首页 > 最新文献

International Journal of Hyperconnectivity and the Internet of Things最新文献

英文 中文
Certifications in Cybersecurity Workforce Development 网络安全劳动力发展认证
Pub Date : 2019-07-01 DOI: 10.4018/ijhiot.2019070104
Ping Wang, H. d'Cruze
The workforce demand for cybersecurity professionals has been substantial and fast growing. Qualified cybersecurity professionals with appropriate knowledge, skills, and abilities for various tasks and job roles are needed to perform the challenging work of defending the cyber space. The certified information systems security professional (CISSP) certification is a globally recognized premier cybersecurity credential and validation of qualifications. This case study analyzes the CISSP certification requirements, domains and objectives and attempts to map them to the cybersecurity industry competencies and the US national cybersecurity workforce framework (NCWF). This research is an extended study with full mapping of all CISSP domain areas to the knowledge, skills, and abilities in NCWF. The extended study aims to discover the in-depth value and role of reputable certifications such as CISSP in competency development for cybersecurity workforce. This article also discusses the value and implications of the CISSP certification on cybersecurity education and training.
对网络安全专业人员的劳动力需求一直在迅速增长。需要具备适当知识、技能和能力的合格网络安全专业人员来执行捍卫网络空间的挑战性工作。认证信息系统安全专家(CISSP)认证是全球公认的首要网络安全证书和资格验证。本案例分析了CISSP认证的要求、领域和目标,并试图将其映射到网络安全行业能力和美国国家网络安全劳动力框架(NCWF)。本研究是一项扩展研究,将所有CISSP领域全面映射到NCWF的知识、技能和能力。该扩展研究旨在深入发现诸如CISSP等知名认证在网络安全劳动力能力发展中的价值和作用。本文还讨论了CISSP认证对网络安全教育培训的价值和意义。
{"title":"Certifications in Cybersecurity Workforce Development","authors":"Ping Wang, H. d'Cruze","doi":"10.4018/ijhiot.2019070104","DOIUrl":"https://doi.org/10.4018/ijhiot.2019070104","url":null,"abstract":"The workforce demand for cybersecurity professionals has been substantial and fast growing. Qualified cybersecurity professionals with appropriate knowledge, skills, and abilities for various tasks and job roles are needed to perform the challenging work of defending the cyber space. The certified information systems security professional (CISSP) certification is a globally recognized premier cybersecurity credential and validation of qualifications. This case study analyzes the CISSP certification requirements, domains and objectives and attempts to map them to the cybersecurity industry competencies and the US national cybersecurity workforce framework (NCWF). This research is an extended study with full mapping of all CISSP domain areas to the knowledge, skills, and abilities in NCWF. The extended study aims to discover the in-depth value and role of reputable certifications such as CISSP in competency development for cybersecurity workforce. This article also discusses the value and implications of the CISSP certification on cybersecurity education and training.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122177902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Why SQL Injection Attacks Are Still Plaguing Databases 为什么SQL注入攻击仍然困扰着数据库
Pub Date : 2019-07-01 DOI: 10.4018/ijhiot.2019070102
Akvile Kiskis
This article describes how SQL injection has been a long-standing problem in database security. It is understandable why injection is considered number one because of the sheer number of web applications that exist currently. An injection attack can allow an attacker to gain complete access of a database which oftentimes contains sensitive information. This results in a loss of confidential information which places consumers at a huge risk.
本文描述了SQL注入如何成为数据库安全中一个长期存在的问题。注入被认为是第一位的原因是可以理解的,因为目前存在大量的web应用程序。注入攻击可以让攻击者获得数据库的完全访问权,而数据库通常包含敏感信息。这将导致机密信息的丢失,从而使消费者面临巨大的风险。
{"title":"Why SQL Injection Attacks Are Still Plaguing Databases","authors":"Akvile Kiskis","doi":"10.4018/ijhiot.2019070102","DOIUrl":"https://doi.org/10.4018/ijhiot.2019070102","url":null,"abstract":"This article describes how SQL injection has been a long-standing problem in database security. It is understandable why injection is considered number one because of the sheer number of web applications that exist currently. An injection attack can allow an attacker to gain complete access of a database which oftentimes contains sensitive information. This results in a loss of confidential information which places consumers at a huge risk.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122470689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Flexible and Centralized Approach for Access Control in Heterogeneous IoT Environment 异构物联网环境下灵活集中的访问控制方法
Pub Date : 2019-01-01 DOI: 10.4018/IJHIOT.2019010102
Jean-Noel Colin, Laurent Evrard
In this article, the researchers introduce a 3-level model for security access control that comes as an extension to ABAC. This extension augments its structural and hierarchical expressiveness allowing to define arbitrarily complex access control rules. The authors apply this model to IoT platforms and show how it fulfils security access control requirements of these platforms. Finally, a reference architecture is introduced for access control applied to connected objects and its implementation details are presented.
在本文中,研究人员介绍了一个作为ABAC扩展的3级安全访问控制模型。这个扩展增强了它的结构和层次表现力,允许定义任意复杂的访问控制规则。作者将该模型应用于物联网平台,并展示了它如何满足这些平台的安全访问控制需求。最后,介绍了一种用于连接对象访问控制的参考体系结构,并给出了其实现细节。
{"title":"A Flexible and Centralized Approach for Access Control in Heterogeneous IoT Environment","authors":"Jean-Noel Colin, Laurent Evrard","doi":"10.4018/IJHIOT.2019010102","DOIUrl":"https://doi.org/10.4018/IJHIOT.2019010102","url":null,"abstract":"In this article, the researchers introduce a 3-level model for security access control that comes as an extension to ABAC. This extension augments its structural and hierarchical expressiveness allowing to define arbitrarily complex access control rules. The authors apply this model to IoT platforms and show how it fulfils security access control requirements of these platforms. Finally, a reference architecture is introduced for access control applied to connected objects and its implementation details are presented.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133656976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey of IPv6 Addressing Schemes for Internet of Things 物联网IPv6寻址方案综述
Pub Date : 2018-07-01 DOI: 10.4018/IJHIOT.2018070104
Gyanendra Kumar, Parul Tomar
As IPv4 addresses are already exhausted before the beginning of Internet of Thing (IoT), IPv6 is widely used to assign unique identity to IoT nodes. In this article, the analysis of different components required in assigning IPv6 addresses to IoT nodes, a survey of IPv6 address assignment schemes and an examination of the different kinds of IPv6 addresses are presented. This article highlights the architectural complexity of IoT technologies, protocol stacks, limitations of IoT nodes, renumbering, multihoming, the merging of IoT network and other challenges towards assigning of IPv6 address to IoT nodes. A comprehensive survey on recent addressing schemes with classification based on allocation tables and spatial information are presented. This survey describes the address allocation mechanism, performance on different metrics, the area of applicability, and the merits and demerits of different addressing schemes. It also describes the future research options addressing IoT.
由于IPv4地址在物联网开始之前就已经耗尽,因此IPv6被广泛用于为物联网节点分配唯一的身份。在本文中,分析了为物联网节点分配IPv6地址所需的不同组件,对IPv6地址分配方案进行了调查,并对不同类型的IPv6地址进行了检查。本文重点介绍了物联网技术的架构复杂性、协议栈、物联网节点的局限性、重新编号、多宿主、物联网网络的合并以及为物联网节点分配IPv6地址的其他挑战。对近年来基于分配表和空间信息分类的寻址方案进行了综述。本调查描述了地址分配机制、不同指标的性能、适用范围以及不同寻址方案的优缺点。它还描述了未来针对物联网的研究选择。
{"title":"A Survey of IPv6 Addressing Schemes for Internet of Things","authors":"Gyanendra Kumar, Parul Tomar","doi":"10.4018/IJHIOT.2018070104","DOIUrl":"https://doi.org/10.4018/IJHIOT.2018070104","url":null,"abstract":"As IPv4 addresses are already exhausted before the beginning of Internet of Thing (IoT), IPv6 is widely used to assign unique identity to IoT nodes. In this article, the analysis of different components required in assigning IPv6 addresses to IoT nodes, a survey of IPv6 address assignment schemes and an examination of the different kinds of IPv6 addresses are presented. This article highlights the architectural complexity of IoT technologies, protocol stacks, limitations of IoT nodes, renumbering, multihoming, the merging of IoT network and other challenges towards assigning of IPv6 address to IoT nodes. A comprehensive survey on recent addressing schemes with classification based on allocation tables and spatial information are presented. This survey describes the address allocation mechanism, performance on different metrics, the area of applicability, and the merits and demerits of different addressing schemes. It also describes the future research options addressing IoT.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116770414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Systematic Exploration on Challenges and Limitations in Middleware Programming for IoT Technology 面向物联网技术的中间件编程的挑战与限制的系统探索
Pub Date : 2018-07-01 DOI: 10.4018/IJHIOT.2018070101
P. Taveras
In a distributed environment, such as IoT, the requirement for constant sensing and actuating from a diverse source of devices increases the complexity and therefore, the operational cost of the software required to keep the system running. The article covers the conceptual and technological aspects, together with a series of previous experiences, findings, and literature that constitute the essence of the body of knowledge related to the issues and challenges for developing a middleware that supports the IoT domain's independent functionality. The article provides the foundation to understand the challenges faced in the development of IoT middleware, focusing on five sensitizing elements, namely, IoT evolution, architecture, security, middleware, and programming. The systematic exploration on limitations for IoT software development revealed the need for programming methods and language abstractions to cope with the demands of IoT scenarios, specifically to deal with the challenges of massive communications, limited infrastructure, and multiplicity of devices.
在物联网等分布式环境中,对来自不同设备来源的持续传感和驱动的需求增加了复杂性,因此,保持系统运行所需的软件的运营成本也随之增加。本文涵盖了概念和技术方面,以及一系列以前的经验、发现和文献,构成了与开发支持物联网领域独立功能的中间件相关的问题和挑战的知识体系的本质。本文为理解物联网中间件开发面临的挑战提供了基础,重点介绍了五个敏感要素,即物联网演进、架构、安全、中间件和编程。对物联网软件开发局限性的系统探索揭示了需要编程方法和语言抽象来应对物联网场景的需求,特别是应对大规模通信、有限基础设施和设备多样性的挑战。
{"title":"A Systematic Exploration on Challenges and Limitations in Middleware Programming for IoT Technology","authors":"P. Taveras","doi":"10.4018/IJHIOT.2018070101","DOIUrl":"https://doi.org/10.4018/IJHIOT.2018070101","url":null,"abstract":"In a distributed environment, such as IoT, the requirement for constant sensing and actuating from a diverse source of devices increases the complexity and therefore, the operational cost of the software required to keep the system running. The article covers the conceptual and technological aspects, together with a series of previous experiences, findings, and literature that constitute the essence of the body of knowledge related to the issues and challenges for developing a middleware that supports the IoT domain's independent functionality. The article provides the foundation to understand the challenges faced in the development of IoT middleware, focusing on five sensitizing elements, namely, IoT evolution, architecture, security, middleware, and programming. The systematic exploration on limitations for IoT software development revealed the need for programming methods and language abstractions to cope with the demands of IoT scenarios, specifically to deal with the challenges of massive communications, limited infrastructure, and multiplicity of devices.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128978679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Effects of the FCC Net Neutrality Repeal on Security and Privacy 废除FCC网络中立性对安全和隐私的影响
Pub Date : 2018-07-01 DOI: 10.4018/IJHIOT.2018070102
Van Nguyen, Derek Mohammed, Marwan Omar, Mubarak Banisakher
The repeal of net neutrality has caused a great public outcry from academic down to the end-users. Net neutrality was an FCC order that specified the principles for Internet Service Providers. The most prevalent principles were related to bandwidth throttling, preferential treatments, and privacy. Some described the action of the FCC will lead to the end of the Internet and consumer privacy. There have been many articles discussing about the fallout of the ruling, but it is difficult filtering fact from fiction. In this article, the authors discuss the nature of net neutrality, the history, the arguments for and against, and the roles of the FCC and their many orders. They also layout the implication of repeal on security and privacy. They present a few scenarios specifying what an ISP can do and cannot do. Finally, the authors specify what laws the consumers have left for their privacy.
网络中立性的废除引起了从学术界到最终用户的强烈抗议。网络中立是联邦通信委员会的一项命令,规定了互联网服务提供商的原则。最普遍的原则与带宽限制、优惠待遇和隐私有关。一些人认为联邦通信委员会的行动将导致互联网和消费者隐私的终结。有很多文章讨论了判决的后果,但很难从虚构中过滤事实。在这篇文章中,作者讨论了网络中立性的本质,历史,支持和反对的争论,以及FCC的角色和他们的许多命令。他们还阐述了废除该法案对安全和隐私的影响。它们提供了一些场景,指定ISP可以做什么和不能做什么。最后,作者详细说明了消费者为他们的隐私保留了哪些法律。
{"title":"The Effects of the FCC Net Neutrality Repeal on Security and Privacy","authors":"Van Nguyen, Derek Mohammed, Marwan Omar, Mubarak Banisakher","doi":"10.4018/IJHIOT.2018070102","DOIUrl":"https://doi.org/10.4018/IJHIOT.2018070102","url":null,"abstract":"The repeal of net neutrality has caused a great public outcry from academic down to the end-users. Net neutrality was an FCC order that specified the principles for Internet Service Providers. The most prevalent principles were related to bandwidth throttling, preferential treatments, and privacy. Some described the action of the FCC will lead to the end of the Internet and consumer privacy. There have been many articles discussing about the fallout of the ruling, but it is difficult filtering fact from fiction. In this article, the authors discuss the nature of net neutrality, the history, the arguments for and against, and the roles of the FCC and their many orders. They also layout the implication of repeal on security and privacy. They present a few scenarios specifying what an ISP can do and cannot do. Finally, the authors specify what laws the consumers have left for their privacy.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125772145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Disrupting the U.S. National Security Through Financial Cybercrimes 通过金融网络犯罪破坏美国国家安全
Pub Date : 1900-01-01 DOI: 10.4018/IJHIOT.2019010101
C. Nobles
The U.S. financial sector is the bedrock of the economic health and strategic advancement. As a critical infrastructure, the financial sector continuously faces cyber-attacks and other nefarious activity. The financial sector is undergoing a technological explosion and forcing banks and financial institutions to implement cutting edge technologies. Even though technological breakthroughs are yielding competitive advantages; consequently, the same technologies are more prone to cyber-attacks stemming from technologically-induced vulnerabilities. The integrative and hyperconnected state of the financial industry and the domestic and global financial ecosystems are highly centralized and vulnerable to sophisticated cybersecurity threats, human factors, social engineering, credit card fraud, and online banking schemes. Any attempts to degrade, disrupt, or deny vital services and transactions in the financial industry could be conceived as an infringement and blockade of the U.S. global powers.
美国金融业是经济健康发展和战略进步的基石。作为关键的基础设施,金融部门不断面临网络攻击和其他恶意活动。金融部门正在经历一场技术爆炸,迫使银行和金融机构采用尖端技术。尽管技术突破正在产生竞争优势;因此,同样的技术更容易受到源于技术诱发漏洞的网络攻击。金融业与国内和全球金融生态系统的融合和超连接状态高度集中,容易受到复杂的网络安全威胁、人为因素、社会工程、信用卡欺诈和网上银行计划的影响。任何降低、破坏或拒绝金融行业重要服务和交易的企图都可能被视为对美国全球权力的侵犯和封锁。
{"title":"Disrupting the U.S. National Security Through Financial Cybercrimes","authors":"C. Nobles","doi":"10.4018/IJHIOT.2019010101","DOIUrl":"https://doi.org/10.4018/IJHIOT.2019010101","url":null,"abstract":"The U.S. financial sector is the bedrock of the economic health and strategic advancement. As a critical infrastructure, the financial sector continuously faces cyber-attacks and other nefarious activity. The financial sector is undergoing a technological explosion and forcing banks and financial institutions to implement cutting edge technologies. Even though technological breakthroughs are yielding competitive advantages; consequently, the same technologies are more prone to cyber-attacks stemming from technologically-induced vulnerabilities. The integrative and hyperconnected state of the financial industry and the domestic and global financial ecosystems are highly centralized and vulnerable to sophisticated cybersecurity threats, human factors, social engineering, credit card fraud, and online banking schemes. Any attempts to degrade, disrupt, or deny vital services and transactions in the financial industry could be conceived as an infringement and blockade of the U.S. global powers.","PeriodicalId":262783,"journal":{"name":"International Journal of Hyperconnectivity and the Internet of Things","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128635504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
International Journal of Hyperconnectivity and the Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1