首页 > 最新文献

Journal of Information Systems Security最新文献

英文 中文
Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings 信息系统安全:第17届国际会议,ICISS 2021,印度巴特那,12月16日至20日,2021年,会议记录
Q4 Social Sciences Pub Date : 2021-01-01 DOI: 10.1007/978-3-030-92571-0
{"title":"Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings","authors":"","doi":"10.1007/978-3-030-92571-0","DOIUrl":"https://doi.org/10.1007/978-3-030-92571-0","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81313726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings 信息系统安全:第16届国际会议,ICISS 2020,查谟,印度,12月16日至20日,2020年,会议录
Q4 Social Sciences Pub Date : 2020-01-01 DOI: 10.1007/978-3-030-65610-2
S. Kanhere, Vishwas T. Patil, S. Sural, M. Gaur
{"title":"Information Systems Security: 16th International Conference, ICISS 2020, Jammu, India, December 16–20, 2020, Proceedings","authors":"S. Kanhere, Vishwas T. Patil, S. Sural, M. Gaur","doi":"10.1007/978-3-030-65610-2","DOIUrl":"https://doi.org/10.1007/978-3-030-65610-2","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/978-3-030-65610-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72492757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings 信息系统安全:第15届国际会议,ICISS 2019,印度海得拉巴,2019年12月16日至20日,会议记录
Q4 Social Sciences Pub Date : 2019-01-01 DOI: 10.1007/978-3-030-36945-3
D. Garg, N. Kumar, R. Shyamasundar
{"title":"Information Systems Security: 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedings","authors":"D. Garg, N. Kumar, R. Shyamasundar","doi":"10.1007/978-3-030-36945-3","DOIUrl":"https://doi.org/10.1007/978-3-030-36945-3","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76889326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From the Editor's Desk 从编辑部
Q4 Social Sciences Pub Date : 2007-12-13 DOI: 10.1080/10658980701818343
K. Namuduri
{"title":"From the Editor's Desk","authors":"K. Namuduri","doi":"10.1080/10658980701818343","DOIUrl":"https://doi.org/10.1080/10658980701818343","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75185107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Sickness in the Health Networks 健康网络中的安全病
Q4 Social Sciences Pub Date : 2007-12-13 DOI: 10.1080/10658980701752864
Harold J. “Rockie” Grimes
{"title":"Security Sickness in the Health Networks","authors":"Harold J. “Rockie” Grimes","doi":"10.1080/10658980701752864","DOIUrl":"https://doi.org/10.1080/10658980701752864","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77459048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From the Editor's Desk 从编辑部
Q4 Social Sciences Pub Date : 2007-11-20 DOI: 10.1080/10658980701795087
K. Namuduri
We have two review articles dealing with totally varied subjects in this issue. One article is regarding lean women with polycystic ovaries (PCOS) and the other is regarding oral health and erectile dysfunction (ED). Women with PCOS demonstrate different phenotypes based on their body mass index (BMI), which may vary considerably by geography. We also know that most women with PCOS are obese, and this obesity has a significant impact on the metabolic and reproductive consequences of PCOS. However, one must remember that lean women with PCOS also carry a huge metabolic risk. It has been reported that 5–10% of lean women have PCOS, and 30–50% of women with PCOS are lean. The numbers among the Indian population may be much more, because thin Indian women with PCOS have more fat, less muscle and are sarcopenic with abdominal obesity. Lean Indian women with PCOS are often misdiagnosed and not managed in time. We diagnosed PCOS in lean women when the women had BMI <23 kg/mwith waist circumference (WC) <80 cm. Though obesity has a higher incidence of insulin resistance, 75% of lean women were insulin resistant. luteneizing hormone (LH)/follicle stimulating hormone (FSH) ratios and dehydroepiandrosterone (DHEAS) levels were also higher in lean women with PCOS. Moreover, β-endorphin levels were found to be higher in lean women with PCOS, which correlated with other hormonal parameters. These higher β-endorphins, which stimulate the release of LH, are linked to mood disorders. Lean women with PCOS have a genetic predisposition with insulin resistance and hypersensitivity, as well as higher postprandial insulin levels. These women also have reactive hypoglycemia to carbs, excess hunger and body fat storage. Lean women with PCOS did not report a history of type-2 diabetes among their first-degree relatives. Therefore, the management of lean women with PCOS should deal with handling sarcopenia, building muscle, modifying diet by reducing the intake of carbohydrates and fats and adding proteins. Apart from modifying the diet, one must advise these women to eat less and eat slowly. It is also important to curb stress by various means such as yoga and meditation.
本期我们有两篇评论文章,涉及的主题完全不同。一篇文章是关于患有多囊卵巢(PCOS)的瘦弱女性,另一篇是关于口腔健康和勃起功能障碍(ED)。多囊卵巢综合征的女性表现出不同的表型,基于她们的身体质量指数(BMI),这可能因地理而有很大差异。我们也知道,大多数患有多囊卵巢综合征的女性都是肥胖的,这种肥胖对多囊卵巢综合征的代谢和生殖后果有重大影响。然而,人们必须记住,患有多囊卵巢综合征的瘦弱女性也有巨大的代谢风险。据报道,5-10%的瘦女性患有多囊卵巢综合征,30-50%的多囊卵巢综合征女性是瘦的。印度人口中的数字可能更多,因为患有多囊卵巢综合征的瘦弱的印度妇女脂肪更多,肌肉更少,肌肉减少,腹部肥胖。患有多囊卵巢综合征的瘦弱印度妇女经常被误诊,而且没有及时治疗。当女性BMI <23 kg/m,腰围<80 cm时,我们诊断为PCOS。虽然肥胖有较高的胰岛素抵抗发生率,但75%的苗条女性有胰岛素抵抗。瘦削的多囊卵巢综合征女性黄体生成素(LH)/卵泡刺激素(FSH)比率和脱氢表雄酮(DHEAS)水平也较高。此外,患有多囊卵巢综合征的瘦弱女性β-内啡肽水平更高,这与其他激素参数相关。刺激黄体生成素释放的β-内啡肽水平升高与情绪障碍有关。患有多囊卵巢综合征的瘦弱女性有胰岛素抵抗和过敏的遗传倾向,餐后胰岛素水平也较高。这些女性对碳水化合物也有反应性低血糖,过度饥饿和身体脂肪储存。患有多囊卵巢综合征的瘦弱女性在其一级亲属中未报告2型糖尿病病史。因此,瘦型多囊卵巢综合征女性的管理应处理肌肉减少症,增加肌肉,通过减少碳水化合物和脂肪的摄入和增加蛋白质来调整饮食。除了改变饮食外,还必须建议这些妇女少吃,慢吃。通过瑜伽和冥想等各种方式来抑制压力也很重要。
{"title":"From the Editor's Desk","authors":"K. Namuduri","doi":"10.1080/10658980701795087","DOIUrl":"https://doi.org/10.1080/10658980701795087","url":null,"abstract":"We have two review articles dealing with totally varied subjects in this issue. One article is regarding lean women with polycystic ovaries (PCOS) and the other is regarding oral health and erectile dysfunction (ED). Women with PCOS demonstrate different phenotypes based on their body mass index (BMI), which may vary considerably by geography. We also know that most women with PCOS are obese, and this obesity has a significant impact on the metabolic and reproductive consequences of PCOS. However, one must remember that lean women with PCOS also carry a huge metabolic risk. It has been reported that 5–10% of lean women have PCOS, and 30–50% of women with PCOS are lean. The numbers among the Indian population may be much more, because thin Indian women with PCOS have more fat, less muscle and are sarcopenic with abdominal obesity. Lean Indian women with PCOS are often misdiagnosed and not managed in time. We diagnosed PCOS in lean women when the women had BMI <23 kg/mwith waist circumference (WC) <80 cm. Though obesity has a higher incidence of insulin resistance, 75% of lean women were insulin resistant. luteneizing hormone (LH)/follicle stimulating hormone (FSH) ratios and dehydroepiandrosterone (DHEAS) levels were also higher in lean women with PCOS. Moreover, β-endorphin levels were found to be higher in lean women with PCOS, which correlated with other hormonal parameters. These higher β-endorphins, which stimulate the release of LH, are linked to mood disorders. Lean women with PCOS have a genetic predisposition with insulin resistance and hypersensitivity, as well as higher postprandial insulin levels. These women also have reactive hypoglycemia to carbs, excess hunger and body fat storage. Lean women with PCOS did not report a history of type-2 diabetes among their first-degree relatives. Therefore, the management of lean women with PCOS should deal with handling sarcopenia, building muscle, modifying diet by reducing the intake of carbohydrates and fats and adding proteins. Apart from modifying the diet, one must advise these women to eat less and eat slowly. It is also important to curb stress by various means such as yoga and meditation.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89454922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaining Access with Social Engineering: An Empirical Study of the Threat 获取访问与社会工程:威胁的实证研究
Q4 Social Sciences Pub Date : 2007-11-01 DOI: 10.1080/10658980701788165
M. Workman
ABSTRACT Recently, research on information security has expanded from its purely technological orientation into striving to understand and explain the role of human behavior in security breaches. However, an area that has been lacking theory-grounded empirical study is in social engineering attacks. While there exists an extensive body of anecdotal literature, factors that account for attack success remains largely speculative. To better understand this increasing phenomenon, we developed a theoretical framework and conducted an empirical field study to investigate social engineering attacks, and from these results, we make recommendations for practice and further research.
近年来,信息安全的研究已经从单纯的技术取向扩展到努力理解和解释人类行为在安全漏洞中的作用。然而,缺乏理论基础的实证研究的一个领域是社会工程攻击。虽然存在大量的轶事文献,但攻击成功的因素在很大程度上仍然是推测性的。为了更好地理解这一日益增长的现象,我们开发了一个理论框架,并进行了一项实证研究,以调查社会工程攻击,并根据这些结果,我们提出了实践和进一步研究的建议。
{"title":"Gaining Access with Social Engineering: An Empirical Study of the Threat","authors":"M. Workman","doi":"10.1080/10658980701788165","DOIUrl":"https://doi.org/10.1080/10658980701788165","url":null,"abstract":"ABSTRACT Recently, research on information security has expanded from its purely technological orientation into striving to understand and explain the role of human behavior in security breaches. However, an area that has been lacking theory-grounded empirical study is in social engineering attacks. While there exists an extensive body of anecdotal literature, factors that account for attack success remains largely speculative. To better understand this increasing phenomenon, we developed a theoretical framework and conducted an empirical field study to investigate social engineering attacks, and from these results, we make recommendations for practice and further research.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72954628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 149
An Empirical Study on the Performance of Java/.Net Cryptographic APIs Java/的性能实证研究网络加密api
Q4 Social Sciences Pub Date : 2007-11-01 DOI: 10.1080/10658980701784602
Guillermo A. Francia, Rahjima R. Francia
ABSTRACT The unprecedented growing demands on security and privacy protection ushered the proliferation of cryptographic tools. This article presents a study on the performance comparison of cryptographic Application Program Interfaces (APIs) that are implemented for the Java and the .Net frameworks. The results of the study clearly indicate the superiority of a set of commercial cryptographic APIs over its open-source counterpart.
对安全和隐私保护的需求空前增长,催生了加密工具的激增。本文介绍了针对Java和。net框架实现的加密应用程序接口(api)的性能比较研究。研究结果清楚地表明,一组商业加密api优于其开源对应物。
{"title":"An Empirical Study on the Performance of Java/.Net Cryptographic APIs","authors":"Guillermo A. Francia, Rahjima R. Francia","doi":"10.1080/10658980701784602","DOIUrl":"https://doi.org/10.1080/10658980701784602","url":null,"abstract":"ABSTRACT The unprecedented growing demands on security and privacy protection ushered the proliferation of cryptographic tools. This article presents a study on the performance comparison of cryptographic Application Program Interfaces (APIs) that are implemented for the Java and the .Net frameworks. The results of the study clearly indicate the superiority of a set of commercial cryptographic APIs over its open-source counterpart.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78832786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Anatomy of Human Hacking 对人类黑客行为的剖析
Q4 Social Sciences Pub Date : 2007-11-01 DOI: 10.1080/10658980701747237
Peter O. Okenyi, T. Owens
ABSTRACT Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its impact is continuously giving serious concern in the Information technology arena which has often been undermined due to the ease with which this technique is widely used to infiltrate networks through unsuspecting individuals that are undeniably considered the “weakest link” in the security circle. Security awareness that brings about behavioral change, reduces employees' vulnerability, and protects against threats exploiting employees' vulnerability having a positive impact overall on risks related to information assets. Strategies for developing and implementing a successful information security awareness program are presented in this article, which also provides an introduction to the subject of human hacking while discussing the various counter-measures available to minimize the likelihood of such occurrences and their financial, reputation, psychological, and legal ramifications.
人类黑客是一种严重依赖人类操纵的非技术入侵。它的影响不断引起信息技术领域的严重关注,由于这种技术被广泛用于通过毫无戒心的个人渗透网络,而这些个人无疑被认为是安全圈中“最薄弱的环节”,因此常常受到破坏。安全意识带来行为改变,减少员工的脆弱性,防范利用员工脆弱性的威胁,对信息资产相关风险总体上有积极的影响。本文介绍了开发和实施成功的信息安全意识计划的策略,还介绍了人类黑客攻击的主题,同时讨论了各种可用的应对措施,以尽量减少此类事件发生的可能性及其财务、声誉、心理和法律后果。
{"title":"On the Anatomy of Human Hacking","authors":"Peter O. Okenyi, T. Owens","doi":"10.1080/10658980701747237","DOIUrl":"https://doi.org/10.1080/10658980701747237","url":null,"abstract":"ABSTRACT Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its impact is continuously giving serious concern in the Information technology arena which has often been undermined due to the ease with which this technique is widely used to infiltrate networks through unsuspecting individuals that are undeniably considered the “weakest link” in the security circle. Security awareness that brings about behavioral change, reduces employees' vulnerability, and protects against threats exploiting employees' vulnerability having a positive impact overall on risks related to information assets. Strategies for developing and implementing a successful information security awareness program are presented in this article, which also provides an introduction to the subject of human hacking while discussing the various counter-measures available to minimize the likelihood of such occurrences and their financial, reputation, psychological, and legal ramifications.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90463546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Regulatory Compliance and the Chief Compliance Officer 法规遵从和首席合规官
Q4 Social Sciences Pub Date : 2007-11-01 DOI: 10.1080/10658980701805050
Edward H. Freeman
{"title":"Regulatory Compliance and the Chief Compliance Officer","authors":"Edward H. Freeman","doi":"10.1080/10658980701805050","DOIUrl":"https://doi.org/10.1080/10658980701805050","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75870866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Journal of Information Systems Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1