首页 > 最新文献

2008 Third International Annual Workshop on Digital Forensics and Incident Analysis最新文献

英文 中文
An Investigation into the Development of an Anti-forensic Tool to Obscure USB Flash Drive Device Information on a Windows XP Platform Windows XP平台上USB设备信息反取证模糊工具的开发研究
P. Thomas, Alun Morris
When a USB flash drive is plugged into a Windows XP computer, a number of registry settings and log files are automatically updated that reflect the use of the USB flash drive. This information is often important in criminal proceedings where the use of a USB flash drive can be shown to have copied data to and from the computer. The aim of this work was to evaluate the information that can identify USB flash drive usage on a Windows XP computer and to understand how that information could be used by a computer forensics investigator. A tool was produced to perform a function that allowed the amendment of the information concerned with USB flash device usage. This amendment of data will be intentional and deliberate and can therefore be defined as being an anti forensics tool.
当USB闪存驱动器插入Windows XP计算机时,许多注册表设置和日志文件会自动更新,以反映USB闪存驱动器的使用情况。在刑事诉讼中,这些信息通常很重要,因为使用USB闪存驱动器可以证明将数据复制到计算机或从计算机复制数据。这项工作的目的是评估可以识别Windows XP计算机上USB闪存驱动器使用情况的信息,并了解计算机取证调查员如何使用这些信息。制作了一种工具来执行允许修改与USB闪存设备使用有关的信息的功能。这种数据的修改将是有意和深思熟虑的,因此可以被定义为一种反取证工具。
{"title":"An Investigation into the Development of an Anti-forensic Tool to Obscure USB Flash Drive Device Information on a Windows XP Platform","authors":"P. Thomas, Alun Morris","doi":"10.1109/WDFIA.2008.13","DOIUrl":"https://doi.org/10.1109/WDFIA.2008.13","url":null,"abstract":"When a USB flash drive is plugged into a Windows XP computer, a number of registry settings and log files are automatically updated that reflect the use of the USB flash drive. This information is often important in criminal proceedings where the use of a USB flash drive can be shown to have copied data to and from the computer. The aim of this work was to evaluate the information that can identify USB flash drive usage on a Windows XP computer and to understand how that information could be used by a computer forensics investigator. A tool was produced to perform a function that allowed the amendment of the information concerned with USB flash device usage. This amendment of data will be intentional and deliberate and can therefore be defined as being an anti forensics tool.","PeriodicalId":259636,"journal":{"name":"2008 Third International Annual Workshop on Digital Forensics and Incident Analysis","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Global Positioning Systems: Analysis Principles and Sources of Evidence in User Devices 全球定位系统:用户设备中的分析原则和证据来源
D. Jones, I. Sutherland, T. Tryfonas
The growing popularity of Global Positioning Systems and other location-based telecommunications service provision provide a further potential source of data for the forensic investigator. Network- or device located information may have evidential value in supporting a case by providing details or proof of visited locations, navigation through particular routes,or communications with third parties. In this paper we focus on the examination of the end users portable device and we highlight the nature and locations where potential evidence may be left behind.
全球定位系统和其他基于位置的电信服务的日益普及为法医调查员提供了进一步的潜在数据来源。网络或设备定位信息可以通过提供访问位置的详细信息或证据,通过特定路线导航或与第三方通信,在支持案件方面具有证据价值。在本文中,我们着重于检查终端用户的便携式设备,并强调了可能留下潜在证据的性质和位置。
{"title":"Global Positioning Systems: Analysis Principles and Sources of Evidence in User Devices","authors":"D. Jones, I. Sutherland, T. Tryfonas","doi":"10.1109/WDFIA.2008.12","DOIUrl":"https://doi.org/10.1109/WDFIA.2008.12","url":null,"abstract":"The growing popularity of Global Positioning Systems and other location-based telecommunications service provision provide a further potential source of data for the forensic investigator. Network- or device located information may have evidential value in supporting a case by providing details or proof of visited locations, navigation through particular routes,or communications with third parties. In this paper we focus on the examination of the end users portable device and we highlight the nature and locations where potential evidence may be left behind.","PeriodicalId":259636,"journal":{"name":"2008 Third International Annual Workshop on Digital Forensics and Incident Analysis","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128131657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Forensic Value of Backscatter from Email Spam 垃圾邮件反向散射的法医学价值
C. Fuhrman
Email backscatter is a side effect of email spam, viruses or worms. When a spam or malware-laden email is sent, it nearly always has a forged sender address. If this email fails to reach its recipient, e.g., because the recipientpsilas mailbox is full or the recipient has set up an out-of-the-office auto-responder, the recipientpsilas mail system may attempt to generate and send an automated message replying to the forged sender. This unsolicited message sent to the forged sender is an email backscatter. On massive email spam runs where the same address (or domain) is forged as the sender, there can be significant amounts of backscatter email to the forged address. We consider potential forensic value in the analysis of email backscatter, for example, the times when certain compromised machines were used to send spams. We present results of an analysis performed with our Backscatter Email Analysis Tool (BEAT) of a massive backscatter incident that occurred in mid April, 2008.
电子邮件反向散射是垃圾邮件、病毒或蠕虫的副作用。当发送垃圾邮件或恶意软件的电子邮件时,它几乎总是有一个伪造的发件人地址。如果此电子邮件未能到达其收件人,例如,因为收件人的邮箱已满或收件人设置了不在办公室的自动应答器,收件人的邮件系统可能会尝试生成并发送自动消息回复伪造的发件人。此发送给伪造发件人的未经请求的消息是电子邮件反向散射。在大量的垃圾邮件中,伪造了与发件人相同的地址(或域名),可能会有大量的反向散射电子邮件发送到伪造的地址。我们考虑了电子邮件反向散射分析的潜在法医价值,例如,某些受感染的机器被用来发送垃圾邮件的时间。本文介绍了我们的反向散射电子邮件分析工具(BEAT)对2008年4月中旬发生的大规模反向散射事件的分析结果。
{"title":"Forensic Value of Backscatter from Email Spam","authors":"C. Fuhrman","doi":"10.1109/WDFIA.2008.10","DOIUrl":"https://doi.org/10.1109/WDFIA.2008.10","url":null,"abstract":"Email backscatter is a side effect of email spam, viruses or worms. When a spam or malware-laden email is sent, it nearly always has a forged sender address. If this email fails to reach its recipient, e.g., because the recipientpsilas mailbox is full or the recipient has set up an out-of-the-office auto-responder, the recipientpsilas mail system may attempt to generate and send an automated message replying to the forged sender. This unsolicited message sent to the forged sender is an email backscatter. On massive email spam runs where the same address (or domain) is forged as the sender, there can be significant amounts of backscatter email to the forged address. We consider potential forensic value in the analysis of email backscatter, for example, the times when certain compromised machines were used to send spams. We present results of an analysis performed with our Backscatter Email Analysis Tool (BEAT) of a massive backscatter incident that occurred in mid April, 2008.","PeriodicalId":259636,"journal":{"name":"2008 Third International Annual Workshop on Digital Forensics and Incident Analysis","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124136992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Malicious Hosts Detection through Truth Powered Approach 基于真相驱动方法的恶意主机检测
M. Chihoub
The widespread adoption of mobile agents as a best appropriate mean for supporting distributed computing is facing the major problem of security. The subtle issue of malicious hosts is by far the most difficult facet of this concern. Many various solutions had been reported in the area of mobile agentspsila trustworthiness, varying from tamper free hardware to pure software protocols. Nonetheless, none is fully satisfactory. This paper addresses the issues of mobile agentspsila trustworthiness in a new basis. In fact, our approach uses a mediation procedure, resorting at last to a mechanism enforcing the truth where the malicious character of a host is unambiguously reported. The core ideas of our approach are new. However, the principles driving them were around for years, since the era of distributed systems investigations. This paper will develop the issues raised by our approach.
移动代理作为支持分布式计算的一种最合适的手段,其广泛采用面临着主要的安全问题。恶意主机的微妙问题是迄今为止最棘手的问题。在移动代理领域已经报道了许多不同的解决方案,从无篡改的硬件到纯软件协议。然而,没有一个是完全令人满意的。本文在新的基础上讨论了移动代理的可靠性问题。事实上,我们的方法使用了一个中介过程,最终诉诸于一种机制,在明确报告主机的恶意特性时强制执行真相。我们的方法的核心思想是新的。然而,自分布式系统调查时代以来,驱动它们的原则已经存在了很多年。本文将阐述我们的方法所提出的问题。
{"title":"Malicious Hosts Detection through Truth Powered Approach","authors":"M. Chihoub","doi":"10.1109/WDFIA.2008.6","DOIUrl":"https://doi.org/10.1109/WDFIA.2008.6","url":null,"abstract":"The widespread adoption of mobile agents as a best appropriate mean for supporting distributed computing is facing the major problem of security. The subtle issue of malicious hosts is by far the most difficult facet of this concern. Many various solutions had been reported in the area of mobile agentspsila trustworthiness, varying from tamper free hardware to pure software protocols. Nonetheless, none is fully satisfactory. This paper addresses the issues of mobile agentspsila trustworthiness in a new basis. In fact, our approach uses a mediation procedure, resorting at last to a mechanism enforcing the truth where the malicious character of a host is unambiguously reported. The core ideas of our approach are new. However, the principles driving them were around for years, since the era of distributed systems investigations. This paper will develop the issues raised by our approach.","PeriodicalId":259636,"journal":{"name":"2008 Third International Annual Workshop on Digital Forensics and Incident Analysis","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Determining Culpability in Investigations of Malicious E-mail Dissemination within the Organisation 在机构内调查恶意电子邮件传播的罪责确定
J. Haggerty, M. Taylor, D. Gresty
Investigating cases of e-mail misuse within an organization (e.g. sexist / racist content, offensive material, etc.) to determine culpability can be a complex process. Such investigations are less likely to result in a formal prosecution, but are more likely to end in disciplinary action. In a criminal investigation, the evidence is collected, analyzed and then presented to the court. In an internal corporate forensics investigation, management must not only assess evidence to determine culpability, but must also determine appropriate levels of corporate discipline to be applied. These range from informal verbal warnings through formal verbal and written warnings, to suspension or termination of employment. Such a process may often be conducted by management who have no experience of the investigatory process. The social network analysis approach presented in this paper can be used not only to analyze and appreciate what can be a complex sequence of events involved in e-mail misuse, but also to determine levels of culpability.
调查组织内部滥用电子邮件的案例(例如性别歧视/种族主义内容,攻击性材料等)以确定罪责可能是一个复杂的过程。这样的调查不太可能导致正式起诉,但更有可能以纪律处分告终。在刑事调查中,证据被收集、分析,然后呈交给法庭。在企业内部取证调查中,管理层不仅必须评估证据以确定罪责,还必须确定要应用的适当的企业纪律水平。这些措施的范围从非正式的口头警告到正式的口头和书面警告,到暂停或终止雇佣关系。这种程序通常由没有调查程序经验的管理人员进行。本文中提出的社会网络分析方法不仅可以用于分析和理解涉及电子邮件滥用的复杂事件序列,还可以用于确定罪责水平。
{"title":"Determining Culpability in Investigations of Malicious E-mail Dissemination within the Organisation","authors":"J. Haggerty, M. Taylor, D. Gresty","doi":"10.1109/WDFIA.2008.8","DOIUrl":"https://doi.org/10.1109/WDFIA.2008.8","url":null,"abstract":"Investigating cases of e-mail misuse within an organization (e.g. sexist / racist content, offensive material, etc.) to determine culpability can be a complex process. Such investigations are less likely to result in a formal prosecution, but are more likely to end in disciplinary action. In a criminal investigation, the evidence is collected, analyzed and then presented to the court. In an internal corporate forensics investigation, management must not only assess evidence to determine culpability, but must also determine appropriate levels of corporate discipline to be applied. These range from informal verbal warnings through formal verbal and written warnings, to suspension or termination of employment. Such a process may often be conducted by management who have no experience of the investigatory process. The social network analysis approach presented in this paper can be used not only to analyze and appreciate what can be a complex sequence of events involved in e-mail misuse, but also to determine levels of culpability.","PeriodicalId":259636,"journal":{"name":"2008 Third International Annual Workshop on Digital Forensics and Incident Analysis","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127731514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detecting and Manipulating Compressed Alternate Data Streams in a Forensics Investigation 在取证调查中检测和操纵压缩交替数据流
Adamantini Martini, Alexandros Zaharis, C. Ilioudis
Data hiding technique through alternate data streams in compressed form is poorly documented and less known among forensic experts. This paper deals with the documentation of compressed ADS and their attributes concerning hiding information, provides a simple technique of creating compressed ADS and using it in a malicious manner. Finally a method is presented in order to detect and manipulate ADS in a proper way, complying with the computer forensic techniques.
通过压缩形式的替代数据流来隐藏数据的技术文档很少,在法医专家中也不太了解。本文讨论了压缩ADS的文档及其隐藏信息的属性,提供了一种创建压缩ADS并恶意使用的简单技术。最后提出了一种符合计算机取证技术的ADS检测和操纵方法。
{"title":"Detecting and Manipulating Compressed Alternate Data Streams in a Forensics Investigation","authors":"Adamantini Martini, Alexandros Zaharis, C. Ilioudis","doi":"10.1109/WDFIA.2008.9","DOIUrl":"https://doi.org/10.1109/WDFIA.2008.9","url":null,"abstract":"Data hiding technique through alternate data streams in compressed form is poorly documented and less known among forensic experts. This paper deals with the documentation of compressed ADS and their attributes concerning hiding information, provides a simple technique of creating compressed ADS and using it in a malicious manner. Finally a method is presented in order to detect and manipulate ADS in a proper way, complying with the computer forensic techniques.","PeriodicalId":259636,"journal":{"name":"2008 Third International Annual Workshop on Digital Forensics and Incident Analysis","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115674812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Two-Dimensional Evidence Reliability Amplification Process Model for Digital Forensics 数字取证二维证据可靠性放大过程模型
M. Khatir, S.M. Hejazi, E. Sneiders
Being related to law and state-of-the-art technology, digital forensics needs more discipline than traditional forensics. The variety of types of crimes, distribution of networks and complexity of information and communication technology, add to the complexity of the process of digital investigations. A rigorous and flexible process model is needed to overcome challenges and obstacles in this area. In this paper we propose a digital forensics process, called "two-dimensional evidence reliability amplification process model", which presents a detailed digital forensic process model in five main phases and different roles to perform it. At the same time, this iterative process addresses four essential tasks as the umbrella activities that are applicable across all phases and sub-phases. We have also developed a hypothetical solution based on intersection of events and exploit mathematical operations and symbols for making an algorithm to increase the reliability of evidence. This process model is detailed enough to describe the investigation process so that it could possibly provide a guideline that investigators can take advantage of it during a forensics investigation process.
与法律和最先进的技术相关,数字取证比传统取证需要更多的纪律。犯罪类型的多样性、网络的分布以及信息和通信技术的复杂性增加了数字调查过程的复杂性。需要一个严格而灵活的流程模型来克服这一领域的挑战和障碍。本文提出了一个数字取证过程,称为“二维证据可靠性放大过程模型”,该模型详细地描述了数字取证过程的五个主要阶段及其在其中扮演的不同角色。同时,这个迭代过程处理了四个基本任务,作为适用于所有阶段和子阶段的伞形活动。我们还开发了一个基于事件交集的假设解决方案,并利用数学运算和符号来制作算法,以提高证据的可靠性。这个过程模型足够详细,可以描述调查过程,因此它可能提供一个指导方针,调查人员可以在取证调查过程中利用它。
{"title":"Two-Dimensional Evidence Reliability Amplification Process Model for Digital Forensics","authors":"M. Khatir, S.M. Hejazi, E. Sneiders","doi":"10.1109/WDFIA.2008.11","DOIUrl":"https://doi.org/10.1109/WDFIA.2008.11","url":null,"abstract":"Being related to law and state-of-the-art technology, digital forensics needs more discipline than traditional forensics. The variety of types of crimes, distribution of networks and complexity of information and communication technology, add to the complexity of the process of digital investigations. A rigorous and flexible process model is needed to overcome challenges and obstacles in this area. In this paper we propose a digital forensics process, called \"two-dimensional evidence reliability amplification process model\", which presents a detailed digital forensic process model in five main phases and different roles to perform it. At the same time, this iterative process addresses four essential tasks as the umbrella activities that are applicable across all phases and sub-phases. We have also developed a hypothetical solution based on intersection of events and exploit mathematical operations and symbols for making an algorithm to increase the reliability of evidence. This process model is detailed enough to describe the investigation process so that it could possibly provide a guideline that investigators can take advantage of it during a forensics investigation process.","PeriodicalId":259636,"journal":{"name":"2008 Third International Annual Workshop on Digital Forensics and Incident Analysis","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121465805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Cyber-Crime Investigations: Complex Collaborative Decision Making 网络犯罪调查:复杂的协同决策
Peter M. Bednar, Vasilios Katos, C. Hennell, Peter M. Bednar
This paper reports on the challenges computer forensic investigators face in relation to collaborative decision making, communication and coordination.The opportunities, operational environment and modus operandi of a cyber criminal are considered and used to develop the requirements in terms of both skill sets and procedural support a forensics investigator should have in order to respond to the respective threat vectors. As such, we show how a published framework for systemic thinking can be fit for purpose for supporting the collaborative enquiry and decision-making process.
本文报道了计算机取证人员在协同决策、沟通和协调方面所面临的挑战。考虑并利用网络犯罪的机会、操作环境和操作方式来制定取证调查员应具备的技能组合和程序支持要求,以应对各自的威胁载体。因此,我们展示了一个已发布的系统思考框架如何适合支持协作调查和决策过程的目的。
{"title":"Cyber-Crime Investigations: Complex Collaborative Decision Making","authors":"Peter M. Bednar, Vasilios Katos, C. Hennell, Peter M. Bednar","doi":"10.1109/WDFIA.2008.7","DOIUrl":"https://doi.org/10.1109/WDFIA.2008.7","url":null,"abstract":"This paper reports on the challenges computer forensic investigators face in relation to collaborative decision making, communication and coordination.The opportunities, operational environment and modus operandi of a cyber criminal are considered and used to develop the requirements in terms of both skill sets and procedural support a forensics investigator should have in order to respond to the respective threat vectors. As such, we show how a published framework for systemic thinking can be fit for purpose for supporting the collaborative enquiry and decision-making process.","PeriodicalId":259636,"journal":{"name":"2008 Third International Annual Workshop on Digital Forensics and Incident Analysis","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123404979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2008 Third International Annual Workshop on Digital Forensics and Incident Analysis
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1