首页 > 最新文献

2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)最新文献

英文 中文
International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism 大数据、深度学习与打击网络恐怖主义国际大会
Ahmet Kilic, S. Ozdemir, Ilker Ozcelik, R. Erdoğan, Ramazan Terzi, Murat Akin, Bilgehan Arslan, Mehtap Ulker, Baris Bülent Kirlar, Süleyman Demirel, C. Varol, Sam Houston, Ç. Arslan, E. Okamoto, E. Yolacan, Osman Gazi, Fehmi Jafaar, H. Ş. Bilge, I. G. Ozbilgin, R. Erdoğan, H. Sever, M. Kiraz, M. Kaya, Y. Beyazit
International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism
大数据、深度学习与打击网络恐怖主义国际大会
{"title":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","authors":"Ahmet Kilic, S. Ozdemir, Ilker Ozcelik, R. Erdoğan, Ramazan Terzi, Murat Akin, Bilgehan Arslan, Mehtap Ulker, Baris Bülent Kirlar, Süleyman Demirel, C. Varol, Sam Houston, Ç. Arslan, E. Okamoto, E. Yolacan, Osman Gazi, Fehmi Jafaar, H. Ş. Bilge, I. G. Ozbilgin, R. Erdoğan, H. Sever, M. Kiraz, M. Kaya, Y. Beyazit","doi":"10.1109/ibigdelft.2018.8625348","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625348","url":null,"abstract":"International Congress on Bigdata Deep Learning and Fighting Cyber Terrorism","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IBIGDELFT 2018
Mücadele Kongresi, Telif Hakkı
Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. Copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid throught Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For reprint or republication permission, email to IEEE Copyright Manager at pubs-permission@ieee.org
允许摘要并注明出处。在美国版权法的限制之外,图书馆允许影印本卷中第一页底部带有代码的文章,供读者私人使用,前提是代码中显示的每本费用通过版权清理中心支付,地址:222 Rosewood Drive, Danvers, MA 01923。如需转载或转载许可,请发送电子邮件至IEEE版权经理pubs-permission@ieee.org
{"title":"IBIGDELFT 2018","authors":"Mücadele Kongresi, Telif Hakkı","doi":"10.1109/ibigdelft.2018.8625341","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625341","url":null,"abstract":"Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. Copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid throught Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For reprint or republication permission, email to IEEE Copyright Manager at pubs-permission@ieee.org","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation 自定义安全可视化生成的安全信息评估和事件管理系统
Ferda Özdemir Sönmez, B. Gunel
Security Information and Event Management Systems (SIEM) are generally very complex systems encapsulating a large number of functions with different behaviors. Visualization is a common way of data presentation in these systems along with other data presentation ways such as reporting, alerting, text messaging. However, generation of the visualization has different steps. If the data is in a custom format, rather than a predefined format which either obeys a standard or a known file structure, the generation of custom visualizations may not be straightforward. Evaluation information for these tools related to custom visualization generation capabilities may be useful for better decision making. This information can be used while designing visualizations through SIEM systems or purchasing the most useful SIEM system for an organization. In this study, six well-known SIEM systems are evaluated through a common scenario created by the authors to check custom visualization generation capabilities. The contributions include this unique scenario and the advantages and disadvantages regarding various steps of the provided scenario along with the difficulties experienced by the authors during the installation and configuration of these SIEM systems.
安全信息和事件管理系统(SIEM)通常是非常复杂的系统,封装了大量具有不同行为的功能。可视化是这些系统中常见的数据表示方式,以及其他数据表示方式,如报告、警报、文本消息。然而,可视化的生成有不同的步骤。如果数据是自定义格式,而不是遵循标准或已知文件结构的预定义格式,则自定义可视化的生成可能不那么简单。与自定义可视化生成功能相关的这些工具的评估信息可能有助于更好地制定决策。在通过SIEM系统设计可视化或为组织购买最有用的SIEM系统时,可以使用此信息。在本研究中,通过作者创建的通用场景评估了六个知名的SIEM系统,以检查自定义可视化生成能力。这些贡献包括这个独特的场景、所提供场景的各个步骤的优缺点,以及作者在安装和配置这些SIEM系统期间遇到的困难。
{"title":"Evaluation of Security Information and Event Management Systems for Custom Security Visualization Generation","authors":"Ferda Özdemir Sönmez, B. Gunel","doi":"10.1109/ibigdelft.2018.8625291","DOIUrl":"https://doi.org/10.1109/ibigdelft.2018.8625291","url":null,"abstract":"Security Information and Event Management Systems (SIEM) are generally very complex systems encapsulating a large number of functions with different behaviors. Visualization is a common way of data presentation in these systems along with other data presentation ways such as reporting, alerting, text messaging. However, generation of the visualization has different steps. If the data is in a custom format, rather than a predefined format which either obeys a standard or a known file structure, the generation of custom visualizations may not be straightforward. Evaluation information for these tools related to custom visualization generation capabilities may be useful for better decision making. This information can be used while designing visualizations through SIEM systems or purchasing the most useful SIEM system for an organization. In this study, six well-known SIEM systems are evaluated through a common scenario created by the authors to check custom visualization generation capabilities. The contributions include this unique scenario and the advantages and disadvantages regarding various steps of the provided scenario along with the difficulties experienced by the authors during the installation and configuration of these SIEM systems.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Steganography Application for UTF8 Encoded Texts UTF8编码文本的隐写应用
Cihan Yakar, S. Ozdemir
Encryption is the most common method used to protect the texts from being read by the individuals or systems other than the sender and receiver. In encrypted communication, third parties and supervisors can easily realize that a closed information is transmitted. Although this content cannot be resolved immediately, it can be marked as suspicious. Closed text can also be protected by using a hidden method instead of using an encryption method. The hidden text could be attributed “innocent” without notice by the third parties or systems. Recognizing the hidden text will become more difficult when it is included in everyday conversations. In this study, the work of hiding another text within a text encoded in the UTF-8 standard has been made for everyday communication applications. The method used in the study has been controlled by using instant messaging softwares which are widely used.
加密是保护文本不被发送方和接收方以外的个人或系统读取的最常用方法。在加密通信中,第三方和监管人员很容易意识到传输的信息是封闭的。虽然不能立即解析此内容,但可以将其标记为可疑。封闭文本也可以通过使用隐藏方法而不是使用加密方法来保护。隐藏的文本可以在没有第三方或系统通知的情况下被归为“无辜的”。当隐藏文本出现在日常对话中时,识别隐藏文本将变得更加困难。在这项研究中,在UTF-8标准编码的文本中隐藏另一个文本的工作已经用于日常通信应用。研究中使用的方法是通过使用广泛使用的即时通讯软件来控制的。
{"title":"Steganography Application for UTF8 Encoded Texts","authors":"Cihan Yakar, S. Ozdemir","doi":"10.1109/IBIGDELFT.2018.8625308","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625308","url":null,"abstract":"Encryption is the most common method used to protect the texts from being read by the individuals or systems other than the sender and receiver. In encrypted communication, third parties and supervisors can easily realize that a closed information is transmitted. Although this content cannot be resolved immediately, it can be marked as suspicious. Closed text can also be protected by using a hidden method instead of using an encryption method. The hidden text could be attributed “innocent” without notice by the third parties or systems. Recognizing the hidden text will become more difficult when it is included in everyday conversations. In this study, the work of hiding another text within a text encoded in the UTF-8 standard has been made for everyday communication applications. The method used in the study has been controlled by using instant messaging softwares which are widely used.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126142156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Awareness Qualification Level Measurement Model 认知资格水平测量模型
Salih Erdem Erol, Ş. Sağiroğlu
To be able to talk about effective information security against all types of attacks, from a simple cyber attack to cyber terrorism and even cyber warfare, awareness must be defined as a problem, not a solution. To solve this problem “You can not manage what you can not measure!” point of view must be the starting point. Information security problem can be solved if security awareness level can be measured accurately and raising the awareness level according to the measurements. After studies in the literature are examined, it is seen that there is no dynamic model for measuring the cyber security awareness, score based leveling, survey and focus area based approaches are used, measurements are made for certain levels/groups and do not have a certain leveling standardization. In this study, a “capability based dynamic model” has been proposed for the first time in order to measure awareness level. It is seen that the proposed model is superior to the models in literature by these specifications; designed in a stepped structure with leveling standardization, applicable to all groups/levels and capability based approach used. It is considered that the developed model will contribute to the increase of cyber security awareness.
为了能够谈论有效的信息安全对抗各种类型的攻击,从简单的网络攻击到网络恐怖主义,甚至网络战争,意识必须被定义为一个问题,而不是一个解决方案。要解决这个问题“你无法管理你无法衡量的东西!”的观点必须是出发点。只有准确地测量安全意识水平,并根据测量结果提高安全意识水平,才能解决信息安全问题。通过对文献研究的梳理,发现网络安全意识的测量没有动态模型,采用了基于分数的水平测量、基于调查的方法和基于重点区域的方法,对一定的水平/群体进行了测量,没有一定的水平标准化。本文首次提出了“基于能力的动态模型”来衡量企业的认知水平。从这些指标可以看出,本文提出的模型优于文献中的模型;采用阶梯结构设计,具有水平标准化,适用于所有组/级别和基于能力的方法。据认为,该模型将有助于提高网络安全意识。
{"title":"Awareness Qualification Level Measurement Model","authors":"Salih Erdem Erol, Ş. Sağiroğlu","doi":"10.1109/IBIGDELFT.2018.8625305","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625305","url":null,"abstract":"To be able to talk about effective information security against all types of attacks, from a simple cyber attack to cyber terrorism and even cyber warfare, awareness must be defined as a problem, not a solution. To solve this problem “You can not manage what you can not measure!” point of view must be the starting point. Information security problem can be solved if security awareness level can be measured accurately and raising the awareness level according to the measurements. After studies in the literature are examined, it is seen that there is no dynamic model for measuring the cyber security awareness, score based leveling, survey and focus area based approaches are used, measurements are made for certain levels/groups and do not have a certain leveling standardization. In this study, a “capability based dynamic model” has been proposed for the first time in order to measure awareness level. It is seen that the proposed model is superior to the models in literature by these specifications; designed in a stepped structure with leveling standardization, applicable to all groups/levels and capability based approach used. It is considered that the developed model will contribute to the increase of cyber security awareness.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Technical Analysis on Financial Time Series Data Based on Map-Reduce Programming Model: A Case Study 基于Map-Reduce规划模型的金融时间序列数据技术分析
Yasin Uygun, Mehmet Onur Erboy, M. Aktaş, O. Kalipsiz, Ishak Aykurt
Technical analysis is a widely used method for forecasting the price direction on the financial time series data. This method requires the use of different number and types of analysis algorithms (technical indicators) together. Although these algorithms show successful performance on small-scalefinancial time series data, significant performance decreases are detected when the size of data increased. On the large-scale financial time series data, it is necessary to implement these algorithms based on the Map-Reduce programming model and examine the performance of the algorithms which are implemented based on this model comparatively. For this purpose, seven different indicators are studied within the scope of this study, new versions of these indicators are implemented using Map-Reduce parallel data processing model and performance comparisons are made with these algorithms. As a result of these comparisons on single-node and multi-node, significant performance gains have been obtained using Map-Reduce programming model.
技术分析是一种广泛应用于预测金融时间序列数据价格走向的方法。这种方法需要将不同数量和类型的分析算法(技术指标)结合使用。尽管这些算法在小规模金融时间序列数据上表现出成功的性能,但当数据规模增加时,性能会显著下降。在大规模金融时间序列数据上,有必要基于Map-Reduce规划模型实现这些算法,并比较检验基于该模型实现的算法的性能。为此,在本研究范围内研究了七个不同的指标,使用Map-Reduce并行数据处理模型实现了这些指标的新版本,并与这些算法进行了性能比较。通过在单节点和多节点上的比较,使用Map-Reduce编程模型获得了显著的性能提升。
{"title":"Technical Analysis on Financial Time Series Data Based on Map-Reduce Programming Model: A Case Study","authors":"Yasin Uygun, Mehmet Onur Erboy, M. Aktaş, O. Kalipsiz, Ishak Aykurt","doi":"10.1109/IBIGDELFT.2018.8625357","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625357","url":null,"abstract":"Technical analysis is a widely used method for forecasting the price direction on the financial time series data. This method requires the use of different number and types of analysis algorithms (technical indicators) together. Although these algorithms show successful performance on small-scalefinancial time series data, significant performance decreases are detected when the size of data increased. On the large-scale financial time series data, it is necessary to implement these algorithms based on the Map-Reduce programming model and examine the performance of the algorithms which are implemented based on this model comparatively. For this purpose, seven different indicators are studied within the scope of this study, new versions of these indicators are implemented using Map-Reduce parallel data processing model and performance comparisons are made with these algorithms. As a result of these comparisons on single-node and multi-node, significant performance gains have been obtained using Map-Reduce programming model.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122657052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form 用广义Hadamard形式生成Toeplitz形式的MDS矩阵
M. K. Pehlivanoglu, S. Akleylek, M. T. Sakalli, N. Duru
In this paper, hardware efficient diffusion layers are generated. Non-involutory and new 8×8 MDS matrices over GF(28) with the best-known XOR counts are constructed by using a new matrix form, which is developed by circulant matrix form and the idea used in developing Generalised Hadamard (GHadamard) matrix form. Then, it is shown that the proposed matrix form is a subset of Toeplitz matrix form.
本文生成了硬件高效的扩散层。GF(28)上具有最著名异或计数的非对合和新的8×8 MDS矩阵是通过使用一种新的矩阵形式构造的,该矩阵形式是由循环矩阵形式和用于发展广义Hadamard (GHadamard)矩阵形式的思想发展而来的。然后证明了所提出的矩阵形式是Toeplitz矩阵形式的一个子集。
{"title":"Generating MDS Matrices in Toeplitz Form by Using Generalised Hadamard Form","authors":"M. K. Pehlivanoglu, S. Akleylek, M. T. Sakalli, N. Duru","doi":"10.1109/IBIGDELFT.2018.8625280","DOIUrl":"https://doi.org/10.1109/IBIGDELFT.2018.8625280","url":null,"abstract":"In this paper, hardware efficient diffusion layers are generated. Non-involutory and new 8×8 MDS matrices over GF(28) with the best-known XOR counts are constructed by using a new matrix form, which is developed by circulant matrix form and the idea used in developing Generalised Hadamard (GHadamard) matrix form. Then, it is shown that the proposed matrix form is a subset of Toeplitz matrix form.","PeriodicalId":290302,"journal":{"name":"2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123184170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1