首页 > 最新文献

Journal of Information Systems Security最新文献

英文 中文
Social Psychological Variables That Contribute to Resistance to Security Assessment Findings 社会心理变量有助于抵制安全评估结果
Q4 Social Sciences Pub Date : 2006-03-01 DOI: 10.1201/1086.1065898X/45926.15.1.20060301/92685.8
Russ Neal
Abstract It is not uncommon for IT executive management to require sufficient time to review and digest the findings of a security or disaster recovery risk assessment or the recommendations of a follow-on remediation plan. This is normal and is to be expected. Security remediation or the institution of a disaster recovery plan is costly and resource intensive. But soon a milestone is passed and the security consultant realizes that by the time any action is to be taken by executive management, the findings of the assessment have decayed and the information from several months ago can no longer serve as the information for decision making today. In some instances, consultants have observed management, prompted by audit findings and resulting hard implementation dates, attempting to suddenly act on assessment findings that are months to years old. Other forms of non-action are to belatedly proceed with the security remediation, only to have the project flounder due to non-support.
It执行管理层需要足够的时间来审查和消化安全或灾难恢复风险评估的结果或后续补救计划的建议,这并不罕见。这是正常的,也是意料之中的。安全补救或灾难恢复计划的制定成本很高,而且需要大量资源。但很快一个里程碑就过去了,安全顾问意识到,在执行管理层要采取任何行动的时候,评估的结果已经过时,几个月前的信息再也不能作为今天决策的信息了。在某些情况下,顾问注意到,由于审计结果和由此产生的难以确定的执行日期,管理层试图突然根据几个月到几年前的评估结果采取行动。其他形式的不作为是延迟进行安全补救,只是由于不支持而使项目陷入困境。
{"title":"Social Psychological Variables That Contribute to Resistance to Security Assessment Findings","authors":"Russ Neal","doi":"10.1201/1086.1065898X/45926.15.1.20060301/92685.8","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45926.15.1.20060301/92685.8","url":null,"abstract":"Abstract It is not uncommon for IT executive management to require sufficient time to review and digest the findings of a security or disaster recovery risk assessment or the recommendations of a follow-on remediation plan. This is normal and is to be expected. Security remediation or the institution of a disaster recovery plan is costly and resource intensive. But soon a milestone is passed and the security consultant realizes that by the time any action is to be taken by executive management, the findings of the assessment have decayed and the information from several months ago can no longer serve as the information for decision making today. In some instances, consultants have observed management, prompted by audit findings and resulting hard implementation dates, attempting to suddenly act on assessment findings that are months to years old. Other forms of non-action are to belatedly proceed with the security remediation, only to have the project flounder due to non-support.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83948341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding the IM Security Threat 了解即时通讯安全威胁
Q4 Social Sciences Pub Date : 2006-03-01 DOI: 10.1201/1086.1065898X/45926.15.1.20060301/92681.4
Art Gilliland
Abstract Success in today's fast-paced global economy requires precision, agility, and speed. Organizations must quickly respond to changing market demands and make timely decisions that impact the success or failure of their business. Through the use of available and proven technologies to increase the velocity of collaborative decision making to match the speed of doing business, the demand for information is driving the need for real-time communications in today's organizations. Instant access to information across internal collaborative groups, important customers, and external trading partners creates business efficiencies and sets the real-time organization above the rest.
在当今快节奏的全球经济中取得成功需要精确、敏捷和速度。组织必须快速响应不断变化的市场需求,并及时做出影响其业务成败的决策。通过使用可用的和经过验证的技术来提高协作决策的速度,以匹配业务的速度,对信息的需求正在推动当今组织对实时通信的需求。跨内部协作组、重要客户和外部贸易伙伴对信息的即时访问可以提高业务效率,并将实时组织置于其他组织之上。
{"title":"Understanding the IM Security Threat","authors":"Art Gilliland","doi":"10.1201/1086.1065898X/45926.15.1.20060301/92681.4","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45926.15.1.20060301/92681.4","url":null,"abstract":"Abstract Success in today's fast-paced global economy requires precision, agility, and speed. Organizations must quickly respond to changing market demands and make timely decisions that impact the success or failure of their business. Through the use of available and proven technologies to increase the velocity of collaborative decision making to match the speed of doing business, the demand for information is driving the need for real-time communications in today's organizations. Instant access to information across internal collaborative groups, important customers, and external trading partners creates business efficiencies and sets the real-time organization above the rest.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74434620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Money Mules: An Investigative View 金钱骡子:一种调查性观点
Q4 Social Sciences Pub Date : 2006-03-01 DOI: 10.1201/1086.1065898X/45926.15.1.20060301/92679.2
Ken Dunham
Abstract Money mules are individuals unwittingly hired by organized criminals to perform international wire fraud and other illicit operations. It's their job to help move money around under the title of “account manager,” “client manager,” and other creative titles. Mules don't often realize they are part of an international fraud ring. It's bigger than you think, moving millions of dollars annually to overseas accounts in Russia and other global locations. This investigative report looks into the world of money mules and how they operate.
钱骡是指在不知情的情况下被有组织犯罪分子雇佣从事国际电信欺诈和其他非法活动的个人。他们的工作是在“客户经理”、“客户经理”和其他有创意的头衔下帮助资金周转。骡子通常不会意识到他们是国际诈骗团伙的一部分。它比你想象的要大,每年将数百万美元转移到俄罗斯和其他全球地区的海外账户。这份调查报告着眼于钱骡的世界以及他们是如何运作的。
{"title":"Money Mules: An Investigative View","authors":"Ken Dunham","doi":"10.1201/1086.1065898X/45926.15.1.20060301/92679.2","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45926.15.1.20060301/92679.2","url":null,"abstract":"Abstract Money mules are individuals unwittingly hired by organized criminals to perform international wire fraud and other illicit operations. It's their job to help move money around under the title of “account manager,” “client manager,” and other creative titles. Mules don't often realize they are part of an international fraud ring. It's bigger than you think, moving millions of dollars annually to overseas accounts in Russia and other global locations. This investigative report looks into the world of money mules and how they operate.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75050963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Managing the Risks of Managed Security Services 管理托管安全服务的风险
Q4 Social Sciences Pub Date : 2006-03-01 DOI: 10.1201/1086.1065898X/45926.15.1.20060301/92684.7
B. Masuda
Abstract The information security industry has been around for quite a while, but only in the past decade has it matured and become a widespread practice throughout commerce. As the information security industry matures and grows, the application of certain economic principles becomes apparent, such as economies of scale.
信息安全行业已经存在了很长一段时间,但在过去的十年里,它才逐渐成熟,并成为整个商业领域的普遍实践。随着信息安全行业的成熟和发展,某些经济原则的应用变得明显,例如规模经济。
{"title":"Managing the Risks of Managed Security Services","authors":"B. Masuda","doi":"10.1201/1086.1065898X/45926.15.1.20060301/92684.7","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45926.15.1.20060301/92684.7","url":null,"abstract":"Abstract The information security industry has been around for quite a while, but only in the past decade has it matured and become a widespread practice throughout commerce. As the information security industry matures and grows, the application of certain economic principles becomes apparent, such as economies of scale.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87614404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Wardriving: Unauthorized Access to Wi-Fi Networks Wardriving:未经授权访问Wi-Fi网络
Q4 Social Sciences Pub Date : 2006-03-01 DOI: 10.1201/1086.1065898X/45926.15.1.20060301/92680.3
Edward H. Freeman
Abstract Wireless local area network, or Wi-Fi (“wireless fidelity”), is a short-range networking technology. Wi-Fi allows suitably equipped computers to connect to computer networks and the Internet using a radio connection rather than wires. Most new laptop computers can access Wi-Fi routers. T-Mobile HotSpot provides high-speed Wi-Fi in public locations such as Starbucks, Borders, FedEx, Kinko's, Hyatt's, and the airline clubs for most major airlines. Unlimited subscription plans start at $29.99 per month or $6.00 per hour for nonmembers.
无线局域网(Wireless local area network,简称Wi-Fi)是一种短距离网络技术。Wi-Fi允许配备适当设备的计算机使用无线电连接而不是电线连接到计算机网络和互联网。大多数新的笔记本电脑都可以访问Wi-Fi路由器。T-Mobile HotSpot在星巴克、Borders、FedEx、Kinko’s、Hyatt’s以及大多数主要航空公司的航空俱乐部等公共场所提供高速Wi-Fi。无限订阅计划起价为每月29.99美元,非会员每小时6.00美元。
{"title":"Wardriving: Unauthorized Access to Wi-Fi Networks","authors":"Edward H. Freeman","doi":"10.1201/1086.1065898X/45926.15.1.20060301/92680.3","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45926.15.1.20060301/92680.3","url":null,"abstract":"Abstract Wireless local area network, or Wi-Fi (“wireless fidelity”), is a short-range networking technology. Wi-Fi allows suitably equipped computers to connect to computer networks and the Internet using a radio connection rather than wires. Most new laptop computers can access Wi-Fi routers. T-Mobile HotSpot provides high-speed Wi-Fi in public locations such as Starbucks, Borders, FedEx, Kinko's, Hyatt's, and the airline clubs for most major airlines. Unlimited subscription plans start at $29.99 per month or $6.00 per hour for nonmembers.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75698378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Securing and Hardening Red†Hat Linux 安全加固Red†Hat Linux
Q4 Social Sciences Pub Date : 2006-03-01 DOI: 10.1201/1086.1065898X/45926.15.1.20060301/92682.5
Sumit Dhar
Abstract An operating system is only as secure as the way it is configured and set up by the systems administrator. An improperly configured system, no matter how secure the underlying OS, is a disaster waiting to happen. Security thus depends a lot on the foresight and strategies of the administrator.
操作系统的安全性取决于系统管理员对其进行配置和设置的方式。无论底层操作系统有多安全,配置不当的系统都是一场灾难。因此,安全性在很大程度上取决于管理员的远见和策略。
{"title":"Securing and Hardening Red†Hat Linux","authors":"Sumit Dhar","doi":"10.1201/1086.1065898X/45926.15.1.20060301/92682.5","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45926.15.1.20060301/92682.5","url":null,"abstract":"Abstract An operating system is only as secure as the way it is configured and set up by the systems administrator. An improperly configured system, no matter how secure the underlying OS, is a disaster waiting to happen. Security thus depends a lot on the foresight and strategies of the administrator.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84480249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Lion and the Gazelle 狮子和瞪羚
Q4 Social Sciences Pub Date : 2006-03-01 DOI: 10.1201/1086.1065898X/45926.15.1.20060301/92678.1
J. Tiller
Abstract There are many discussions concerning infosec's value to the business and its role in the value chain. Every company produces, ultimately, goods or services that are the culmination of a series of events or actions encompassing people, process, and technology. The ability to introduce efficiencies — resulting in greater savings without derogation to the product or service — within the value chain presents a significant benefit for the producer. This tenet will impact security professionals like no other in the next few years.
关于信息安全对企业的价值及其在价值链中的作用,有很多讨论。每个公司最终生产的产品或服务都是一系列事件或行动的高潮,这些事件或行动包括人员、流程和技术。在价值链中引入效率的能力——在不损害产品或服务的情况下实现更大的节省——为生产商带来了巨大的利益。这一原则将在未来几年对安全专业人员产生前所未有的影响。
{"title":"The Lion and the Gazelle","authors":"J. Tiller","doi":"10.1201/1086.1065898X/45926.15.1.20060301/92678.1","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45926.15.1.20060301/92678.1","url":null,"abstract":"Abstract There are many discussions concerning infosec's value to the business and its role in the value chain. Every company produces, ultimately, goods or services that are the culmination of a series of events or actions encompassing people, process, and technology. The ability to introduce efficiencies — resulting in greater savings without derogation to the product or service — within the value chain presents a significant benefit for the producer. This tenet will impact security professionals like no other in the next few years.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83297320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Don't Trust Your Vendor's Software Distribution Methodology 不要相信供应商的软件分发方法
Q4 Social Sciences Pub Date : 2006-01-01 DOI: 10.1201/1086.1065898X/45782.14.6.20060101/91858.8
Andrew Storms
Abstract Weeks prior to a scheduled maintenance window, a network administrator at Cable and Wireless navigated to Cisco's Web site and downloaded new IOS code for their 12000 series gig routers. Days of rigorous testing resulted in an expected smooth installation of the new software. Unknown to the network administrator or anyone at Cable and Wireless, the IOS code had been Trojaned. Via Lawful Intercept, weeks went by where packets were sent to previously hijacked SOHO systems, which in turn forwarded said information to various sources, eventually making their way to a global terrorist group.
在计划维护窗口的前几周,有线和无线公司的网络管理员浏览到思科的网站,并为他们的12000系列gig路由器下载了新的IOS代码。经过数天的严格测试,新软件顺利安装。网络管理员或有线和无线公司的任何人都不知道,IOS代码已经被木马化了。通过合法拦截,几个星期后,数据包被发送到先前被劫持的SOHO系统,这些系统又将这些信息转发给各种来源,最终进入一个全球恐怖组织的手中。
{"title":"Don't Trust Your Vendor's Software Distribution Methodology","authors":"Andrew Storms","doi":"10.1201/1086.1065898X/45782.14.6.20060101/91858.8","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45782.14.6.20060101/91858.8","url":null,"abstract":"Abstract Weeks prior to a scheduled maintenance window, a network administrator at Cable and Wireless navigated to Cisco's Web site and downloaded new IOS code for their 12000 series gig routers. Days of rigorous testing resulted in an expected smooth installation of the new software. Unknown to the network administrator or anyone at Cable and Wireless, the IOS code had been Trojaned. Via Lawful Intercept, weeks went by where packets were sent to previously hijacked SOHO systems, which in turn forwarded said information to various sources, eventually making their way to a global terrorist group.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81780946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Best Practices for Building a Security Operations Center 构建安全运营中心的最佳实践
Q4 Social Sciences Pub Date : 2006-01-01 DOI: 10.1201/1086.1065898X/45782.14.6.20060101/91856.6
Diana Kelley, Ron Moritz
Abstract If one cannot effectively manage the growing volume of security events flooding the enterprise, one cannot secure one's business. Yet IT security teams are now being overwhelmed by literally millions of security-related messages every day. This daily deluge of security data is being generated by the numerous “point” security solutions deployed across the enterprise: firewalls, intrusion prevention and detection, access control, identity management, anti-virus, etc. These solutions all generate information in different formats, store it in different places, and forward to different locations. And it is more than anyone can handle.
如果不能有效地管理大量涌入企业的安全事件,就不能保证企业的安全。然而,IT安全团队现在每天都被数百万条与安全相关的消息所淹没。每天大量的安全数据是由部署在企业各处的众多“点”安全解决方案产生的:防火墙、入侵防御和检测、访问控制、身份管理、反病毒等。这些解决方案都以不同的格式生成信息,将其存储在不同的位置,并转发到不同的位置。这是任何人都无法承受的。
{"title":"Best Practices for Building a Security Operations Center","authors":"Diana Kelley, Ron Moritz","doi":"10.1201/1086.1065898X/45782.14.6.20060101/91856.6","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45782.14.6.20060101/91856.6","url":null,"abstract":"Abstract If one cannot effectively manage the growing volume of security events flooding the enterprise, one cannot secure one's business. Yet IT security teams are now being overwhelmed by literally millions of security-related messages every day. This daily deluge of security data is being generated by the numerous “point” security solutions deployed across the enterprise: firewalls, intrusion prevention and detection, access control, identity management, anti-virus, etc. These solutions all generate information in different formats, store it in different places, and forward to different locations. And it is more than anyone can handle.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82407960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Disclosure of Information Theft: The ChoicePoint Security Breach 披露信息盗窃:选择点安全漏洞
Q4 Social Sciences Pub Date : 2006-01-01 DOI: 10.1201/1086.1065898X/45782.14.6.20060101/91853.3
Edward H. Freeman
Abstract In recent months, the media have reported several major security breaches. Hackers have stolen the personal information of thousands of individuals from leading banks, credit bureaus, and insurance companies. In other cases, computers and disks with highly confidential data have simply vanished at the airport security counter or from vehicles parked in the company lot. Stolen data may include such sensitive information as Social Security and driver's license numbers, financial history, and bank account numbers and balances.
近几个月来,媒体报道了几起重大的安全漏洞。黑客已经从主要银行、信用机构和保险公司窃取了成千上万个人的个人信息。在其他情况下,拥有高度机密数据的电脑和磁盘在机场安检柜台或停在公司停车场的车辆上消失了。被盗的数据可能包括诸如社会保障和驾驶执照号码、财务历史、银行账号和余额等敏感信息。
{"title":"Disclosure of Information Theft: The ChoicePoint Security Breach","authors":"Edward H. Freeman","doi":"10.1201/1086.1065898X/45782.14.6.20060101/91853.3","DOIUrl":"https://doi.org/10.1201/1086.1065898X/45782.14.6.20060101/91853.3","url":null,"abstract":"Abstract In recent months, the media have reported several major security breaches. Hackers have stolen the personal information of thousands of individuals from leading banks, credit bureaus, and insurance companies. In other cases, computers and disks with highly confidential data have simply vanished at the airport security counter or from vehicles parked in the company lot. Stolen data may include such sensitive information as Social Security and driver's license numbers, financial history, and bank account numbers and balances.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2006-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81825851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Information Systems Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1