首页 > 最新文献

Journal of Information Systems Security最新文献

英文 中文
Defending the Corporate Crown Jewels from the Dangers that Lurk Within — Effective Internal Network Security Focuses on Behavior 保护公司皇冠上的宝石免受潜伏在内部的危险——有效的内部网络安全关注于行为
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980601051524
Ross Ortega
ABSTRACT The risk of damaging cyber-attacks on corporate networks has never been higher. Enterprise networks contain the most precious assets of a corporation. Essentially, everything a company creates or does manifests itself within the corporate network. Consequently, corporate networks have become fertile ground for abuse and theft.
企业网络遭受破坏性网络攻击的风险从未如此之高。企业网络包含着企业最宝贵的资产。从本质上讲,公司所创造或所做的一切都体现在公司网络中。因此,公司网络成为滥用和盗窃的沃土。
{"title":"Defending the Corporate Crown Jewels from the Dangers that Lurk Within — Effective Internal Network Security Focuses on Behavior","authors":"Ross Ortega","doi":"10.1080/10658980601051524","DOIUrl":"https://doi.org/10.1080/10658980601051524","url":null,"abstract":"ABSTRACT The risk of damaging cyber-attacks on corporate networks has never been higher. Enterprise networks contain the most precious assets of a corporation. Essentially, everything a company creates or does manifests itself within the corporate network. Consequently, corporate networks have become fertile ground for abuse and theft.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73184348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
RFIDs and Personal Privacy rfid与个人隐私
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980601051821
Edward H. Freeman
It's not true that life is one damn thing after another; it is one damn thing over and over.—Edna St. Vincent Millay (1892–1950) Security and privacy experts agree any new technology is always one ...
生活不是一件该死的事接一件该死的事;就是一件该死的事反复发生。——埃德娜·圣文森特·米莱(1892-1950)安全和隐私专家一致认为,任何新技术总是一种……
{"title":"RFIDs and Personal Privacy","authors":"Edward H. Freeman","doi":"10.1080/10658980601051821","DOIUrl":"https://doi.org/10.1080/10658980601051821","url":null,"abstract":"It's not true that life is one damn thing after another; it is one damn thing over and over.—Edna St. Vincent Millay (1892–1950) Security and privacy experts agree any new technology is always one ...","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74008720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Introduction to Insider Threat Management 内部威胁管理简介
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980601051334
Sean Steele, C. Wargo
Insiders — employees, contractors, consultants, and vendors — pose as great a threat to an organization’s security posture as outsiders, including hackers. Few organizations have implemented the policies, procedures, tools, or strategies to effectively address their insider threats. An insider threat assessment is a recommended first step for many organizations, followed by review of relevant security policies and employee awareness training.
内部人员——雇员、承包商、顾问和供应商——与外部人员(包括黑客)一样对组织的安全态势构成巨大威胁。很少有组织实施了政策、程序、工具或策略来有效地解决其内部威胁。对于许多组织来说,内部威胁评估是建议的第一步,然后是审查相关的安全策略和员工意识培训。
{"title":"An Introduction to Insider Threat Management","authors":"Sean Steele, C. Wargo","doi":"10.1080/10658980601051334","DOIUrl":"https://doi.org/10.1080/10658980601051334","url":null,"abstract":"Insiders — employees, contractors, consultants, and vendors — pose as great a threat to an organization’s security posture as outsiders, including hackers. Few organizations have implemented the policies, procedures, tools, or strategies to effectively address their insider threats. An insider threat assessment is a recommended first step for many organizations, followed by review of relevant security policies and employee awareness training.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78045991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Securing Access in Network Operations — Emerging Tools for Simplifying a Carrier's Network Security Administration 网络操作中的安全访问——简化运营商网络安全管理的新兴工具
Q4 Social Sciences Pub Date : 2007-03-28 DOI: 10.1080/10658980601051417
Costas Constantakis
ABSTRACT Security administrators at the global communications service providers have traditionally experienced difficulties in enforcing access security policies in their network operations. It has not, however, been for lack of trying. Whether security breaches have been intentional (hackers) or inadvertent (well-intentioned network operators misusing commands), network outages and intrusions due to an inability to enforce access security policies have been a serious problem, often resulting in tens of millions of dollars in foregone revenues while impairing a service provider's ability to provide continuous service to its customers. This article reviews the challenges that have existed to date for security administrators while exploring a 4-step approach, using newly available security administration automation tools, to overcome these challenges for network operating environments that involve many hundreds of network operators administering tens of thousands of network elements in a global network.
全球通信服务提供商的安全管理员在其网络运营中执行访问安全策略时一直遇到困难。然而,这并不是因为缺乏尝试。无论安全漏洞是故意的(黑客)还是无意的(善意的网络运营商滥用命令),由于无法执行访问安全策略而导致的网络中断和入侵都是一个严重的问题,通常会导致数千万美元的收入损失,同时损害服务提供商为其客户提供持续服务的能力。本文回顾了迄今为止安全管理员面临的挑战,同时探索了一种4步方法,使用最新可用的安全管理自动化工具来克服网络操作环境中的这些挑战,这些环境涉及数百个网络运营商管理全球网络中的数万个网络元素。
{"title":"Securing Access in Network Operations — Emerging Tools for Simplifying a Carrier's Network Security Administration","authors":"Costas Constantakis","doi":"10.1080/10658980601051417","DOIUrl":"https://doi.org/10.1080/10658980601051417","url":null,"abstract":"ABSTRACT Security administrators at the global communications service providers have traditionally experienced difficulties in enforcing access security policies in their network operations. It has not, however, been for lack of trying. Whether security breaches have been intentional (hackers) or inadvertent (well-intentioned network operators misusing commands), network outages and intrusions due to an inability to enforce access security policies have been a serious problem, often resulting in tens of millions of dollars in foregone revenues while impairing a service provider's ability to provide continuous service to its customers. This article reviews the challenges that have existed to date for security administrators while exploring a 4-step approach, using newly available security administration automation tools, to overcome these challenges for network operating environments that involve many hundreds of network operators administering tens of thousands of network elements in a global network.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76971346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OrderGun.A: A Sophisticated Rootkit OrderGun。答:一个复杂的Rootkit
Q4 Social Sciences Pub Date : 2007-01-01 DOI: 10.1080/10658980601051763
K. Dunham
There is disclosed printing apparatus composed essentially of molded plastics material which has relatively few parts, is easy to manufacture and maintain, and is lightweight and portable. The apparatus is illustrated as being of the table top type which can print both standard type tags and labels, string tags and pin tickets. The apparatus has a print head operable in conjunction with an impression control device, a feed finger assembly with a registration adjustment, a simple drive arrangement operated by a cam with a single cam path, and a reel positionable at different attitudes, and the construction of the apparatus is readily adaptable to both manually operated and motorized versions.
本发明公开了一种主要由模塑塑料材料组成的打印设备,该设备具有相对较少的部件,易于制造和维护,并且轻巧便携。所述设备为桌面型,可打印标准型标签和标签、串式标签和引脚票。该设备具有可与印模控制装置一起操作的打印头,具有对准调整的进给手指组件,由具有单个凸轮路径的凸轮操作的简单驱动装置,以及可在不同姿态定位的卷轴,并且该设备的结构易于适应手动操作和电动版本。
{"title":"OrderGun.A: A Sophisticated Rootkit","authors":"K. Dunham","doi":"10.1080/10658980601051763","DOIUrl":"https://doi.org/10.1080/10658980601051763","url":null,"abstract":"There is disclosed printing apparatus composed essentially of molded plastics material which has relatively few parts, is easy to manufacture and maintain, and is lightweight and portable. The apparatus is illustrated as being of the table top type which can print both standard type tags and labels, string tags and pin tickets. The apparatus has a print head operable in conjunction with an impression control device, a feed finger assembly with a registration adjustment, a simple drive arrangement operated by a cam with a single cam path, and a reel positionable at different attitudes, and the construction of the apparatus is readily adaptable to both manually operated and motorized versions.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84943538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IT Security Management and Business Process Automation: Challenges, Approaches, and Rewards IT安全管理和业务流程自动化:挑战、方法和回报
Q4 Social Sciences Pub Date : 2007-01-01 DOI: 10.1080/10658980601051706
Richard P. Tracy
A favorite idiom among security experts is, “Security isn’t a product, it’s a process.” If security is a process, then why not automate it? Today’s workflow and business process management (BPM) technologies are mature enough to support the automation of essential tasks that underlie risk compliance and assessment, vulnerability testing and management, patching, incident management and response, and other information technology security processes. More important, an enterprise platform for IT security process automation enables cybersecurity specialists to centrally orchestrate the interactions of personnel, their work, and various point products for information security—cutting across departments and functional areas to ensure a resilient, flexible security posture. The results: faster deployment and stronger enforcement of security policies; the ability to achieve sustained compliance with industry and government mandates for information security; comprehensive, error-free documentation of security procedures and policies; and more cost-effective attainment of the enterprise’s security goals. This article will review some of the basic issues that relate to information security process automation, including turning security policies into security requirements; challenges in enforcing security requirements; what’s involved in automating information security and compliance processes; and how a security process automation platform supports that effort.
安全专家最喜欢的一句话是:“安全不是一个产品,而是一个过程。”如果安全性是一个过程,那么为什么不将其自动化呢?今天的工作流和业务流程管理(BPM)技术已经足够成熟,可以支持风险遵从性和评估、漏洞测试和管理、修补、事件管理和响应以及其他信息技术安全流程的基本任务的自动化。更重要的是,IT安全流程自动化的企业平台使网络安全专家能够集中协调人员、他们的工作以及跨部门和功能区域的信息安全的各种点产品之间的交互,以确保有弹性、灵活的安全状态。其结果是:更快地部署和更强地执行安全策略;实现持续遵守行业和政府信息安全指令的能力;全面无误的安全程序和政策文件;并更经济高效地实现企业的安全目标。本文将回顾与信息安全流程自动化相关的一些基本问题,包括将安全策略转换为安全需求;在执行保安要求方面的挑战;自动化信息安全和合规流程涉及哪些内容;以及安全过程自动化平台如何支持这一工作。
{"title":"IT Security Management and Business Process Automation: Challenges, Approaches, and Rewards","authors":"Richard P. Tracy","doi":"10.1080/10658980601051706","DOIUrl":"https://doi.org/10.1080/10658980601051706","url":null,"abstract":"A favorite idiom among security experts is, “Security isn’t a product, it’s a process.” If security is a process, then why not automate it? Today’s workflow and business process management (BPM) technologies are mature enough to support the automation of essential tasks that underlie risk compliance and assessment, vulnerability testing and management, patching, incident management and response, and other information technology security processes. More important, an enterprise platform for IT security process automation enables cybersecurity specialists to centrally orchestrate the interactions of personnel, their work, and various point products for information security—cutting across departments and functional areas to ensure a resilient, flexible security posture. The results: faster deployment and stronger enforcement of security policies; the ability to achieve sustained compliance with industry and government mandates for information security; comprehensive, error-free documentation of security procedures and policies; and more cost-effective attainment of the enterprise’s security goals. This article will review some of the basic issues that relate to information security process automation, including turning security policies into security requirements; challenges in enforcing security requirements; what’s involved in automating information security and compliance processes; and how a security process automation platform supports that effort.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87250002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Multimedia Digital Rights Protection Using Watermarking Techniques 基于水印技术的多媒体数字版权保护
Q4 Social Sciences Pub Date : 2007-01-01 DOI: 10.1080/10658980701322528
Vyaghreswara Rao Namuduri, S. Pandit
ABSTRACT With the advancement of Internet technologies and its wide usage, it has become easy to illegally copy, distribute, and manipulate digital products. Digital watermarking is a proven method to protect authenticity by identifying the owner of the digital content. Significant work has been reported in the last five years on legal and technical measures for protecting digital rights. This paper explains the concepts of ownership rights and related intellectual property rights and their technical and legal protection measures. It also introduces digital water marking, its classification, features, and applications.
随着互联网技术的进步和广泛使用,非法复制、传播和操纵数字产品已经变得非常容易。数字水印是一种经过验证的方法,通过识别数字内容的所有者来保护真实性。据报道,在过去五年中,在保护数字权利的法律和技术措施方面开展了重大工作。本文阐述了所有权和相关知识产权的概念及其技术和法律保护措施。介绍了数字水印的分类、特点和应用。
{"title":"Multimedia Digital Rights Protection Using Watermarking Techniques","authors":"Vyaghreswara Rao Namuduri, S. Pandit","doi":"10.1080/10658980701322528","DOIUrl":"https://doi.org/10.1080/10658980701322528","url":null,"abstract":"ABSTRACT With the advancement of Internet technologies and its wide usage, it has become easy to illegally copy, distribute, and manipulate digital products. Digital watermarking is a proven method to protect authenticity by identifying the owner of the digital content. Significant work has been reported in the last five years on legal and technical measures for protecting digital rights. This paper explains the concepts of ownership rights and related intellectual property rights and their technical and legal protection measures. It also introduces digital water marking, its classification, features, and applications.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87978908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Building an Identity Management Infrastructure for Today…and Tomorrow 为今天和明天建立一个身份管理基础设施
Q4 Social Sciences Pub Date : 2007-01-01 DOI: 10.1080/10658980701250083
A. Klein
The machine comprises a dough flattening out station, a puff-pastry cutting station, a cut puff-pastry triangle spacing and orienting station, a triangle aligning station and a forming station, wherein a plurality of conveyor apparatus are provided effective to convey baking pans under the forming station, in such a way as to cause the pastry pieces to orderly fall into shaped recesses formed in the pans. The machine further comprises a mechanical type of device effective to control the falling of the formed pastry pieces on the pans and a rotating brush device for bending the pieces according to a predetermined curvature.
该机器包括擀面工位、泡饼切割工位、切割泡饼三角间距定位工位、三角对准工位和成型工位,其中设有多个输送装置,有效地在成型工位下输送焙烤盘,使焙烤盘有序地落入焙烤盘形成的形状凹槽中。该机器还包括有效控制形成的糕点块落在平底锅上的机械式装置和根据预定曲率弯曲所述糕点块的旋转刷装置。
{"title":"Building an Identity Management Infrastructure for Today…and Tomorrow","authors":"A. Klein","doi":"10.1080/10658980701250083","DOIUrl":"https://doi.org/10.1080/10658980701250083","url":null,"abstract":"The machine comprises a dough flattening out station, a puff-pastry cutting station, a cut puff-pastry triangle spacing and orienting station, a triangle aligning station and a forming station, wherein a plurality of conveyor apparatus are provided effective to convey baking pans under the forming station, in such a way as to cause the pastry pieces to orderly fall into shaped recesses formed in the pans. The machine further comprises a mechanical type of device effective to control the falling of the formed pastry pieces on the pans and a rotating brush device for bending the pieces according to a predetermined curvature.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78748430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From the Editor's Desk 从编辑部
Q4 Social Sciences Pub Date : 2007-01-01 DOI: 10.1080/10658980701372804
K. Namuduri
{"title":"From the Editor's Desk","authors":"K. Namuduri","doi":"10.1080/10658980701372804","DOIUrl":"https://doi.org/10.1080/10658980701372804","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78073810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Data-Archiving: How to Protect and Store Your Data 安全数据归档:如何保护和存储您的数据
Q4 Social Sciences Pub Date : 2007-01-01 DOI: 10.1080/10658980601051904
Edwin F. Ginty
{"title":"Secure Data-Archiving: How to Protect and Store Your Data","authors":"Edwin F. Ginty","doi":"10.1080/10658980601051904","DOIUrl":"https://doi.org/10.1080/10658980601051904","url":null,"abstract":"","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2007-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79661146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Systems Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1