首页 > 最新文献

Security and Privacy最新文献

英文 中文
Detection of malicious smart contracts by fine‐tuning GPT‐3 通过微调 GPT-3 检测恶意智能合约
IF 1.9 Pub Date : 2024-06-09 DOI: 10.1002/spy2.430
Msvpj Sathvik, Hirak Mazumdar
This paper introduces a comprehensive framework for the detection and identification of malicious smart contracts, emphasizing their vulnerabilities. The framework leverages the capabilities of GPT‐3, which have been adapted and fine‐tuned for binary and multi‐class classification tasks. To the best of our knowledge, this study is the first to explore the use of GPT‐3 specifically for detecting and identifying malicious smart contracts. The framework addresses previously unexplored research questions and provides insightful answers through rigorous experimentation. The contributions of this work include proposing a novel approach, pioneering the adaptation of GPT‐3 for this purpose, and offering valuable insights into the detection of malicious smart contracts and vulnerabilities. Notably, our research reveals that GPT‐3 excels not only in understanding natural language but also in decoding the secrets embedded in numerical codes like opcodes. This finding extends the applicability of GPT‐3 beyond language‐based tasks and highlights its potential in enhancing smart contract security.
本文介绍了一个用于检测和识别恶意智能合约的综合框架,强调了它们的漏洞。该框架利用了 GPT-3 的功能,并针对二进制和多类分类任务进行了调整和微调。据我们所知,本研究是首次探索如何将 GPT-3 专门用于检测和识别恶意智能合约。该框架解决了以前未曾探索过的研究问题,并通过严格的实验提供了深刻的答案。这项工作的贡献包括提出了一种新方法,开创性地将 GPT-3 用于此目的,并为检测恶意智能合约和漏洞提供了有价值的见解。值得注意的是,我们的研究发现,GPT-3 不仅在理解自然语言方面表现出色,而且在解码操作码等数字代码中蕴含的秘密方面也很出色。这一发现将 GPT-3 的适用性扩展到了基于语言的任务之外,并凸显了它在增强智能合约安全性方面的潜力。
{"title":"Detection of malicious smart contracts by fine‐tuning GPT‐3","authors":"Msvpj Sathvik, Hirak Mazumdar","doi":"10.1002/spy2.430","DOIUrl":"https://doi.org/10.1002/spy2.430","url":null,"abstract":"This paper introduces a comprehensive framework for the detection and identification of malicious smart contracts, emphasizing their vulnerabilities. The framework leverages the capabilities of GPT‐3, which have been adapted and fine‐tuned for binary and multi‐class classification tasks. To the best of our knowledge, this study is the first to explore the use of GPT‐3 specifically for detecting and identifying malicious smart contracts. The framework addresses previously unexplored research questions and provides insightful answers through rigorous experimentation. The contributions of this work include proposing a novel approach, pioneering the adaptation of GPT‐3 for this purpose, and offering valuable insights into the detection of malicious smart contracts and vulnerabilities. Notably, our research reveals that GPT‐3 excels not only in understanding natural language but also in decoding the secrets embedded in numerical codes like opcodes. This finding extends the applicability of GPT‐3 beyond language‐based tasks and highlights its potential in enhancing smart contract security.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141366363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy‐preserving security monitoring data sharing of new power system based on batch verification ring signature 基于批量验证环签名的新电力系统隐私保护安全监控数据共享
IF 1.9 Pub Date : 2024-06-07 DOI: 10.1002/spy2.418
Yi Wang, Hao Yang, Yiming Zhang, Yitao Zhao, Shaoyang Yin
To meet the increasing electricity demand and achieve the goals of “carbon peaking” and “carbon neutrality”, it is urgent to develop a new power system with new energy as the main body and large‐scale integration of power intelligent electronic devices. However, the large‐scale access to intelligent devices will bring new network security issues. In response to network security threats, a power grid network security situational awareness system is established to assess the security situation of the power grid and strengthen the network security. Cloud data sharing enables security monitoring data to flow faster and be fully used to facilitate security situational research and judgment. Nevertheless, in reality, issues such as privacy leakage, data tampering, and unauthorized access hinder the application of cloud data sharing. To solve the above problems, we propose a new secure sharing scheme for power system security monitoring data based on batch verification ring signature. In this scheme, we design a batch verification ring signature algorithm to guarantee users' anonymity and promote the efficiency of data sharing. Then, we formally prove that our scheme achieves three security features: anonymity, confidentiality, and unforgeability. Finally, experimental simulations show that our scheme's computational cost is less than half that of other schemes, which also has lower communication overhead.
为满足日益增长的电力需求,实现 "碳调峰 "和 "碳中和 "的目标,迫切需要发展以新能源为主体、大规模集成电力智能电子设备的新型电力系统。然而,智能设备的大规模接入将带来新的网络安全问题。针对网络安全威胁,建立电网网络安全态势感知系统,评估电网安全态势,加强网络安全保障。云数据共享使安全监控数据能够更快地流动起来,并得到充分利用,促进安全态势研判。然而,在现实中,隐私泄露、数据篡改、非法访问等问题阻碍了云数据共享的应用。为解决上述问题,我们提出了一种基于批量验证环签名的新型电力系统安全监测数据安全共享方案。在该方案中,我们设计了一种批量验证环签名算法,以保证用户的匿名性并提高数据共享的效率。然后,我们正式证明了我们的方案实现了三个安全特性:匿名性、保密性和不可伪造性。最后,实验模拟表明,我们方案的计算成本不到其他方案的一半,通信开销也更低。
{"title":"Privacy‐preserving security monitoring data sharing of new power system based on batch verification ring signature","authors":"Yi Wang, Hao Yang, Yiming Zhang, Yitao Zhao, Shaoyang Yin","doi":"10.1002/spy2.418","DOIUrl":"https://doi.org/10.1002/spy2.418","url":null,"abstract":"To meet the increasing electricity demand and achieve the goals of “carbon peaking” and “carbon neutrality”, it is urgent to develop a new power system with new energy as the main body and large‐scale integration of power intelligent electronic devices. However, the large‐scale access to intelligent devices will bring new network security issues. In response to network security threats, a power grid network security situational awareness system is established to assess the security situation of the power grid and strengthen the network security. Cloud data sharing enables security monitoring data to flow faster and be fully used to facilitate security situational research and judgment. Nevertheless, in reality, issues such as privacy leakage, data tampering, and unauthorized access hinder the application of cloud data sharing. To solve the above problems, we propose a new secure sharing scheme for power system security monitoring data based on batch verification ring signature. In this scheme, we design a batch verification ring signature algorithm to guarantee users' anonymity and promote the efficiency of data sharing. Then, we formally prove that our scheme achieves three security features: anonymity, confidentiality, and unforgeability. Finally, experimental simulations show that our scheme's computational cost is less than half that of other schemes, which also has lower communication overhead.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141374967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey analysis of quantum computing adoption and the paradigm of privacy engineering 量子计算应用和隐私工程范例的调查分析
IF 1.9 Pub Date : 2024-06-07 DOI: 10.1002/spy2.419
Nour Mousa, Farid Shirazi
This study investigates the adoption of quantum computing (QC) technology using the diffusion of innovation (DOI) theory and provides an extensive literature review. We deployed structural equation modeling to analyze data from a survey conducted among 96 top managers in various industries from Canada, the US, and Europe, including IT‐based small and medium‐sized enterprises (SMEs) dealing with QC software development. Our survey analysis indicates that the complexity of QC systems and software is the main barrier to the future adoption of quantum computing. This research offers insights into how future quantum computers can impact the security and privacy of information, emphasizing the importance of privacy protection. In this context, the study contributes to the notion of privacy engineering in the complex context of QC. The study established important outlines and tools for shaping future QCs. Our study, backed by empirical evidence, underscores the significant impact of new technology on citizens', organizations', firms', and government‐private data. The results provide a clear message to policymakers, industry leaders, and developers: privacy engineering should be an integral part of technical development, and it's crucial to act before costs escalate. In this context, our study stands out as one of the few that use NLP and structural equation modeling to address privacy challenges in QC research through experimental research, offering practical solutions to real‐world problems.
本研究利用创新扩散(DOI)理论研究了量子计算(QC)技术的采用情况,并提供了大量文献综述。我们采用结构方程模型对来自加拿大、美国和欧洲不同行业的 96 位高层管理人员进行了调查,其中包括从事量子计算软件开发的 IT 型中小企业(SMEs)。我们的调查分析表明,量子计算系统和软件的复杂性是未来采用量子计算的主要障碍。这项研究为未来量子计算机如何影响信息安全和隐私提供了见解,强调了隐私保护的重要性。在此背景下,本研究为复杂的量子计算背景下的隐私工程概念做出了贡献。研究为塑造未来的量子计算机制定了重要的纲要和工具。我们的研究以经验证据为支撑,强调了新技术对公民、组织、公司以及政府和私人数据的重大影响。研究结果为政策制定者、行业领导者和开发人员提供了一个明确的信息:隐私工程应成为技术开发不可分割的一部分,在成本上升之前采取行动至关重要。在此背景下,我们的研究脱颖而出,成为通过实验研究使用 NLP 和结构方程建模来解决质量控制研究中的隐私挑战的少数研究之一,为现实世界的问题提供了切实可行的解决方案。
{"title":"A survey analysis of quantum computing adoption and the paradigm of privacy engineering","authors":"Nour Mousa, Farid Shirazi","doi":"10.1002/spy2.419","DOIUrl":"https://doi.org/10.1002/spy2.419","url":null,"abstract":"This study investigates the adoption of quantum computing (QC) technology using the diffusion of innovation (DOI) theory and provides an extensive literature review. We deployed structural equation modeling to analyze data from a survey conducted among 96 top managers in various industries from Canada, the US, and Europe, including IT‐based small and medium‐sized enterprises (SMEs) dealing with QC software development. Our survey analysis indicates that the complexity of QC systems and software is the main barrier to the future adoption of quantum computing. This research offers insights into how future quantum computers can impact the security and privacy of information, emphasizing the importance of privacy protection. In this context, the study contributes to the notion of privacy engineering in the complex context of QC. The study established important outlines and tools for shaping future QCs. Our study, backed by empirical evidence, underscores the significant impact of new technology on citizens', organizations', firms', and government‐private data. The results provide a clear message to policymakers, industry leaders, and developers: privacy engineering should be an integral part of technical development, and it's crucial to act before costs escalate. In this context, our study stands out as one of the few that use NLP and structural equation modeling to address privacy challenges in QC research through experimental research, offering practical solutions to real‐world problems.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141373831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities 为具有访问控制功能的医疗生态系统设计以患者为中心的高效智能合约
IF 1.9 Pub Date : 2024-06-07 DOI: 10.1002/spy2.427
Kausthav Pratim Kalita, Debojit Boro, Dhruba Kumar Bhattacharyya
Electronic medical records are a patient's digital asset that enhances the information available to doctors for tracking their patients' health. When this information is stored in a secure environment, health examination reports can serve as a dependable repository for thorough observation of a patient's well‐being. However, it is crucial for the owner to have control over access to these repositories. In this scenario, a blockchain ecosystem with appropriate access control mechanisms can help create a distributed and decentralized storage platform to ensure the safety and security of data. Developing cost‐effective smart contracts and creating clear design diagrams to represent them are essential for establishing such an ecosystem. This paper introduces a smart contract for the Ethereum blockchain that allows an owner to maintain control over their data. The paper presents a diagram for visually representing the modules within our smart contract, providing readers with a clearer understanding of the access control techniques utilized in implementing our strategies. Our smart contract offers clinicians a valuable means of accessing historical data to promptly evaluate a patient's health in emergency situations. We showcase its efficacy by illustrating how it streamlines insurance claims, where it verifies the patient's coverage and automatically authorizes medical expense payments. Lastly, a study is presented to showcase an effective method of storing the ingested data within the Ethereum network. The suggested approach allows restrictions on data visibility based on the viewer's accessibility through identity‐based access control achieved using additional structures in smart contracts. These structures store filtered records accessible to users based on their viewing privileges. The simulated test bed results support the efficiency of using smart contracts with additional structures in terms of gas consumption when compared to those that use a single structure for read and write operations.
电子病历是病人的数字资产,可为医生追踪病人健康状况提供更多信息。当这些信息被存储在安全的环境中时,健康检查报告就可以成为全面观察病人健康状况的可靠资料库。然而,至关重要的是,所有者必须能够控制对这些存储库的访问。在这种情况下,具有适当访问控制机制的区块链生态系统可以帮助创建一个分布式、去中心化的存储平台,确保数据的安全和安保。开发具有成本效益的智能合约并创建清晰的设计图来表示它们,对于建立这样一个生态系统至关重要。本文介绍了以太坊区块链的智能合约,它允许所有者保持对其数据的控制。本文提供了一个图表,用于直观地表示我们智能合约中的模块,让读者更清楚地了解在实施我们的策略时所使用的访问控制技术。我们的智能合约为临床医生提供了获取历史数据的宝贵手段,以便在紧急情况下及时评估病人的健康状况。我们通过说明智能合约如何简化保险理赔来展示它的功效,它可以验证病人的保险范围并自动授权医疗费用支付。最后,我们介绍了一项研究,以展示在以太坊网络中存储摄入数据的有效方法。所建议的方法通过使用智能合约中的附加结构实现基于身份的访问控制,从而根据查看者的访问权限对数据可见性进行限制。这些结构根据用户的查看权限存储用户可访问的过滤记录。模拟测试平台的结果表明,与使用单一结构进行读写操作的智能合约相比,使用附加结构的智能合约在气体消耗方面更有效率。
{"title":"Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities","authors":"Kausthav Pratim Kalita, Debojit Boro, Dhruba Kumar Bhattacharyya","doi":"10.1002/spy2.427","DOIUrl":"https://doi.org/10.1002/spy2.427","url":null,"abstract":"Electronic medical records are a patient's digital asset that enhances the information available to doctors for tracking their patients' health. When this information is stored in a secure environment, health examination reports can serve as a dependable repository for thorough observation of a patient's well‐being. However, it is crucial for the owner to have control over access to these repositories. In this scenario, a blockchain ecosystem with appropriate access control mechanisms can help create a distributed and decentralized storage platform to ensure the safety and security of data. Developing cost‐effective smart contracts and creating clear design diagrams to represent them are essential for establishing such an ecosystem. This paper introduces a smart contract for the Ethereum blockchain that allows an owner to maintain control over their data. The paper presents a diagram for visually representing the modules within our smart contract, providing readers with a clearer understanding of the access control techniques utilized in implementing our strategies. Our smart contract offers clinicians a valuable means of accessing historical data to promptly evaluate a patient's health in emergency situations. We showcase its efficacy by illustrating how it streamlines insurance claims, where it verifies the patient's coverage and automatically authorizes medical expense payments. Lastly, a study is presented to showcase an effective method of storing the ingested data within the Ethereum network. The suggested approach allows restrictions on data visibility based on the viewer's accessibility through identity‐based access control achieved using additional structures in smart contracts. These structures store filtered records accessible to users based on their viewing privileges. The simulated test bed results support the efficiency of using smart contracts with additional structures in terms of gas consumption when compared to those that use a single structure for read and write operations.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141372182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure authentication protocol for remote patient monitoring in an internet‐of‐medical‐things environment 医疗物联网环境下远程患者监护的安全认证协议
IF 1.9 Pub Date : 2024-06-05 DOI: 10.1002/spy2.428
Srijanee Mookherji, Odelu Vanga, R. Prasath, A. K. Das
Internet of Medical Things (IoMT) enable users to avail healthcare services remotely. In IoMT, sensor nodes (SNs), like blood pressure sensors and temperature sensors, collect health data from patients and communicate it to Health Workers (HWs) such as doctors, nurses, and so on. The HWs cater to the patients remotely, known as remote patient monitoring (RPM), by using data obtained from SNs. The communicated health data between SNs and HWs are sensitive in nature. Leakage and modification of such data leads to huge consequences, particularly patient death during medical emergencies. Hence, ensuring mutual authentication along with data integrity and privacy is of utmost important in the healthcare domain. In the literature, many authentication protocols are presented for healthcare applications specific to IoMT‐RPM. But, most of the existing approaches fail to provide adequate security against well‐known attacks includes impersonation and man‐in‐the‐middle attacks. In this paper, we propose a privacy preserving authentication protocol for IoMT‐RPM which is secure against various known attacks. We present a rigorous formal security analysis of our protocol under the extended Canetti‐Krawczyk (eCK) adversary model. In addition, we also perform formal verification using Tamarin Prover, a symbolic formal analysis tool. The results show that the proposed protocol is secure under eCK‐adversary model. We then present the comparative performance analysis to show the efficiency of the proposed protocol over the existing protocols. As a result, the proposed protocol provides high security without compromising the performance over the existing protocols, and therefore, our protocol is very much suitable for real‐time applications.
医疗物联网(IoMT)使用户能够远程享受医疗保健服务。在 IoMT 中,传感器节点(SN),如血压传感器和温度传感器,收集患者的健康数据,并将其传送给医生、护士等健康工作者(HW)。健康工作者利用从 SN 获取的数据对患者进行远程护理,即远程患者监护(RPM)。SN 和 HW 之间通信的健康数据具有敏感性。泄漏和修改这些数据会导致严重后果,特别是在医疗紧急情况下造成病人死亡。因此,在医疗保健领域,确保相互认证以及数据完整性和隐私至关重要。在文献中,针对 IoMT-RPM 的医疗保健应用提出了许多认证协议。但是,大多数现有方法都无法提供足够的安全性来抵御众所周知的攻击,包括冒名顶替和中间人攻击。在本文中,我们提出了一种针对 IoMT-RPM 的隐私保护认证协议,该协议可安全抵御各种已知攻击。我们在扩展的 Canetti-Krawczyk (eCK) 对手模型下对我们的协议进行了严格的形式安全性分析。此外,我们还使用符号形式分析工具 Tamarin Prover 进行了形式验证。结果表明,所提出的协议在 eCK 对手模型下是安全的。然后,我们进行了性能对比分析,以显示与现有协议相比,所提协议的效率更高。结果表明,与现有协议相比,我们提出的协议在不影响性能的情况下提供了很高的安全性,因此,我们的协议非常适合实时应用。
{"title":"A secure authentication protocol for remote patient monitoring in an internet‐of‐medical‐things environment","authors":"Srijanee Mookherji, Odelu Vanga, R. Prasath, A. K. Das","doi":"10.1002/spy2.428","DOIUrl":"https://doi.org/10.1002/spy2.428","url":null,"abstract":"Internet of Medical Things (IoMT) enable users to avail healthcare services remotely. In IoMT, sensor nodes (SNs), like blood pressure sensors and temperature sensors, collect health data from patients and communicate it to Health Workers (HWs) such as doctors, nurses, and so on. The HWs cater to the patients remotely, known as remote patient monitoring (RPM), by using data obtained from SNs. The communicated health data between SNs and HWs are sensitive in nature. Leakage and modification of such data leads to huge consequences, particularly patient death during medical emergencies. Hence, ensuring mutual authentication along with data integrity and privacy is of utmost important in the healthcare domain. In the literature, many authentication protocols are presented for healthcare applications specific to IoMT‐RPM. But, most of the existing approaches fail to provide adequate security against well‐known attacks includes impersonation and man‐in‐the‐middle attacks. In this paper, we propose a privacy preserving authentication protocol for IoMT‐RPM which is secure against various known attacks. We present a rigorous formal security analysis of our protocol under the extended Canetti‐Krawczyk (eCK) adversary model. In addition, we also perform formal verification using Tamarin Prover, a symbolic formal analysis tool. The results show that the proposed protocol is secure under eCK‐adversary model. We then present the comparative performance analysis to show the efficiency of the proposed protocol over the existing protocols. As a result, the proposed protocol provides high security without compromising the performance over the existing protocols, and therefore, our protocol is very much suitable for real‐time applications.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141383301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection 利用机器学习和基于统计的混合特征选择实现物联网安全的网络入侵检测系统
IF 1.9 Pub Date : 2024-06-05 DOI: 10.1002/spy2.429
Supongmen Walling, Sibesh Lodh
The widespread adoption of Internet of Things (IoT) devices has revolutionized daily life, offering convenience and efficiency. However, this growth has also brought new security challenges. With the escalating use of Internet and network technology, the number of cyber‐attacks has increased, intensifying the focus on Intrusion Detection Systems (IDS) among researchers. Network intrusion detection (NID) plays a crucial role in securing IoT networks, becoming essential for modern security infrastructure. Recently, machine learning algorithms have shown promise in providing IDS solutions. Yet, IoT IDS systems face challenges due to their functional and physical diversity, making comprehensive feature utilization impractical. Therefore, effective feature selection becomes imperative. In this research, a novel feature selection methodology for anomaly‐based NIDS is proposed. The methodology commences by employing two filter‐based techniques, namely 1‐way ANOVA and the Pearson correlation coefficient, to meticulously identify and extract pertinent features from the dataset. These methods serve as initial filters to discern the most relevant attributes, ensuring that only the most informative features are retained for subsequent analysis. Subsequently, the most optimal features identified by both methodologies are extracted utilizing the principles of union and intersection in mathematical set theory. Using the NSL‐KDD and UNSW‐NB15 datasets, we exemplify how our model can outperform conventional ML classifiers in terms of detection rate, precision, recall. In our study, intrusion detection is carried out by SVM, kNN, Decision Tree, Logistic Regression and Random Forest using trained attack patterns. The demonstrated results highlight the exceptional performance of the proposed system, with an impressive accuracy rate of 99.6% on the NSL‐KDD dataset and a substantial 97.7% on the UNSW‐NB15 dataset, clearly surpassing the performance of contemporary methods.
物联网(IoT)设备的广泛应用彻底改变了人们的日常生活,为人们提供了便利和效率。然而,这种增长也带来了新的安全挑战。随着互联网和网络技术应用的不断升级,网络攻击的数量也随之增加,研究人员更加关注入侵检测系统(IDS)。网络入侵检测(NID)在确保物联网网络安全方面发挥着至关重要的作用,已成为现代安全基础设施的关键。最近,机器学习算法有望提供 IDS 解决方案。然而,物联网 IDS 系统因其功能和物理多样性而面临挑战,使得全面利用特征变得不切实际。因此,有效的特征选择势在必行。本研究为基于异常的 NIDS 提出了一种新颖的特征选择方法。该方法首先采用两种基于筛选的技术,即单向方差分析和皮尔逊相关系数,从数据集中仔细识别和提取相关特征。这些方法可作为识别最相关属性的初始过滤器,确保只保留信息量最大的特征用于后续分析。随后,利用数学集合论中的联合和交集原理,提取这两种方法识别出的最佳特征。利用 NSL-KDD 和 UNSW-NB15 数据集,我们举例说明了我们的模型如何在检测率、精确度和召回率方面优于传统的 ML 分类器。在我们的研究中,利用训练有素的攻击模式,通过 SVM、kNN、决策树、逻辑回归和随机森林进行了入侵检测。演示结果凸显了所提系统的卓越性能,在 NSL-KDD 数据集上的准确率高达 99.6%,在 UNSW-NB15 数据集上的准确率也高达 97.7%,明显超越了当代方法的性能。
{"title":"Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection","authors":"Supongmen Walling, Sibesh Lodh","doi":"10.1002/spy2.429","DOIUrl":"https://doi.org/10.1002/spy2.429","url":null,"abstract":"The widespread adoption of Internet of Things (IoT) devices has revolutionized daily life, offering convenience and efficiency. However, this growth has also brought new security challenges. With the escalating use of Internet and network technology, the number of cyber‐attacks has increased, intensifying the focus on Intrusion Detection Systems (IDS) among researchers. Network intrusion detection (NID) plays a crucial role in securing IoT networks, becoming essential for modern security infrastructure. Recently, machine learning algorithms have shown promise in providing IDS solutions. Yet, IoT IDS systems face challenges due to their functional and physical diversity, making comprehensive feature utilization impractical. Therefore, effective feature selection becomes imperative. In this research, a novel feature selection methodology for anomaly‐based NIDS is proposed. The methodology commences by employing two filter‐based techniques, namely 1‐way ANOVA and the Pearson correlation coefficient, to meticulously identify and extract pertinent features from the dataset. These methods serve as initial filters to discern the most relevant attributes, ensuring that only the most informative features are retained for subsequent analysis. Subsequently, the most optimal features identified by both methodologies are extracted utilizing the principles of union and intersection in mathematical set theory. Using the NSL‐KDD and UNSW‐NB15 datasets, we exemplify how our model can outperform conventional ML classifiers in terms of detection rate, precision, recall. In our study, intrusion detection is carried out by SVM, kNN, Decision Tree, Logistic Regression and Random Forest using trained attack patterns. The demonstrated results highlight the exceptional performance of the proposed system, with an impressive accuracy rate of 99.6% on the NSL‐KDD dataset and a substantial 97.7% on the UNSW‐NB15 dataset, clearly surpassing the performance of contemporary methods.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141386198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving location‐query privacy in location‐based services: A review 在基于位置的服务中保护位置查询隐私:综述
IF 1.9 Pub Date : 2024-05-15 DOI: 10.1002/spy2.412
Hira Rasheed, Rafidah Md Noor, Norjihan Abdul Ghani, Iftikhar Ahmad
Location‐based services (LBS) leverage the geographical information of a device to deliver information, entertainment, and other services tailored to the user's present location. LBS not only brings leisure to people's lives but also raises concerns about users' privacy. Consequently, location privacy protection has captured the attention of researchers owing to the increased adoption of location‐based services and the potential privacy issues faced by users. Along with location privacy, query privacy is also a crucial privacy concern that incurs possible damage to individual privacy and even to users' safety. Preserving location privacy only secures the user's current location but protection of query privacy guarantees the security of the user's future possible location. However, to the best of our knowledge, none of the relevant studies realized the significance of query privacy. This review paper provides an overview of LBS and its components, classifying the LBS based on: granularity, number of queries, initiator, and range. We investigated the threat model, vulnerabilities, and privacy attacks in LBS, reviewed the approaches used by the researchers to mitigate the location and query privacy threats, and evaluation metrics. We also analyzed the ability of current methods to implicitly/explicitly secure query privacy and the impact of recent technological progression on problem‐building and solution evolution. Finally, this paper concludes by identifying the open issues in the existing research and directions for future work.
基于位置的服务(LBS)利用设备的地理信息,提供针对用户当前位置的信息、娱乐和其他服务。位置服务不仅给人们的生活带来了乐趣,也引发了对用户隐私的关注。因此,由于基于位置的服务的采用率越来越高,以及用户面临的潜在隐私问题,位置隐私保护引起了研究人员的关注。除了位置隐私,查询隐私也是一个重要的隐私问题,可能会对个人隐私甚至用户安全造成损害。保护位置隐私只能保证用户当前位置的安全,而保护查询隐私则能保证用户未来可能位置的安全。然而,据我们所知,相关研究都没有意识到查询隐私的重要性。这篇综述论文概述了 LBS 及其组成部分,并根据粒度、查询次数、发起者和范围对 LBS 进行了分类。我们研究了 LBS 中的威胁模型、漏洞和隐私攻击,回顾了研究人员用于缓解位置和查询隐私威胁的方法以及评估指标。我们还分析了当前方法隐式/显式保护查询隐私的能力,以及近期技术进步对问题构建和解决方案演进的影响。最后,本文总结了现有研究中的未决问题和未来工作方向。
{"title":"Preserving location‐query privacy in location‐based services: A review","authors":"Hira Rasheed, Rafidah Md Noor, Norjihan Abdul Ghani, Iftikhar Ahmad","doi":"10.1002/spy2.412","DOIUrl":"https://doi.org/10.1002/spy2.412","url":null,"abstract":"Location‐based services (LBS) leverage the geographical information of a device to deliver information, entertainment, and other services tailored to the user's present location. LBS not only brings leisure to people's lives but also raises concerns about users' privacy. Consequently, location privacy protection has captured the attention of researchers owing to the increased adoption of location‐based services and the potential privacy issues faced by users. Along with location privacy, query privacy is also a crucial privacy concern that incurs possible damage to individual privacy and even to users' safety. Preserving location privacy only secures the user's current location but protection of query privacy guarantees the security of the user's future possible location. However, to the best of our knowledge, none of the relevant studies realized the significance of query privacy. This review paper provides an overview of LBS and its components, classifying the LBS based on: granularity, number of queries, initiator, and range. We investigated the threat model, vulnerabilities, and privacy attacks in LBS, reviewed the approaches used by the researchers to mitigate the location and query privacy threats, and evaluation metrics. We also analyzed the ability of current methods to implicitly/explicitly secure query privacy and the impact of recent technological progression on problem‐building and solution evolution. Finally, this paper concludes by identifying the open issues in the existing research and directions for future work.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140975350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment PRC6:用于增强并行环境中云数据安全性的混合轻量级密码
IF 1.9 Pub Date : 2024-05-14 DOI: 10.1002/spy2.413
Zahraa A. Mohammed, Khalid Ali Hussein
Modern technologies of computing cloud are showing great promise, but at the same time create new security challenges that hinder full acceptance. Given that most of these services often use cloud networks as channels for communication, securing data transmission is crucial. This paper introduce a new hybrid encryption algorithm, the proposed two‐layered PRC6 cipher, tailored address security concerns in cloud computing environments with minimal resource constraints. The PRC6 cipher incorporates enhancements from Cha‐cha into an extension of the RC6 cipher. PRC6 implements double encryption. At the first level, the plain text is divided into four equal parts, each encrypted by processes derived from RC6, which include shifting, summation, modulo arithmetic, and XOR with a generated key. The second level incorporates a Quarter round function, among others, to further obscure the encoded message. PRC6 is implemented in a parallel computing model to significantly reduce overall computation time, especially important for lightweight applications. Experimental results show that the algorithm can achieve a high level of security for cloud workloads. It activates parallel mode in just seven encryption rounds, cutting calculation time to 50% in a matter of seconds. Performance evaluations against popular encryption standards also indicate that PRC6 offers promising security benefits when computational resources are limited. This hybrid approach presents a viable solution for strengthening data protection in modern cloud systems and it stand against the most popular attacks like brute force.
现代云计算技术前景广阔,但同时也带来了新的安全挑战,阻碍了人们对这种技术的全面接受。鉴于这些服务大多使用云网络作为通信渠道,确保数据传输安全至关重要。本文介绍了一种新的混合加密算法,即所提出的双层 PRC6 密码,它是为解决云计算环境中的安全问题而量身定制的,具有最小的资源限制。PRC6 密码将 Cha-cha 的增强功能融入 RC6 密码的扩展中。PRC6 实现了双重加密。在第一层,纯文本被分成四个等分的部分,每个部分都通过 RC6 衍生的过程进行加密,包括移位、求和、模运算以及与生成密钥的 XOR。第二层包含一个四舍五入函数等,以进一步隐藏加密信息。PRC6 采用并行计算模式,大大减少了整体计算时间,这对轻量级应用尤为重要。实验结果表明,该算法能为云计算工作负载实现高水平的安全性。它只需七轮加密就能激活并行模式,在几秒钟内就能将计算时间缩短 50%。针对流行的加密标准进行的性能评估也表明,当计算资源有限时,PRC6 能提供很好的安全优势。这种混合方法为加强现代云系统中的数据保护提供了一种可行的解决方案,它可以抵御蛮力等最常见的攻击。
{"title":"PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment","authors":"Zahraa A. Mohammed, Khalid Ali Hussein","doi":"10.1002/spy2.413","DOIUrl":"https://doi.org/10.1002/spy2.413","url":null,"abstract":"Modern technologies of computing cloud are showing great promise, but at the same time create new security challenges that hinder full acceptance. Given that most of these services often use cloud networks as channels for communication, securing data transmission is crucial. This paper introduce a new hybrid encryption algorithm, the proposed two‐layered PRC6 cipher, tailored address security concerns in cloud computing environments with minimal resource constraints. The PRC6 cipher incorporates enhancements from Cha‐cha into an extension of the RC6 cipher. PRC6 implements double encryption. At the first level, the plain text is divided into four equal parts, each encrypted by processes derived from RC6, which include shifting, summation, modulo arithmetic, and XOR with a generated key. The second level incorporates a Quarter round function, among others, to further obscure the encoded message. PRC6 is implemented in a parallel computing model to significantly reduce overall computation time, especially important for lightweight applications. Experimental results show that the algorithm can achieve a high level of security for cloud workloads. It activates parallel mode in just seven encryption rounds, cutting calculation time to 50% in a matter of seconds. Performance evaluations against popular encryption standards also indicate that PRC6 offers promising security benefits when computational resources are limited. This hybrid approach presents a viable solution for strengthening data protection in modern cloud systems and it stand against the most popular attacks like brute force.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140977990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SiSMA‐SWMS: Signature‐based Secure Monitoring Approach for Smart Waste Monitoring Systems SiSMA-SWMS:基于签名的智能废物监测系统安全监测方法
IF 1.9 Pub Date : 2024-05-07 DOI: 10.1002/spy2.405
Radhika Lama, Sandip Karmakar
With the speedy growth of the populace, corresponding waste also grows, notably raising greater concern about the monitoring of waste in urban areas. Although the traditional method of waste monitoring has benefited city waste management systems, it remains time‐consuming, inefficient, and detrimental to public health. This situation can be improved by integrating advanced technologies, which can significantly enhance the flexibility and performance of waste monitoring systems. However, these advanced technologies encounter numerous security challenges. In this article, we have implemented a signature‐based monitoring approach to oversee the status of smart bins. To ensure the security, robustness, and reliability of the introduced protocol, we utilized tools such as AVISPA, Scyther, the ROR model, and Mao and Boyd logic. As discussed in the informal security analysis, the introduced protocol successfully fulfills the security requirements for smart waste monitoring systems. Finally, an in‐depth comparative analysis of the related works and the introduced protocol shows that the latter provides greater security, reliability, and efficiency. As a result, the reliability and hardness of the cryptographic operations used in the introduced protocol make it secure enough to use in real‐world applications.
随着人口的快速增长,相应的垃圾也随之增加,这尤其引起了人们对城市地区垃圾监测的更大关注。虽然传统的垃圾监测方法有利于城市垃圾管理系统,但仍然耗时长、效率低,而且不利于公众健康。这种情况可以通过整合先进技术得到改善,这些技术可以大大提高垃圾监测系统的灵活性和性能。然而,这些先进技术也遇到了许多安全挑战。在本文中,我们采用了一种基于签名的监控方法来监督智能垃圾箱的状态。为了确保所引入协议的安全性、稳健性和可靠性,我们利用了 AVISPA、Scyther、ROR 模型以及 Mao 和 Boyd 逻辑等工具。正如非正式安全分析中所讨论的那样,引入的协议成功地满足了智能废物监测系统的安全要求。最后,对相关著作和引入协议的深入对比分析表明,后者提供了更高的安全性、可靠性和效率。因此,引入协议中使用的加密操作的可靠性和硬度使其足以在实际应用中安全使用。
{"title":"SiSMA‐SWMS: Signature‐based Secure Monitoring Approach for Smart Waste Monitoring Systems","authors":"Radhika Lama, Sandip Karmakar","doi":"10.1002/spy2.405","DOIUrl":"https://doi.org/10.1002/spy2.405","url":null,"abstract":"With the speedy growth of the populace, corresponding waste also grows, notably raising greater concern about the monitoring of waste in urban areas. Although the traditional method of waste monitoring has benefited city waste management systems, it remains time‐consuming, inefficient, and detrimental to public health. This situation can be improved by integrating advanced technologies, which can significantly enhance the flexibility and performance of waste monitoring systems. However, these advanced technologies encounter numerous security challenges. In this article, we have implemented a signature‐based monitoring approach to oversee the status of smart bins. To ensure the security, robustness, and reliability of the introduced protocol, we utilized tools such as AVISPA, Scyther, the ROR model, and Mao and Boyd logic. As discussed in the informal security analysis, the introduced protocol successfully fulfills the security requirements for smart waste monitoring systems. Finally, an in‐depth comparative analysis of the related works and the introduced protocol shows that the latter provides greater security, reliability, and efficiency. As a result, the reliability and hardness of the cryptographic operations used in the introduced protocol make it secure enough to use in real‐world applications.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141005154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Short message encryption technology of Beidou communication based on SM9 基于 SM9 的北斗通信短报文加密技术
IF 1.9 Pub Date : 2024-05-07 DOI: 10.1002/spy2.411
Shi Jin, Yichun Wang, Zhaofeng Guo, Li Yang, Xiaosan Su
To reduce the security authentication time cost, forwarding delay, and enhance message security of Beidou communication short messages, this paper proposes a Beidou communication short message encryption technology based on SM9 (Mobile Code Secure Communication). This technology uses split hierarchical clustering algorithm to cluster the short message data of Beidou Communication, in order to unify the processing of similar short message data and improve the encryption efficiency of subsequent short messages. Based on the data clustering results, this paper constructs a short message forwarding verification model using the SM9 identification password algorithm, and provides the message content of the communication application protocol and the communication receiving information protocol to achieve low‐cost and efficient forwarding verification. In addition, this article improves the initial value selection of Logistic chaotic mapping by coupling the tent map with coupled mapping lattice (CML) in the spatiotemporal chaos model to generate a chaotic initial value sequence, thereby expanding the key space, enhancing the ability to resist exhaustive attacks, enhancing the randomness of the generated key parameters, and optimizing the encryption effect of short messages. The experimental results show that the short message security authentication time of the technology proposed in this article is basically controlled within 25 ms, and the minimum forwarding delay is only 23.9 ms, which can effectively resist attacks and improve the security of Beidou communication.
为降低北斗通信短报文的安全认证时间成本、转发时延,提高报文安全性,本文提出了一种基于SM9(移动码安全通信)的北斗通信短报文加密技术。该技术采用拆分分层聚类算法对北斗通信短报文数据进行聚类,以统一处理同类短报文数据,提高后续短报文的加密效率。基于数据聚类结果,本文利用SM9识别口令算法构建了短报文转发验证模型,并提供了通信应用协议和通信接收信息协议的报文内容,实现了低成本、高效率的转发验证。此外,本文通过将时空混沌模型中的帐篷图与耦合映射网格(CML)耦合生成混沌初值序列,改进了Logistic混沌映射的初值选择,从而扩展了密钥空间,增强了抵御穷举攻击的能力,提高了生成密钥参数的随机性,优化了短报文的加密效果。实验结果表明,本文提出的技术的短报文安全认证时间基本控制在25 ms以内,最小转发时延仅为23.9 ms,能够有效抵御攻击,提高了北斗通信的安全性。
{"title":"Short message encryption technology of Beidou communication based on SM9","authors":"Shi Jin, Yichun Wang, Zhaofeng Guo, Li Yang, Xiaosan Su","doi":"10.1002/spy2.411","DOIUrl":"https://doi.org/10.1002/spy2.411","url":null,"abstract":"To reduce the security authentication time cost, forwarding delay, and enhance message security of Beidou communication short messages, this paper proposes a Beidou communication short message encryption technology based on SM9 (Mobile Code Secure Communication). This technology uses split hierarchical clustering algorithm to cluster the short message data of Beidou Communication, in order to unify the processing of similar short message data and improve the encryption efficiency of subsequent short messages. Based on the data clustering results, this paper constructs a short message forwarding verification model using the SM9 identification password algorithm, and provides the message content of the communication application protocol and the communication receiving information protocol to achieve low‐cost and efficient forwarding verification. In addition, this article improves the initial value selection of Logistic chaotic mapping by coupling the tent map with coupled mapping lattice (CML) in the spatiotemporal chaos model to generate a chaotic initial value sequence, thereby expanding the key space, enhancing the ability to resist exhaustive attacks, enhancing the randomness of the generated key parameters, and optimizing the encryption effect of short messages. The experimental results show that the short message security authentication time of the technology proposed in this article is basically controlled within 25 ms, and the minimum forwarding delay is only 23.9 ms, which can effectively resist attacks and improve the security of Beidou communication.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141003248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1