首页 > 最新文献

2019 3rd Cyber Security in Networking Conference (CSNet)最新文献

英文 中文
IoT Cybersecurity based Smart Home Intrusion Prevention System 基于物联网网络安全的智能家居入侵防御系统
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108938
Fathima James
The Internet of Things (IoT) devices are becoming more popular in various domains such as e-Home, e-Health, e-Commerce, e-banking, e-Enterprises, e-Learning and e-Trafficking. The IoT is not only connecting computer and mobile devices, it also interconnects smart homes, buildings, companies and cities.With increased deployment of IoT devices in domestic smart home environment, the threats and challenges also need to be addressed in order to improve and build a secure and resilient cybersecurity based IoT smart infrastructure. Moreover, IoT smart environment tackles more security issues than traditional computer networks usually do. While many researchers are trying to explore the security challenges and open problems in smart home based IoT infrastructure, there is a lack of a systematic study of the security challenges in the IoT cybersecurity landscape. However, Smart home environment and IoT services will introduce significant security challenges due to the substantial increase in the number of computing resources, attack surface, communications infrastructure and attack rates. In this paper, we intent to fulfil this gap by executing the IoT cybersecurity-based attacks to detect the most critical attacks for smart home IoT end devices. At the same time, we present our intrusion prevention system methodology in order to protect the affected system from future attacks.
物联网(IoT)设备在电子家庭、电子医疗、电子商务、电子银行、电子企业、电子学习和电子交易等各个领域越来越受欢迎。物联网不仅连接计算机和移动设备,还连接智能家居、建筑、公司和城市。随着物联网设备在国内智能家居环境中部署的增加,也需要应对威胁和挑战,以改善和建立一个安全、有弹性的基于网络安全的物联网智能基础设施。此外,物联网智能环境比传统计算机网络通常解决更多的安全问题。虽然许多研究人员正试图探索基于物联网基础设施的智能家居中的安全挑战和开放问题,但缺乏对物联网网络安全领域的安全挑战的系统研究。然而,由于计算资源、攻击面、通信基础设施和攻击率的大幅增加,智能家居环境和物联网服务将带来重大的安全挑战。在本文中,我们打算通过执行基于物联网网络安全的攻击来检测智能家居物联网终端设备的最关键攻击来填补这一空白。同时,我们提出了我们的入侵防御系统方法,以保护受影响的系统免受未来的攻击。
{"title":"IoT Cybersecurity based Smart Home Intrusion Prevention System","authors":"Fathima James","doi":"10.1109/CSNet47905.2019.9108938","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108938","url":null,"abstract":"The Internet of Things (IoT) devices are becoming more popular in various domains such as e-Home, e-Health, e-Commerce, e-banking, e-Enterprises, e-Learning and e-Trafficking. The IoT is not only connecting computer and mobile devices, it also interconnects smart homes, buildings, companies and cities.With increased deployment of IoT devices in domestic smart home environment, the threats and challenges also need to be addressed in order to improve and build a secure and resilient cybersecurity based IoT smart infrastructure. Moreover, IoT smart environment tackles more security issues than traditional computer networks usually do. While many researchers are trying to explore the security challenges and open problems in smart home based IoT infrastructure, there is a lack of a systematic study of the security challenges in the IoT cybersecurity landscape. However, Smart home environment and IoT services will introduce significant security challenges due to the substantial increase in the number of computing resources, attack surface, communications infrastructure and attack rates. In this paper, we intent to fulfil this gap by executing the IoT cybersecurity-based attacks to detect the most critical attacks for smart home IoT end devices. At the same time, we present our intrusion prevention system methodology in order to protect the affected system from future attacks.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115491617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The EMV Payment System: Is It Reliable? EMV支付系统:可靠吗?
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108846
Nour El Madhoun, E. Bertin, G. Pujolle
EMV (Europay MasterCard Visa) is the technical international protocol implemented to secure the communication, between a client’s payment device and a PoS (Point of Sale), during a contact or contactless-NFC purchase transaction. In this paper, we are interested in examining the reliability of this protocol.
EMV (Europay MasterCard Visa)是一种技术国际协议,用于在接触或非接触式nfc购买交易期间,确保客户支付设备与PoS(销售点)之间的通信安全。在本文中,我们感兴趣的是检查该协议的可靠性。
{"title":"The EMV Payment System: Is It Reliable?","authors":"Nour El Madhoun, E. Bertin, G. Pujolle","doi":"10.1109/CSNet47905.2019.9108846","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108846","url":null,"abstract":"EMV (Europay MasterCard Visa) is the technical international protocol implemented to secure the communication, between a client’s payment device and a PoS (Point of Sale), during a contact or contactless-NFC purchase transaction. In this paper, we are interested in examining the reliability of this protocol.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130337600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards Blockchain Services For Mobile Money Traceability And Federation 面向移动货币可追溯性和联邦的区块链服务
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108970
Kodjo Edem Agbezoutsi, P. Urien, Toundé Mesmin Dandjinou
This paper discusses a new approach to mobile money, a money transfer solution via mobile phone, which uses accounts associated with SIM (Subscriber Identity Module) identifiers, and which are managed by the Mobile Network Operators (MNOs). The first solution launched in Kenya in 2007, M-PESA is one of the world major mobile money services. Mobile money becomes the new monopoly of MMOs in an economic system where the rate of unbanked adults is very high. Currently in 2019 Orange Money makes nearly 1.5 million transactions per day, which corresponds to a monetary value of nearly 15 billion CFA francs per day. The USSD is the technology at the heart of the Mobile-money transactions. Blockchain, which is the underlying technology of the first crypto currency Bitcoin, has drawn a lot of global attention in recent years. Blockchain does not stop seeing its field of action widen. The field of action of the Blockchain has not yet completed its enlargement. The rate of unbanked is still very high in developing countries; this rate is a factor that does not favor the emergence of the economy. It is necessary to count on the mobile money to skip this obstacle (according to the World Bank) we make here the state of the art on the mobile money and its underlying technologies in the sub-Saharan countries and in Burkina-Faso. We propose a mobile-money solution based on the Blockchain, in order to increase security, trust, and move towards a federation of mobile-money platforms.
本文讨论了一种移动货币的新方法,一种通过移动电话转账的解决方案,它使用与SIM(用户身份模块)标识符相关的账户,并由移动网络运营商(MNOs)管理。M-PESA是2007年在肯尼亚推出的第一个解决方案,是世界上主要的移动货币服务之一。在没有银行账户的成年人比例非常高的经济体系中,移动货币成为mmo游戏的新垄断。目前,2019年Orange Money每天进行近150万笔交易,相当于每天近150亿非洲法郎的货币价值。USSD是移动货币交易的核心技术。区块链是第一种加密货币比特币的基础技术,近年来引起了全球的广泛关注。区块链并没有停止看到它的行动领域扩大。区块链的行动领域尚未完成扩大。在发展中国家,没有银行账户的比率仍然很高;这是一个不利于经济崛起的因素。有必要依靠移动货币来跳过这个障碍(根据世界银行的说法),我们在这里介绍了撒哈拉以南国家和布基纳法索移动货币及其基础技术的最新进展。我们提出了一个基于区块链的移动货币解决方案,以增加安全性,信任,并朝着移动货币平台联盟的方向发展。
{"title":"Towards Blockchain Services For Mobile Money Traceability And Federation","authors":"Kodjo Edem Agbezoutsi, P. Urien, Toundé Mesmin Dandjinou","doi":"10.1109/CSNet47905.2019.9108970","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108970","url":null,"abstract":"This paper discusses a new approach to mobile money, a money transfer solution via mobile phone, which uses accounts associated with SIM (Subscriber Identity Module) identifiers, and which are managed by the Mobile Network Operators (MNOs). The first solution launched in Kenya in 2007, M-PESA is one of the world major mobile money services. Mobile money becomes the new monopoly of MMOs in an economic system where the rate of unbanked adults is very high. Currently in 2019 Orange Money makes nearly 1.5 million transactions per day, which corresponds to a monetary value of nearly 15 billion CFA francs per day. The USSD is the technology at the heart of the Mobile-money transactions. Blockchain, which is the underlying technology of the first crypto currency Bitcoin, has drawn a lot of global attention in recent years. Blockchain does not stop seeing its field of action widen. The field of action of the Blockchain has not yet completed its enlargement. The rate of unbanked is still very high in developing countries; this rate is a factor that does not favor the emergence of the economy. It is necessary to count on the mobile money to skip this obstacle (according to the World Bank) we make here the state of the art on the mobile money and its underlying technologies in the sub-Saharan countries and in Burkina-Faso. We propose a mobile-money solution based on the Blockchain, in order to increase security, trust, and move towards a federation of mobile-money platforms.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Risk Management Framework and A Generalized Attack Automata for IoT based Smart Home Environment 基于物联网的智能家居环境的风险管理框架和广义攻击自动机
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108941
Fathima James
Security has been identified as one of the top barriers of Internet of Things (IoT) based smart home environment. The vulnerabilities in IoT based systems produce security threats and challenges that affect smart environment applications. Since smart home is the fastest developing field of IoT technology, it provides innovative, intellectual, ubiquitous and interactive services to users using different operations. Due to internet-connected, dynamic and heterogeneous nature, smart home environment creates new security, authentication, access control and privacy challenges. To increase information security and integrity, the IoT based smart environment crucially needs an attack model along with a risk management framework. In this paper, we propose the finite state automata-based attack model in order to investigate smart home based security attacks and then evaluate their impact with our proposed risk management framework in order to mitigate IoT smart home related crucial attacks. Finally, through the analysis of typical attack behavior and risk management framework, it shows that the proposed framework is practicable and effective.
安全性已被确定为基于物联网(IoT)的智能家居环境的最大障碍之一。基于物联网的系统中的漏洞会产生影响智能环境应用的安全威胁和挑战。智能家居是物联网技术发展最快的领域,通过不同的操作方式为用户提供创新、智能、泛在、互动的服务。由于互联网连接、动态和异构的特性,智能家居环境对安全、认证、访问控制和隐私提出了新的挑战。为了提高信息的安全性和完整性,基于物联网的智能环境迫切需要一个攻击模型以及风险管理框架。在本文中,我们提出了基于有限状态自动机的攻击模型,以调查基于智能家居的安全攻击,然后用我们提出的风险管理框架评估其影响,以减轻物联网智能家居相关的关键攻击。最后,通过对典型攻击行为和风险管理框架的分析,验证了所提框架的可行性和有效性。
{"title":"A Risk Management Framework and A Generalized Attack Automata for IoT based Smart Home Environment","authors":"Fathima James","doi":"10.1109/CSNet47905.2019.9108941","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108941","url":null,"abstract":"Security has been identified as one of the top barriers of Internet of Things (IoT) based smart home environment. The vulnerabilities in IoT based systems produce security threats and challenges that affect smart environment applications. Since smart home is the fastest developing field of IoT technology, it provides innovative, intellectual, ubiquitous and interactive services to users using different operations. Due to internet-connected, dynamic and heterogeneous nature, smart home environment creates new security, authentication, access control and privacy challenges. To increase information security and integrity, the IoT based smart environment crucially needs an attack model along with a risk management framework. In this paper, we propose the finite state automata-based attack model in order to investigate smart home based security attacks and then evaluate their impact with our proposed risk management framework in order to mitigate IoT smart home related crucial attacks. Finally, through the analysis of typical attack behavior and risk management framework, it shows that the proposed framework is practicable and effective.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"93 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120850651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC 基于WebRTC的笔记本电脑和智能手机键盘声学认证验证
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108962
C. Tietz, Eric Klieme, Lukas Behrendt, Pawel Böning, Leonard Marschke, C. Meinel
This paper evaluates authentication based on sounds emitted while typing on a laptop’s keyboard only with the help of the integrated microphones and a smartphone placed nearby. The sound samples of 26 individuals were recorded in a novel real-world scenario using only web technologies. The data of laptop and the smartphone was compared based on existing approaches. They can reach Equal-Error-Rates (EERs) of 11.2% on the laptop data and 9.3% on the smartphone data.
该论文仅利用集成麦克风和放置在附近的智能手机,根据在笔记本电脑键盘上打字时发出的声音来评估身份。26个人的声音样本被记录在一个新的现实世界场景中,只使用网络技术。在现有方法的基础上,对笔记本电脑和智能手机的数据进行比较。他们在笔记本电脑数据上的平均错误率(EERs)达到11.2%,在智能手机数据上达到9.3%。
{"title":"Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC","authors":"C. Tietz, Eric Klieme, Lukas Behrendt, Pawel Böning, Leonard Marschke, C. Meinel","doi":"10.1109/CSNet47905.2019.9108962","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108962","url":null,"abstract":"This paper evaluates authentication based on sounds emitted while typing on a laptop’s keyboard only with the help of the integrated microphones and a smartphone placed nearby. The sound samples of 26 individuals were recorded in a novel real-world scenario using only web technologies. The data of laptop and the smartphone was compared based on existing approaches. They can reach Equal-Error-Rates (EERs) of 11.2% on the laptop data and 9.3% on the smartphone data.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122785969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-based collaborative defences in multi network alliances 多网络联盟中基于信任的协同防御
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108945
R. Koning, A. Deljoo, Lydia Meijer, C. D. Laat, P. Grosso
Collaborative defences against, for example, Distributed Denial of Service attacks require trust between the collaborators. Even in a trusted alliance of collaborators, some members are more trusted than others with the execution of a specific task. This paper shows that trust can be used as a criterion in collaborative defences against attacks on computer infrastructures. We evaluate the implementation of a trust based defence in an overlay network and compare its’ performance to other collaborative defences in the same environment. Results show that the trust-based defence has comparable results to the other collaborative defences after the trust values converge to reflect the behaviour of the nodes.
例如,协作防御分布式拒绝服务攻击需要协作者之间的信任。即使在一个值得信任的合作者联盟中,在执行特定任务时,一些成员也比其他成员更值得信任。本文表明,信任可以作为协同防御计算机基础设施攻击的标准。我们评估的实现基于信任的国防,覆盖网络和比较其性能与其他协作防御在相同的环境中。结果表明,在信任值收敛反映节点行为后,基于信任的防御与其他协同防御效果相当。
{"title":"Trust-based collaborative defences in multi network alliances","authors":"R. Koning, A. Deljoo, Lydia Meijer, C. D. Laat, P. Grosso","doi":"10.1109/CSNet47905.2019.9108945","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108945","url":null,"abstract":"Collaborative defences against, for example, Distributed Denial of Service attacks require trust between the collaborators. Even in a trusted alliance of collaborators, some members are more trusted than others with the execution of a specific task. This paper shows that trust can be used as a criterion in collaborative defences against attacks on computer infrastructures. We evaluate the implementation of a trust based defence in an overlay network and compare its’ performance to other collaborative defences in the same environment. Results show that the trust-based defence has comparable results to the other collaborative defences after the trust values converge to reflect the behaviour of the nodes.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133336139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building 网络安全信息共享:通过能力建设增强安全、信任和隐私
Pub Date : 2019-10-01 DOI: 10.1109/CSNet47905.2019.9108944
Solange Ghernaouti, L. Cellier, Bastien Wanner
This article focuses on the importance of information sharing practices for capacity building competences in the field of cybersecurity.It analyses needs and constraints of information sharing to produce security and cyberresilience that promote trust and confidence in cyberspace. It identifies the different types of information that can be shared as well as the main vectors for supporting information sharing. By proposing five applications of information sharing in cybersecurity, it focusses on education and warning in order to enforce people competencies.High-level recommendations are proposed in conclusion for the establishment of a platform for information sharing and analysis.
本文重点讨论了信息共享实践对网络安全领域能力建设的重要性。它分析了信息共享的需求和限制,以产生安全和网络弹性,促进网络空间的信任和信心。它确定了可以共享的不同类型的信息以及支持信息共享的主要向量。通过提出信息共享在网络安全中的五种应用,它侧重于教育和警告,以加强人们的能力。最后提出了建立信息共享和分析平台的高级别建议。
{"title":"Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building","authors":"Solange Ghernaouti, L. Cellier, Bastien Wanner","doi":"10.1109/CSNet47905.2019.9108944","DOIUrl":"https://doi.org/10.1109/CSNet47905.2019.9108944","url":null,"abstract":"This article focuses on the importance of information sharing practices for capacity building competences in the field of cybersecurity.It analyses needs and constraints of information sharing to produce security and cyberresilience that promote trust and confidence in cyberspace. It identifies the different types of information that can be shared as well as the main vectors for supporting information sharing. By proposing five applications of information sharing in cybersecurity, it focusses on education and warning in order to enforce people competencies.High-level recommendations are proposed in conclusion for the establishment of a platform for information sharing and analysis.","PeriodicalId":350566,"journal":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124055056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2019 3rd Cyber Security in Networking Conference (CSNet)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1