下研究兴趣与“如何在智能港口运营中进行全面的网络安全调查?”强调网络安全风险评估工作应从运营服务、系统内部和系统之间的信息流、电力供应等方面进行覆盖,实现智能终端过程的整体风险评估。
{"title":"Assessment of Cyber Security risks: A Smart Terminal Process","authors":"J. Pöyhönen","doi":"10.34190/eccws.22.1.1060","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1060","url":null,"abstract":"In Finland, the connections to global maritime transportation logistics systems are an essential part of the national critical infrastructure. As a part of maritime logistics systems, the port's operations are important elements for global maritime traffic and the transportation supply chain. Digitalization of seaport services makes it possible to increase the efficiency of terminal systems in the logistic processes. At the same time, port logistic processes can notably reduce its CO2 emissions by optimizing port operations. The improvement of port processes relies very much on the development of Information and Communication Technology (ICT) and Industrial Control Systems (ICS) or Operation Technologies (OT) systems. In port environment there are parts that are controlled (ICS/OT) from the cyber environment but directly interact with the physical surroundings. These are called Cyber-Physical Systems (CPS). In this environment, the cyber security aspects of the port logistic need to be addressed. In Finland, the Port SMARTER research program has been on the way since 2021. The aim of the program is to create port services within new technology solutions, and that way improve cargo and people flows while improving the experience for all stakeholders. However, this development increase also complicated system dimensions in the use of ports and makes port operations complex systems of systems environment characterized by a conglomeration of interconnected networks and dependencies. This paper describes a practical approach to risk assessment work regarding the SMARTER research case. It provides a comprehensive cyber security investigation approach to port operations at the system level. In risk assessment work, the paper emphasizes the importation of description of probabilities to defend the system element against estimated probabilities of cyber-attacks at all parts of port processes. The findings of the study are related to the comprehensive cyber security architecture of the SMARTER research goals. The following research interests are related to the issue: \"How a comprehensive cyber security investigation can be conducted in smart ports operations?” This paper emphasizes cyber security risks assessment work should be covered from services for operation, information flows in and between systems, as well as electricity supplies to achieve holistic risks assessment in the smart terminal process.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126030388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Teaching Social Science Aspects of Information Security 信息安全的社会科学方面教学
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1210
Igor Bernik
As information security has become increasingly crucial in our daily lives, there is a growing need to teach its social science aspects. This paper explores the challenges and best practices for teaching social science aspects of information security. It begins with the importance of information security and cyberspace and highlights the human aspects of information security. Next, it discusses the role of social science in understanding information security and how social science can help us better design and implement security measures. The paper identifies challenges in teaching social science aspects of information security, such as the interdisciplinary nature of the subject and the need for a standardised curriculum. Finally, the paper outlines best practices for teaching social science aspects of information security, such as using case studies and real-world examples, incorporating interactive and experiential learning, and leveraging existing resources. The conclusion highlights the importance of incorporating social science aspects of information security in education and suggests future research directions.
随着信息安全在我们的日常生活中变得越来越重要,越来越需要教授其社会科学方面的知识。本文探讨了教授信息安全社会科学方面的挑战和最佳实践。它从信息安全和网络空间的重要性开始,突出了信息安全的人为方面。接下来,讨论了社会科学在理解信息安全中的作用,以及社会科学如何帮助我们更好地设计和实施安全措施。这篇论文指出了在教授信息安全的社会科学方面的挑战,例如该学科的跨学科性质和标准化课程的需要。最后,本文概述了教授信息安全社会科学方面的最佳实践,例如使用案例研究和现实世界的例子,结合交互式和体验式学习,以及利用现有资源。结论强调了将社会科学方面的信息安全纳入教育的重要性,并提出了未来的研究方向。
{"title":"Teaching Social Science Aspects of Information Security","authors":"Igor Bernik","doi":"10.34190/eccws.22.1.1210","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1210","url":null,"abstract":"As information security has become increasingly crucial in our daily lives, there is a growing need to teach its social science aspects. This paper explores the challenges and best practices for teaching social science aspects of information security. It begins with the importance of information security and cyberspace and highlights the human aspects of information security. Next, it discusses the role of social science in understanding information security and how social science can help us better design and implement security measures. The paper identifies challenges in teaching social science aspects of information security, such as the interdisciplinary nature of the subject and the need for a standardised curriculum. Finally, the paper outlines best practices for teaching social science aspects of information security, such as using case studies and real-world examples, incorporating interactive and experiential learning, and leveraging existing resources. The conclusion highlights the importance of incorporating social science aspects of information security in education and suggests future research directions.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Forensic in A Virtual World; A Case of Metaverse and VR 虚拟世界中的数字取证研究虚拟现实和虚拟现实的案例
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1149
Tayba Al ali, Sara Al Fulaiti, Manal Abuzour, Sheikha Almaqahami, R. Ikuesan
Metaverse is a virtual space where users can interact with each other. It is a combination of virtual reality, augmented reality, and mixed reality. This evolving technology can offer many exciting opportunities that can be used for individuals and businesses. Although this technology has many advantages, people are misusing it for their benefit. Many cyberattacks are occurring in the metaverse world because it has various vulnerabilities and privacy issues. This paper explains four cyberattacks and a case scenario of each attack as it relates to the metaverse. Additionally, this study developed a metaverse forensic framework that can be used to investigate cyberattacks in the metaverse world. Furthermore, this study describes how forensic examiners can conduct a forensic investigation using state-of-the-art forensic solutions and tools. The developed framework can be used by forensic examiners, security researchers, as well as the general scientific community for the security of the metaverse.
虚拟世界是一个用户可以相互交流的虚拟空间。它是虚拟现实、增强现实和混合现实的结合。这种不断发展的技术可以为个人和企业提供许多令人兴奋的机会。尽管这项技术有很多优点,但人们为了自己的利益而滥用它。许多网络攻击发生在虚拟世界,因为它有各种漏洞和隐私问题。本文解释了四种网络攻击以及与元宇宙相关的每种攻击的案例场景。此外,本研究还开发了一个可用于调查虚拟世界网络攻击的虚拟取证框架。此外,本研究描述了法医检验员如何使用最先进的法医解决方案和工具进行法医调查。开发的框架可以被法医审查员、安全研究人员以及一般的科学社区用于虚拟世界的安全。
{"title":"Digital Forensic in A Virtual World; A Case of Metaverse and VR","authors":"Tayba Al ali, Sara Al Fulaiti, Manal Abuzour, Sheikha Almaqahami, R. Ikuesan","doi":"10.34190/eccws.22.1.1149","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1149","url":null,"abstract":"Metaverse is a virtual space where users can interact with each other. It is a combination of virtual reality, augmented reality, and mixed reality. This evolving technology can offer many exciting opportunities that can be used for individuals and businesses. Although this technology has many advantages, people are misusing it for their benefit. Many cyberattacks are occurring in the metaverse world because it has various vulnerabilities and privacy issues. This paper explains four cyberattacks and a case scenario of each attack as it relates to the metaverse. Additionally, this study developed a metaverse forensic framework that can be used to investigate cyberattacks in the metaverse world. Furthermore, this study describes how forensic examiners can conduct a forensic investigation using state-of-the-art forensic solutions and tools. The developed framework can be used by forensic examiners, security researchers, as well as the general scientific community for the security of the metaverse.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128814665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Situational Awareness of GDPR 建立GDPR的态势感知
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1077
Pauliina Hirvonen, Martti J. Kari
Because previous academic research does not comment sufficiently on how the relevant content of the European Union (EU) General Data Protection Regulation (GDPR  has been properly communicated to the organisations, or how the situational awareness (SA) of GDPR has been built in the organisations, this qualitative empirical research was regarded as a valuable approach for gathering authentic research material on the practical bases of this phenomena. The aim of this empirical case study (CS) is to develop a picture of what processes organisations use to build SA of the GDPR requirements. To guide the CS, we asked how the SA for decision-making was constructed and how it was perceived in organisations. The experiences of eight Finnish organisations showed that the organisations’ practices of building SA and their experiences with the quality and adequacy of SA differed. However, building SA proved to be a critical step for organisations in the overall process of meeting GDPR requirements. Especially the data coming from inside the organisation became very relevant in the SA process, because it supported decision makers to determine how the GDPR requirements should be implemented in the organisation. As a main contribution of this article, based on best practices shared by organisations a model of building SA was built. The proposed model is threefold and was constructed by combining the findings of an empirical CS analysis, the steps of the intelligence process, and the essential elements of the model of creating information security SA. The result is potentially beneficial for building situational understanding of any complex or ambiguous issue, especially in complex and digitalised technological areas, where combining information management with accurate and efficient decision-making is a common challenge. The results can be used by any party who is looking to build SA of an abstract issue in a complex environment.
由于以前的学术研究没有充分评论欧盟(EU)通用数据保护条例(GDPR)的相关内容如何被适当地传达给组织,或者如何在组织中建立GDPR的态势感知(SA),因此这种定性实证研究被认为是一种有价值的方法,可以在这一现象的实践基础上收集真实的研究材料。本实证案例研究(CS)的目的是开发组织用于构建GDPR要求SA的流程的图片。为了指导CS,我们询问了用于决策的SA是如何构建的,以及它在组织中的看法。八个芬兰组织的经验表明,组织建立SA的实践和他们对SA的质量和充分性的经验是不同的。然而,建立SA被证明是组织在满足GDPR要求的整个过程中至关重要的一步。特别是来自组织内部的数据在SA过程中变得非常相关,因为它支持决策者确定如何在组织中实施GDPR要求。作为本文的主要贡献,基于组织共享的最佳实践,构建了构建SA的模型。提出的模型是三重的,是通过结合实证CS分析的结果、情报过程的步骤和创建信息安全SA模型的基本要素来构建的。该结果可能有助于对任何复杂或模糊问题建立情境理解,特别是在复杂和数字化技术领域,在这些领域,将信息管理与准确有效的决策相结合是一个共同的挑战。任何希望在复杂环境中构建抽象问题SA的各方都可以使用这些结果。
{"title":"Building Situational Awareness of GDPR","authors":"Pauliina Hirvonen, Martti J. Kari","doi":"10.34190/eccws.22.1.1077","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1077","url":null,"abstract":"Because previous academic research does not comment sufficiently on how the relevant content of the European Union (EU) General Data Protection Regulation (GDPR  has been properly communicated to the organisations, or how the situational awareness (SA) of GDPR has been built in the organisations, this qualitative empirical research was regarded as a valuable approach for gathering authentic research material on the practical bases of this phenomena. The aim of this empirical case study (CS) is to develop a picture of what processes organisations use to build SA of the GDPR requirements. To guide the CS, we asked how the SA for decision-making was constructed and how it was perceived in organisations. The experiences of eight Finnish organisations showed that the organisations’ practices of building SA and their experiences with the quality and adequacy of SA differed. However, building SA proved to be a critical step for organisations in the overall process of meeting GDPR requirements. Especially the data coming from inside the organisation became very relevant in the SA process, because it supported decision makers to determine how the GDPR requirements should be implemented in the organisation. As a main contribution of this article, based on best practices shared by organisations a model of building SA was built. The proposed model is threefold and was constructed by combining the findings of an empirical CS analysis, the steps of the intelligence process, and the essential elements of the model of creating information security SA. The result is potentially beneficial for building situational understanding of any complex or ambiguous issue, especially in complex and digitalised technological areas, where combining information management with accurate and efficient decision-making is a common challenge. The results can be used by any party who is looking to build SA of an abstract issue in a complex environment.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127367100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Norms for State Responsibilities regarding Online Disinformation and Influence Operations 关于网络虚假信息和影响行动的国家责任规范
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1121
B. van Niekerk, Trishana Ramluckan
The Internet has provided a global mass communication system, and in particular social media technologies began a social revolution for the public sphere. However, these platforms have been exploited for the purposes of influence operations and disinformation campaigns to hinder or subvert national decision-making processes by affecting the policy makers, voters, or swaying general public opinion. Often this is achieved through manipulative means falling within a grey area of international and constitutional systems. Existing proposed normative frameworks for responsible state behaviour in Cyberspace have tended to focus on cyber operations. While online influence operations are recognised as a concern, they were not explicitly discussed in the frameworks, resulting in knowledge gaps related to countering influence operations and disinformation. There is a growing narrative that influence operations and disinformation campaigns are a cyber security issue and nations sometimes include legislation related to disinformation in cyber security. This indicates that existing cyber norms can be used to guide the development of norms for addressing disinformation and influence operations. This paper aims to propose a normative framework for state responsibility relating to influence operations emerging from thematic analysis of existing cyber norms and research on mitigating influence operations.
互联网提供了一个全球性的大众传播系统,特别是社交媒体技术开始了公共领域的社会革命。然而,这些平台被用于影响行动和虚假信息运动,通过影响决策者、选民或动摇公众舆论来阻碍或颠覆国家决策进程。这通常是通过属于国际和宪法制度灰色地带的操纵手段实现的。关于网络空间负责任国家行为的现有拟议规范框架往往侧重于网络行动。虽然在线影响行动被认为是一个令人关切的问题,但在框架中没有明确讨论这些问题,导致在打击影响行动和虚假信息方面存在知识空白。越来越多的人认为,影响行动和虚假信息运动是一个网络安全问题,各国有时会在网络安全中纳入与虚假信息有关的立法。这表明,现有的网络规范可用于指导制定处理虚假信息和影响行动的规范。本文旨在通过对现有网络规范的专题分析和对减轻影响行动的研究,提出与影响行动有关的国家责任规范框架。
{"title":"Towards Norms for State Responsibilities regarding Online Disinformation and Influence Operations","authors":"B. van Niekerk, Trishana Ramluckan","doi":"10.34190/eccws.22.1.1121","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1121","url":null,"abstract":"The Internet has provided a global mass communication system, and in particular social media technologies began a social revolution for the public sphere. However, these platforms have been exploited for the purposes of influence operations and disinformation campaigns to hinder or subvert national decision-making processes by affecting the policy makers, voters, or swaying general public opinion. Often this is achieved through manipulative means falling within a grey area of international and constitutional systems. Existing proposed normative frameworks for responsible state behaviour in Cyberspace have tended to focus on cyber operations. While online influence operations are recognised as a concern, they were not explicitly discussed in the frameworks, resulting in knowledge gaps related to countering influence operations and disinformation. There is a growing narrative that influence operations and disinformation campaigns are a cyber security issue and nations sometimes include legislation related to disinformation in cyber security. This indicates that existing cyber norms can be used to guide the development of norms for addressing disinformation and influence operations. This paper aims to propose a normative framework for state responsibility relating to influence operations emerging from thematic analysis of existing cyber norms and research on mitigating influence operations.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125773818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment 通过使用测试平台环境在工业环境中开发网络安全
Pub Date : 2023-06-19 DOI: 10.34190/eccws.22.1.1362
Jussi Simola, R. Savola, T. Frantti, Arttu Takala, Riku Lehkonen
Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and supply chain management in the industrial sector. Threats have changed into a combination of threat types. Hybrid threats may prevent everyday industrial activities, processes, and procedures so that supply chain problems may become long-lasting and affects business continuity management.The project CSG belongs to the (Cybersecurity governance of operational technology in the sector connected smart energy) research project consortium of Business Finland’s Digital Trust Programme. The first research paper regarding the CSG (Cyber Security Governance) project concentrates on the applied theory background of this project. The research provides a research approach for investigating cyber security at the operational and technical levels. It answers the questions of where to concentrate on OT-related cyber security research and how we aim to deploy a testbed to develop a governance model in the CSG project. The study's primary purpose is to describe the operating OT-SOC environment and analyze system requirements for optimizing situational awareness in the testbed environment.
关键基础设施保护需要一个测试环境,该环境允许测试不同类型的设备、软件、网络和工具,以开发关键工业环境的重要功能。使用的电气设备必须可靠、有能力并保持稳定的关键工业生态系统。工业企业需要开发网络安全能力,以检测和预防工业环境中的IT/ICT和OT/ICS威胁。新兴趋势是创建安全运营中心(SOC)服务来检测企业网络中与ics相关的威胁。能源供应部门必须包含安全业务连续性和工业部门供应链管理的关键要素。威胁已经变成了威胁类型的组合。混合威胁可能会阻止日常的工业活动、流程和程序,从而使供应链问题变得持久,并影响业务连续性管理。CSG项目属于芬兰商业数字信任计划的研究项目联盟(互联智能能源领域运营技术的网络安全治理)。第一篇关于CSG (Cyber Security Governance,网络安全治理)项目的研究论文主要介绍了该项目的应用理论背景。该研究为在操作和技术层面调查网络安全提供了一种研究方法。它回答了在哪里关注与iot相关的网络安全研究,以及我们如何在CSG项目中部署测试平台以开发治理模型等问题。该研究的主要目的是描述操作OT-SOC环境,并分析系统需求,以优化测试平台环境中的态势感知。
{"title":"Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment","authors":"Jussi Simola, R. Savola, T. Frantti, Arttu Takala, Riku Lehkonen","doi":"10.34190/eccws.22.1.1362","DOIUrl":"https://doi.org/10.34190/eccws.22.1.1362","url":null,"abstract":"Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and supply chain management in the industrial sector. Threats have changed into a combination of threat types. Hybrid threats may prevent everyday industrial activities, processes, and procedures so that supply chain problems may become long-lasting and affects business continuity management.\u0000The project CSG belongs to the (Cybersecurity governance of operational technology in the sector connected smart energy) research project consortium of Business Finland’s Digital Trust Programme. \u0000The first research paper regarding the CSG (Cyber Security Governance) project concentrates on the applied theory background of this project. The research provides a research approach for investigating cyber security at the operational and technical levels. It answers the questions of where to concentrate on OT-related cyber security research and how we aim to deploy a testbed to develop a governance model in the CSG project. The study's primary purpose is to describe the operating OT-SOC environment and analyze system requirements for optimizing situational awareness in the testbed environment.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125852295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Conference on Cyber Warfare and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1