首页 > 最新文献

Journal of Internet Services and Information Security最新文献

英文 中文
An Intelligent Health Surveillance System: Predictive Modeling of Cardiovascular Parameters through Machine Learning Algorithms Using LoRa Communication and Internet of Medical Things (IoMT) 智能健康监测系统:利用 LoRa 通信和医疗物联网 (IoMT) 通过机器学习算法对心血管参数进行预测建模
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.011
P. Lavanya, Dr.I.V. Subba Reddy, Dr.V. Selvakumar, Shreesh V Deshpande
In several nations, the majority of heart attacks lead to fatality prior to patients receiving any kind of medical intervention. The traditional healthcare system is mostly passive, requiring patients to initiate contact with healthcare services independently. People often do not request the treatment if they are unconscious during a heart disease episode. The use of Internet of Medical Things (IoMT) methods offers significant advantages in addressing the issue of caring for patients with cardiac problems. These techniques may transform service delivery into ubiquitous and activate healthcare services. Low-cost remote monitoring systems are essential to implementing a widespread healthcare service. In this article, we proposed a cost-effective Personal Health Care Device(PHCD) based on the Internet of Things (IoT). The PHCD transmits user somatic signals to data acquisition devices using a LoRa (Long-range and low-power) wireless communication network. The received data is uploaded to the cloud using IoT platforms like Adafruit IO. Further, various Machine learning (ML) algorithms, Naïve Bayes, ANN, CNN, and LSTM, were applied to collected data to predict heart rate and SpO2 behavior. The performance results of different forecast models were compared to identify precise modeling and reliable forecasts to prevent emergency cardiovascular conditions.
在一些国家,大多数心脏病患者在接受任何医疗干预之前就已经死亡。传统的医疗保健系统大多是被动的,需要患者自己主动联系医疗保健服务。如果在心脏病发作时昏迷不醒,人们往往不会要求治疗。使用医疗物联网(IoMT)方法在解决心脏病患者护理问题方面具有显著优势。这些技术可将服务交付转变为无处不在的激活医疗保健服务。低成本的远程监控系统对于实施广泛的医疗保健服务至关重要。在本文中,我们提出了一种基于物联网(IoT)的经济高效的个人健康护理设备(PHCD)。个人健康护理设备通过 LoRa(长距离低功耗)无线通信网络将用户的体征信号传输到数据采集设备。接收到的数据通过 Adafruit IO 等物联网平台上传到云端。此外,还将 Naïve Bayes、ANN、CNN 和 LSTM 等各种机器学习(ML)算法应用于所收集的数据,以预测心率和 SpO2 行为。对不同预测模型的性能结果进行了比较,以确定精确的建模和可靠的预测,从而预防紧急心血管状况的发生。
{"title":"An Intelligent Health Surveillance System: Predictive Modeling of Cardiovascular Parameters through Machine Learning Algorithms Using LoRa Communication and Internet of Medical Things (IoMT)","authors":"P. Lavanya, Dr.I.V. Subba Reddy, Dr.V. Selvakumar, Shreesh V Deshpande","doi":"10.58346/jisis.2024.i1.011","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.011","url":null,"abstract":"In several nations, the majority of heart attacks lead to fatality prior to patients receiving any kind of medical intervention. The traditional healthcare system is mostly passive, requiring patients to initiate contact with healthcare services independently. People often do not request the treatment if they are unconscious during a heart disease episode. The use of Internet of Medical Things (IoMT) methods offers significant advantages in addressing the issue of caring for patients with cardiac problems. These techniques may transform service delivery into ubiquitous and activate healthcare services. Low-cost remote monitoring systems are essential to implementing a widespread healthcare service. In this article, we proposed a cost-effective Personal Health Care Device(PHCD) based on the Internet of Things (IoT). The PHCD transmits user somatic signals to data acquisition devices using a LoRa (Long-range and low-power) wireless communication network. The received data is uploaded to the cloud using IoT platforms like Adafruit IO. Further, various Machine learning (ML) algorithms, Naïve Bayes, ANN, CNN, and LSTM, were applied to collected data to predict heart rate and SpO2 behavior. The performance results of different forecast models were compared to identify precise modeling and reliable forecasts to prevent emergency cardiovascular conditions.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Data Management System for Smart Cities Leveraging Artificial Intelligence Modeling Techniques to Enhance Privacy and Security 利用人工智能建模技术加强隐私和安全的智能城市数据管理系统
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.003
Dr.V. Jyothi, Dr. Tammineni Sreelatha, Dr.T.M. Thiyagu, R. Sowndharya, N. Arvinth
Smart cities are metropolitan areas that use sophisticated technology to increase efficiency, sustainability, and overall quality of life. The potential for transformation is tremendous, with applications ranging from Internet of Things (IoT)-driven infrastructure to data-driven governance. Effectively handling the abundant data produced in smart cities requires stringent security and privacy protocols. This research aims to tackle these difficulties by introducing the suggested Artificial Intelligence-based Data Management System (AI-DMS) for Smart Cities. AI-DMS seeks to optimize the data processing pipeline, guaranteeing effectiveness throughout the process, from data extraction to publication. Implementing a Multi-Level Sensitive Model is a notable addition, as it classifies data into three categories: sensitive, quasi-sensitive, and public. This allows for more nuanced sharing of data. Privacy preservation is accomplished using Principal Component Analysis (PCA), a comprehensive technique encompassing feature mapping, selection, normalization, and transformation. The simulation results demonstrate that AI-DMS outperforms other methods. It achieves a Data Quality Score of 95.12% (training) and 93.76% (testing), a Privacy Preservation Rate of 85.23% (training) and 82.76% (testing), a Processing Efficiency of 90.54% (training) and 88.76% (testing), a Sensitivity Model Accuracy of 80.12% (training) and 78.45% (testing), and a Data Access Time of 22.76 ms (training) and 21.32 ms (testing). The results highlight AI-DMS as a reliable and effective system, guaranteeing superior smart city data management that is secure and precise. This contribution aligns with the changing urban scene, offering improvements in decision-making based on data while still ensuring privacy and security.
智慧城市是利用先进技术提高效率、可持续性和整体生活质量的大都市地区。转型的潜力巨大,应用范围从物联网(IoT)驱动的基础设施到数据驱动的治理。要有效处理智慧城市中产生的大量数据,需要严格的安全和隐私协议。本研究旨在通过为智慧城市引入基于人工智能的数据管理系统(AI-DMS)来解决这些难题。AI-DMS 致力于优化数据处理管道,保证从数据提取到发布的整个过程的有效性。实施多级敏感模型是一个值得注意的补充,因为它将数据分为三类:敏感、准敏感和公开。这使得数据共享更加细致入微。隐私保护是通过主成分分析(PCA)来实现的,这是一种包含特征映射、选择、归一化和转换的综合技术。模拟结果表明,AI-DMS 优于其他方法。它的数据质量得分达到 95.12%(训练)和 93.76%(测试),隐私保护率达到 85.23%(训练)和 82.76%(测试),处理效率达到 90.54%(训练)和 88.76%(测试),灵敏度模型准确率达到 80.12%(训练)和 78.45%(测试),数据访问时间达到 22.76 毫秒(训练)和 21.32 毫秒(测试)。结果表明,AI-DMS 是一个可靠、有效的系统,可确保安全、精确地进行卓越的智慧城市数据管理。这一贡献与不断变化的城市场景相吻合,在确保隐私和安全的同时,改进了基于数据的决策。
{"title":"A Data Management System for Smart Cities Leveraging Artificial Intelligence Modeling Techniques to Enhance Privacy and Security","authors":"Dr.V. Jyothi, Dr. Tammineni Sreelatha, Dr.T.M. Thiyagu, R. Sowndharya, N. Arvinth","doi":"10.58346/jisis.2024.i1.003","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.003","url":null,"abstract":"Smart cities are metropolitan areas that use sophisticated technology to increase efficiency, sustainability, and overall quality of life. The potential for transformation is tremendous, with applications ranging from Internet of Things (IoT)-driven infrastructure to data-driven governance. Effectively handling the abundant data produced in smart cities requires stringent security and privacy protocols. This research aims to tackle these difficulties by introducing the suggested Artificial Intelligence-based Data Management System (AI-DMS) for Smart Cities. AI-DMS seeks to optimize the data processing pipeline, guaranteeing effectiveness throughout the process, from data extraction to publication. Implementing a Multi-Level Sensitive Model is a notable addition, as it classifies data into three categories: sensitive, quasi-sensitive, and public. This allows for more nuanced sharing of data. Privacy preservation is accomplished using Principal Component Analysis (PCA), a comprehensive technique encompassing feature mapping, selection, normalization, and transformation. The simulation results demonstrate that AI-DMS outperforms other methods. It achieves a Data Quality Score of 95.12% (training) and 93.76% (testing), a Privacy Preservation Rate of 85.23% (training) and 82.76% (testing), a Processing Efficiency of 90.54% (training) and 88.76% (testing), a Sensitivity Model Accuracy of 80.12% (training) and 78.45% (testing), and a Data Access Time of 22.76 ms (training) and 21.32 ms (testing). The results highlight AI-DMS as a reliable and effective system, guaranteeing superior smart city data management that is secure and precise. This contribution aligns with the changing urban scene, offering improvements in decision-making based on data while still ensuring privacy and security.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSA-Forecaster: Stacked Model for Forecasting Child Sexual Abuse CSA-Forecaster:预测儿童性虐待的叠加模型
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.015
S. Parthasarathy, Arunraj Lakshminarayanan, A. Khan, K. J. Sathick
Child sexual abuse is a pervasive and distressing issue that poses serious threats to the well-being and development of children. Early identification and prevention of such incidents are crucial for ensuring child safety and protection. In this study, we investigate the application of stacked machine learning models for the forecasting of child sexual abuse cases. Data on child sexual abuse incidents were gathered from StatBank Denmark and used in this analysis. The geographical coordinates of the municipalities were incorporated as part of the descriptive analysis to examine the distribution and prevalence of child abuse cases. Our approach incorporates a stacked ensemble framework that combines the XGBoost, LSTM, and Random Forest algorithms. By leveraging the strength of individual models and capturing diverse patterns in the data, the stacked model aims to improve prediction performance. Our experimental results demonstrate that the CSA-Forecaster model outperforms individual models in forecasting child sexual abuse incidents. The proposed model achieved an RMSE of 0.094, MAE of 0.0712, MAPE of 0.1557, and R2 of 0.8028, indicating robust performance. The outcomes of this research have significant repercussions for the creation of proactive interventions and support systems. Child protection agencies and experts might be equipped to more effectively allocate resources and potentially prevent future abuse instances by employing machine learning models.
儿童性虐待是一个普遍存在的令人痛苦的问题,对儿童的福祉和发展构成严重威胁。早期识别和预防此类事件对于确保儿童安全和保护儿童至关重要。在本研究中,我们探讨了堆叠式机器学习模型在儿童性虐待案件预测中的应用。有关儿童性虐待事件的数据来自丹麦统计数据库,并被用于此次分析。作为描述性分析的一部分,我们还纳入了各市的地理坐标,以检查儿童性虐待案件的分布和普遍程度。我们的方法采用了堆叠集合框架,将 XGBoost、LSTM 和随机森林算法结合在一起。通过利用单个模型的优势和捕捉数据中的不同模式,堆叠模型旨在提高预测性能。实验结果表明,在预测儿童性虐待事件方面,CSA-Forecaster 模型优于单个模型。所提出的模型的 RMSE 为 0.094,MAE 为 0.0712,MAPE 为 0.1557,R2 为 0.8028,表明其性能稳健。这项研究的成果对建立积极主动的干预和支持系统具有重要意义。儿童保护机构和专家可以利用机器学习模型更有效地分配资源,并有可能预防未来的虐待事件。
{"title":"CSA-Forecaster: Stacked Model for Forecasting Child Sexual Abuse","authors":"S. Parthasarathy, Arunraj Lakshminarayanan, A. Khan, K. J. Sathick","doi":"10.58346/jisis.2024.i1.015","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.015","url":null,"abstract":"Child sexual abuse is a pervasive and distressing issue that poses serious threats to the well-being and development of children. Early identification and prevention of such incidents are crucial for ensuring child safety and protection. In this study, we investigate the application of stacked machine learning models for the forecasting of child sexual abuse cases. Data on child sexual abuse incidents were gathered from StatBank Denmark and used in this analysis. The geographical coordinates of the municipalities were incorporated as part of the descriptive analysis to examine the distribution and prevalence of child abuse cases. Our approach incorporates a stacked ensemble framework that combines the XGBoost, LSTM, and Random Forest algorithms. By leveraging the strength of individual models and capturing diverse patterns in the data, the stacked model aims to improve prediction performance. Our experimental results demonstrate that the CSA-Forecaster model outperforms individual models in forecasting child sexual abuse incidents. The proposed model achieved an RMSE of 0.094, MAE of 0.0712, MAPE of 0.1557, and R2 of 0.8028, indicating robust performance. The outcomes of this research have significant repercussions for the creation of proactive interventions and support systems. Child protection agencies and experts might be equipped to more effectively allocate resources and potentially prevent future abuse instances by employing machine learning models.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Attentional Implanted Graph Clustering Algorithm for the Visualization and Analysis of Social Networks 用于社交网络可视化和分析的深度注意力植入图聚类算法
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.010
Dr. Fernando Escobedo, Dr. Henry Bernardo Garay Canales, Dr. Eddy Miguel Aguirre Reyes, Carlos Alberto Lamadrid Vela, Oscar Napoleón Montoya Perez, Grover Enrique Caballero Jimenez
As the user base expands, social network data becomes more intricate, making analyzing the interconnections between various entities challenging. Various graph visualization technologies are employed to analyze extensive and intricate network data. Network graphs inherently possess intricacy and may have overlapping elements. Graph clustering is a basic endeavor that aims to identify communities or groupings inside networks. Recent research has mostly concentrated on developing deep learning techniques to acquire a concise representation of graphs, which is then utilized with traditional clustering methods such as k-means or spectral clustering techniques. Multiplying these two-step architectures is challenging and sometimes results in unsatisfactory performance. This is mostly due to the lack of a goal-oriented graph encoding developed explicitly for the clustering job. This work introduces a novel Deep Learning (DL) method called Deep Attentional Implanted Graph Clustering (DAIGC), designed to achieve goal-oriented clustering. Our approach centers on associated graphs to thoroughly investigate both aspects of data in graphs. The proposed DAIGC technique utilizes a Graph Attention Autoencoder (GAA) to determine the significance of nearby nodes about a target node. This allows encoding a graph's topographical structure and node value into a concise representation. Based on this representation, an interior product decoder has been trained to rebuild the graph structure. The performance of the proposed approach has been evaluated on four distinct types and sizes of real-world intricate networks, varying in vertex count from 𝑁=102 𝑡𝑜 𝑁=107. The performance of the suggested methods is evaluated by comparing them with two established and commonly used graph clustering techniques. The testing findings demonstrate the effectiveness of the proposed method in terms of processing speed and visualization compared to the state-of-the-art algorithms.
随着用户群的扩大,社交网络数据变得更加错综复杂,分析不同实体之间的相互联系变得极具挑战性。各种图形可视化技术被用来分析广泛而复杂的网络数据。网络图本质上具有复杂性,并可能存在重叠元素。图聚类是一项基本工作,旨在识别网络内部的群体或分组。最近的研究主要集中在开发深度学习技术,以获得图的简明表示,然后将其与传统聚类方法(如 k-means 或频谱聚类技术)结合使用。将这两步架构相乘具有挑战性,有时会导致性能不尽人意。这主要是由于缺乏明确针对聚类工作开发的目标导向图编码。这项工作引入了一种名为深度注意力植入图聚类(DAIGC)的新型深度学习(DL)方法,旨在实现面向目标的聚类。我们的方法以关联图为中心,深入研究图中数据的两个方面。所提出的 DAIGC 技术利用图注意力自动编码器(GAA)来确定附近节点对目标节点的重要性。这样就能将图的地形结构和节点值编码成简明的表示法。在此基础上,对内部乘积解码器进行训练,以重建图结构。我们在四种不同类型和规模的真实世界复杂网络上评估了所建议方法的性能,这些网络的顶点数从 𝑁=102 𝑡𝑜𝑁=107 不等。通过与两种成熟的常用图聚类技术进行比较,对建议方法的性能进行了评估。测试结果表明,与最先进的算法相比,建议的方法在处理速度和可视化方面非常有效。
{"title":"Deep Attentional Implanted Graph Clustering Algorithm for the Visualization and Analysis of Social Networks","authors":"Dr. Fernando Escobedo, Dr. Henry Bernardo Garay Canales, Dr. Eddy Miguel Aguirre Reyes, Carlos Alberto Lamadrid Vela, Oscar Napoleón Montoya Perez, Grover Enrique Caballero Jimenez","doi":"10.58346/jisis.2024.i1.010","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.010","url":null,"abstract":"As the user base expands, social network data becomes more intricate, making analyzing the interconnections between various entities challenging. Various graph visualization technologies are employed to analyze extensive and intricate network data. Network graphs inherently possess intricacy and may have overlapping elements. Graph clustering is a basic endeavor that aims to identify communities or groupings inside networks. Recent research has mostly concentrated on developing deep learning techniques to acquire a concise representation of graphs, which is then utilized with traditional clustering methods such as k-means or spectral clustering techniques. Multiplying these two-step architectures is challenging and sometimes results in unsatisfactory performance. This is mostly due to the lack of a goal-oriented graph encoding developed explicitly for the clustering job. This work introduces a novel Deep Learning (DL) method called Deep Attentional Implanted Graph Clustering (DAIGC), designed to achieve goal-oriented clustering. Our approach centers on associated graphs to thoroughly investigate both aspects of data in graphs. The proposed DAIGC technique utilizes a Graph Attention Autoencoder (GAA) to determine the significance of nearby nodes about a target node. This allows encoding a graph's topographical structure and node value into a concise representation. Based on this representation, an interior product decoder has been trained to rebuild the graph structure. The performance of the proposed approach has been evaluated on four distinct types and sizes of real-world intricate networks, varying in vertex count from 𝑁=102 𝑡𝑜 𝑁=107. The performance of the suggested methods is evaluated by comparing them with two established and commonly used graph clustering techniques. The testing findings demonstrate the effectiveness of the proposed method in terms of processing speed and visualization compared to the state-of-the-art algorithms.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Effectiveness of a Gan Fingerprint Removal Approach in Fooling Deepfake Face Detection 评估赣指纹去除方法在欺骗深度伪人脸检测中的有效性
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.006
Wasin AlKishri, Dr. Setyawan Widyarto, Dr. Jabar H. Yousif
Deep neural networks are able to generate stunningly realistic images, making it easy to fool both technology and humans into distinguishing real images from fake ones. Generative Adversarial Networks (GANs) play a significant role in these successes (GANs). Various studies have shown that combining features from different domains can produce effective results. However, the challenges lie in detecting these fake images, especially when modifications or removal of GAN components are involved. In this research, we analyse the high-frequency Fourier modes of real and deep network-generated images and show that Images generated by deep networks share an observable, systematic shortcoming when it comes to reproducing their high-frequency features. We illustrate how eliminating the GAN fingerprint in modified pictures' frequency and spatial spectrum might affect deep-fake detection approaches. In-depth review of the latest research on the GAN-Based Artifacts Detection Method. We empirically assess our approach to the CNN detection model using style GAN structures 140k datasets of Real and Fake Faces. Our method has dramatically reduced the detection rate of fake images by 50%. In our study, we found that adversaries are able to remove the fingerprints of GANs, making it difficult to detect the generated images. This result confirms the lack of robustness of current algorithms and the need for further research in this area.
深度神经网络能够生成令人惊叹的逼真图像,让技术和人类轻松辨别真假图像。生成对抗网络(GAN)在这些成功中发挥了重要作用。各种研究表明,结合不同领域的特征可以产生有效的结果。然而,如何检测这些伪造图像,尤其是在涉及修改或删除 GAN 组件的情况下,是一项挑战。在这项研究中,我们分析了真实图像和深度网络生成图像的高频傅立叶模式,结果表明,深度网络生成的图像在再现其高频特征方面存在可观察到的系统性缺陷。我们说明了在修改后的图片频率和空间频谱中消除 GAN 指纹会如何影响深度防伪检测方法。深入回顾基于 GAN 的伪影检测方法的最新研究。我们使用样式 GAN 结构 140k 真实和虚假人脸数据集对 CNN 检测模型的方法进行了实证评估。我们的方法将假图像的检测率大幅降低了 50%。在我们的研究中,我们发现对手能够消除 GAN 的指纹,从而难以检测生成的图像。这一结果证实了当前算法缺乏鲁棒性,需要在这一领域开展进一步研究。
{"title":"Evaluating the Effectiveness of a Gan Fingerprint Removal Approach in Fooling Deepfake Face Detection","authors":"Wasin AlKishri, Dr. Setyawan Widyarto, Dr. Jabar H. Yousif","doi":"10.58346/jisis.2024.i1.006","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.006","url":null,"abstract":"Deep neural networks are able to generate stunningly realistic images, making it easy to fool both technology and humans into distinguishing real images from fake ones. Generative Adversarial Networks (GANs) play a significant role in these successes (GANs). Various studies have shown that combining features from different domains can produce effective results. However, the challenges lie in detecting these fake images, especially when modifications or removal of GAN components are involved. In this research, we analyse the high-frequency Fourier modes of real and deep network-generated images and show that Images generated by deep networks share an observable, systematic shortcoming when it comes to reproducing their high-frequency features. We illustrate how eliminating the GAN fingerprint in modified pictures' frequency and spatial spectrum might affect deep-fake detection approaches. In-depth review of the latest research on the GAN-Based Artifacts Detection Method. We empirically assess our approach to the CNN detection model using style GAN structures 140k datasets of Real and Fake Faces. Our method has dramatically reduced the detection rate of fake images by 50%. In our study, we found that adversaries are able to remove the fingerprints of GANs, making it difficult to detect the generated images. This result confirms the lack of robustness of current algorithms and the need for further research in this area.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating Novel Machine Learning for Big Data Analytics and IoT Technology in Intelligent Database Management Systems 在智能数据库管理系统中整合用于大数据分析的新型机器学习和物联网技术
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.014
Rosa Clavijo-López, Dr. Wayky Alfredo Luy Navarrete, Dr. Jesús Merino Velásquez, Dr. Carlos Miguel Aguilar Saldaña, Alcides Muñoz Ocas, Dr. César Augusto Flores Tananta
Database Management Systems (DBMS) advancement has been crucial to Information Technology (IT). Traditional DBMS needed help managing large and varied datasets under strict time constraints due to the emergence of Big Data and the widespread use of Internet of Things (IoT) devices. The growing intricacy of data and the need for instantaneous processing presented substantial obstacles. This research suggests a Machine Learning-based Intelligent Database Management Systems (ML-IDMS) technique. This invention combines the skills of Machine Learning with DBMS, improving flexibility and decision-making capacities. The ML-IDMS is specifically developed to tackle current obstacles by providing capabilities such as instantaneous data retrieval, intelligent heat measurement, and effective neural network initialization. The simulation results showcase the effectiveness of ML-IDMS, as shown by impressive metrics such as query execution time (19.27 sec), storage efficiency (83.78%), data accuracy (90%), redundancy reduction (66.42%), network throughput (7.93 Gbps), and end-to-end delay (14.4 ms). The results highlight the efficacy of ML-IDMS in managing various data circumstances. ML-IDMS addresses current obstacles and establishes a standard for future intelligent data management and analytics progress.
数据库管理系统(DBMS)的发展对信息技术(IT)至关重要。由于大数据的出现和物联网(IoT)设备的广泛使用,传统的 DBMS 需要在严格的时间限制下帮助管理大量不同的数据集。数据的日益复杂性和对即时处理的需求带来了巨大障碍。本研究提出了一种基于机器学习的智能数据库管理系统(ML-IDMS)技术。这项发明将机器学习技术与数据库管理系统相结合,提高了灵活性和决策能力。ML-IDMS 通过提供瞬时数据检索、智能热量测量和有效的神经网络初始化等功能,专为解决当前障碍而开发。仿真结果显示了 ML-IDMS 的有效性,查询执行时间(19.27 秒)、存储效率(83.78%)、数据准确率(90%)、冗余减少率(66.42%)、网络吞吐量(7.93 Gbps)和端到端延迟(14.4 毫秒)等指标都令人印象深刻。这些结果凸显了 ML-IDMS 在管理各种数据环境方面的功效。ML-IDMS 解决了当前的障碍,并为未来智能数据管理和分析的发展建立了标准。
{"title":"Integrating Novel Machine Learning for Big Data Analytics and IoT Technology in Intelligent Database Management Systems","authors":"Rosa Clavijo-López, Dr. Wayky Alfredo Luy Navarrete, Dr. Jesús Merino Velásquez, Dr. Carlos Miguel Aguilar Saldaña, Alcides Muñoz Ocas, Dr. César Augusto Flores Tananta","doi":"10.58346/jisis.2024.i1.014","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.014","url":null,"abstract":"Database Management Systems (DBMS) advancement has been crucial to Information Technology (IT). Traditional DBMS needed help managing large and varied datasets under strict time constraints due to the emergence of Big Data and the widespread use of Internet of Things (IoT) devices. The growing intricacy of data and the need for instantaneous processing presented substantial obstacles. This research suggests a Machine Learning-based Intelligent Database Management Systems (ML-IDMS) technique. This invention combines the skills of Machine Learning with DBMS, improving flexibility and decision-making capacities. The ML-IDMS is specifically developed to tackle current obstacles by providing capabilities such as instantaneous data retrieval, intelligent heat measurement, and effective neural network initialization. The simulation results showcase the effectiveness of ML-IDMS, as shown by impressive metrics such as query execution time (19.27 sec), storage efficiency (83.78%), data accuracy (90%), redundancy reduction (66.42%), network throughput (7.93 Gbps), and end-to-end delay (14.4 ms). The results highlight the efficacy of ML-IDMS in managing various data circumstances. ML-IDMS addresses current obstacles and establishes a standard for future intelligent data management and analytics progress.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Optimal Model for Allocation Readers with Grid Cell Size and Arbitrary Workspace Shapes in RFID Network Planning RFID 网络规划中采用网格单元大小和任意工作空间形状分配读取器的最佳模型
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.012
Van Hoa Le
RFID Network Planning (RNP) is the problem of deploying RFID readers within a workspace so that each tag can be covered by at least one reader. The objective of RNP is to determine the optimal positions of readers while satisfying certain constraints, such as maximum coverage, minimal interference, load balance among readers, etc. However, most previous studies considered the workspace rectangular or square and assumed a fixed number of readers. They then employed some heuristic methods to find the optimal reader positions. This approach is not practical because the workspace can have any shape, and an approach adaptable to the actual shape of the workspace is needed. This paper proposed an improved adaptive model considering the workspace shape, called RNP-3P. The objectives of RNP-3P are to minimize the number of readers, maximize coverage area, minimize interference, and achieve load balance. RNP-3P optimizes the problem in three phases: Phase 1 involves modeling the workspace with grid cell size, Phase 2 determines the objective function, and Phase 3 proposes the iGAPO algorithm to optimize the number and positions of readers within the workspace. Simulation results demonstrate that the proposed model is more effective compared to other heuristic methods.
RFID 网络规划(RNP)是在工作区内部署 RFID 阅读器,使每个标签至少能被一个阅读器覆盖的问题。RNP 的目标是确定阅读器的最佳位置,同时满足某些约束条件,如最大覆盖率、最小干扰、阅读器之间的负载平衡等。然而,以往的大多数研究都认为工作空间是矩形或正方形的,并假设阅读器的数量是固定的。然后,他们采用一些启发式方法来找到最佳的阅读器位置。这种方法并不实用,因为工作区可以是任何形状,因此需要一种能适应工作区实际形状的方法。本文提出了一种考虑到工作空间形状的改进型自适应模型,称为 RNP-3P。RNP-3P 的目标是最小化阅读器数量、最大化覆盖区域、最小化干扰和实现负载平衡。RNP-3P 分三个阶段对问题进行优化:第一阶段是建立具有网格单元大小的工作区模型,第二阶段是确定目标函数,第三阶段是提出 iGAPO 算法,以优化工作区内阅读器的数量和位置。仿真结果表明,与其他启发式方法相比,所提出的模型更为有效。
{"title":"An Optimal Model for Allocation Readers with Grid Cell Size and Arbitrary Workspace Shapes in RFID Network Planning","authors":"Van Hoa Le","doi":"10.58346/jisis.2024.i1.012","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.012","url":null,"abstract":"RFID Network Planning (RNP) is the problem of deploying RFID readers within a workspace so that each tag can be covered by at least one reader. The objective of RNP is to determine the optimal positions of readers while satisfying certain constraints, such as maximum coverage, minimal interference, load balance among readers, etc. However, most previous studies considered the workspace rectangular or square and assumed a fixed number of readers. They then employed some heuristic methods to find the optimal reader positions. This approach is not practical because the workspace can have any shape, and an approach adaptable to the actual shape of the workspace is needed. This paper proposed an improved adaptive model considering the workspace shape, called RNP-3P. The objectives of RNP-3P are to minimize the number of readers, maximize coverage area, minimize interference, and achieve load balance. RNP-3P optimizes the problem in three phases: Phase 1 involves modeling the workspace with grid cell size, Phase 2 determines the objective function, and Phase 3 proposes the iGAPO algorithm to optimize the number and positions of readers within the workspace. Simulation results demonstrate that the proposed model is more effective compared to other heuristic methods.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Detection and Response Using AI and NLP in Cybersecurity 在网络安全中使用人工智能和 NLP 进行威胁检测和响应
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.013
Dr. Walaa Saber Ismail
Introduction: In an age of rapid technical innovation and a growing digital world, protecting sensitive data from cyberattacks is crucial. The dynamic and complicated nature of these attacks requires novel cybersecurity solutions. Methods: This study analyses how Artificial Intelligence (AI) and Natural Language Processing (NLP) strengthen cybersecurity. The qualitative research approach is followed to gather data through a literature review of relevant scholarly articles and conduct interviews with cybersecurity specialists. Results: Recent AI advances have greatly enhanced the detection of anomalous patterns and behaviors in huge datasets, a key threat identification tool. NLP has also excelled at detecting malevolent intent in textual data, such as phishing efforts. AI and NLP enable adaptive security policies, enabling agile responses to evolving security issues. Expert interviews confirm that AI and NLP reduce false positives, improve threat intelligence, streamline network security setups, and improve compliance checks. These technologies enable responsive security policies, which give a strategic edge against developing security threats. AI and NLP's predictive skills could revolutionize cybersecurity by preventing threats. Conclusion: This study shows that AI and NLP have improved cybersecurity threat detection, automated incident response, and adaptive security policies. Overcoming threat detection, aggressive attacks and data privacy issues is essential to properly leveraging these advances and strengthening cyber resilience in a changing digital landscape.
导言:在技术快速创新和数字世界不断发展的时代,保护敏感数据免受网络攻击至关重要。这些攻击的动态性和复杂性要求采用新颖的网络安全解决方案。方法:本研究分析了人工智能(AI)和自然语言处理(NLP)如何加强网络安全。本研究采用定性研究方法,通过对相关学术文章进行文献综述和对网络安全专家进行访谈来收集数据。研究结果人工智能的最新进展大大提高了对海量数据集中异常模式和行为的检测能力,这是一种关键的威胁识别工具。NLP 在检测文本数据(如网络钓鱼行为)中的恶意意图方面也表现出色。人工智能和 NLP 可实现自适应安全策略,从而灵活应对不断变化的安全问题。专家访谈证实,人工智能和 NLP 可以减少误报,提高威胁情报能力,简化网络安全设置,改进合规性检查。这些技术可实现反应灵敏的安全策略,从而在应对不断发展的安全威胁时获得战略优势。人工智能和 NLP 的预测技能可以预防威胁,从而彻底改变网络安全。结论本研究表明,人工智能和 NLP 已经改进了网络安全威胁检测、自动事件响应和自适应安全策略。要在不断变化的数字环境中正确利用这些进步并加强网络复原力,克服威胁检测、侵略性攻击和数据隐私问题至关重要。
{"title":"Threat Detection and Response Using AI and NLP in Cybersecurity","authors":"Dr. Walaa Saber Ismail","doi":"10.58346/jisis.2024.i1.013","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.013","url":null,"abstract":"Introduction: In an age of rapid technical innovation and a growing digital world, protecting sensitive data from cyberattacks is crucial. The dynamic and complicated nature of these attacks requires novel cybersecurity solutions. Methods: This study analyses how Artificial Intelligence (AI) and Natural Language Processing (NLP) strengthen cybersecurity. The qualitative research approach is followed to gather data through a literature review of relevant scholarly articles and conduct interviews with cybersecurity specialists. Results: Recent AI advances have greatly enhanced the detection of anomalous patterns and behaviors in huge datasets, a key threat identification tool. NLP has also excelled at detecting malevolent intent in textual data, such as phishing efforts. AI and NLP enable adaptive security policies, enabling agile responses to evolving security issues. Expert interviews confirm that AI and NLP reduce false positives, improve threat intelligence, streamline network security setups, and improve compliance checks. These technologies enable responsive security policies, which give a strategic edge against developing security threats. AI and NLP's predictive skills could revolutionize cybersecurity by preventing threats. Conclusion: This study shows that AI and NLP have improved cybersecurity threat detection, automated incident response, and adaptive security policies. Overcoming threat detection, aggressive attacks and data privacy issues is essential to properly leveraging these advances and strengthening cyber resilience in a changing digital landscape.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CFS-AE: Correlation-based Feature Selection and Autoencoder for Improved Intrusion Detection System Performance CFS-AE:基于相关性的特征选择和自动编码器,提高入侵检测系统性能
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.007
Seiba Alhassan, Dr. Gaddafi Abdul-Salaam, Asante Micheal, Y. Missah, Dr. Ernest D. Ganaa, Alimatu Sadia Shirazu
The major problem computer network users face concerning data – whether in storage, in transit, or being processed - is unauthorized access. This unauthorized access typically leads to the loss of confidentiality, integrity, and availability of data. Consequently, it is essential to implement an accurate Intrusion Detection System (IDS) for every information system. Many researchers have proposed machine learning and deep learning models, such as autoencoders, to enhance existing IDS. However, the accuracy of these models remains a significant research challenge. This paper proposes a Correlation-Based Feature Selection and Autoencoder (CFS-AE) to enhance detection accuracy and reduce the false alarms associated with the current anomaly-based IDS. The first step involves feature selection for the NSL-KDD and CIC-IDS2017 datasets which are used to train and test our model. Subsequently, an autoencoder is employed as a classifier to categorize data traffic into attack and normal categories. The results from our experimental study revealed an accuracy of 94.32% and 97.71% for the NSL-KDD and CIC-IDS2017 datasets, respectively. These results demonstrate improved performance over existing IDS systems.
计算机网络用户在存储、传输或处理数据时面临的主要问题是未经授权的访问。这种未经授权的访问通常会导致数据的机密性、完整性和可用性丢失。因此,为每个信息系统实施精确的入侵检测系统(IDS)至关重要。许多研究人员提出了机器学习和深度学习模型,如自动编码器,以增强现有的 IDS。然而,这些模型的准确性仍然是一个重大的研究挑战。本文提出了一种基于相关性的特征选择和自动编码器(CFS-AE),以提高检测精度并减少与当前基于异常的 IDS 相关的误报。第一步是对 NSL-KDD 和 CIC-IDS2017 数据集进行特征选择,用于训练和测试我们的模型。随后,采用自动编码器作为分类器,将数据流量分为攻击和正常两类。实验研究结果表明,NSL-KDD 和 CIC-IDS2017 数据集的准确率分别为 94.32% 和 97.71%。这些结果表明,与现有的 IDS 系统相比,该系统的性能有所提高。
{"title":"CFS-AE: Correlation-based Feature Selection and Autoencoder for Improved Intrusion Detection System Performance","authors":"Seiba Alhassan, Dr. Gaddafi Abdul-Salaam, Asante Micheal, Y. Missah, Dr. Ernest D. Ganaa, Alimatu Sadia Shirazu","doi":"10.58346/jisis.2024.i1.007","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.007","url":null,"abstract":"The major problem computer network users face concerning data – whether in storage, in transit, or being processed - is unauthorized access. This unauthorized access typically leads to the loss of confidentiality, integrity, and availability of data. Consequently, it is essential to implement an accurate Intrusion Detection System (IDS) for every information system. Many researchers have proposed machine learning and deep learning models, such as autoencoders, to enhance existing IDS. However, the accuracy of these models remains a significant research challenge. This paper proposes a Correlation-Based Feature Selection and Autoencoder (CFS-AE) to enhance detection accuracy and reduce the false alarms associated with the current anomaly-based IDS. The first step involves feature selection for the NSL-KDD and CIC-IDS2017 datasets which are used to train and test our model. Subsequently, an autoencoder is employed as a classifier to categorize data traffic into attack and normal categories. The results from our experimental study revealed an accuracy of 94.32% and 97.71% for the NSL-KDD and CIC-IDS2017 datasets, respectively. These results demonstrate improved performance over existing IDS systems.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Designing a Privacy-Oriented Architecture for Managing Personal Identifiable Information 为管理个人身份信息设计一个以隐私为导向的架构
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.005
Adán F. Guzmán-Castillo, Gabriela Suntaxi, Bryan N. Flores-Sarango, Denys A. Flores
Recent threat reports have warned researchers and security professionals about a shortage of cybersecurity skills to face devastating personal data breaches. As a response, governments have taken on the challenge of proposing specific legislation to protect citizens' privacy while holding information-processing companies accountable for any misuse. However, unauthorized access to such information, or possible negligent destruction of personal records are some issues that cannot be dealt with privacy laws alone. In this research, we introduce the functional requirements to deploy PriVARq, a novel privacy-oriented architecture to proactively manage any consensual submission of personal identifiable information (PII); i.e. during its collection, processing, verification and transference. PriVARq’s main contribution is the balance between legal frameworks and industry-leading security standards to mitigate the former’s shortage of practical solutions to tackle some privacy and security issues when dealing with PII. Consequently, for defining PriVARq’s functional requirements, a privacy-by-design approach is employed which not only considers legislation proposed in Europe and Latin America but also analyzes technical aspects outlined in international security standards. We aim to provide a proactive approach to reduce the shortage of skills and solutions to tackle privacy leakages in public repositories and devise future research venues to implement PriVARq in public and private organizations.
最近的威胁报告警告研究人员和安全专业人员,面对破坏性的个人数据泄露事件,他们缺乏网络安全技能。作为应对措施,各国政府纷纷提出具体的立法建议,以保护公民的隐私,同时追究信息处理公司对任何滥用行为的责任。然而,未经授权访问此类信息,或可能因疏忽而销毁个人记录,这些问题单靠隐私法是无法解决的。在这项研究中,我们介绍了部署 PriVARq 的功能要求,这是一种面向隐私的新型架构,可主动管理任何经同意提交的个人身份信息(PII),即在其收集、处理、验证和传输过程中。PriVARq 的主要贡献是在法律框架和行业领先的安全标准之间取得平衡,以缓解前者在处理 PII 时缺乏解决某些隐私和安全问题的实用解决方案的问题。因此,在定义 PriVARq 的功能要求时,我们采用了隐私设计方法,不仅考虑了欧洲和拉丁美洲提出的立法,还分析了国际安全标准中概述的技术方面。我们的目标是提供一种积极主动的方法,以减少技能和解决方案的短缺,从而解决公共资料库中的隐私泄露问题,并为在公共和私营机构中实施 PriVARq 设计未来的研究场所。
{"title":"Towards Designing a Privacy-Oriented Architecture for Managing Personal Identifiable Information","authors":"Adán F. Guzmán-Castillo, Gabriela Suntaxi, Bryan N. Flores-Sarango, Denys A. Flores","doi":"10.58346/jisis.2024.i1.005","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.005","url":null,"abstract":"Recent threat reports have warned researchers and security professionals about a shortage of cybersecurity skills to face devastating personal data breaches. As a response, governments have taken on the challenge of proposing specific legislation to protect citizens' privacy while holding information-processing companies accountable for any misuse. However, unauthorized access to such information, or possible negligent destruction of personal records are some issues that cannot be dealt with privacy laws alone. In this research, we introduce the functional requirements to deploy PriVARq, a novel privacy-oriented architecture to proactively manage any consensual submission of personal identifiable information (PII); i.e. during its collection, processing, verification and transference. PriVARq’s main contribution is the balance between legal frameworks and industry-leading security standards to mitigate the former’s shortage of practical solutions to tackle some privacy and security issues when dealing with PII. Consequently, for defining PriVARq’s functional requirements, a privacy-by-design approach is employed which not only considers legislation proposed in Europe and Latin America but also analyzes technical aspects outlined in international security standards. We aim to provide a proactive approach to reduce the shortage of skills and solutions to tackle privacy leakages in public repositories and devise future research venues to implement PriVARq in public and private organizations.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Internet Services and Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1