首页 > 最新文献

Journal of Cyber Security and Mobility最新文献

英文 中文
Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review 基于深度学习的恶意软件检测与分类混合分析:最新综述
Q3 Computer Science Pub Date : 2023-12-11 DOI: 10.13052/jcsm2245-1439.1314
Syed Shuja Hussain, M. Razak, Ahmad Firdaus
Globally extensive digital revolutions involved with every process related to human progress can easily create the critical issues in security aspects. This is promoted due to the important factors like financial crises and geographical connectivity in worse condition of the nations. By this fact, the authors are well motivated to present a precise literature on malware detection with deep learning approach. In this literature, the basic overview includes the nature of nature of malware detection i.e., static, dynamic, and hybrid approach. Another major component of this articles is the investigation of the backgrounds from recently published and highly cited state-of-the-arts on malware detection, prevention and prediction with deep learning frameworks. The technologies engaged in providing solutions are utilized from AI based frameworks like machine learning, deep learning, and hybrid frameworks. The main motivations to produce this article is to portrait clear pictures of the option challenging issues and corresponding solution for developing robust malware-free devices. In the lack of a robust malware-free devices, highly growing geographical and financial disputes at wide globes can be extensively provoked by malicious groups. Therefore, exceptionally high demand of the malware detection devices requires a very strong recommendation to ensure the security of a nation. In terms preventing and recovery, Zero-day threats can be handled by recent methodology used in deep learning. In the conclusion, we also explored and investigated the future patterns of malware and how deals with in upcoming years. Such review may extend towards the development of IoT based applications used many fields such as medical devices, home appliances, academic systems.
全球范围内广泛的数字革命涉及到与人类进步相关的每一个过程,很容易在安全方面造成严重问题。这主要是由于金融危机和各国地理连接状况恶化等重要因素造成的。基于这一事实,作者有充分的动机利用深度学习方法提出关于恶意软件检测的精确文献。在这些文献中,基本概述包括恶意软件检测的性质,即静态、动态和混合方法。这篇文章的另一个主要部分是对最近发表的、被高度引用的关于使用深度学习框架进行恶意软件检测、预防和预测的最新技术进行背景调查。参与提供解决方案的技术来自人工智能框架,如机器学习、深度学习和混合框架。撰写这篇文章的主要动机是为了清晰地描绘出开发强大的无恶意软件设备所面临的挑战性问题和相应的解决方案。由于缺乏强大的无恶意软件设备,全球范围内日益增长的地理和金融纠纷可能会被恶意组织广泛挑起。因此,对恶意软件检测设备的极高需求需要一个强有力的建议来确保国家安全。在预防和恢复方面,零日威胁可以通过最新的深度学习方法来处理。最后,我们还探索和研究了恶意软件的未来模式以及未来几年的应对方法。这种审查可能会扩展到基于物联网的应用开发,应用于医疗设备、家用电器、学术系统等多个领域。
{"title":"Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review","authors":"Syed Shuja Hussain, M. Razak, Ahmad Firdaus","doi":"10.13052/jcsm2245-1439.1314","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1314","url":null,"abstract":"Globally extensive digital revolutions involved with every process related to human progress can easily create the critical issues in security aspects. This is promoted due to the important factors like financial crises and geographical connectivity in worse condition of the nations. By this fact, the authors are well motivated to present a precise literature on malware detection with deep learning approach. In this literature, the basic overview includes the nature of nature of malware detection i.e., static, dynamic, and hybrid approach. Another major component of this articles is the investigation of the backgrounds from recently published and highly cited state-of-the-arts on malware detection, prevention and prediction with deep learning frameworks. The technologies engaged in providing solutions are utilized from AI based frameworks like machine learning, deep learning, and hybrid frameworks. The main motivations to produce this article is to portrait clear pictures of the option challenging issues and corresponding solution for developing robust malware-free devices. In the lack of a robust malware-free devices, highly growing geographical and financial disputes at wide globes can be extensively provoked by malicious groups. Therefore, exceptionally high demand of the malware detection devices requires a very strong recommendation to ensure the security of a nation. In terms preventing and recovery, Zero-day threats can be handled by recent methodology used in deep learning. In the conclusion, we also explored and investigated the future patterns of malware and how deals with in upcoming years. Such review may extend towards the development of IoT based applications used many fields such as medical devices, home appliances, academic systems.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"53 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139010420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Malware Detection Using Deep Learning Network Analysis 利用深度学习网络分析检测网络恶意软件
Q3 Computer Science Pub Date : 2023-12-11 DOI: 10.13052/jcsm2245-1439.1312
Peng Xiao
Malware, short for malicious software, is designed for harmful purposes and threatens network security because it can propagate without human interaction by exploiting user’s vulnerabilities and carelessness. Having your system regularly scanned for malicious software is essential for keeping hackers at bay and avoiding the disclosure of sensitive data. The major drawbacks are the rapid creation of new malware variants, and it may become difficult to detect existing threats. With the ever-increasing volume of Android malware, the sophistication with which it can hide, and the potentially enormous value of data assets stored on Android devices, detecting or classifying Android malware is a big data problem. Security researchers have developed various malware detection and prevention programs for servers, gateways, user workstations, and mobile devices. Some offer centralized monitoring for malware detection software deployed on many systems or computers. The purpose of this essay is to critically examine the research that has been done specifically on malware detection. This paper proposes the Anti-Virus Software Detection for Malware with Deep Learning Network (AVSD-MDLN) framework to explore the possible threats. The two methods help in finding the threats. Dynamic Analysis for the Detection of Spyware (DA-DS) framework is framed to detect malicious malware, while the other is for classifying Android malware which is helped out through the Category in an Ensemble (CE) method. Prior malware detection methods are compared with the results of the proposed method. According to the research findings, the proposed approach achieves a higher projected time (0.5 sec) and detection accuracy (97.47%) than the existing situation machine learning and deep learning methodologies. Performance, correlation coefficient, and recall rate all improved in the suggested framework. Likewise, the negative rate (MPR) and the positive rate (PPR) also improved.
恶意软件是恶意软件的简称,其设计目的是为了达到有害的目的,并威胁到网络安全,因为它可以利用用户的漏洞和粗心大意,在没有人际互动的情况下传播。定期扫描系统中的恶意软件对于防止黑客入侵和避免敏感数据泄露至关重要。其主要缺点是新的恶意软件变种会迅速产生,而且可能难以检测到现有的威胁。随着安卓恶意软件数量的不断增加、其隐藏的复杂程度以及存储在安卓设备上的数据资产的潜在巨大价值,对安卓恶意软件进行检测或分类是一个大数据问题。安全研究人员为服务器、网关、用户工作站和移动设备开发了各种恶意软件检测和预防程序。有些程序为部署在许多系统或计算机上的恶意软件检测软件提供集中监控。本文旨在批判性地审视专门针对恶意软件检测所做的研究。本文提出了利用深度学习网络检测恶意软件的反病毒软件检测(AVSD-MDLN)框架,以探索可能的威胁。这两种方法有助于发现威胁。动态分析检测间谍软件(DA-DS)框架用于检测恶意软件,而另一种则用于对安卓恶意软件进行分类,该分类通过集合分类(CE)方法来实现。先前的恶意软件检测方法与所提出方法的结果进行了比较。研究结果表明,与现有的机器学习和深度学习方法相比,提议的方法实现了更高的预测时间(0.5 秒)和检测准确率(97.47%)。在建议的框架中,性能、相关系数和召回率都有所提高。同样,阴性率(MPR)和阳性率(PPR)也有所提高。
{"title":"Network Malware Detection Using Deep Learning Network Analysis","authors":"Peng Xiao","doi":"10.13052/jcsm2245-1439.1312","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1312","url":null,"abstract":"Malware, short for malicious software, is designed for harmful purposes and threatens network security because it can propagate without human interaction by exploiting user’s vulnerabilities and carelessness. Having your system regularly scanned for malicious software is essential for keeping hackers at bay and avoiding the disclosure of sensitive data. The major drawbacks are the rapid creation of new malware variants, and it may become difficult to detect existing threats. With the ever-increasing volume of Android malware, the sophistication with which it can hide, and the potentially enormous value of data assets stored on Android devices, detecting or classifying Android malware is a big data problem. Security researchers have developed various malware detection and prevention programs for servers, gateways, user workstations, and mobile devices. Some offer centralized monitoring for malware detection software deployed on many systems or computers. The purpose of this essay is to critically examine the research that has been done specifically on malware detection. This paper proposes the Anti-Virus Software Detection for Malware with Deep Learning Network (AVSD-MDLN) framework to explore the possible threats. The two methods help in finding the threats. Dynamic Analysis for the Detection of Spyware (DA-DS) framework is framed to detect malicious malware, while the other is for classifying Android malware which is helped out through the Category in an Ensemble (CE) method. Prior malware detection methods are compared with the results of the proposed method. According to the research findings, the proposed approach achieves a higher projected time (0.5 sec) and detection accuracy (97.47%) than the existing situation machine learning and deep learning methodologies. Performance, correlation coefficient, and recall rate all improved in the suggested framework. Likewise, the negative rate (MPR) and the positive rate (PPR) also improved.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"147 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138978532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Intrusion Detection and Prevention System for DDOS Attack in WSN Using SS-LSACNN and TCSLR 使用 SS-LSACNN 和 TCSLR 的高效 WSN DDOS 攻击入侵检测和防御系统
Q3 Computer Science Pub Date : 2023-12-11 DOI: 10.13052/jcsm2245-1439.1315
Vikash Kumar Singh, D. Sivashankar, Kishlay Kundan, Sushmita Kumari
Sensor Nodes (SNs) are utilized by Wireless Sensor Networks (WSNs) to recognize their environment; in addition, the WSN delivers data from sensing nodes to the sink. The WSNs are exposed to several security threats owing to the broadcast performance of transmission along with the increase in the growth of application regions. Countermeasures like Intrusion Detection and Prevention Systems (IDPS) should be adopted to overcome the aforementioned attacks. By implementing these systems, several intrusions can be detected in WSN; also, WSN can be prevented from various security attacks. Therefore, identifying the general attack that influences the SNs mentioned as Distributed Denial of Service (DDoS) attack and recuperating the data utilizing Soft Swish (SS)-Linear Scaling-centered Adam Convolution Neural Network (SS-LSACNN) along with Two’s Compliment Shift Reverse (TCSLR) operation are the intentions of this work. Firstly, for extracting the vital features, the data gathered as of the dataset are utilized. After that, the extracted features are pre-processed. It is then utilized for attack detection. The null features and the redundant data are removed in preprocessing. By employing the Correlation Coefficient-centered Synthetic Minority Oversampling Technique (CC-SMOTE) methodology, data separation regarding classes and data balancing was performed to prevent the imbalance issue. Subsequently, to provide the preprocessed data for attack detection, the Numeralization and feature scaling are executed. After that, by utilizing Chebyshev Distance (CD)-centric K-Means Algorithm (KMA), the real-time SNs are initialized as well as clustered. The data gathered as of the SNs are utilized for attack detection following the clustering phase. Following the detection phase, the data being attacked are amassed in the log file; similarly, the non-attacked data are inputted into the prevention phase. Next, the experiential analysis is carried out for examining the proposed system’s efficacy. The outcomes revealed that the proposed model exhibits 98.15% accuracy, 97.59% sensitivity, 95.72% specificity, and 95.48% F-measure, which displays the proposed model’s efficacy.
无线传感器网络(WSN)利用传感器节点(SN)来识别周围环境;此外,WSN 还将传感节点的数据传送到汇集器。由于传输的广播性能和应用区域的增长,WSN 面临着多种安全威胁。应采用入侵检测和防御系统(IDPS)等对策来克服上述攻击。通过实施这些系统,可以检测到 WSN 中的若干入侵行为,还可以防止 WSN 遭受各种安全攻击。因此,识别影响 SN 的一般攻击(如分布式拒绝服务(DDoS)攻击),并利用软虹吸(SS)-线性扩展为中心的亚当卷积神经网络(SS-LSACNN)和二进制移位反向(TCSLR)操作来恢复数据,是这项工作的目的所在。首先,为了提取重要特征,我们利用了从数据集中收集到的数据。然后,对提取的特征进行预处理。然后将其用于攻击检测。在预处理过程中,空特征和冗余数据会被去除。通过采用以相关系数为中心的合成少数群体过采样技术(CC-SMOTE)方法,对类别进行了数据分离,并对数据进行了平衡,以防止出现不平衡问题。随后,为了提供用于攻击检测的预处理数据,执行了数值化和特征缩放。之后,利用以切比雪夫距离(CD)为中心的 K-Means 算法(KMA),对实时 SN 进行初始化和聚类。在聚类阶段之后,收集到的 SN 数据将用于攻击检测。检测阶段结束后,被攻击的数据会被收集到日志文件中;同样,未被攻击的数据也会被输入到预防阶段。接下来,我们进行了经验分析,以检验拟议系统的功效。结果显示,建议模型的准确率为 98.15%,灵敏度为 97.59%,特异性为 95.72%,F-measure 为 95.48%,显示了建议模型的功效。
{"title":"An Efficient Intrusion Detection and Prevention System for DDOS Attack in WSN Using SS-LSACNN and TCSLR","authors":"Vikash Kumar Singh, D. Sivashankar, Kishlay Kundan, Sushmita Kumari","doi":"10.13052/jcsm2245-1439.1315","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1315","url":null,"abstract":"Sensor Nodes (SNs) are utilized by Wireless Sensor Networks (WSNs) to recognize their environment; in addition, the WSN delivers data from sensing nodes to the sink. The WSNs are exposed to several security threats owing to the broadcast performance of transmission along with the increase in the growth of application regions. Countermeasures like Intrusion Detection and Prevention Systems (IDPS) should be adopted to overcome the aforementioned attacks. By implementing these systems, several intrusions can be detected in WSN; also, WSN can be prevented from various security attacks. Therefore, identifying the general attack that influences the SNs mentioned as Distributed Denial of Service (DDoS) attack and recuperating the data utilizing Soft Swish (SS)-Linear Scaling-centered Adam Convolution Neural Network (SS-LSACNN) along with Two’s Compliment Shift Reverse (TCSLR) operation are the intentions of this work. Firstly, for extracting the vital features, the data gathered as of the dataset are utilized. After that, the extracted features are pre-processed. It is then utilized for attack detection. The null features and the redundant data are removed in preprocessing. By employing the Correlation Coefficient-centered Synthetic Minority Oversampling Technique (CC-SMOTE) methodology, data separation regarding classes and data balancing was performed to prevent the imbalance issue. Subsequently, to provide the preprocessed data for attack detection, the Numeralization and feature scaling are executed. After that, by utilizing Chebyshev Distance (CD)-centric K-Means Algorithm (KMA), the real-time SNs are initialized as well as clustered. The data gathered as of the SNs are utilized for attack detection following the clustering phase. Following the detection phase, the data being attacked are amassed in the log file; similarly, the non-attacked data are inputted into the prevention phase. Next, the experiential analysis is carried out for examining the proposed system’s efficacy. The outcomes revealed that the proposed model exhibits 98.15% accuracy, 97.59% sensitivity, 95.72% specificity, and 95.48% F-measure, which displays the proposed model’s efficacy.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"16 45","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138980839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Cyber Threat Intelligence System for Internet of Things (IoT) Using Machine Learning 利用机器学习的物联网(IoT)恶意软件网络威胁情报系统
Q3 Computer Science Pub Date : 2023-12-11 DOI: 10.13052/jcsm2245-1439.1313
Peng Xiao
Cyber Intelligence (CI) is a sophisticated security solution that uses machine learning models to protect networks against cyber-attack. Security concerns to IoT devices are exacerbated because of their inherent weaknesses in memory systems, physical and online interfaces, and network services. IoT devices are vulnerable to attacks because of the communication channels. That raises the risk of spoofing and Denial-of-Service (DoS) attacks on the entire system, which is a severe problem. Since the IoT ecosystem does not have encryption and access restrictions, cloud-based communications and data storage have become increasingly popular. An IoT-based Cyber Threat Intelligence System (IoT-CTIS) is designed in this article to detect malware and security threads using a machine learning algorithm. Because hackers are continuously attempting to get their hands on sensitive information, it is important that IoT devices have strong authentication measures in place. Multifactor authentication, digital certificates, and biometrics are just some of the methods that may be used to verify the identity of an Internet of Things device. All devices use Machine Learning (ML) assisted Logistic Regression (LR) techniques to address memory and Internet interface vulnerabilities. System integrity concerns, such as spoofing and Denial of Service (DoS) attacks, must be minimized using the Random Forest (RF) Algorithm. Default passwords are often provided with IoT devices, and many users don’t bother to change them, making it simple for cybercriminals to get access. In other instances, people design insecure passwords that are easy to crack. The results of the experiments show that the method outperforms other similar strategies in terms of identification and wrong alarms. Checking your alarm system’s functionality both locally and in terms of its connection to the monitoring centre is why you do it. Make sure your alarm system is working properly by checking it on a regular basis. It is recommended that you do system tests at least once every three months. The experimental analysis of IoT-CTIS outperforms the method in terms of accuracy (90%), precision (90%), F-measure (88%), Re-call (90%), RMSE (15%), MSE (5%), TPR (89%), TNR (8%), FRP (89%), FNR (8%), Security (93%), MCC (92%).
网络智能(CI)是一种先进的安全解决方案,它使用机器学习模型来保护网络免受网络攻击。由于物联网设备在内存系统、物理和在线接口以及网络服务方面存在固有的弱点,因此物联网设备的安全问题更加严重。由于通信渠道的原因,物联网设备很容易受到攻击。这就提高了对整个系统进行欺骗和拒绝服务(DoS)攻击的风险,这是一个严重的问题。由于物联网生态系统没有加密和访问限制,基于云的通信和数据存储变得越来越流行。本文设计了一种基于物联网的网络威胁情报系统(IoT-CTIS),利用机器学习算法检测恶意软件和安全线程。由于黑客不断试图获取敏感信息,因此物联网设备必须具备强大的身份验证措施。多因素身份验证、数字证书和生物识别技术只是用于验证物联网设备身份的部分方法。所有设备都使用机器学习 (ML) 辅助逻辑回归 (LR) 技术来解决内存和互联网接口漏洞问题。必须使用随机森林 (RF) 算法最大限度地减少系统完整性问题,如欺骗和拒绝服务 (DoS) 攻击。物联网设备通常提供默认密码,许多用户懒得更改密码,网络犯罪分子因此很容易获得访问权限。在其他情况下,人们设计的密码不安全,很容易被破解。实验结果表明,该方法在识别和错误报警方面优于其他类似策略。检查报警系统在本地和与监控中心连接方面的功能,这是您这样做的原因。通过定期检查确保报警系统正常工作。建议至少每三个月进行一次系统测试。通过实验分析,IoT-CTIS 在准确度(90%)、精确度(90%)、F-measure(88%)、Re-call(90%)、RMSE(15%)、MSE(5%)、TPR(89%)、TNR(8%)、FRP(89%)、FNR(8%)、安全性(93%)、MCC(92%)等方面均优于上述方法。
{"title":"Malware Cyber Threat Intelligence System for Internet of Things (IoT) Using Machine Learning","authors":"Peng Xiao","doi":"10.13052/jcsm2245-1439.1313","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1313","url":null,"abstract":"Cyber Intelligence (CI) is a sophisticated security solution that uses machine learning models to protect networks against cyber-attack. Security concerns to IoT devices are exacerbated because of their inherent weaknesses in memory systems, physical and online interfaces, and network services. IoT devices are vulnerable to attacks because of the communication channels. That raises the risk of spoofing and Denial-of-Service (DoS) attacks on the entire system, which is a severe problem. Since the IoT ecosystem does not have encryption and access restrictions, cloud-based communications and data storage have become increasingly popular. An IoT-based Cyber Threat Intelligence System (IoT-CTIS) is designed in this article to detect malware and security threads using a machine learning algorithm. Because hackers are continuously attempting to get their hands on sensitive information, it is important that IoT devices have strong authentication measures in place. Multifactor authentication, digital certificates, and biometrics are just some of the methods that may be used to verify the identity of an Internet of Things device. All devices use Machine Learning (ML) assisted Logistic Regression (LR) techniques to address memory and Internet interface vulnerabilities. System integrity concerns, such as spoofing and Denial of Service (DoS) attacks, must be minimized using the Random Forest (RF) Algorithm. Default passwords are often provided with IoT devices, and many users don’t bother to change them, making it simple for cybercriminals to get access. In other instances, people design insecure passwords that are easy to crack. The results of the experiments show that the method outperforms other similar strategies in terms of identification and wrong alarms. Checking your alarm system’s functionality both locally and in terms of its connection to the monitoring centre is why you do it. Make sure your alarm system is working properly by checking it on a regular basis. It is recommended that you do system tests at least once every three months. The experimental analysis of IoT-CTIS outperforms the method in terms of accuracy (90%), precision (90%), F-measure (88%), Re-call (90%), RMSE (15%), MSE (5%), TPR (89%), TNR (8%), FRP (89%), FNR (8%), Security (93%), MCC (92%).","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"27 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138981189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Update Algorithm of Secure Computer Database Based on Deep Belief Network 基于深度相信网络的安全计算机数据库更新算法
Q3 Computer Science Pub Date : 2023-12-11 DOI: 10.13052/jcsm2245-1439.1311
Liusuo Huang, Yan Song
In order to ensure the security of large-scale data transmission in a short time and in a wide range during online database updating, this paper presents a secure computer database updating algorithm based on DBN (Deep Belief Network). In this paper, the model adopts multi-layer depth structure for unsupervised feature learning, maps high-dimensional and nonlinear intrusion data to low-dimensional space, establishes the relationship mapping between high-dimensional and low-dimensional, and then uses fine-tuning algorithm to transform the model to achieve the best expression of features. At the same time, this method improves the data processing and method model without destroying the learned knowledge of the model and seriously affecting the real-time performance of detection. In order to overcome the problem of system instability caused by fixed empirical learning rate, this paper proposes a learning rate optimization strategy based on energy change. In the process of feature extraction, the features of different hidden layers are extracted to form combined features. Experiments show that the detection rate of this method can reach 95.31%, and the false alarm rate is 2.14%. This verifies the effectiveness of the secure computer database updating algorithm in this paper. Which can ensure the online update of the secure computer database.
为了保证在线数据库更新过程中大规模数据传输在短时间、大范围内的安全性,本文提出了一种基于DBN(深度信念网络)的安全计算机数据库更新算法。本文模型采用多层深度结构进行无监督特征学习,将高维、非线性的入侵数据映射到低维空间,建立高维与低维之间的关系映射,然后利用微调算法对模型进行变换,实现特征的最佳表达。同时,这种方法改进了数据处理和方法模型,不会破坏模型的已学知识,也不会严重影响检测的实时性。为了克服固定经验学习率导致系统不稳定的问题,本文提出了一种基于能量变化的学习率优化策略。在特征提取过程中,提取不同隐藏层的特征,形成组合特征。实验表明,该方法的检测率可达 95.31%,误报率为 2.14%。这验证了本文安全计算机数据库更新算法的有效性。这可以确保安全计算机数据库的在线更新。
{"title":"Update Algorithm of Secure Computer Database Based on Deep Belief Network","authors":"Liusuo Huang, Yan Song","doi":"10.13052/jcsm2245-1439.1311","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1311","url":null,"abstract":"In order to ensure the security of large-scale data transmission in a short time and in a wide range during online database updating, this paper presents a secure computer database updating algorithm based on DBN (Deep Belief Network). In this paper, the model adopts multi-layer depth structure for unsupervised feature learning, maps high-dimensional and nonlinear intrusion data to low-dimensional space, establishes the relationship mapping between high-dimensional and low-dimensional, and then uses fine-tuning algorithm to transform the model to achieve the best expression of features. At the same time, this method improves the data processing and method model without destroying the learned knowledge of the model and seriously affecting the real-time performance of detection. In order to overcome the problem of system instability caused by fixed empirical learning rate, this paper proposes a learning rate optimization strategy based on energy change. In the process of feature extraction, the features of different hidden layers are extracted to form combined features. Experiments show that the detection rate of this method can reach 95.31%, and the false alarm rate is 2.14%. This verifies the effectiveness of the secure computer database updating algorithm in this paper. Which can ensure the online update of the secure computer database.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"30 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138981153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the Security of Internet of Multimedia Things in Wireless Environment 无线环境下多媒体物联网的安全性分析
Q3 Computer Science Pub Date : 2023-12-11 DOI: 10.13052/jcsm2245-1439.1316
Nabeel Mahdy Haddad, Mustafa sabah Mustafa, H. S. Salih, M. Jaber, M. H. Ali
The Internet of Things (IoT) and real-time flexibility improve people’s lives, and IoT applications rely heavily on multimedia sensors and devices. An interconnected network of IoT multimedia devices has made the Internet of Medical Things (IoMT). It creates massive data distinct from what the Internet of Things (IoT) produced. Smart traffic monitoring and smart hospitals are only a few examples of real-time deployment applications. IoMT data and decision-making must be made quickly since it directly impacts human life. The security heterogeneity of optimization issues is a significant challenge for enabling multimedia applications on the IoT. The IoMT has difficulty achieving low-cost data collecting while maintaining data security. An Internet of Multimedia Things in a wireless environment (IoMT-WE) system decreases the bandwidth and privacy risk caused by the revocation list, ensures the integrity of batch verification information, and corresponds with Vehicular ad hoc network (VANET) security performance. The proposed method uses random subsampling and chaotic convolution to collect numerous images. The sampling method is safe since the measurement matrix is controlled by chaos. As part of the IoMT architecture, wireless multimedia sensor nodes can be more easily deployed over the long term for real-time multimedia. The Wireless Multimedia Sensor Network (WMSN) comprises nodes that can capture both multimedia and non-multimedia data. The ioMT-WE system has been tested and found to be secure and effective.
物联网(IoT)和实时灵活性改善了人们的生活,而物联网应用在很大程度上依赖于多媒体传感器和设备。由物联网多媒体设备组成的互联网络成就了医疗物联网(IoMT)。它所产生的海量数据与物联网(IoT)所产生的数据截然不同。智能交通监控和智能医院只是实时部署应用的几个例子。IoMT 数据和决策必须迅速做出,因为它直接影响到人类的生命。优化问题的安全性异质性是在物联网上实现多媒体应用的一大挑战。IoMT 很难在保持数据安全的同时实现低成本的数据采集。无线环境下的多媒体物联网(IoMT-WE)系统降低了撤销列表带来的带宽和隐私风险,确保了批量验证信息的完整性,并符合车载网络(VANET)的安全性能。所提出的方法使用随机子采样和混沌卷积来收集大量图像。由于测量矩阵由混沌控制,因此采样方法是安全的。作为 IoMT 架构的一部分,无线多媒体传感器节点可以更容易地进行长期部署,以实现实时多媒体。无线多媒体传感器网络(WMSN)由可捕获多媒体和非多媒体数据的节点组成。经过测试,ioMT-WE 系统既安全又有效。
{"title":"Analysis of the Security of Internet of Multimedia Things in Wireless Environment","authors":"Nabeel Mahdy Haddad, Mustafa sabah Mustafa, H. S. Salih, M. Jaber, M. H. Ali","doi":"10.13052/jcsm2245-1439.1316","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1316","url":null,"abstract":"The Internet of Things (IoT) and real-time flexibility improve people’s lives, and IoT applications rely heavily on multimedia sensors and devices. An interconnected network of IoT multimedia devices has made the Internet of Medical Things (IoMT). It creates massive data distinct from what the Internet of Things (IoT) produced. Smart traffic monitoring and smart hospitals are only a few examples of real-time deployment applications. IoMT data and decision-making must be made quickly since it directly impacts human life. The security heterogeneity of optimization issues is a significant challenge for enabling multimedia applications on the IoT. The IoMT has difficulty achieving low-cost data collecting while maintaining data security. An Internet of Multimedia Things in a wireless environment (IoMT-WE) system decreases the bandwidth and privacy risk caused by the revocation list, ensures the integrity of batch verification information, and corresponds with Vehicular ad hoc network (VANET) security performance. The proposed method uses random subsampling and chaotic convolution to collect numerous images. The sampling method is safe since the measurement matrix is controlled by chaos. As part of the IoMT architecture, wireless multimedia sensor nodes can be more easily deployed over the long term for real-time multimedia. The Wireless Multimedia Sensor Network (WMSN) comprises nodes that can capture both multimedia and non-multimedia data. The ioMT-WE system has been tested and found to be secure and effective.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"24 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139010598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Priori Algorithm Based Network Security Situational Awareness Multi-Source Data Correlation Analysis Method 基于先验算法的网络安全态势感知多源数据关联分析方法
Q3 Computer Science Pub Date : 2023-11-17 DOI: 10.13052/jcsm2245-1439.1263
Wei Li, Jianjun Li, Chengting Zhang, Guang Yao, Xue Xu
In the context of the information age, the Internet has developed rapidly, but the accompanying network security threats have also become an issue that cannot be ignored. In order to effectively respond to these threats and improve the data processing capabilities of network security situational awareness, the study focuses on the challenges of multi-source data processing and proposes a multi-source data association analysis method based on the A priori algorithm. This method aims to deeply explore the implicit relationships between data and provide stronger support for network attack detection. In addition, the study also designed a multi-level evaluation method based on coefficient of variation indicators, aiming to provide a more objective and comprehensive evaluation of the detection results. After a series of experimental verification, the proposed correlation analysis method has achieved significant results in detecting phishing attacks and DOS attacks, with detection rates of 90.3% and 93.8%, respectively. At the same time, the multi-level evaluation method has also been experimentally proven to provide more reasonable and accurate results for data evaluation. The methods and technologies proposed in the study can not only improve the multi-source data processing ability of network security situational awareness, but also provide valuable references for future network security research and practice.
在信息时代的背景下,互联网发展迅速,但随之而来的网络安全威胁也成为一个不容忽视的问题。为了有效应对这些威胁,提高网络安全态势感知的数据处理能力,本研究针对多源数据处理的难题,提出了一种基于先验算法的多源数据关联分析方法。该方法旨在深入挖掘数据之间的隐含关系,为网络攻击检测提供更有力的支持。此外,该研究还设计了基于变异系数指标的多层次评价方法,旨在对检测结果进行更客观、更全面的评价。经过一系列实验验证,所提出的相关性分析方法在检测网络钓鱼攻击和 DOS 攻击方面取得了显著效果,检测率分别达到 90.3% 和 93.8%。同时,多层次评价方法也得到了实验验证,为数据评价提供了更合理、更准确的结果。本研究提出的方法和技术不仅能提高网络安全态势感知的多源数据处理能力,还能为今后的网络安全研究和实践提供有价值的参考。
{"title":"A Priori Algorithm Based Network Security Situational Awareness Multi-Source Data Correlation Analysis Method","authors":"Wei Li, Jianjun Li, Chengting Zhang, Guang Yao, Xue Xu","doi":"10.13052/jcsm2245-1439.1263","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1263","url":null,"abstract":"In the context of the information age, the Internet has developed rapidly, but the accompanying network security threats have also become an issue that cannot be ignored. In order to effectively respond to these threats and improve the data processing capabilities of network security situational awareness, the study focuses on the challenges of multi-source data processing and proposes a multi-source data association analysis method based on the A priori algorithm. This method aims to deeply explore the implicit relationships between data and provide stronger support for network attack detection. In addition, the study also designed a multi-level evaluation method based on coefficient of variation indicators, aiming to provide a more objective and comprehensive evaluation of the detection results. After a series of experimental verification, the proposed correlation analysis method has achieved significant results in detecting phishing attacks and DOS attacks, with detection rates of 90.3% and 93.8%, respectively. At the same time, the multi-level evaluation method has also been experimentally proven to provide more reasonable and accurate results for data evaluation. The methods and technologies proposed in the study can not only improve the multi-source data processing ability of network security situational awareness, but also provide valuable references for future network security research and practice.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"30 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139264283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Anomaly Detection in Vehicular CAN Based on Bi-LSTM 基于Bi-LSTM的车载CAN异常检测研究
Q3 Computer Science Pub Date : 2023-08-12 DOI: 10.13052/jcsm2245-1439.1251
Xiaopeng Kan, Zhihong Zhou, Lihong Yao, Yuxin Zuo
Controller Area Network (CAN) is one of the most widely used in-vehicle networks in modern vehicles. Due to the lack of security mechanisms such as encryption and authentication, CAN is vulnerable to external hackers in the intelligent network environment. In the paper, a lightweight CAN bus anomaly detection model based on the Bi-LSTM model is proposed. The Bi-LSTM model learns ID sequence correlation features to detect anomalies. At the same time, the Attention mechanism is introduced to improve the model’s efficiency. The paper focuses on replay attacks, denial of service attacks and fuzzing attacks. The experimental results show that the anomaly detection model based on Bi-LSTM can detect three attack types quickly and accurately.
控制器局域网(CAN)是现代汽车中应用最广泛的车载网络之一。由于缺乏加密、认证等安全机制,CAN在智能网络环境下容易受到外部黑客的攻击。本文提出了一种基于Bi-LSTM模型的轻量级CAN总线异常检测模型。Bi-LSTM模型通过学习ID序列的相关特征来检测异常。同时引入注意机制,提高模型的效率。本文重点研究了重放攻击、拒绝服务攻击和模糊攻击。实验结果表明,基于Bi-LSTM的异常检测模型能够快速准确地检测出三种攻击类型。
{"title":"Research on Anomaly Detection in Vehicular CAN Based on Bi-LSTM","authors":"Xiaopeng Kan, Zhihong Zhou, Lihong Yao, Yuxin Zuo","doi":"10.13052/jcsm2245-1439.1251","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1251","url":null,"abstract":"Controller Area Network (CAN) is one of the most widely used in-vehicle networks in modern vehicles. Due to the lack of security mechanisms such as encryption and authentication, CAN is vulnerable to external hackers in the intelligent network environment. In the paper, a lightweight CAN bus anomaly detection model based on the Bi-LSTM model is proposed. The Bi-LSTM model learns ID sequence correlation features to detect anomalies. At the same time, the Attention mechanism is introduced to improve the model’s efficiency. The paper focuses on replay attacks, denial of service attacks and fuzzing attacks. The experimental results show that the anomaly detection model based on Bi-LSTM can detect three attack types quickly and accurately.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"252 1","pages":"629-652"},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85187481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Security Access Control Systems in Fog Computing Environment 雾计算环境下的安全门禁系统分析
Q3 Computer Science Pub Date : 2023-08-12 DOI: 10.13052/jcsm2245-1439.1252
Junlin Zhang
Fog computing is a computing environment that can respond to user operational needs in real time. Aiming at the shortcomings of user privacy protection performance and structural performance, a method of completely hiding access structures is proposed under the framework of cloud and mist computing. The cuckoo filter is applied to the fog computing environment, and users are detected through fog nodes. If an attribute is detected to exist in the fully hidden access structure, the mapping function between the attribute and the access structure line number is returned. The research results show that with the increase of the number of attributes, the advantage of attribute confirmation time for fog servers is gradually obvious; The overall delay of fog computing is shorter, the Time To Live (TTL) is longer, the average delay is only 3 ms, and the delay is lower; The completely hidden access structure constructed by the cuckoo algorithm occupies only 1% of the total system steps, which can more effectively achieve user privacy protection without increasing overhead. The proposed scheme greatly reduces the amount of computation while fully protecting user privacy, and meets the needs of users for fast and secure access.
雾计算是一种能够实时响应用户操作需求的计算环境。针对用户隐私保护性能和结构性能的不足,提出了一种在云和雾计算框架下完全隐藏访问结构的方法。杜鹃滤波器应用于雾计算环境,通过雾节点检测用户。如果检测到某个属性存在于完全隐藏的访问结构中,则返回该属性与访问结构行号之间的映射函数。研究结果表明,随着属性数量的增加,雾服务器在属性确认时间上的优势逐渐明显;雾计算的总体延迟更短,生存时间(TTL)更长,平均延迟仅为3ms,并且延迟更低;布谷鸟算法构建的完全隐藏的访问结构只占系统总步骤的1%,可以在不增加开销的情况下更有效地实现用户隐私保护。该方案在充分保护用户隐私的同时,大大减少了计算量,满足了用户对快速安全访问的需求。
{"title":"Analysis of Security Access Control Systems in Fog Computing Environment","authors":"Junlin Zhang","doi":"10.13052/jcsm2245-1439.1252","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1252","url":null,"abstract":"Fog computing is a computing environment that can respond to user operational needs in real time. Aiming at the shortcomings of user privacy protection performance and structural performance, a method of completely hiding access structures is proposed under the framework of cloud and mist computing. The cuckoo filter is applied to the fog computing environment, and users are detected through fog nodes. If an attribute is detected to exist in the fully hidden access structure, the mapping function between the attribute and the access structure line number is returned. The research results show that with the increase of the number of attributes, the advantage of attribute confirmation time for fog servers is gradually obvious; The overall delay of fog computing is shorter, the Time To Live (TTL) is longer, the average delay is only 3 ms, and the delay is lower; The completely hidden access structure constructed by the cuckoo algorithm occupies only 1% of the total system steps, which can more effectively achieve user privacy protection without increasing overhead. The proposed scheme greatly reduces the amount of computation while fully protecting user privacy, and meets the needs of users for fast and secure access.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48606815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation and Real Ket Model 结合位平面颜色表示和Real Ket模型的量子图像加密算法
Q3 Computer Science Pub Date : 2023-08-12 DOI: 10.13052/jcsm2245-1439.1257
Xv Zhou, Jinwen He
Image is one of the most important carriers of information that humans transmit on a daily basis. Therefore, the security of images in the transmission process has been a key study subject. A quantum bit-plane representation of the Real Ket model (QBRK) is proposed, which requires 2n+4 and 2n+6 quantum bits to represent gray-scale and color images of 22n−k×2k size, respectively. On the basis of the QBRK model and chaotic system, an image encryption algorithm is proposed according to pixel position encoding for slice dislocation and quantum bit-plane XOR operation. First, we use a modified logistics chaos system to generate two matrices that perform matrix determinant transformations in the bit-plane. Then, we perform an XOR operation on the pixel values based on the parity bit-plane. Finally, the pixel diffusion is completed by permutation with each cut encoding in the QBRK model. According to the simulation outcomes and security analysis, the encryption algorithm is very efficient and well resists state-of-the-art attacks.
图像是人类日常生活中最重要的信息载体之一。因此,图像在传输过程中的安全性一直是一个重点研究课题。提出了Real Ket模型(QBRK)的量子位平面表示,该模型需要2n+4和2n+6个量子比特来分别表示22n−k×2k大小的灰度图像和彩色图像。在QBRK模型和混沌系统的基础上,提出了一种基于像素位置编码的图像加密算法,用于切片位错和量子位面异或运算。首先,我们使用改进的物流混沌系统生成两个矩阵,在位平面上执行矩阵行列式变换。然后,我们基于奇偶校验位平面对像素值执行异或操作。最后,通过对QBRK模型中每个切割编码的置换,完成像素扩散。仿真结果和安全性分析表明,该加密算法具有很高的效率,能够很好地抵御最先进的攻击。
{"title":"Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation and Real Ket Model","authors":"Xv Zhou, Jinwen He","doi":"10.13052/jcsm2245-1439.1257","DOIUrl":"https://doi.org/10.13052/jcsm2245-1439.1257","url":null,"abstract":"Image is one of the most important carriers of information that humans transmit on a daily basis. Therefore, the security of images in the transmission process has been a key study subject. A quantum bit-plane representation of the Real Ket model (QBRK) is proposed, which requires 2n+4 and 2n+6 quantum bits to represent gray-scale and color images of 22n−k×2k size, respectively. On the basis of the QBRK model and chaotic system, an image encryption algorithm is proposed according to pixel position encoding for slice dislocation and quantum bit-plane XOR operation. First, we use a modified logistics chaos system to generate two matrices that perform matrix determinant transformations in the bit-plane. Then, we perform an XOR operation on the pixel values based on the parity bit-plane. Finally, the pixel diffusion is completed by permutation with each cut encoding in the QBRK model. According to the simulation outcomes and security analysis, the encryption algorithm is very efficient and well resists state-of-the-art attacks.","PeriodicalId":37820,"journal":{"name":"Journal of Cyber Security and Mobility","volume":"113 1","pages":"757-784"},"PeriodicalIF":0.0,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79079828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cyber Security and Mobility
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1