Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188862
Aimilios Chourmouziadis, O. Gonzalez, G. Pavlou
Efficient Web Services (WS) based network monitoring of managed devices is a difficult task due to the relatively big overhead WS impose. In the past we proposed mechanisms to perform distributed monitoring efficiently, minimizing the relevant overhead. Standardization of WS operations is also important in order to achieve interoperability. The WS Resource Framework (WSRF) tries to standardize the messages exchanged with resources representing the state of a device. Adopting WSRF's concepts, the Management Using Web Services (MUWS) standard aims to support device management in an interoperable manner. In this paper we propose methods to use the mechanisms introduced in our previous work combined with MUWS in order to establish the means to retrieve management information efficiently and at the same time achieve interoperability. We also present our experiences in using custom as well as standardized solutions for monitoring devices that range from small to large resource-capable systems. We describe the motivations for this research and present ideas on techniques that need to be adopted for WS based monitoring based on what we have learned in the process.
{"title":"Experiences in using MUWS for scalable distributed monitoring","authors":"Aimilios Chourmouziadis, O. Gonzalez, G. Pavlou","doi":"10.1109/INM.2009.5188862","DOIUrl":"https://doi.org/10.1109/INM.2009.5188862","url":null,"abstract":"Efficient Web Services (WS) based network monitoring of managed devices is a difficult task due to the relatively big overhead WS impose. In the past we proposed mechanisms to perform distributed monitoring efficiently, minimizing the relevant overhead. Standardization of WS operations is also important in order to achieve interoperability. The WS Resource Framework (WSRF) tries to standardize the messages exchanged with resources representing the state of a device. Adopting WSRF's concepts, the Management Using Web Services (MUWS) standard aims to support device management in an interoperable manner. In this paper we propose methods to use the mechanisms introduced in our previous work combined with MUWS in order to establish the means to retrieve management information efficiently and at the same time achieve interoperability. We also present our experiences in using custom as well as standardized solutions for monitoring devices that range from small to large resource-capable systems. We describe the motivations for this research and present ideas on techniques that need to be adopted for WS based monitoring based on what we have learned in the process.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125728538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188784
Carol J. Fung, Jie Zhang, I. Aib, R. Boutaba
The accuracy of detecting intrusions within an Intrusion Detection Network (IDN) depends on the efficiency of collaboration between the peer Intrusion Detection Systems (IDSes) as well as the security itself of the IDN against insider threats. In this paper, we study host-based IDNs and introduce a Dirichlet-based model to measure the level of trustworthiness among peer IDSes according to their mutual experience. The model has strong scalability properties and is robust against common insider threats, such as a compromised or malfunctioning peer. We evaluate our system based on a simulated collaborative host-based IDS network. The experimental results demonstrate the improved robustness, efficiency, and scalability of our system in detecting intrusions in comparison with existing models.
{"title":"Robust and scalable trust management for collaborative intrusion detection","authors":"Carol J. Fung, Jie Zhang, I. Aib, R. Boutaba","doi":"10.1109/INM.2009.5188784","DOIUrl":"https://doi.org/10.1109/INM.2009.5188784","url":null,"abstract":"The accuracy of detecting intrusions within an Intrusion Detection Network (IDN) depends on the efficiency of collaboration between the peer Intrusion Detection Systems (IDSes) as well as the security itself of the IDN against insider threats. In this paper, we study host-based IDNs and introduce a Dirichlet-based model to measure the level of trustworthiness among peer IDSes according to their mutual experience. The model has strong scalability properties and is robust against common insider threats, such as a compromised or malfunctioning peer. We evaluate our system based on a simulated collaborative host-based IDS network. The experimental results demonstrate the improved robustness, efficiency, and scalability of our system in detecting intrusions in comparison with existing models.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125942457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188877
H. Sanneck, L. Schmelz, E. Troch, L. D. Bie
In access networks, the roll-out of new network elements (NE) or changes to the NE HW and SW cause considerable overhead. The total number of NE is significant and is increasing for new radio access technologies like Long Term Evolution (LTE) due to the decreasing cell size. Furthermore for network scenarios like femto access points / home NEs conventional network deployment and management approaches where the network is fully planned and NEs are tightly managed cannot be followed any more. Furthermore the increased security requirements by operators for such network deployments have to be observed. An auto-connectivity scheme which incorporates the NE's security setup is proposed which tries to balance the trade-off between automation (avoiding any manual intervention) and security. This is achieved by shifting manufacturer and operator activities to a preparation (rather than the actual roll-out) phase and eliminating any interaction between them as much as possible. The NE is delivered only with an “off-theshelf” software & configuration installation. Only at the point in time when the NE is placed on site, the NE hardware-to-site mapping happening is executed. Together with mutual authentication between NE and the Operation, Administration and Maintenance (OAM) system it is possible to enable a very flexible and secure roll-out process.
{"title":"Auto-connectivity and security setup for access network elements","authors":"H. Sanneck, L. Schmelz, E. Troch, L. D. Bie","doi":"10.1109/INM.2009.5188877","DOIUrl":"https://doi.org/10.1109/INM.2009.5188877","url":null,"abstract":"In access networks, the roll-out of new network elements (NE) or changes to the NE HW and SW cause considerable overhead. The total number of NE is significant and is increasing for new radio access technologies like Long Term Evolution (LTE) due to the decreasing cell size. Furthermore for network scenarios like femto access points / home NEs conventional network deployment and management approaches where the network is fully planned and NEs are tightly managed cannot be followed any more. Furthermore the increased security requirements by operators for such network deployments have to be observed. An auto-connectivity scheme which incorporates the NE's security setup is proposed which tries to balance the trade-off between automation (avoiding any manual intervention) and security. This is achieved by shifting manufacturer and operator activities to a preparation (rather than the actual roll-out) phase and eliminating any interaction between them as much as possible. The NE is delivered only with an “off-theshelf” software & configuration installation. Only at the point in time when the NE is placed on site, the NE hardware-to-site mapping happening is executed. Together with mutual authentication between NE and the Operation, Administration and Maintenance (OAM) system it is possible to enable a very flexible and secure roll-out process.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188842
M. Cristea, R. Strijkers, D. Marchal, L. Gommans, C. D. Laat, R. Meijer
This paper presents the generalised Token Based Networking (gTBN) architecture, which enables dynamic binding of communities and their applications to specialised network services. gTBN uses protocol independent tokens to provide decoupling of authorisation from time of usage as well as identification of network traffic. The tokenised traffic allows specialised software components uploaded into network elements to execute services specific to communities. A reference implementation of gTBN over IPv4 is proposed as well as the presentation of our experiments. These experiments include validation tests of our test bed with common grid applications such as GridFTP, OpenMPI, and VLC. In addition, we present a firewalling use case based on gTBN.
{"title":"Supporting communities in programmable grid networks: gTBN","authors":"M. Cristea, R. Strijkers, D. Marchal, L. Gommans, C. D. Laat, R. Meijer","doi":"10.1109/INM.2009.5188842","DOIUrl":"https://doi.org/10.1109/INM.2009.5188842","url":null,"abstract":"This paper presents the generalised Token Based Networking (gTBN) architecture, which enables dynamic binding of communities and their applications to specialised network services. gTBN uses protocol independent tokens to provide decoupling of authorisation from time of usage as well as identification of network traffic. The tokenised traffic allows specialised software components uploaded into network elements to execute services specific to communities. A reference implementation of gTBN over IPv4 is proposed as well as the presentation of our experiments. These experiments include validation tests of our test bed with common grid applications such as GridFTP, OpenMPI, and VLC. In addition, we present a firewalling use case based on gTBN.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188823
A. Bagchi, F. Caruso, A. Mayer, R. Roman, Prabha Kumar, S. Kowtha
An ongoing trend within the telecommunications industry has been toward providing end-to-end (E2E) IP based services. Accordingly, the associated management perspective has shifted from management of services within a single service provider domain towards a multi-domain paradigm supporting an E2E service view in which relationships among service providers, suppliers and customers and the related service level agreements (SLAs) take on major significance. In order to achieve multi-domain management, it is essential that a service management framework be put in place that supports planning, fulfilling, and assuring E2E services, including management of Service Requests, Service Assurance, and SLAs. The collecting and fusing of information from multiple sources, many external to the service provider's domain, to support the required E2E perspective has become an essential process.
{"title":"Framework to achieve multi-domain service management","authors":"A. Bagchi, F. Caruso, A. Mayer, R. Roman, Prabha Kumar, S. Kowtha","doi":"10.1109/INM.2009.5188823","DOIUrl":"https://doi.org/10.1109/INM.2009.5188823","url":null,"abstract":"An ongoing trend within the telecommunications industry has been toward providing end-to-end (E2E) IP based services. Accordingly, the associated management perspective has shifted from management of services within a single service provider domain towards a multi-domain paradigm supporting an E2E service view in which relationships among service providers, suppliers and customers and the related service level agreements (SLAs) take on major significance. In order to achieve multi-domain management, it is essential that a service management framework be put in place that supports planning, fulfilling, and assuring E2E services, including management of Service Requests, Service Assurance, and SLAs. The collecting and fusing of information from multiple sources, many external to the service provider's domain, to support the required E2E perspective has become an essential process.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133119119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188829
Y. Abdelmalek, A. A. E. Al, T. Saadawi
In this paper, we address the problem of collaborative video caching in ad hoc mobile networks. We consider network portraying static video server with wired interface to gateway node that is equipped with wireless interfaces, other nodes are requiring access to the video streams that is stored at video server. In order to reduce the average access latency as well as enhance the video accessibility, efficient video caching placement and replacement strategies are crucial at some of the distributed intermediate nodes across the network. Virtual backbone caching nodes will be elected by executing caching placement algorithm after running the routing protocol phase. The simulation results indicate that the proposed collaborative aggregate cache mechanism can significantly improve the video QoS in terms of packet loss and average packet delay.
{"title":"Collaborative content caching algorithms in mobile ad hoc networks environment","authors":"Y. Abdelmalek, A. A. E. Al, T. Saadawi","doi":"10.1109/INM.2009.5188829","DOIUrl":"https://doi.org/10.1109/INM.2009.5188829","url":null,"abstract":"In this paper, we address the problem of collaborative video caching in ad hoc mobile networks. We consider network portraying static video server with wired interface to gateway node that is equipped with wireless interfaces, other nodes are requiring access to the video streams that is stored at video server. In order to reduce the average access latency as well as enhance the video accessibility, efficient video caching placement and replacement strategies are crucial at some of the distributed intermediate nodes across the network. Virtual backbone caching nodes will be elected by executing caching placement algorithm after running the routing protocol phase. The simulation results indicate that the proposed collaborative aggregate cache mechanism can significantly improve the video QoS in terms of packet loss and average packet delay.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125106381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188812
Byungchul Park, Y. Won, Hwanjo Yu, J. W. Hong, Hong-Sun Noh, Jang Jin Lee
Industrial process control IP networks support communications between process control applications and devices. Communication faults in any stage of these control networks can cause delays or even shutdown of the entire manufacturing process. The current process of detecting and diagnosing communication faults is mostly manual, cumbersome, and inefficient. Detecting early symptoms of potential problems is very important but automated solutions do not yet exist. Our research goal is to automate the process of detecting and diagnosing the communication faults as well as to prevent problems by detecting early symptoms of potential problems. To achieve our goal, we have first investigated real-world fault cases and summarized control network failures. We have also defined network metrics and their alarm conditions to detect early symptoms for communication failures between process control servers and devices. In particular, we leverage data mining techniques to train the system to learn the rules of network faults in control networks and our testing results show that these rules are very effective. In our earlier work, we presented a design of a process control network monitoring and fault diagnosis system. In this paper, we focus on how the fault detection part of this system can be improved using data mining techniques.
{"title":"Fault detection in IP-based process control networks using data mining","authors":"Byungchul Park, Y. Won, Hwanjo Yu, J. W. Hong, Hong-Sun Noh, Jang Jin Lee","doi":"10.1109/INM.2009.5188812","DOIUrl":"https://doi.org/10.1109/INM.2009.5188812","url":null,"abstract":"Industrial process control IP networks support communications between process control applications and devices. Communication faults in any stage of these control networks can cause delays or even shutdown of the entire manufacturing process. The current process of detecting and diagnosing communication faults is mostly manual, cumbersome, and inefficient. Detecting early symptoms of potential problems is very important but automated solutions do not yet exist. Our research goal is to automate the process of detecting and diagnosing the communication faults as well as to prevent problems by detecting early symptoms of potential problems. To achieve our goal, we have first investigated real-world fault cases and summarized control network failures. We have also defined network metrics and their alarm conditions to detect early symptoms for communication failures between process control servers and devices. In particular, we leverage data mining techniques to train the system to learn the rules of network faults in control networks and our testing results show that these rules are very effective. In our earlier work, we presented a design of a process control network monitoring and fault diagnosis system. In this paper, we focus on how the fault detection part of this system can be improved using data mining techniques.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134102358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188800
V. Gondi, N. Agoulmine
The roaming between different WiMAX (Worldwide Interoperability for Microwave Access) networks as well as the interworking between WiMAX and other access technologies will be a key enabler for global WiMAX deployment. To provide secure and seamless roaming capability for mobile users across different access network domains, belonging to the same or different operators, we propose a roaming & interworking solution using intermediary entities, called Roaming Interworking Intermediary (RII). A generic RII-based interworking and roaming architecture between WiMAX, 3GPP (third Generation Partnership Project) and WLAN networks is presented. A test-bed has been setup, using real pre-WiMAX and Wi-Fi equipments and real operational cellular network, to demonstrate and evaluate the proposed solutions. The robustness, feasibility and efficiency of the proposed architecture are proven through different user scenarios.
{"title":"Secure interworking & roaming of WiMAX with 3G and Wi-Fi","authors":"V. Gondi, N. Agoulmine","doi":"10.1109/INM.2009.5188800","DOIUrl":"https://doi.org/10.1109/INM.2009.5188800","url":null,"abstract":"The roaming between different WiMAX (Worldwide Interoperability for Microwave Access) networks as well as the interworking between WiMAX and other access technologies will be a key enabler for global WiMAX deployment. To provide secure and seamless roaming capability for mobile users across different access network domains, belonging to the same or different operators, we propose a roaming & interworking solution using intermediary entities, called Roaming Interworking Intermediary (RII). A generic RII-based interworking and roaming architecture between WiMAX, 3GPP (third Generation Partnership Project) and WLAN networks is presented. A test-bed has been setup, using real pre-WiMAX and Wi-Fi equipments and real operational cellular network, to demonstrate and evaluate the proposed solutions. The robustness, feasibility and efficiency of the proposed architecture are proven through different user scenarios.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134117575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188863
Patricia Marcu, G. Grabarnik, Laura Z. Luan, D. Rosu, L. Shwartz, Christopher Ward
In recent years, IT Service Management (ITSM) has become one of the most researched areas of IT. Incident and Problem Management are two of the Service Operation processes in the IT Infrastructure Library (ITIL). These two processes aim to recognize, log, isolate and correct errors which occur in the environment and disrupt the delivery of services. Incident Management and Problem Management form the basis of the tooling provided by an Incident Ticket Systems (ITS).
{"title":"Towards an optimized model of incident ticket correlation","authors":"Patricia Marcu, G. Grabarnik, Laura Z. Luan, D. Rosu, L. Shwartz, Christopher Ward","doi":"10.1109/INM.2009.5188863","DOIUrl":"https://doi.org/10.1109/INM.2009.5188863","url":null,"abstract":"In recent years, IT Service Management (ITSM) has become one of the most researched areas of IT. Incident and Problem Management are two of the Service Operation processes in the IT Infrastructure Library (ITIL). These two processes aim to recognize, log, isolate and correct errors which occur in the environment and disrupt the delivery of services. Incident Management and Problem Management form the basis of the tooling provided by an Incident Ticket Systems (ITS).","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134349315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188809
Estêvão M. Z. Rohr, L. Granville, L. Tarouco
The use of Web services in network management has became a reality after recent researches and industry standardization effort. Although performance is a critical issue, as well as security support, no investigation so far has observed how secure Web services communications perform when employed for network management. In this paper we present a first investigation in this subject by evaluating the performance of WS-Security and XACML in a scenario where remote processes information is retrieved. Our evaluation shows that encryption and access control increase the response time more than other aspects like message signature or authentication. We also observe that messages carrying security information are 10 times larger than unsecure messages, which may prevent the retrieval of a large number of information and short periods of time.
{"title":"Evaluating WS-security and XACML in web services-based network management","authors":"Estêvão M. Z. Rohr, L. Granville, L. Tarouco","doi":"10.1109/INM.2009.5188809","DOIUrl":"https://doi.org/10.1109/INM.2009.5188809","url":null,"abstract":"The use of Web services in network management has became a reality after recent researches and industry standardization effort. Although performance is a critical issue, as well as security support, no investigation so far has observed how secure Web services communications perform when employed for network management. In this paper we present a first investigation in this subject by evaluating the performance of WS-Security and XACML in a scenario where remote processes information is retrieved. Our evaluation shows that encryption and access control increase the response time more than other aspects like message signature or authentication. We also observe that messages carrying security information are 10 times larger than unsecure messages, which may prevent the retrieval of a large number of information and short periods of time.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133031043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}