首页 > 最新文献

2018 National Cyber Summit (NCS)最新文献

英文 中文
Design and Development of Smart TV Protector 智能电视保护器的设计与开发
Pub Date : 2018-06-05 DOI: 10.1109/NCS.2018.00012
D. Privitera, H. Shahriar
Televisions have become "smart" with the addition of computers into their designs. Smart TVs represent a recent risk to the digital cybersecurity ecosystem. Higher-end smart TV models generally sell for more than $1000. Some smart TV's sell for more than $10000. Research has shown that these relatively expensive devices have little to no effective protection against malware leaving them at risk of total loss. This situation creates the need for an apparatus that could conceivably provide a reasonable level of protection from malware at a marginal cost relative to the cost of a high-end Smart TV. This paper presents several concepts for such an apparatus and postulates a recommended approach to secure users against malware attacks on Smart TVs.
随着电脑的加入,电视变得“智能”了。智能电视最近给数字网络安全生态系统带来了风险。高端智能电视的售价通常在1000美元以上。一些智能电视的售价超过1万美元。研究表明,这些相对昂贵的设备几乎没有针对恶意软件的有效保护,使它们面临完全丢失的风险。这种情况产生了对一种设备的需求,这种设备可以以相对于高端智能电视的边际成本提供合理水平的恶意软件保护。本文提出了这种设备的几个概念,并假设了一种推荐的方法来保护用户免受智能电视上的恶意软件攻击。
{"title":"Design and Development of Smart TV Protector","authors":"D. Privitera, H. Shahriar","doi":"10.1109/NCS.2018.00012","DOIUrl":"https://doi.org/10.1109/NCS.2018.00012","url":null,"abstract":"Televisions have become \"smart\" with the addition of computers into their designs. Smart TVs represent a recent risk to the digital cybersecurity ecosystem. Higher-end smart TV models generally sell for more than $1000. Some smart TV's sell for more than $10000. Research has shown that these relatively expensive devices have little to no effective protection against malware leaving them at risk of total loss. This situation creates the need for an apparatus that could conceivably provide a reasonable level of protection from malware at a marginal cost relative to the cost of a high-end Smart TV. This paper presents several concepts for such an apparatus and postulates a recommended approach to secure users against malware attacks on Smart TVs.","PeriodicalId":283240,"journal":{"name":"2018 National Cyber Summit (NCS)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121034349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Playbook Oriented Cyber Response 以剧本为导向的网络反应
Pub Date : 2018-06-01 DOI: 10.1109/NCS.2018.00007
A. Applebaum, Shawn Johnson, Michael Limiero, Michael Smith
Cyber analysts tend to respond to anomalous events manually, often using subjective judgment that can lead to responses that are less than optimal. Additionally, analysts tend to report on events and share cyber knowledge in unstructured, textual formats, which not only require more time to parse – thus taking more time to respond – but also lead to multiple conclusions from the same input. To remedy this, we have proposed a framework designed to provide an analyst with a set of timely and accurate courses of action in response to events, in some cases automating those responses. As part of this framework, we have created a playbook specification format that allows analysts to specify the right course of action to take in response to events, given certain risk conditions and mission context. In addition to providing the specification format, we have also created an initial ontology to help analysts build their playbook contents and have laid out a notional architecture that can operationalize these playbooks. Our playbook format can help standardize how analysts should respond to events, thus decreasing the time to response and enabling analysts to share key knowledge in a common format. Ultimately, this should increase the efficacy of security operations center personnel.
网络分析师倾向于手动响应异常事件,通常使用主观判断,这可能导致不太理想的响应。此外,分析人员倾向于以非结构化的文本格式报告事件和分享网络知识,这不仅需要更多的时间来分析——因此需要更多的时间来回应——而且还会从相同的输入中得出多个结论。为了解决这个问题,我们提出了一个框架,旨在为分析师提供一组及时和准确的行动方案,以响应事件,在某些情况下自动化这些响应。作为这个框架的一部分,我们已经创建了一个剧本规范格式,它允许分析人员在给定特定的风险条件和任务上下文的情况下,指定响应事件所采取的正确行动。除了提供规范格式之外,我们还创建了一个初始本体,以帮助分析人员构建他们的剧本内容,并制定了一个可以对这些剧本进行操作的概念体系结构。我们的剧本格式可以帮助标准化分析人员应该如何响应事件,从而减少响应时间,并使分析人员能够以公共格式共享关键知识。最终,这将提高安全运营中心人员的效率。
{"title":"Playbook Oriented Cyber Response","authors":"A. Applebaum, Shawn Johnson, Michael Limiero, Michael Smith","doi":"10.1109/NCS.2018.00007","DOIUrl":"https://doi.org/10.1109/NCS.2018.00007","url":null,"abstract":"Cyber analysts tend to respond to anomalous events manually, often using subjective judgment that can lead to responses that are less than optimal. Additionally, analysts tend to report on events and share cyber knowledge in unstructured, textual formats, which not only require more time to parse – thus taking more time to respond – but also lead to multiple conclusions from the same input. To remedy this, we have proposed a framework designed to provide an analyst with a set of timely and accurate courses of action in response to events, in some cases automating those responses. As part of this framework, we have created a playbook specification format that allows analysts to specify the right course of action to take in response to events, given certain risk conditions and mission context. In addition to providing the specification format, we have also created an initial ontology to help analysts build their playbook contents and have laid out a notional architecture that can operationalize these playbooks. Our playbook format can help standardize how analysts should respond to events, thus decreasing the time to response and enabling analysts to share key knowledge in a common format. Ultimately, this should increase the efficacy of security operations center personnel.","PeriodicalId":283240,"journal":{"name":"2018 National Cyber Summit (NCS)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123485569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Optimized Running Window Entropy Algorithm 一种优化的运行窗口熵算法
Pub Date : 2018-06-01 DOI: 10.1109/NCS.2018.00016
K. Jones, Yong Wang
Running window entropy is a useful tool for malware analysis, network anomaly detection, and other cybersecurity topics. An optimized version of this algorithm would allow for inspection of more data in less time, thereby reducing wasted time and costs for an organization. This research presents a novel, non-trivial optimization of the running window entropy algorithm that, on average, requires less than 2% of the time of the original algorithm used in prior research. This savings can equate to days and months of computation time for average scenarios when applied to prior research.
运行窗口熵是恶意软件分析、网络异常检测和其他网络安全主题的有用工具。该算法的优化版本将允许在更短的时间内检查更多的数据,从而减少组织浪费的时间和成本。本研究提出了一种新颖的、非平凡的运行窗口熵算法优化,平均需要的时间不到先前研究中使用的原始算法的2%。当应用于先前的研究时,这种节省相当于平均情况下数天甚至数月的计算时间。
{"title":"An Optimized Running Window Entropy Algorithm","authors":"K. Jones, Yong Wang","doi":"10.1109/NCS.2018.00016","DOIUrl":"https://doi.org/10.1109/NCS.2018.00016","url":null,"abstract":"Running window entropy is a useful tool for malware analysis, network anomaly detection, and other cybersecurity topics. An optimized version of this algorithm would allow for inspection of more data in less time, thereby reducing wasted time and costs for an organization. This research presents a novel, non-trivial optimization of the running window entropy algorithm that, on average, requires less than 2% of the time of the original algorithm used in prior research. This savings can equate to days and months of computation time for average scenarios when applied to prior research.","PeriodicalId":283240,"journal":{"name":"2018 National Cyber Summit (NCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Allocating Security Analysts to Cyber Alerts Using Markov Games 利用马尔可夫博弈为网络警报分配安全分析师
Pub Date : 2018-06-01 DOI: 10.1109/NCS.2018.00008
Noah Dunstatter, Mina Guirguis, A. Tahsini
Allocating cyber-security analysts to incoming cyber alerts is an important task in any organization employing cyber-defense mechanisms. Alerts are typically generated when intrusion detection software on computer systems (e.g., servers, routers) detect abnormal or suspicious activity. Based on the respective significance level of the alerts, some are assigned to cyber-security analysts for further investigation. Due to the wide range of potential attacks coupled with high degrees of attack sophistication, identifying what constitutes a true attack is a challenging problem, especially for organizations performing critical operations (e.g., military bases, financial institutions, etc.) that are constantly being subjected to cyber attacks every day. In this paper, we develop a game-theoretical framework that assigns cyber-security analysts to cyber alerts to minimize the overall risk faced by an organization. Our approach considers a series of games between the attacker and the defender in which a state is maintained between sub-games. The state captures the availability of analysts as well as an attack budget metric that enables us to model the level of risk an attacker is willing to undertake. Through dynamic programming and Q-maximin value iteration-based algorithms, we identify optimal allocation strategies that take into account the current availability of analysts, the risk faced by the attacker, the incoming alerts, and the future outlook of the system. We assess the effectiveness of our allocation strategies by comparing them to other sensible heuristics (e.g., random, greedy and myopic). Our results show that our approach outperforms these other strategies in minimizing risk.
在任何采用网络防御机制的组织中,分配网络安全分析师来处理传入的网络警报是一项重要任务。当计算机系统(如服务器、路由器)上的入侵检测软件检测到异常或可疑活动时,通常会产生警报。根据警报各自的显著性水平,一些被分配给网络安全分析师进行进一步调查。由于潜在攻击的范围很广,加上攻击的复杂程度很高,确定什么构成真正的攻击是一个具有挑战性的问题,特别是对于执行关键操作的组织(例如,军事基地,金融机构等),这些组织每天都在不断遭受网络攻击。在本文中,我们开发了一个博弈论框架,该框架将网络安全分析师分配给网络警报,以最大限度地降低组织面临的整体风险。我们的方法考虑了攻击者和防御者之间的一系列博弈,其中在子博弈之间保持状态。状态捕获分析人员的可用性,以及使我们能够对攻击者愿意承担的风险级别进行建模的攻击预算度量。通过动态规划和基于q最大值迭代的算法,我们确定了考虑分析人员当前可用性、攻击者面临的风险、传入警报和系统未来前景的最佳分配策略。我们通过将我们的分配策略与其他合理的启发式方法(例如,随机、贪婪和短视)进行比较来评估其有效性。我们的结果表明,我们的方法在最小化风险方面优于其他策略。
{"title":"Allocating Security Analysts to Cyber Alerts Using Markov Games","authors":"Noah Dunstatter, Mina Guirguis, A. Tahsini","doi":"10.1109/NCS.2018.00008","DOIUrl":"https://doi.org/10.1109/NCS.2018.00008","url":null,"abstract":"Allocating cyber-security analysts to incoming cyber alerts is an important task in any organization employing cyber-defense mechanisms. Alerts are typically generated when intrusion detection software on computer systems (e.g., servers, routers) detect abnormal or suspicious activity. Based on the respective significance level of the alerts, some are assigned to cyber-security analysts for further investigation. Due to the wide range of potential attacks coupled with high degrees of attack sophistication, identifying what constitutes a true attack is a challenging problem, especially for organizations performing critical operations (e.g., military bases, financial institutions, etc.) that are constantly being subjected to cyber attacks every day. In this paper, we develop a game-theoretical framework that assigns cyber-security analysts to cyber alerts to minimize the overall risk faced by an organization. Our approach considers a series of games between the attacker and the defender in which a state is maintained between sub-games. The state captures the availability of analysts as well as an attack budget metric that enables us to model the level of risk an attacker is willing to undertake. Through dynamic programming and Q-maximin value iteration-based algorithms, we identify optimal allocation strategies that take into account the current availability of analysts, the risk faced by the attacker, the incoming alerts, and the future outlook of the system. We assess the effectiveness of our allocation strategies by comparing them to other sensible heuristics (e.g., random, greedy and myopic). Our results show that our approach outperforms these other strategies in minimizing risk.","PeriodicalId":283240,"journal":{"name":"2018 National Cyber Summit (NCS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126773446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Publisher's Information 出版商的信息
Pub Date : 2018-06-01 DOI: 10.1109/ncs.2018.00022
{"title":"Publisher's Information","authors":"","doi":"10.1109/ncs.2018.00022","DOIUrl":"https://doi.org/10.1109/ncs.2018.00022","url":null,"abstract":"","PeriodicalId":283240,"journal":{"name":"2018 National Cyber Summit (NCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115639997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Title Page iii 第三页标题
Pub Date : 2018-06-01 DOI: 10.1109/ncs.2018.00002
{"title":"Title Page iii","authors":"","doi":"10.1109/ncs.2018.00002","DOIUrl":"https://doi.org/10.1109/ncs.2018.00002","url":null,"abstract":"","PeriodicalId":283240,"journal":{"name":"2018 National Cyber Summit (NCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Perceived Risk, Perceived Controllability, and Security Self-Efficacy on Secure Intention from Social Comparison Theory Perspective 社会比较理论视角下感知风险、感知可控性和安全自我效能感对安全意向的影响
Pub Date : 2018-06-01 DOI: 10.1109/NCS.2018.00014
D. Kim, B. Phillps, Young U. Ryu
Information risk is an increasing concern for researchers and practitioners. By utilizing Technology Threat Avoidance and Social Comparison Theory, we examine the role of perceived risk, perceived risk controllability and self-efficacy secure intention. Findings indicate that users optimistically biased in their risk perceptions and controllability compared with their social counterparts.
信息风险日益受到研究人员和从业人员的关注。运用技术威胁回避理论和社会比较理论,研究了感知风险、感知风险可控性和自我效能感的作用。研究结果表明,与社交用户相比,用户在风险感知和可控性方面存在乐观偏见。
{"title":"Impact of Perceived Risk, Perceived Controllability, and Security Self-Efficacy on Secure Intention from Social Comparison Theory Perspective","authors":"D. Kim, B. Phillps, Young U. Ryu","doi":"10.1109/NCS.2018.00014","DOIUrl":"https://doi.org/10.1109/NCS.2018.00014","url":null,"abstract":"Information risk is an increasing concern for researchers and practitioners. By utilizing Technology Threat Avoidance and Social Comparison Theory, we examine the role of perceived risk, perceived risk controllability and self-efficacy secure intention. Findings indicate that users optimistically biased in their risk perceptions and controllability compared with their social counterparts.","PeriodicalId":283240,"journal":{"name":"2018 National Cyber Summit (NCS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125485704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Message from General Chairs 主席致辞
Pub Date : 2018-06-01 DOI: 10.1109/ncs.2018.00005
{"title":"Message from General Chairs","authors":"","doi":"10.1109/ncs.2018.00005","DOIUrl":"https://doi.org/10.1109/ncs.2018.00005","url":null,"abstract":"","PeriodicalId":283240,"journal":{"name":"2018 National Cyber Summit (NCS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114672615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Cybersecurity Awareness Modules for College and High School Students 面向大学生和高中生的网络安全意识模块
Pub Date : 2018-06-01 DOI: 10.1109/NCS.2018.00009
Y. Peker, Lydia Ray, S. D. Silva
Cybersecurity is of increasing importance due to the rise in reliance on digital equipment and programs to manage our daily lives, including the transmission and storage of personal information. Research studies establish that an effective security awareness program is one of the most important steps towards increasing cybersecurity. In this study we set out to understand the current level of security awareness among college and high school students and develop a module that will help raise their awareness. The main features of our module are interactivity and the presentation of shocking consequences of careless cyber habits of common Internet/technology users. We designed a survey that includes pre and post-tests to fulfill the goals of our project and administered it to students on our campus and at local high schools. Our survey results indicate that the module has been effective on both bodies of students with most impact on non-Computer Science majors. Results also indicate that there is no significant difference in awareness levels for male versus female students.
由于越来越多地依赖数字设备和程序来管理我们的日常生活,包括个人信息的传输和存储,网络安全变得越来越重要。研究表明,有效的安全意识计划是提高网络安全的最重要步骤之一。在本研究中,我们着手了解当前大学和高中学生的安全意识水平,并开发一个模块,将有助于提高他们的意识。我们的模块的主要特点是交互性和普通互联网/技术用户粗心的网络习惯的令人震惊的后果的呈现。我们设计了一项调查,包括前测试和后测试,以实现我们项目的目标,并对我们校园和当地高中的学生进行了调查。我们的调查结果表明,该模块对两类学生都有效,对非计算机科学专业的学生影响最大。结果还显示,男女学生的认知水平无显著差异。
{"title":"Online Cybersecurity Awareness Modules for College and High School Students","authors":"Y. Peker, Lydia Ray, S. D. Silva","doi":"10.1109/NCS.2018.00009","DOIUrl":"https://doi.org/10.1109/NCS.2018.00009","url":null,"abstract":"Cybersecurity is of increasing importance due to the rise in reliance on digital equipment and programs to manage our daily lives, including the transmission and storage of personal information. Research studies establish that an effective security awareness program is one of the most important steps towards increasing cybersecurity. In this study we set out to understand the current level of security awareness among college and high school students and develop a module that will help raise their awareness. The main features of our module are interactivity and the presentation of shocking consequences of careless cyber habits of common Internet/technology users. We designed a survey that includes pre and post-tests to fulfill the goals of our project and administered it to students on our campus and at local high schools. Our survey results indicate that the module has been effective on both bodies of students with most impact on non-Computer Science majors. Results also indicate that there is no significant difference in awareness levels for male versus female students.","PeriodicalId":283240,"journal":{"name":"2018 National Cyber Summit (NCS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127724665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
[Title page i] [标题页i]
Pub Date : 2018-06-01 DOI: 10.1109/ncs.2018.00001
{"title":"[Title page i]","authors":"","doi":"10.1109/ncs.2018.00001","DOIUrl":"https://doi.org/10.1109/ncs.2018.00001","url":null,"abstract":"","PeriodicalId":283240,"journal":{"name":"2018 National Cyber Summit (NCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 National Cyber Summit (NCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1