首页 > 最新文献

Computer Fraud and Security最新文献

英文 中文
Six steps to dealing with a ransomware attack 应对勒索软件攻击的六个步骤
Q1 Social Sciences Pub Date : 2023-10-01 DOI: 10.12968/s1361-3723(23)70047-x
Chris Dimitriadis
No organisation is safe from ransomware, and the threat it poses is only becoming more widespread and severe. However, there are ways to prepare yourself for an attack, and for dealing with the consequences once it occurs. Being ready can significantly reduce the impact when ransomware strikes.
没有任何组织可以免受勒索软件的威胁,它所构成的威胁只会变得越来越广泛和严重。然而,有一些方法可以让你为攻击做好准备,并在攻击发生后处理后果。做好准备可以大大减少勒索软件攻击时的影响。
{"title":"Six steps to dealing with a ransomware attack","authors":"Chris Dimitriadis","doi":"10.12968/s1361-3723(23)70047-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70047-x","url":null,"abstract":"No organisation is safe from ransomware, and the threat it poses is only becoming more widespread and severe. However, there are ways to prepare yourself for an attack, and for dealing with the consequences once it occurs. Being ready can significantly reduce the impact when ransomware strikes.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incident response: are alert levels now unmanageable? 事件响应:警报级别现在是否无法管理?
Q1 Social Sciences Pub Date : 2023-10-01 DOI: 10.12968/s1361-3723(23)70050-x
Brian Martin
Computer Fraud & SecurityVol. 2023, No. 10 The SandboxIncident response: are alert levels now unmanageable?Brian MartinBrian MartinIntegrity360Search for more papers by this authorBrian MartinPublished Online:31 Oct 2023https://doi.org/10.12968/S1361-3723(23)70050-XAboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. Coutinho, S et al.. ‘Cyber security skills in the UK labour market 2023’. Department for Science, Innovation and Technology (DSIT). Accessed Oct 2023. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1173325/Cyber_security_skills_in_the_UK_labour_market_2023.pdf Google Scholar2. ‘Global Incident Response Threat Report’. VMware, 2022. Accessed Oct 2023. www.vmware.com/content/dam/learn/en/amer/fy23/pdf/1553238_Global_Incident_Response_Threat_Report_Weathering_The_Storm.pdf. Google Scholar3. ‘Gartner predicts nearly half of cyber security leaders will change jobs by 2025’. Gartner, 22 Feb 2023. Accessed Oct 2023. www.gartner.com/en/newsroom/press-releases/2023-02-22-gartner-predicts-nearly-half-of-cyber security-leaders-will-change-jobs-by-2025. Google Scholar FiguresReferencesRelatedDetails 1 October 2023Volume 2023Issue 10ISSN (print): 1361-3723ISSN (online): 1873-7056 Metrics History Published online 31 October 2023 Published in print 1 October 2023 Information© MA Business Ltd.
计算机欺诈与安全卷。2023年,第10期沙箱事件响应:警报级别现在是否无法控制?Brian MartinBrian martinintegrity360搜索本文作者的更多论文Brian martin出版在线:2023年10月31日https://doi.org/10.12968/S1361-3723(23)70050-XAboutSectionsView articleView完整文本视图EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail查看文章参考文献1。库蒂尼奥等人……“2023年英国劳动力市场的网络安全技能”。科学、创新及科技部(DSIT)。2023年10月访问。https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1173325/Cyber_security_skills_in_the_UK_labour_market_2023.pdf Google Scholar2“全球事件响应威胁报告”。VMware, 2022年。2023年10月访问。www.vmware.com/content/dam/learn/en/amer/fy23/pdf/1553238_Global_Incident_Response_Threat_Report_Weathering_The_Storm.pdf。谷歌Scholar3。“高德纳预测,到2025年,近一半的网络安全领导者将换工作。”Gartner, 2023年2月22日。2023年10月访问。www.gartner.com/en/newsroom/press-releases/2023-02-22-gartner-predicts-nearly-half-of-cyber安全-领导人将改变-工作- 2025。Google Scholar FiguresReferencesRelatedDetails 2023年10月1日卷2023期10ISSN(印刷):1361-3723ISSN(在线):1873-7056 Metrics History在线出版2023年10月31日出版印刷2023年10月1日信息©MA Business Ltd。
{"title":"Incident response: are alert levels now unmanageable?","authors":"Brian Martin","doi":"10.12968/s1361-3723(23)70050-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70050-x","url":null,"abstract":"Computer Fraud & SecurityVol. 2023, No. 10 The SandboxIncident response: are alert levels now unmanageable?Brian MartinBrian MartinIntegrity360Search for more papers by this authorBrian MartinPublished Online:31 Oct 2023https://doi.org/10.12968/S1361-3723(23)70050-XAboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. Coutinho, S et al.. ‘Cyber security skills in the UK labour market 2023’. Department for Science, Innovation and Technology (DSIT). Accessed Oct 2023. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1173325/Cyber_security_skills_in_the_UK_labour_market_2023.pdf Google Scholar2. ‘Global Incident Response Threat Report’. VMware, 2022. Accessed Oct 2023. www.vmware.com/content/dam/learn/en/amer/fy23/pdf/1553238_Global_Incident_Response_Threat_Report_Weathering_The_Storm.pdf. Google Scholar3. ‘Gartner predicts nearly half of cyber security leaders will change jobs by 2025’. Gartner, 22 Feb 2023. Accessed Oct 2023. www.gartner.com/en/newsroom/press-releases/2023-02-22-gartner-predicts-nearly-half-of-cyber security-leaders-will-change-jobs-by-2025. Google Scholar FiguresReferencesRelatedDetails 1 October 2023Volume 2023Issue 10ISSN (print): 1361-3723ISSN (online): 1873-7056 Metrics History Published online 31 October 2023 Published in print 1 October 2023 Information© MA Business Ltd.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing cyber security coverage in non-computing disciplines 评估非计算学科的网络安全覆盖范围
Q1 Social Sciences Pub Date : 2023-10-01 DOI: 10.12968/s1361-3723(23)70048-1
Steven Furnell, Eliana Stavrou
Cyber security is now the concern and responsibility of everyone who uses technology, regardless of whether they are IT or security practitioners. And this needs to be reflected in education. There are many disciplines, not directly related to cyber security, where knowledge of the threats and the basic skills to combat them are becoming necessary if graduates are to fully contribute to a society safe from cyber risks.
网络安全已经成为每一个使用技术的人的关注和责任,无论是IT从业者还是安全从业者。这需要在教育中得到反映。在许多与网络安全没有直接关系的学科中,如果毕业生想为一个远离网络风险的安全社会做出充分贡献,了解威胁和掌握应对威胁的基本技能就变得非常必要。
{"title":"Assessing cyber security coverage in non-computing disciplines","authors":"Steven Furnell, Eliana Stavrou","doi":"10.12968/s1361-3723(23)70048-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70048-1","url":null,"abstract":"Cyber security is now the concern and responsibility of everyone who uses technology, regardless of whether they are IT or security practitioners. And this needs to be reflected in education. There are many disciplines, not directly related to cyber security, where knowledge of the threats and the basic skills to combat them are becoming necessary if graduates are to fully contribute to a society safe from cyber risks.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The challenges of data sovereignty 数据主权的挑战
Q1 Social Sciences Pub Date : 2023-10-01 DOI: 10.12968/s1361-3723(23)70049-3
Simon Pamplin
Any companies still adopting a tech-first strategy for cyber security are entirely misunderstanding the intentions of global data protection regulation – and as a result are leaving both individuals and the business dangerously exposed. There are broader issues of data governance, including data sovereignty, that involve the whole of the organisation's management team.
任何仍在网络安全方面采取技术优先战略的公司,都完全误解了全球数据保护监管的意图,其结果是让个人和企业都面临危险。还有更广泛的数据治理问题,包括数据主权,涉及到整个组织的管理团队。
{"title":"The challenges of data sovereignty","authors":"Simon Pamplin","doi":"10.12968/s1361-3723(23)70049-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70049-3","url":null,"abstract":"Any companies still adopting a tech-first strategy for cyber security are entirely misunderstanding the intentions of global data protection regulation – and as a result are leaving both individuals and the business dangerously exposed. There are broader issues of data governance, including data sovereignty, that involve the whole of the organisation's management team.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136128930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving national security through accountability 通过问责制加强国家安全
Q1 Social Sciences Pub Date : 2023-10-01 DOI: 10.12968/s1361-3723(23)70046-8
Pieter Danhieux
The cyber security of an organisation starts with the software it uses. And that places a responsibility on software vendors to ensure that the code they ship is intrinsically secure. And that security can't be added as an afterthought – it needs to be integrated deep into the development process.
一个组织的网络安全从它使用的软件开始。这使得软件供应商有责任确保他们发布的代码本质上是安全的。而且这种安全性不能作为事后的想法而添加—它需要深入集成到开发过程中。
{"title":"Improving national security through accountability","authors":"Pieter Danhieux","doi":"10.12968/s1361-3723(23)70046-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70046-8","url":null,"abstract":"The cyber security of an organisation starts with the software it uses. And that places a responsibility on software vendors to ensure that the code they ship is intrinsically secure. And that security can't be added as an afterthought – it needs to be integrated deep into the development process.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
To get the best value out of data, you have to protect it 为了从数据中获得最大的价值,您必须保护它
Q1 Social Sciences Pub Date : 2023-09-01 DOI: 10.12968/s1361-3723(23)70042-0
Jason Foster
It has become a truism that data is the lifeblood of any modern organisation. But to reap the maximum value from data, you have to use it – and that makes it vulnerable. But this means you should view implementing an effective data security as a business investment – unlocking the potential of your data while keeping the organisation safe.
数据是任何现代组织的命脉,这已成为老生常谈。但是为了从数据中获得最大的价值,你必须使用它——这使得它很容易受到攻击。但这意味着你应该将实施有效的数据安全视为一项商业投资——在保证组织安全的同时释放数据的潜力。
{"title":"To get the best value out of data, you have to protect it","authors":"Jason Foster","doi":"10.12968/s1361-3723(23)70042-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70042-0","url":null,"abstract":"It has become a truism that data is the lifeblood of any modern organisation. But to reap the maximum value from data, you have to use it – and that makes it vulnerable. But this means you should view implementing an effective data security as a business investment – unlocking the potential of your data while keeping the organisation safe.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adding AI to NDR in the face of current threats 在面对当前威胁时,将AI添加到NDR中
Q1 Social Sciences Pub Date : 2023-09-01 DOI: 10.12968/s1361-3723(23)70043-2
Jacques de la Rivière
Threat actors exhibit highly agile behaviour, capable of evolving and adapting as new vulnerabilities become evident. Most organisations, however, don't have the same kind of flexibility and are constantly fighting last year's battles. Network detection and response (NDR) solutions have arisen to tackle this problem, and now with the added power of artificial intelligence they have the potential to give organisations the ability to react and respond quickly to new threats.
威胁行为者表现出高度敏捷的行为,能够随着新的漏洞变得明显而进化和适应。然而,大多数组织没有同样的灵活性,并且一直在与去年的战斗作斗争。网络检测和响应(NDR)解决方案已经出现,以解决这个问题,现在随着人工智能的增加,它们有可能使组织能够对新威胁做出快速反应和响应。
{"title":"Adding AI to NDR in the face of current threats","authors":"Jacques de la Rivière","doi":"10.12968/s1361-3723(23)70043-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70043-2","url":null,"abstract":"Threat actors exhibit highly agile behaviour, capable of evolving and adapting as new vulnerabilities become evident. Most organisations, however, don't have the same kind of flexibility and are constantly fighting last year's battles. Network detection and response (NDR) solutions have arisen to tackle this problem, and now with the added power of artificial intelligence they have the potential to give organisations the ability to react and respond quickly to new threats.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How providers can help SMBs navigate the rising tide of attacks 供应商如何帮助中小企业应对不断上升的攻击浪潮
Q1 Social Sciences Pub Date : 2023-09-01 DOI: 10.12968/s1361-3723(23)70045-6
Darren Williams
In the vast, ever-changing threat landscape that encompasses the cyber world, small-to-medium businesses (SMBs) find themselves in a particularly vulnerable position. The paradox of the digital economy is that while it opens unparalleled opportunities for SMBs, it also exposes them to a landscape of cyber security threats that are both complex and continually evolving.
在包含网络世界的巨大且不断变化的威胁环境中,中小型企业(smb)发现自己处于特别脆弱的位置。数字经济的悖论在于,虽然它为中小企业提供了无与伦比的机会,但也使它们面临复杂且不断演变的网络安全威胁。
{"title":"How providers can help SMBs navigate the rising tide of attacks","authors":"Darren Williams","doi":"10.12968/s1361-3723(23)70045-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70045-6","url":null,"abstract":"In the vast, ever-changing threat landscape that encompasses the cyber world, small-to-medium businesses (SMBs) find themselves in a particularly vulnerable position. The paradox of the digital economy is that while it opens unparalleled opportunities for SMBs, it also exposes them to a landscape of cyber security threats that are both complex and continually evolving.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are we ready for the next WannaCry? 我们准备好迎接下一个“想哭”了吗?
Q1 Social Sciences Pub Date : 2023-09-01 DOI: 10.12968/s1361-3723(23)70041-9
Mark Cunningham-Dickie
The WannaCry and NotPetya attacks alerted the world to the massive disruption that can be caused by cyber attacks. They also highlighted weaknesses and a lack of investment in our defences. Since then, the threats we face have moved on, having become significantly more sophisticated not least due to the exploitation of artificial intelligence and machine learning. So are we ready for the next big attack?
“想哭”(WannaCry)和“NotPetya”攻击让全世界意识到,网络攻击可能造成巨大破坏。他们还强调了我们在防御方面的弱点和缺乏投资。从那以后,我们面临的威胁不断发展,变得更加复杂,尤其是由于对人工智能和机器学习的利用。我们准备好迎接下一次大袭击了吗?
{"title":"Are we ready for the next WannaCry?","authors":"Mark Cunningham-Dickie","doi":"10.12968/s1361-3723(23)70041-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70041-9","url":null,"abstract":"The WannaCry and NotPetya attacks alerted the world to the massive disruption that can be caused by cyber attacks. They also highlighted weaknesses and a lack of investment in our defences. Since then, the threats we face have moved on, having become significantly more sophisticated not least due to the exploitation of artificial intelligence and machine learning. So are we ready for the next big attack?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The good and bad of generative AI 生成式AI的好与坏
Q1 Social Sciences Pub Date : 2023-09-01 DOI: 10.12968/s1361-3723(23)70044-4
Bernard Montel
{"title":"The good and bad of generative AI","authors":"Bernard Montel","doi":"10.12968/s1361-3723(23)70044-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70044-4","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Fraud and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1