首页 > 最新文献

Journal of Internet Services and Information Security最新文献

英文 中文
IoT Structure based Supervisor and Enquired the Greenhouse Parameters 基于物联网结构的监控器并查询温室参数
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.009
Abduljaleel Al- Hasnawi, L. Abdul-Rahaim, Hassan Muwafaq Gheni, Zahraa Emad Fadel
The world on the beginning of a new period of regeneration and developing with the increase of Internet and also Internet of Thing (IoT) in the market commercial application. where a new revolution can be made by characterizing its important. The rapprochement of the universal system and the power of sophisticated calculating, sensing with low cost and add create of communication supported by the Internet. In this paper, the green house system is consisting of two sections they are the software and hardware sections. Hardware has three types of sensors for natural environment measuring and gateway (router). Software consists of monitoring and controlling sub system, and IoT cloud, vb.Net software is used to write the programs codes for the proposed system. The environmental parameters of the greenhouse are continuously recorded by various sensors, and the collected data is displayed on a customized website. The system software has the ability to monitor and control the green house environment variables like humidity, temperature and water level on the greenhouse. Thus, the greenhouse can be monitored and controlling from anywhere and at any time. The fundamental aims of this paper have been achieved with the help of all systems parts. The green house environment has been displayed using the IoT cloud and the control is done over the internet connection. The system is implemented in practices. The system result gives an accurate indication that the system is reliable and work completely.
随着互联网和物联网(IoT)在市场上商业应用的增加,世界开始了一个新的复兴和发展时期。在互联网的支持下,通用系统与精密计算、低成本传感和通信功能的完美结合。在本文中,温室系统由软件和硬件两部分组成。硬件部分包括三种用于自然环境测量的传感器和网关(路由器)。软件包括监控子系统和物联网云,使用 vb.Net 软件编写拟议系统的程序代码。各种传感器连续记录温室的环境参数,收集的数据显示在定制的网站上。系统软件能够监测和控制温室的湿度、温度和水位等温室环境变量。因此,可以随时随地对温室进行监测和控制。在所有系统部件的帮助下,本文的基本目标已经实现。通过物联网云显示温室环境,并通过互联网连接进行控制。该系统是在实践中实现的。系统结果准确地表明,该系统是可靠的,可以完全正常工作。
{"title":"IoT Structure based Supervisor and Enquired the Greenhouse Parameters","authors":"Abduljaleel Al- Hasnawi, L. Abdul-Rahaim, Hassan Muwafaq Gheni, Zahraa Emad Fadel","doi":"10.58346/jisis.2024.i1.009","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.009","url":null,"abstract":"The world on the beginning of a new period of regeneration and developing with the increase of Internet and also Internet of Thing (IoT) in the market commercial application. where a new revolution can be made by characterizing its important. The rapprochement of the universal system and the power of sophisticated calculating, sensing with low cost and add create of communication supported by the Internet. In this paper, the green house system is consisting of two sections they are the software and hardware sections. Hardware has three types of sensors for natural environment measuring and gateway (router). Software consists of monitoring and controlling sub system, and IoT cloud, vb.Net software is used to write the programs codes for the proposed system. The environmental parameters of the greenhouse are continuously recorded by various sensors, and the collected data is displayed on a customized website. The system software has the ability to monitor and control the green house environment variables like humidity, temperature and water level on the greenhouse. Thus, the greenhouse can be monitored and controlling from anywhere and at any time. The fundamental aims of this paper have been achieved with the help of all systems parts. The green house environment has been displayed using the IoT cloud and the control is done over the internet connection. The system is implemented in practices. The system result gives an accurate indication that the system is reliable and work completely.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"51 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Nonredundant SVD-based Precoding Matrix for Blind Channel Estimation in CP-OFDM Systems Over Channels with Memory 基于非冗余 SVD 的预编码矩阵,用于 CP-OFDM 系统中的带内存信道盲信道估计
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.018
Osamah Al-Qadhi, L. Abdul-Rahaim
In this paper, we investigate blind channel estimation in cyclic, prefixed orthogonal frequency division multiplexing (OFDM) systems using precoding matrices. Many studies show how the performance of bit error rate (BER) and mean square error of channel estimation are impacted by using a circulant matrix as a precoding matrix. We investigate a new structure for the precoding matrix in which the first row is generated by an exponentially decreasing equation along with the Toeplitz function and deploying singular value decomposition (SVD) to generate the final precoder matrix. This type of SVD-based precoding matrix has been presented and simulated under various circumstances. The resulting precoding matrix is employed in two different OFDM systems to estimate the channel frequency response vector up to scalar ambiguity. The proof of the precoding matrix full rank property is presented, along with other criteria that help with the development of various precoding matrices.
本文研究了使用预编码矩阵在循环、前缀正交频分复用(OFDM)系统中进行盲信道估计的问题。许多研究表明,使用环状矩阵作为预编码矩阵会影响误码率(BER)和信道估计均方误差的性能。我们研究了一种新的预编码矩阵结构,其中第一行由指数递减方程和托普利兹函数生成,并利用奇异值分解(SVD)生成最终的预编码矩阵。这种基于 SVD 的预编码矩阵已在各种情况下进行了演示和模拟。在两个不同的 OFDM 系统中使用了所生成的预编码矩阵,以估计信道频率响应向量的标量模糊性。此外,还介绍了预编码矩阵全秩属性的证明,以及有助于开发各种预编码矩阵的其他标准。
{"title":"A Nonredundant SVD-based Precoding Matrix for Blind Channel Estimation in CP-OFDM Systems Over Channels with Memory","authors":"Osamah Al-Qadhi, L. Abdul-Rahaim","doi":"10.58346/jisis.2024.i1.018","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.018","url":null,"abstract":"In this paper, we investigate blind channel estimation in cyclic, prefixed orthogonal frequency division multiplexing (OFDM) systems using precoding matrices. Many studies show how the performance of bit error rate (BER) and mean square error of channel estimation are impacted by using a circulant matrix as a precoding matrix. We investigate a new structure for the precoding matrix in which the first row is generated by an exponentially decreasing equation along with the Toeplitz function and deploying singular value decomposition (SVD) to generate the final precoder matrix. This type of SVD-based precoding matrix has been presented and simulated under various circumstances. The resulting precoding matrix is employed in two different OFDM systems to estimate the channel frequency response vector up to scalar ambiguity. The proof of the precoding matrix full rank property is presented, along with other criteria that help with the development of various precoding matrices.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"31 38","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Large Young Hacker Concentration in Indonesia 识别印度尼西亚大型青年黑客聚集区
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.004
Onno W. Purbo, Prasetyo Purnomo, Dimaz Arno Prasetio, Agung Budi Prasetio, Dr. Tubagus Asep Nurdin
An Indonesian 2023 Capture the Flag competition for 18-year-olds is looked at for the first time. It engaged a diverse participant profile, encompassing high school students and the general public from various regions. Java Island saw the most participation, especially in East Java, with little interest from Jakarta's youth, possibly due to the abundance of distractions. Despite varied educational backgrounds, vocational institutes, notably in East Java, featured prominently. Gender diversity was limited, with no female participants progressing to the final stage. Analysis of problem categories indicated diverse performance, highlighting challenges in digital signature, online hacking, network analysis, and database assault. Normalization emphasized problems within high school students' capabilities, suggesting the integration of cybersecurity education into curricula. Finalists predominantly hail from Central and East Java, indicating a regional concentration. Younger, non-Javanese participants underscored passion's role in success. Successful profiles revealed independent skill acquisition through online platforms, especially John Hammond's YouTube channel, emphasizing the need for accessible cybersecurity education resources. The study advocates prioritizing ICT education, particularly in networking, online hacking, OSINT, and cryptography, to enhance high school CTF participation and performance. The findings showcase the significance of passion-driven, self-directed learning in fostering ethical hacking skills among Indonesian youth.
本报告首次介绍了印度尼西亚 2023 年为 18 岁青少年举办的 "夺旗 "竞赛。这次比赛的参与者来自不同地区,包括高中生和普通大众。爪哇岛的参与人数最多,尤其是在东爪哇岛,而雅加达的年轻人对比赛兴趣不大,这可能是由于他们的注意力过于分散。尽管教育背景各不相同,但职业院校,尤其是东爪哇的职业院校,在活动中占有突出地位。性别多样性有限,没有女性参赛者进入最后阶段。对问题类别的分析表明,参赛者的表现各不相同,突出表现在数字签名、在线黑客、网络分析和数据库攻击等方面。规范化强调了高中生能力范围内的问题,建议将网络安全教育纳入课程。进入决赛的选手主要来自中爪哇和东爪哇,这表明参赛选手主要集中在该地区。年轻的非爪哇参赛者强调了激情在成功中的作用。成功者的资料显示,他们通过网络平台,尤其是约翰-哈蒙德的 YouTube 频道,独立掌握了技能,这强调了对可获取的网络安全教育资源的需求。本研究提倡优先考虑 ICT 教育,尤其是网络、在线黑客、操作系统情报和密码学方面的教育,以提高高中 CTF 的参与度和成绩。研究结果展示了激情驱动、自主学习在培养印尼青少年黑客道德技能方面的重要意义。
{"title":"Identifying Large Young Hacker Concentration in Indonesia","authors":"Onno W. Purbo, Prasetyo Purnomo, Dimaz Arno Prasetio, Agung Budi Prasetio, Dr. Tubagus Asep Nurdin","doi":"10.58346/jisis.2024.i1.004","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.004","url":null,"abstract":"An Indonesian 2023 Capture the Flag competition for 18-year-olds is looked at for the first time. It engaged a diverse participant profile, encompassing high school students and the general public from various regions. Java Island saw the most participation, especially in East Java, with little interest from Jakarta's youth, possibly due to the abundance of distractions. Despite varied educational backgrounds, vocational institutes, notably in East Java, featured prominently. Gender diversity was limited, with no female participants progressing to the final stage. Analysis of problem categories indicated diverse performance, highlighting challenges in digital signature, online hacking, network analysis, and database assault. Normalization emphasized problems within high school students' capabilities, suggesting the integration of cybersecurity education into curricula. Finalists predominantly hail from Central and East Java, indicating a regional concentration. Younger, non-Javanese participants underscored passion's role in success. Successful profiles revealed independent skill acquisition through online platforms, especially John Hammond's YouTube channel, emphasizing the need for accessible cybersecurity education resources. The study advocates prioritizing ICT education, particularly in networking, online hacking, OSINT, and cryptography, to enhance high school CTF participation and performance. The findings showcase the significance of passion-driven, self-directed learning in fostering ethical hacking skills among Indonesian youth.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"29 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Security Framework for Addressing Privacy Issues in the Zoom Conference System 解决 Zoom 会议系统隐私问题的安全框架
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.016
Samer H. Atawneh, Ziad Alshammari, Mousa AL- Akhras, Bayan Abu Shawar
The COVID-19 pandemic had a significant impact on many facets of human behavior. Most significantly, it required significant changes to how daily activities were conducted. The majority of individuals were forced to work and communicate from home due to social distancing, which opened the door for more virtual meetings. Since most organizations started allowing their employees to work from home, the majority of online meeting platforms—like Zoom and Microsoft Teams—have become more and more popular. Online meetings were not only used by businesses but also by educational institutes to carry out online learning, hospitals to conduct meetings and certain surgeries, and many other industries. The online meetings are practical and simple to organize, but their information security is not as high as that of conventional meetings. Security and privacy issues resulted from this. The safety of personal information such as names, contacts, and locations, the security of online recordings since sensitive information was discussed in most meetings, the security of data while it was in transit, and the potential for competitors to intercept your business were among the many security issues that were raised. Zoom, as one of the famous online conference systems, faced many global concerns, such as sharing private information with third parties, exposing users to unauthorized bullying calls, and adopting questionable end-to-end encryption processes. Additionally, companies have had virtual meetings hacked, leading to privacy issues since hackers can obtain data illegally. Therefore, this research proposes a security framework to address the privacy issues in the Zoom system by applying a set of governance and technical controls. The governance controls provide a strategic view of how an organization controls its security while implementing the technical controls avoids privacy issues in online conference systems. The proposed framework implements a set of technical controls such as encryption, auditing, authentication, and role-based access control. The results were promising and significantly addressed Zoom's privacy issues.
COVID-19 大流行对人类行为的许多方面产生了重大影响。最重要的是,它要求人们对日常活动的方式做出重大改变。由于社会关系的疏远,大多数人被迫在家工作和交流,这为更多的虚拟会议打开了大门。自从大多数企业开始允许员工在家办公以来,大多数在线会议平台(如 Zoom 和 Microsoft Teams)变得越来越流行。在线会议不仅被企业使用,还被教育机构用于开展在线学习、医院用于举行会议和某些手术,以及许多其他行业。在线会议实用性强,组织简单,但其信息安全性不如传统会议高。安全和隐私问题由此产生。姓名、联系人和地点等个人信息的安全问题,由于大多数会议都讨论敏感信息,在线录音的安全问题,数据在传输过程中的安全问题,以及竞争对手拦截业务的可能性等,都是人们提出的诸多安全问题。作为著名的在线会议系统之一,Zoom 面临着许多全球性的问题,如与第三方共享私人信息、使用户面临未经授权的霸王电话、采用可疑的端到端加密流程等。此外,还有公司的虚拟会议遭到黑客攻击,导致隐私问题,因为黑客可以非法获取数据。因此,本研究提出了一个安全框架,通过应用一套治理和技术控制措施来解决 Zoom 系统中的隐私问题。管理控制提供了一个组织如何控制其安全的战略视角,而技术控制的实施则避免了在线会议系统中的隐私问题。建议的框架实施了一套技术控制,如加密、审计、身份验证和基于角色的访问控制。结果很有希望,极大地解决了 Zoom 的隐私问题。
{"title":"A Security Framework for Addressing Privacy Issues in the Zoom Conference System","authors":"Samer H. Atawneh, Ziad Alshammari, Mousa AL- Akhras, Bayan Abu Shawar","doi":"10.58346/jisis.2024.i1.016","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.016","url":null,"abstract":"The COVID-19 pandemic had a significant impact on many facets of human behavior. Most significantly, it required significant changes to how daily activities were conducted. The majority of individuals were forced to work and communicate from home due to social distancing, which opened the door for more virtual meetings. Since most organizations started allowing their employees to work from home, the majority of online meeting platforms—like Zoom and Microsoft Teams—have become more and more popular. Online meetings were not only used by businesses but also by educational institutes to carry out online learning, hospitals to conduct meetings and certain surgeries, and many other industries. The online meetings are practical and simple to organize, but their information security is not as high as that of conventional meetings. Security and privacy issues resulted from this. The safety of personal information such as names, contacts, and locations, the security of online recordings since sensitive information was discussed in most meetings, the security of data while it was in transit, and the potential for competitors to intercept your business were among the many security issues that were raised. Zoom, as one of the famous online conference systems, faced many global concerns, such as sharing private information with third parties, exposing users to unauthorized bullying calls, and adopting questionable end-to-end encryption processes. Additionally, companies have had virtual meetings hacked, leading to privacy issues since hackers can obtain data illegally. Therefore, this research proposes a security framework to address the privacy issues in the Zoom system by applying a set of governance and technical controls. The governance controls provide a strategic view of how an organization controls its security while implementing the technical controls avoids privacy issues in online conference systems. The proposed framework implements a set of technical controls such as encryption, auditing, authentication, and role-based access control. The results were promising and significantly addressed Zoom's privacy issues.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"16 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Effect of Information and Communication Technology (ICT) on Trade in Services in the United States 关于信息和通信技术(ICT)对美国服务贸易影响的研究
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.017
Myeongjoo Kang
The pandemic of COVID-19 appears to boost trade in services and even the ICT service exports in the U.S. The U.S. has been recognized as the world's largest services market and became a leading exporter and importer of services over the last two decades. In this perspective, this study attempts to empirically identify the impact of ICT on trade in services and ICT service exports in the U.S. by employing the modified gravity model of trade from 1990 to 2021. The results indicate that overall ICT access and ICT use have significant positive effects on the trade in services and ICT service exports, but others brought about different results. The study also finds two important facts. First, FTS has a positive effect on the trade in services and ICT services exports, while, MCS has a completely negative effect on both the trade in services and ICT services exports. More interestingly, the dimension of ICT use of IUI and FBS have a different impact on both trade in services and ICT services exports. Another important finding is that the coefficients of IUI and FBS in relation to the trade in services have an unexpected negative sign, while both IUI and FBS have a positive influence on ICT service exports. Finally, these empirical results imply that ICT use has played a more productive role in enhancing ICT service exports than that of ICT access in the U.S. Consequently, these results might provide vital policy insights for the development of ICT and more rapid growth of services trade.
在过去二十年里,美国被公认为世界上最大的服务市场,并成为服务出口国和进口国中的佼佼者。从这一角度出发,本研究试图采用修正的 1990-2021 年贸易引力模型,实证确定 ICT 对美国服务贸易和 ICT 服务出口的影响。研究结果表明,信息和通信技术的总体接入和使用对服务贸易和信息和通信技术服务出口具有显著的积极影响,但其他影响则带来了不同的结果。研究还发现了两个重要事实。首先,FTS 对服务贸易和 ICT 服务出口有积极影响,而 MCS 则对服务贸易和 ICT 服务出口有完全消极的影响。更有趣的是,IUI 和 FBS 的 ICT 使用维度对服务贸易和 ICT 服务出口都有不同的影响。另一个重要发现是,与服务贸易相关的 IUI 和 FBS 的系数是出乎意料的负号,而 IUI 和 FBS 对 ICT 服务出口都有积极影响。最后,这些实证结果表明,在美国,信息和通信技术的使用比信息和通信技术的接入在促进信息和通信技术服务出口方面发挥了更有效的作用。
{"title":"A Study on the Effect of Information and Communication Technology (ICT) on Trade in Services in the United States","authors":"Myeongjoo Kang","doi":"10.58346/jisis.2024.i1.017","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.017","url":null,"abstract":"The pandemic of COVID-19 appears to boost trade in services and even the ICT service exports in the U.S. The U.S. has been recognized as the world's largest services market and became a leading exporter and importer of services over the last two decades. In this perspective, this study attempts to empirically identify the impact of ICT on trade in services and ICT service exports in the U.S. by employing the modified gravity model of trade from 1990 to 2021. The results indicate that overall ICT access and ICT use have significant positive effects on the trade in services and ICT service exports, but others brought about different results. The study also finds two important facts. First, FTS has a positive effect on the trade in services and ICT services exports, while, MCS has a completely negative effect on both the trade in services and ICT services exports. More interestingly, the dimension of ICT use of IUI and FBS have a different impact on both trade in services and ICT services exports. Another important finding is that the coefficients of IUI and FBS in relation to the trade in services have an unexpected negative sign, while both IUI and FBS have a positive influence on ICT service exports. Finally, these empirical results imply that ICT use has played a more productive role in enhancing ICT service exports than that of ICT access in the U.S. Consequently, these results might provide vital policy insights for the development of ICT and more rapid growth of services trade.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"34 43","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140081736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Elman Deep Learning Model for Intrusion Detection System in Internet of Things 用于物联网入侵检测系统的改进型埃尔曼深度学习模型
Q2 Computer Science Pub Date : 2024-03-02 DOI: 10.58346/jisis.2024.i1.008
G. Parimala, R. Kayalvizhi
Many researchers have developed intrusion detection systems in the past using conventional techniques such as artificial neural networks, fuzzy clustering, evolutionary algorithms, association rule mining, and support vector machines. However, in terms of false negative rates and detection rates, these methods did not yield the best outcomes. To address these problems, we proposed a hybrid deep learning model (HDLM) based on intrusion detection and prevention in IoT devices. Initially, the data are collected from KDDCup-99 and NSL-KDD datasets. Then, the important features are extracted from the dataset using the Forward Feature Selection Algorithm (FFSA). Finally, the extracted features are given to the HDLM classifier. The proposed HDLM is a combination of Elman Recurrent Neural Network (ERNN) and Subtraction-Average-Based Optimizer (SABO). The performance of the suggested method is assessed using performance metrics including precision, recall, accuracy, sensitivity, specificity, and F_Measure. The experimental results show that the proposed method attained the maximum intrusion detection accuracy of 98.52%.
过去,许多研究人员利用人工神经网络、模糊聚类、进化算法、关联规则挖掘和支持向量机等传统技术开发了入侵检测系统。然而,就假阴性率和检测率而言,这些方法并未取得最佳效果。为了解决这些问题,我们提出了一种基于物联网设备入侵检测和防御的混合深度学习模型(HDLM)。首先,从 KDDCup-99 和 NSL-KDD 数据集中收集数据。然后,使用前向特征选择算法(FFSA)从数据集中提取重要特征。最后,将提取的特征交给 HDLM 分类器。建议的 HDLM 是 Elman 循环神经网络(ERNN)和基于减法平均的优化器(SABO)的组合。所建议方法的性能评估指标包括精确度、召回率、准确度、灵敏度、特异性和 F_Measure。实验结果表明,所建议的方法达到了 98.52% 的最高入侵检测准确率。
{"title":"Improved Elman Deep Learning Model for Intrusion Detection System in Internet of Things","authors":"G. Parimala, R. Kayalvizhi","doi":"10.58346/jisis.2024.i1.008","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.008","url":null,"abstract":"Many researchers have developed intrusion detection systems in the past using conventional techniques such as artificial neural networks, fuzzy clustering, evolutionary algorithms, association rule mining, and support vector machines. However, in terms of false negative rates and detection rates, these methods did not yield the best outcomes. To address these problems, we proposed a hybrid deep learning model (HDLM) based on intrusion detection and prevention in IoT devices. Initially, the data are collected from KDDCup-99 and NSL-KDD datasets. Then, the important features are extracted from the dataset using the Forward Feature Selection Algorithm (FFSA). Finally, the extracted features are given to the HDLM classifier. The proposed HDLM is a combination of Elman Recurrent Neural Network (ERNN) and Subtraction-Average-Based Optimizer (SABO). The performance of the suggested method is assessed using performance metrics including precision, recall, accuracy, sensitivity, specificity, and F_Measure. The experimental results show that the proposed method attained the maximum intrusion detection accuracy of 98.52%.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"22 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140082189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combination of Alphanumeric Password and Graphic Authentication for Cyber Security 字母数字密码与图形验证相结合,促进网络安全
Q2 Computer Science Pub Date : 2023-12-04 DOI: 10.58346/jisis.2024.i1.002
Joseph Teguh Santoso, Budi Raharjo, Agus Wibowo
The main objective of this research is to create a more secure and user-friendly password-generation method that is less vulnerable to attacks such as shoulder surfing. Similarly, while textual or alphanumeric passwords are not entirely secure, they also come with certain limitations, including issues related to memory. The novelty of this research is the development of a new algorithm (Secure Password Algorithm/SPA) for password generation that uses graphics to generate textual input from users based on user perceptions. This method is more resilient against attacks like shoulder surfing and offers a more secure and user-friendly way of creating passwords. This research uses a combination of literature review and SPA proposals to create passwords with graphical and encryption techniques. The literature review examines the weaknesses of existing graphical and text password methods. The proposed algorithm focuses on user perception and confidential data to create more secure and easy-to-use passwords. The research results show that this research can provide a new, more secure, and user-friendly method of generating passwords such as shoulder surfing. Research supports software implementation of these algorithms and psychometric, psychological, and psychiatric studies to improve user input and protect systems from malicious attacks. Graphical passwords provide better recall compared to textual passwords, and the proposed algorithm for password generation using graphical and encryption techniques provides a more secure and user-friendly method of password generation that is less vulnerable to attacks such as shoulder surfing. The proposed new encryption algorithm has succeeded in overcoming various potential weaknesses and attacks on previous encryption methods. The test results demonstrate the efficiency and near invulnerability of the SPA algorithm against brute force attacks on specific security parameters. Tested alongside AES, shows comparable security levels, particularly in resource-constrained environments. To address doubts, the paper establishes evaluation standards for computational complexity, resistance to known attacks, and adaptability to evolving threats. The algorithm has the potential to be a stronger and more secure solution for generating passwords to safeguard confidential user information.
这项研究的主要目的是创造一种更安全、用户友好的密码生成方法,这种方法不易受到肩冲浪等攻击。同样,虽然文本密码或字母数字密码不是完全安全的,但它们也有一定的局限性,包括与内存相关的问题。本研究的新颖之处在于开发了一种新的密码生成算法(安全密码算法/SPA),该算法使用图形根据用户感知生成用户的文本输入。这种方法更能抵御肩冲浪等攻击,并提供了一种更安全、更友好的创建密码的方式。本研究结合文献综述和SPA建议,使用图形和加密技术创建密码。文献综述检查现有的图形和文本密码方法的弱点。该算法关注用户感知和机密数据,以创建更安全、更易于使用的密码。研究结果表明,本研究可以提供一种新的、更安全的、用户友好的密码生成方法,如肩冲浪。研究支持软件实现这些算法和心理测量学,心理学和精神病学研究,以改善用户输入和保护系统免受恶意攻击。与文本密码相比,图形密码具有更好的召回性,并且所提出的使用图形和加密技术的密码生成算法提供了一种更安全和用户友好的密码生成方法,不易受到诸如肩部冲浪等攻击。提出的新加密算法成功地克服了以往加密方法的各种潜在弱点和攻击。测试结果表明,针对特定安全参数的暴力破解攻击,SPA算法的有效性和近乎无坚不摧。与AES一起测试,显示出相当的安全级别,特别是在资源受限的环境中。为了解决疑问,本文建立了计算复杂性、对已知攻击的抵抗力和对不断变化的威胁的适应性的评估标准。该算法有可能成为生成密码以保护机密用户信息的更强大、更安全的解决方案。
{"title":"Combination of Alphanumeric Password and Graphic Authentication for Cyber Security","authors":"Joseph Teguh Santoso, Budi Raharjo, Agus Wibowo","doi":"10.58346/jisis.2024.i1.002","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.002","url":null,"abstract":"The main objective of this research is to create a more secure and user-friendly password-generation method that is less vulnerable to attacks such as shoulder surfing. Similarly, while textual or alphanumeric passwords are not entirely secure, they also come with certain limitations, including issues related to memory. The novelty of this research is the development of a new algorithm (Secure Password Algorithm/SPA) for password generation that uses graphics to generate textual input from users based on user perceptions. This method is more resilient against attacks like shoulder surfing and offers a more secure and user-friendly way of creating passwords. This research uses a combination of literature review and SPA proposals to create passwords with graphical and encryption techniques. The literature review examines the weaknesses of existing graphical and text password methods. The proposed algorithm focuses on user perception and confidential data to create more secure and easy-to-use passwords. The research results show that this research can provide a new, more secure, and user-friendly method of generating passwords such as shoulder surfing. Research supports software implementation of these algorithms and psychometric, psychological, and psychiatric studies to improve user input and protect systems from malicious attacks. Graphical passwords provide better recall compared to textual passwords, and the proposed algorithm for password generation using graphical and encryption techniques provides a more secure and user-friendly method of password generation that is less vulnerable to attacks such as shoulder surfing. The proposed new encryption algorithm has succeeded in overcoming various potential weaknesses and attacks on previous encryption methods. The test results demonstrate the efficiency and near invulnerability of the SPA algorithm against brute force attacks on specific security parameters. Tested alongside AES, shows comparable security levels, particularly in resource-constrained environments. To address doubts, the paper establishes evaluation standards for computational complexity, resistance to known attacks, and adaptability to evolving threats. The algorithm has the potential to be a stronger and more secure solution for generating passwords to safeguard confidential user information.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"36 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138601528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChatGPT and Cybersecurity: Risk Knocking the Door ChatGPT 和网络安全:风险来敲门
Q2 Computer Science Pub Date : 2023-12-04 DOI: 10.58346/jisis.2024.i1.001
Muawia. A. Elsadig
Numerous advancements in natural language processing (NLP) have been made possible by the development of artificial intelligence (AI). In particular, the recent large growth in this field has been attributed to the development of sophisticated conversational AI systems such as ChatGPT. Since ChatGPT was released in November 2022, its outstanding features and capabilities have amazed millions of users. However, there is an increasing concern about its capacity to further the objectives of bad actors. In particular, ChatGPT provides new opportunities for hackers to compromise cybersecurity. This article provides a thorough investigation and discussion of how ChatGPT can significantly support hackers in committing various attacks. This investigation covers the recent state-of- the-art in research work that conducted on this context. In addition, some responses of the ChatGPT regarding its positive and negative impacts on cybersecurity were evaluated and discussed. The article concluded that ChatGPT has significantly supported hacking behaviors and can be exploited to spread malicious activities. Therefore, continuous development and enforcement of appropriate standards to prevent negative effects are required. To achieve this, policymakers and developers should work together, considering public user concerns and the misuse of this promising tool. Finally, this article provides thoughtful discussions and recommendations that can contribute to improving IA-based systems.
人工智能(AI)的发展使自然语言处理(NLP)的许多进步成为可能。特别是,这一领域最近的大幅增长归功于ChatGPT等复杂的会话人工智能系统的发展。自ChatGPT于2022年11月发布以来,其出色的特性和功能令数百万用户惊叹不已。然而,人们越来越担心它有能力促进不良行为者的目标。特别是,ChatGPT为黑客破坏网络安全提供了新的机会。本文全面调查和讨论了ChatGPT如何显著地支持黑客实施各种攻击。这项调查涵盖了在这方面进行的最新研究工作。此外,还就ChatGPT对网络安全的积极和消极影响进行了评估和讨论。文章的结论是,ChatGPT极大地支持了黑客行为,并且可以被利用来传播恶意活动。因此,需要不断开发和执行适当的标准来防止负面影响。为了实现这一目标,决策者和开发者应该共同努力,考虑到公众用户的担忧和对这一有前途的工具的滥用。最后,本文提供了有助于改进基于ia的系统的深思熟虑的讨论和建议。
{"title":"ChatGPT and Cybersecurity: Risk Knocking the Door","authors":"Muawia. A. Elsadig","doi":"10.58346/jisis.2024.i1.001","DOIUrl":"https://doi.org/10.58346/jisis.2024.i1.001","url":null,"abstract":"Numerous advancements in natural language processing (NLP) have been made possible by the development of artificial intelligence (AI). In particular, the recent large growth in this field has been attributed to the development of sophisticated conversational AI systems such as ChatGPT. Since ChatGPT was released in November 2022, its outstanding features and capabilities have amazed millions of users. However, there is an increasing concern about its capacity to further the objectives of bad actors. In particular, ChatGPT provides new opportunities for hackers to compromise cybersecurity. This article provides a thorough investigation and discussion of how ChatGPT can significantly support hackers in committing various attacks. This investigation covers the recent state-of- the-art in research work that conducted on this context. In addition, some responses of the ChatGPT regarding its positive and negative impacts on cybersecurity were evaluated and discussed. The article concluded that ChatGPT has significantly supported hacking behaviors and can be exploited to spread malicious activities. Therefore, continuous development and enforcement of appropriate standards to prevent negative effects are required. To achieve this, policymakers and developers should work together, considering public user concerns and the misuse of this promising tool. Finally, this article provides thoughtful discussions and recommendations that can contribute to improving IA-based systems.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"12 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138603625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning and Blockchain-Enabled Privacy-Preserving Healthcare 5.0 System: A Comprehensive Approach to Fraud Prevention and Security in IoMT 联邦学习和区块链支持的隐私保护医疗保健 5.0 系统:物联网医疗中预防欺诈和安全的综合方法
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.014
Sindhusaranya B., Yamini R., Manimekalai Dr.M.A.P., Geetha Dr.K.
The proliferation of Internet and Communication Technologies (ICTs) has ushered in a period often referred to as Industry 5.0. The subsequent development is accompanied by the healthcare industry coining Healthcare 5.0. Healthcare 5.0 incorporates the Internet of Things (IoT), enabling medical imaging technologies to facilitate early diagnosis of diseases and enhance the quality of healthcare facilities' service. Nevertheless, the healthcare sector is currently experiencing a delay in adopting Artificial Intelligence (AI) and big data technologies compared to other sectors under the umbrella of Industry 5.0. This delay may be attributed to the prevailing concerns about data privacy within the healthcare domain. In recent times, there has been a noticeable increase in the use of Machine Learning (ML) enabled adaptive Internet of Medical Things (IoMT) systems with different technologies for medical applications. ML is an essential component of the IoMT system, as it optimizes the trade-off between delay and energy consumption. The issue of data fraud in classical learning models inside the distributed IoMT system for medical applications remains a significant research challenge in practical settings. This paper proposes Federated Learning and Blockchain-Enabled Privacy-Preserving (FL-BEPP) for Fraud Prevention and Security (FPS) in the IoMT framework. The system incorporates numerous dynamic strategies. This research examines the medical applications that exhibit hard constraints, such as deadlines, and soft constraints, such as resource consumption, when executed on distributed fog and cloud nodes. The primary objective of FL-BEPP is to effectively detect and safeguard the confidentiality and integrity of data across many tiers, including local fog nodes and faraway clouds. This is achieved by minimizing power use and delay while simultaneously meeting the time constraints associated with healthcare workloads.
互联网和通信技术(ict)的扩散已经迎来了一个通常被称为工业5.0的时期。随后的发展伴随着医疗保健行业推出healthcare 5.0。医疗保健5.0整合了物联网(IoT),使医疗成像技术能够促进疾病的早期诊断,并提高医疗保健机构的服务质量。然而,与工业5.0下的其他行业相比,医疗保健行业目前在采用人工智能(AI)和大数据技术方面存在延迟。这种延迟可能归因于对医疗保健领域数据隐私的普遍担忧。近年来,采用不同技术的机器学习(ML)自适应医疗物联网(IoMT)系统在医疗应用中的使用明显增加。机器学习是IoMT系统的重要组成部分,因为它优化了延迟和能耗之间的权衡。在医疗应用的分布式IoMT系统中,经典学习模型中的数据欺诈问题仍然是一个重大的研究挑战。本文提出了用于IoMT框架中欺诈预防和安全(FPS)的联邦学习和支持区块链的隐私保护(FL-BEPP)。该系统包含许多动态策略。本研究考察了在分布式雾和云节点上执行时表现出硬约束(如截止日期)和软约束(如资源消耗)的医疗应用程序。FL-BEPP的主要目标是有效地检测和保护包括本地雾节点和远程云在内的多层数据的机密性和完整性。这可以通过最小化功耗和延迟来实现,同时满足与医疗保健工作负载相关的时间限制。
{"title":"Federated Learning and Blockchain-Enabled Privacy-Preserving Healthcare 5.0 System: A Comprehensive Approach to Fraud Prevention and Security in IoMT","authors":"Sindhusaranya B., Yamini R., Manimekalai Dr.M.A.P., Geetha Dr.K.","doi":"10.58346/jisis.2023.i4.014","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.014","url":null,"abstract":"The proliferation of Internet and Communication Technologies (ICTs) has ushered in a period often referred to as Industry 5.0. The subsequent development is accompanied by the healthcare industry coining Healthcare 5.0. Healthcare 5.0 incorporates the Internet of Things (IoT), enabling medical imaging technologies to facilitate early diagnosis of diseases and enhance the quality of healthcare facilities' service. Nevertheless, the healthcare sector is currently experiencing a delay in adopting Artificial Intelligence (AI) and big data technologies compared to other sectors under the umbrella of Industry 5.0. This delay may be attributed to the prevailing concerns about data privacy within the healthcare domain. In recent times, there has been a noticeable increase in the use of Machine Learning (ML) enabled adaptive Internet of Medical Things (IoMT) systems with different technologies for medical applications. ML is an essential component of the IoMT system, as it optimizes the trade-off between delay and energy consumption. The issue of data fraud in classical learning models inside the distributed IoMT system for medical applications remains a significant research challenge in practical settings. This paper proposes Federated Learning and Blockchain-Enabled Privacy-Preserving (FL-BEPP) for Fraud Prevention and Security (FPS) in the IoMT framework. The system incorporates numerous dynamic strategies. This research examines the medical applications that exhibit hard constraints, such as deadlines, and soft constraints, such as resource consumption, when executed on distributed fog and cloud nodes. The primary objective of FL-BEPP is to effectively detect and safeguard the confidentiality and integrity of data across many tiers, including local fog nodes and faraway clouds. This is achieved by minimizing power use and delay while simultaneously meeting the time constraints associated with healthcare workloads.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"64 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138606397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Analysis of Law Violation Data for the Creation of Autonomous Vehicle Traffic Flow Evaluation Indicators 为创建自动驾驶汽车交通流量评价指标而进行的违法数据分析研究
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.013
Mi-ju Kim, Yu-bin Go, So-yeon Choi, Nam-sun Kim, Cheol-hee Yoon, Wonhyung Park
The study analyzes the reason for the steady increase in the number of traffic accidents in Yongin City, Gyeonggi-do, despite the improvement of Korea's traffic accident system and the decrease in the number of traffic accidents. Seven years of traffic accident data is collected to analyze major legal violations and accident risks and to derive accident-prone areas and road risk indices through QGIS mapping. Based on this analysis, it identifies the causes of accidents in multiple accident areas, proposes improvement measures like the installation of a median strip and an unmanned traffic control device near a crosswalk, and emphasizes the significance of driver awareness and safety education. The aim of the study is to analyze road risk factors and suggest improvement measures to prevent traffic accidents, with the goal of improving the traffic situation in Yongin city.
该报告书分析了在韩国交通事故制度得到改善、交通事故数量有所减少的情况下,京畿道龙仁市的交通事故数量却持续增加的原因。收集7年的交通事故数据,通过QGIS制图分析重大违法行为和事故风险,得出事故易发区域和道路风险指数。在此基础上,明确了多个事故区域的事故原因,提出了在人行横道附近安装中间带和无人驾驶交通控制装置等改进措施,并强调了驾驶员意识和安全教育的重要性。本研究的目的是分析道路风险因素,并提出改善措施,以防止交通事故,以改善龙仁市的交通状况。
{"title":"A Study on the Analysis of Law Violation Data for the Creation of Autonomous Vehicle Traffic Flow Evaluation Indicators","authors":"Mi-ju Kim, Yu-bin Go, So-yeon Choi, Nam-sun Kim, Cheol-hee Yoon, Wonhyung Park","doi":"10.58346/jisis.2023.i4.013","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.013","url":null,"abstract":"The study analyzes the reason for the steady increase in the number of traffic accidents in Yongin City, Gyeonggi-do, despite the improvement of Korea's traffic accident system and the decrease in the number of traffic accidents. Seven years of traffic accident data is collected to analyze major legal violations and accident risks and to derive accident-prone areas and road risk indices through QGIS mapping. Based on this analysis, it identifies the causes of accidents in multiple accident areas, proposes improvement measures like the installation of a median strip and an unmanned traffic control device near a crosswalk, and emphasizes the significance of driver awareness and safety education. The aim of the study is to analyze road risk factors and suggest improvement measures to prevent traffic accidents, with the goal of improving the traffic situation in Yongin city.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"124 42","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138606849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Internet Services and Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1