首页 > 最新文献

Future Internet最新文献

英文 中文
Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks 利用分类法工程实现国际监管框架中的安全基线合规性
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-07 DOI: 10.3390/fi15100330
Šarūnas Grigaliūnas, Michael Schmidt, Rasa Brūzgienė, Panayiota Smyrli, Vladislav Bidikov
A surge in successful Information Security (IS) breaches targeting Research and Education (R&E) institutions highlights a pressing need for enhanced protection. Addressing this, a consortium of European National Research and Education Network (NREN) organizations has developed a unified IS framework. This paper aims to introduce the Security Baseline for NRENs and a security maturity model tailored for R&E entities, derived from established security best practices to meet the specific needs of NRENs, universities, and various research institutions. The models currently in existence do not possess a system to smoothly correlate varying requirement tiers with distinct user groups or scenarios, baseline standards, and existing legislative actions. This segmentation poses a significant hurdle to the community’s capacity to guarantee consistency, congruency, and thorough compliance with a cohesive array of security standards and regulations. By employing taxonomical engineering principles, a mapping of baseline requirements to other security frameworks and regulations has been established. This reveals a correlation across most regulations impacting R&E institutions and uncovers an overlap in the high-level requirements, which is beneficial for the implementation of multiple standards. Consequently, organizations can systematically compare diverse security requirements, pinpoint gaps in their strategy, and formulate a roadmap to bolster their security initiatives.
针对研究和教育机构的信息安全(IS)攻击事件的激增凸显了加强保护的迫切需求。为了解决这个问题,一个由欧洲国家研究和教育网络(NREN)组织组成的联盟开发了一个统一的信息系统框架。本文旨在介绍nren的安全基线和为研发实体量身定制的安全成熟度模型,该模型源自已建立的安全最佳实践,以满足nren、大学和各种研究机构的特定需求。目前存在的模型不具备一个系统,可以将不同的需求层与不同的用户组或场景、基线标准和现有的立法行动顺利地关联起来。这种分割对社区保证一致性、一致性和完全遵守安全标准和法规的能力构成了重大障碍。通过采用分类法工程原则,已经建立了基线需求到其他安全框架和法规的映射。这揭示了影响研发机构的大多数法规之间的相关性,并揭示了高层需求中的重叠,这对多个标准的实现是有益的。因此,组织可以系统地比较不同的安全需求,查明其策略中的差距,并制定路线图来支持其安全计划。
{"title":"Leveraging Taxonomical Engineering for Security Baseline Compliance in International Regulatory Frameworks","authors":"Šarūnas Grigaliūnas, Michael Schmidt, Rasa Brūzgienė, Panayiota Smyrli, Vladislav Bidikov","doi":"10.3390/fi15100330","DOIUrl":"https://doi.org/10.3390/fi15100330","url":null,"abstract":"A surge in successful Information Security (IS) breaches targeting Research and Education (R&E) institutions highlights a pressing need for enhanced protection. Addressing this, a consortium of European National Research and Education Network (NREN) organizations has developed a unified IS framework. This paper aims to introduce the Security Baseline for NRENs and a security maturity model tailored for R&E entities, derived from established security best practices to meet the specific needs of NRENs, universities, and various research institutions. The models currently in existence do not possess a system to smoothly correlate varying requirement tiers with distinct user groups or scenarios, baseline standards, and existing legislative actions. This segmentation poses a significant hurdle to the community’s capacity to guarantee consistency, congruency, and thorough compliance with a cohesive array of security standards and regulations. By employing taxonomical engineering principles, a mapping of baseline requirements to other security frameworks and regulations has been established. This reveals a correlation across most regulations impacting R&E institutions and uncovers an overlap in the high-level requirements, which is beneficial for the implementation of multiple standards. Consequently, organizations can systematically compare diverse security requirements, pinpoint gaps in their strategy, and formulate a roadmap to bolster their security initiatives.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135301099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Personalized Ontology Recommendation System to Effectively Support Ontology Development by Reuse 通过重用有效支持本体开发的个性化本体推荐系统
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-07 DOI: 10.3390/fi15100331
Marwa Abdelreheim, Taysir Hassan A. Soliman, Friederike Klan
The profusion of existing ontologies in different domains has made reusing ontologies a best practice when developing new ontologies. The ontology reuse process reduces the expensive cost of developing a new ontology, in terms of time and effort, and supports semantic interoperability. Existing ontology development tools do not assist in the recommendation of ontologies or their concepts to be reused. Also, existing ontology recommendation tools could suggest whole ontologies covering a set of input keywords without referring to which parts of them (e.g., concepts) can be reused. In this paper, we propose an effective ontology recommendation system that helps the user in the iterative development and reuse of ontologies. The system allows the user to provide explicit preferences about the new ontology, and iteratively guides the user to parts from existing ontologies which match his preferences for reuse. Finally, we developed a prototype of our ontology recommendation system and conducted a user-based evaluation to assess the effectiveness of our approach.
不同领域中大量的现有本体使得在开发新本体时重用本体成为最佳实践。本体重用过程在时间和精力方面降低了开发新本体的昂贵成本,并支持语义互操作性。现有的本体开发工具不能帮助推荐要重用的本体或其概念。此外,现有的本体推荐工具可以推荐覆盖一组输入关键字的整个本体,而不参考其中哪些部分(例如,概念)可以重用。在本文中,我们提出了一个有效的本体推荐系统,帮助用户迭代开发和重用本体。该系统允许用户提供关于新本体的明确偏好,并迭代地引导用户从现有本体中找到符合其偏好的部件进行重用。最后,我们开发了本体推荐系统的原型,并进行了基于用户的评估来评估我们方法的有效性。
{"title":"A Personalized Ontology Recommendation System to Effectively Support Ontology Development by Reuse","authors":"Marwa Abdelreheim, Taysir Hassan A. Soliman, Friederike Klan","doi":"10.3390/fi15100331","DOIUrl":"https://doi.org/10.3390/fi15100331","url":null,"abstract":"The profusion of existing ontologies in different domains has made reusing ontologies a best practice when developing new ontologies. The ontology reuse process reduces the expensive cost of developing a new ontology, in terms of time and effort, and supports semantic interoperability. Existing ontology development tools do not assist in the recommendation of ontologies or their concepts to be reused. Also, existing ontology recommendation tools could suggest whole ontologies covering a set of input keywords without referring to which parts of them (e.g., concepts) can be reused. In this paper, we propose an effective ontology recommendation system that helps the user in the iterative development and reuse of ontologies. The system allows the user to provide explicit preferences about the new ontology, and iteratively guides the user to parts from existing ontologies which match his preferences for reuse. Finally, we developed a prototype of our ontology recommendation system and conducted a user-based evaluation to assess the effectiveness of our approach.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135301104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-to-End Service Availability in Heterogeneous Multi-Tier Cloud–Fog–Edge Networks 异构多层云雾边缘网络中的端到端服务可用性
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-06 DOI: 10.3390/fi15100329
Igor Kabashkin
With the evolution towards the interconnected future internet spanning satellites, aerial systems, terrestrial infrastructure, and oceanic networks, availability modeling becomes imperative to ensure reliable service. This paper presents a methodology to assess end-to-end availability in complex multi-tiered architectures using a Markov model tailored to the unique characteristics of cloud, fog, edge, and IoT layers. By quantifying individual tier reliability and combinations thereof, the approach enables setting availability targets during the design and evaluation of operational systems. In the paper, a methodology is proposed to construct a Markov model for the reliability of discrete tiers and end-to-end service availability in heterogeneous multi-tier cloud–fog–edge networks, and the model is demonstrated through numerical examples assessing availability in multi-tier networks. The numerical examples demonstrate the adaptability of the model to various topologies from conventional three-tier to arbitrary multi-level architectures. As connectivity becomes ubiquitous across heterogeneous devices and networks, the proposed approach and availability modeling provide an effective tool for reinforcing the future internet’s fault tolerance and service quality.
随着未来互联互联网的发展,包括卫星、航空系统、地面基础设施和海洋网络,可用性建模成为确保可靠服务的必要条件。本文提出了一种评估复杂多层架构中端到端可用性的方法,该方法使用了针对云、雾、边缘和物联网层的独特特征量身定制的马尔可夫模型。通过量化单个层的可靠性及其组合,该方法能够在操作系统的设计和评估期间设定可用性目标。本文提出了一种构建异构多层云雾边缘网络中离散层可靠性和端到端服务可用性马尔可夫模型的方法,并通过评估多层网络中可用性的数值算例对该模型进行了验证。数值算例证明了该模型对从传统三层结构到任意多层结构的各种拓扑结构的适应性。随着连接在异构设备和网络中变得无处不在,所提出的方法和可用性建模为增强未来互联网的容错性和服务质量提供了有效的工具。
{"title":"End-to-End Service Availability in Heterogeneous Multi-Tier Cloud–Fog–Edge Networks","authors":"Igor Kabashkin","doi":"10.3390/fi15100329","DOIUrl":"https://doi.org/10.3390/fi15100329","url":null,"abstract":"With the evolution towards the interconnected future internet spanning satellites, aerial systems, terrestrial infrastructure, and oceanic networks, availability modeling becomes imperative to ensure reliable service. This paper presents a methodology to assess end-to-end availability in complex multi-tiered architectures using a Markov model tailored to the unique characteristics of cloud, fog, edge, and IoT layers. By quantifying individual tier reliability and combinations thereof, the approach enables setting availability targets during the design and evaluation of operational systems. In the paper, a methodology is proposed to construct a Markov model for the reliability of discrete tiers and end-to-end service availability in heterogeneous multi-tier cloud–fog–edge networks, and the model is demonstrated through numerical examples assessing availability in multi-tier networks. The numerical examples demonstrate the adaptability of the model to various topologies from conventional three-tier to arbitrary multi-level architectures. As connectivity becomes ubiquitous across heterogeneous devices and networks, the proposed approach and availability modeling provide an effective tool for reinforcing the future internet’s fault tolerance and service quality.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135350929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating MPTCP Congestion Control Algorithms: Implications for Streaming in Open Internet 评估MPTCP拥塞控制算法:对开放网际网路流媒体的影响
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-04 DOI: 10.3390/fi15100328
Łukasz Piotr Łuczak, Przemysław Ignaciuk, Michał Morawski
In today’s digital era, the demand for uninterrupted and efficient data streaming is paramount across various sectors, from entertainment to industrial automation. While the traditional single-path solutions often fell short in ensuring rapid and consistent data transfers, Multipath TCP (MPTCP) emerges as a promising alternative, enabling simultaneous data transfer across multiple network paths. The efficacy of MPTCP, however, hinges on the choice of appropriate congestion control (CC) algorithms. Addressing the present knowledge gap, this research provides a thorough evaluation of key MPTCP CC algorithms in the context of streaming applications in open Internet environments. Our findings reveal that BALIA stands out as the most suitable choice for MPTCP streaming, adeptly balancing waiting time, throughput, and Head-of-Line blocking reduction. Conversely, the wVegas algorithm, with its delay-centric approach, proves less adequate for multipath streaming. This study underscores the imperative to fine-tune MPTCP for streaming applications, at the same time offering insights for future development areas and innovations.
在当今的数字时代,从娱乐到工业自动化,对不间断和高效数据流的需求在各个领域都是至关重要的。虽然传统的单路径解决方案在确保快速和一致的数据传输方面往往不足,但多路径TCP (MPTCP)作为一种有前途的替代方案出现了,它可以跨多个网络路径同时传输数据。然而,MPTCP的有效性取决于选择合适的拥塞控制(CC)算法。为了解决目前的知识差距,本研究对开放互联网环境下流媒体应用中的关键MPTCP CC算法进行了全面评估。我们的研究结果表明,BALIA是MPTCP流的最合适选择,它巧妙地平衡了等待时间、吞吐量和减少排队阻塞。相反,以延迟为中心的wVegas算法被证明不适用于多路径流。这项研究强调了为流媒体应用程序微调MPTCP的必要性,同时为未来的发展领域和创新提供了见解。
{"title":"Evaluating MPTCP Congestion Control Algorithms: Implications for Streaming in Open Internet","authors":"Łukasz Piotr Łuczak, Przemysław Ignaciuk, Michał Morawski","doi":"10.3390/fi15100328","DOIUrl":"https://doi.org/10.3390/fi15100328","url":null,"abstract":"In today’s digital era, the demand for uninterrupted and efficient data streaming is paramount across various sectors, from entertainment to industrial automation. While the traditional single-path solutions often fell short in ensuring rapid and consistent data transfers, Multipath TCP (MPTCP) emerges as a promising alternative, enabling simultaneous data transfer across multiple network paths. The efficacy of MPTCP, however, hinges on the choice of appropriate congestion control (CC) algorithms. Addressing the present knowledge gap, this research provides a thorough evaluation of key MPTCP CC algorithms in the context of streaming applications in open Internet environments. Our findings reveal that BALIA stands out as the most suitable choice for MPTCP streaming, adeptly balancing waiting time, throughput, and Head-of-Line blocking reduction. Conversely, the wVegas algorithm, with its delay-centric approach, proves less adequate for multipath streaming. This study underscores the imperative to fine-tune MPTCP for streaming applications, at the same time offering insights for future development areas and innovations.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135592441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MSEN: A Multi-Scale Evolutionary Network for Modeling the Evolution of Temporal Knowledge Graphs 时间知识图演化建模的多尺度演化网络
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-30 DOI: 10.3390/fi15100327
Yong Yu, Shudong Chen, Rong Du, Da Tong, Hao Xu, Shuai Chen
Temporal knowledge graphs play an increasingly prominent role in scenarios such as social networks, finance, and smart cities. As such, research on temporal knowledge graphs continues to deepen. In particular, research on temporal knowledge graph reasoning holds great significance, as it can provide abundant knowledge for downstream tasks such as question answering and recommendation systems. Current reasoning research focuses primarily on interpolation and extrapolation. Extrapolation research aims to predict the likelihood of events occurring in future timestamps. Historical events are crucial for predicting future events. However, existing models struggle to fully capture the evolutionary characteristics of historical knowledge graphs. This paper proposes a multi-scale evolutionary network (MSEN) model that leverages Hierarchical Transfer aware Graph Neural Network (HT-GNN) in a local memory encoder to aggregate rich structural semantics from each timestamp’s knowledge graph. It also utilizes Time Related Graph Neural Network (TR-GNN) in a global memory encoder to model temporal-semantic dependencies of entities across the global knowledge graph, mining global evolutionary patterns. The model integrates information from both encoders to generate entity embeddings for predicting future events. The proposed MSEN model demonstrates strong performance compared to several baselines on typical benchmark datasets. Results show MSEN achieves the highest prediction accuracy.
时间知识图在社交网络、金融和智慧城市等场景中发挥着越来越突出的作用。因此,对时间知识图的研究不断深入。特别是时间知识图推理的研究具有重要的意义,因为它可以为问答和推荐系统等下游任务提供丰富的知识。目前的推理研究主要集中在插值和外推。外推研究的目的是预测未来时间戳中事件发生的可能性。历史事件对于预测未来事件至关重要。然而,现有的模型很难完全捕捉历史知识图的进化特征。本文提出了一种多尺度进化网络(MSEN)模型,该模型利用局部记忆编码器中的分层传输感知图神经网络(HT-GNN)从每个时间戳的知识图中聚合丰富的结构语义。它还利用全局记忆编码器中的时间相关图神经网络(TR-GNN)来建模全局知识图中实体的时间语义依赖关系,挖掘全局进化模式。该模型集成了来自两个编码器的信息来生成实体嵌入以预测未来事件。与典型基准数据集上的几个基线相比,所提出的MSEN模型表现出较强的性能。结果表明,MSEN具有较高的预测精度。
{"title":"MSEN: A Multi-Scale Evolutionary Network for Modeling the Evolution of Temporal Knowledge Graphs","authors":"Yong Yu, Shudong Chen, Rong Du, Da Tong, Hao Xu, Shuai Chen","doi":"10.3390/fi15100327","DOIUrl":"https://doi.org/10.3390/fi15100327","url":null,"abstract":"Temporal knowledge graphs play an increasingly prominent role in scenarios such as social networks, finance, and smart cities. As such, research on temporal knowledge graphs continues to deepen. In particular, research on temporal knowledge graph reasoning holds great significance, as it can provide abundant knowledge for downstream tasks such as question answering and recommendation systems. Current reasoning research focuses primarily on interpolation and extrapolation. Extrapolation research aims to predict the likelihood of events occurring in future timestamps. Historical events are crucial for predicting future events. However, existing models struggle to fully capture the evolutionary characteristics of historical knowledge graphs. This paper proposes a multi-scale evolutionary network (MSEN) model that leverages Hierarchical Transfer aware Graph Neural Network (HT-GNN) in a local memory encoder to aggregate rich structural semantics from each timestamp’s knowledge graph. It also utilizes Time Related Graph Neural Network (TR-GNN) in a global memory encoder to model temporal-semantic dependencies of entities across the global knowledge graph, mining global evolutionary patterns. The model integrates information from both encoders to generate entity embeddings for predicting future events. The proposed MSEN model demonstrates strong performance compared to several baselines on typical benchmark datasets. Results show MSEN achieves the highest prediction accuracy.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136343849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of an Effective Hierarchical Deep-Learning-Based Object Detection Model Integrated with Image-Processing Techniques for Detecting Speed Limit Signs, Rockfalls, Potholes, and Car Crashes 结合图像处理技术的有效分层深度学习目标检测模型在限速标志、落石、坑洞和车祸检测中的应用
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-28 DOI: 10.3390/fi15100322
Yao-Liang Chung
Against the backdrop of rising road traffic accident rates, measures to prevent road traffic accidents have always been a pressing issue in Taiwan. Road traffic accidents are mostly caused by speeding and roadway obstacles, especially in the form of rockfalls, potholes, and car crashes (involving damaged cars and overturned cars). To address this, it was necessary to design a real-time detection system that could detect speed limit signs, rockfalls, potholes, and car crashes, which would alert drivers to make timely decisions in the event of an emergency, thereby preventing secondary car crashes. This system would also be useful for alerting the relevant authorities, enabling a rapid response to the situation. In this study, a hierarchical deep-learning-based object detection model is proposed based on You Only Look Once v7 (YOLOv7) and mask region-based convolutional neural network (Mask R-CNN) algorithms. In the first level, YOLOv7 identifies speed limit signs and rockfalls, potholes, and car crashes. In the second level, Mask R-CNN subdivides the speed limit signs into nine categories (30, 40, 50, 60, 70, 80, 90, 100, and 110 km/h). The images used in this study consisted of screen captures of dashcam footage as well as images obtained from the Tsinghua-Tencent 100K dataset, Google Street View, and Google Images searches. During model training, we employed Gaussian noise and image rotation to simulate poor weather conditions as well as obscured, slanted, or twisted objects. Canny edge detection was used to enhance the contours of the detected objects and accentuate their features. The combined use of these image-processing techniques effectively increased the quantity and variety of images in the training set. During model testing, we evaluated the model’s performance based on its mean average precision (mAP). The experimental results showed that the mAP of our proposed model was 8.6 percentage points higher than that of the YOLOv7 model—a significant improvement in the overall accuracy of the model. In addition, we tested the model using videos showing different scenarios that had not been used in the training process, finding the model to have a rapid response time and a lower overall mean error rate. To summarize, the proposed model is a good candidate for road safety detection.
在道路交通意外率不断上升的背景下,如何预防道路交通意外一直是台湾迫切需要解决的问题。道路交通事故主要是由超速和道路障碍引起的,特别是以落石、坑洞和车祸(包括损坏的汽车和翻倒的汽车)的形式。为了解决这个问题,有必要设计一个实时检测系统,可以检测限速标志、落石、坑洞和车祸,提醒司机在紧急情况下及时做出决定,从而防止二次车祸。这一系统也有助于向有关当局发出警报,使其能够迅速对局势作出反应。在本研究中,提出了一种基于You Only Look Once v7 (YOLOv7)和基于mask区域的卷积神经网络(mask R-CNN)算法的分层深度学习目标检测模型。在第一关,YOLOv7识别限速标志、落石、坑洞和车祸。在第二层,Mask R-CNN将限速标志细分为9类(30,40,50,60,70,80,90,100和110 km/h)。本研究中使用的图像包括行车记录仪镜头的屏幕截图,以及从清华-腾讯100K数据集、谷歌街景和谷歌图像搜索中获得的图像。在模型训练过程中,我们使用高斯噪声和图像旋转来模拟恶劣的天气条件以及遮挡、倾斜或扭曲的物体。采用精细边缘检测增强被检测物体的轮廓,突出其特征。这些图像处理技术的结合使用有效地增加了训练集中图像的数量和种类。在模型测试中,我们根据其平均精度(mAP)来评估模型的性能。实验结果表明,我们提出的模型的mAP比YOLOv7模型提高了8.6个百分点,显著提高了模型的整体精度。此外,我们使用训练过程中未使用的不同场景的视频对模型进行了测试,发现该模型具有快速的响应时间和较低的总体平均错误率。综上所述,该模型是道路安全检测的理想选择。
{"title":"Application of an Effective Hierarchical Deep-Learning-Based Object Detection Model Integrated with Image-Processing Techniques for Detecting Speed Limit Signs, Rockfalls, Potholes, and Car Crashes","authors":"Yao-Liang Chung","doi":"10.3390/fi15100322","DOIUrl":"https://doi.org/10.3390/fi15100322","url":null,"abstract":"Against the backdrop of rising road traffic accident rates, measures to prevent road traffic accidents have always been a pressing issue in Taiwan. Road traffic accidents are mostly caused by speeding and roadway obstacles, especially in the form of rockfalls, potholes, and car crashes (involving damaged cars and overturned cars). To address this, it was necessary to design a real-time detection system that could detect speed limit signs, rockfalls, potholes, and car crashes, which would alert drivers to make timely decisions in the event of an emergency, thereby preventing secondary car crashes. This system would also be useful for alerting the relevant authorities, enabling a rapid response to the situation. In this study, a hierarchical deep-learning-based object detection model is proposed based on You Only Look Once v7 (YOLOv7) and mask region-based convolutional neural network (Mask R-CNN) algorithms. In the first level, YOLOv7 identifies speed limit signs and rockfalls, potholes, and car crashes. In the second level, Mask R-CNN subdivides the speed limit signs into nine categories (30, 40, 50, 60, 70, 80, 90, 100, and 110 km/h). The images used in this study consisted of screen captures of dashcam footage as well as images obtained from the Tsinghua-Tencent 100K dataset, Google Street View, and Google Images searches. During model training, we employed Gaussian noise and image rotation to simulate poor weather conditions as well as obscured, slanted, or twisted objects. Canny edge detection was used to enhance the contours of the detected objects and accentuate their features. The combined use of these image-processing techniques effectively increased the quantity and variety of images in the training set. During model testing, we evaluated the model’s performance based on its mean average precision (mAP). The experimental results showed that the mAP of our proposed model was 8.6 percentage points higher than that of the YOLOv7 model—a significant improvement in the overall accuracy of the model. In addition, we tested the model using videos showing different scenarios that had not been used in the training process, finding the model to have a rapid response time and a lower overall mean error rate. To summarize, the proposed model is a good candidate for road safety detection.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135387281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Factors Affecting Countries’ Adoption of Blockchain-Enabled Central Bank Digital Currencies 探讨影响各国采用区块链支持的央行数字货币的因素
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-28 DOI: 10.3390/fi15100321
Medina Ayta Mohammed, Carmen De-Pablos-Heredero, José Luis Montes Botella
Central bank-issued digital currencies have sparked significant interest and are currently the subject of extensive research, owing to their potential for rapid settlement, low fees, accessibility, and automated monetary policies. However, central bank digital currencies are still in their infancy and the levels of adoption vary significantly between nations, with a few countries seeing widespread adoption. We used partial least squares structural equation modeling to investigate the nonlinear relationship between key national development indicators and central bank digital deployment across 67 countries. We explore the technological, environmental, legal, and economic factors that affect central bank digital currency adoption by country. We found a statistically significant and positive correlation between countries’ central bank digital currency adoption status and a country’s level of democracy and public confidence in governance, and a negative association between regulatory quality and income inequality. There was no significant association between countries’ central bank digital currency adoption status and their level of network readiness, foreign exchange reserves, and sustainable development goal rank. Thus, we posit that a country that is highly democratic and has good governance adopts central bank digital currencies more readily than others. Based on our findings, we suggested areas for additional research and highlighted policy considerations related to the wider adoption of central bank digital currency.
中央银行发行的数字货币已经引起了人们的极大兴趣,目前正在进行广泛的研究,因为它们具有快速结算、低费用、可访问性和自动化货币政策的潜力。然而,央行数字货币仍处于起步阶段,各国之间的采用水平差异很大,少数国家已被广泛采用。我们使用偏最小二乘结构方程模型研究了67个国家的关键国家发展指标与中央银行数字化部署之间的非线性关系。我们探讨了影响各国央行采用数字货币的技术、环境、法律和经济因素。我们发现,各国央行数字货币的采用状况与该国的民主水平和公众对治理的信心之间存在统计学上显著的正相关关系,监管质量与收入不平等之间存在负相关关系。各国央行数字货币采用状况与其网络准备程度、外汇储备水平和可持续发展目标排名之间没有显著关联。因此,我们假设一个高度民主且治理良好的国家比其他国家更容易采用央行数字货币。根据我们的研究结果,我们提出了进一步研究的领域,并强调了与更广泛采用央行数字货币相关的政策考虑。
{"title":"Exploring the Factors Affecting Countries’ Adoption of Blockchain-Enabled Central Bank Digital Currencies","authors":"Medina Ayta Mohammed, Carmen De-Pablos-Heredero, José Luis Montes Botella","doi":"10.3390/fi15100321","DOIUrl":"https://doi.org/10.3390/fi15100321","url":null,"abstract":"Central bank-issued digital currencies have sparked significant interest and are currently the subject of extensive research, owing to their potential for rapid settlement, low fees, accessibility, and automated monetary policies. However, central bank digital currencies are still in their infancy and the levels of adoption vary significantly between nations, with a few countries seeing widespread adoption. We used partial least squares structural equation modeling to investigate the nonlinear relationship between key national development indicators and central bank digital deployment across 67 countries. We explore the technological, environmental, legal, and economic factors that affect central bank digital currency adoption by country. We found a statistically significant and positive correlation between countries’ central bank digital currency adoption status and a country’s level of democracy and public confidence in governance, and a negative association between regulatory quality and income inequality. There was no significant association between countries’ central bank digital currency adoption status and their level of network readiness, foreign exchange reserves, and sustainable development goal rank. Thus, we posit that a country that is highly democratic and has good governance adopts central bank digital currencies more readily than others. Based on our findings, we suggested areas for additional research and highlighted policy considerations related to the wider adoption of central bank digital currency.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135387410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating IPTV Malware in the Wild 调查IPTV恶意软件
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-28 DOI: 10.3390/fi15100325
Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer, Vasilis Katos
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from different sources. These infringing IPTV technologies may include websites, software, software add-ons, and physical set-top boxes. Due to the free or low cost of illegal IPTV technologies, illicit IPTV content providers will often resort to intrusive advertising, scams, and the distribution of malware to increase their revenue. We developed an automated solution for collecting and analysing malware from illegal IPTV technologies and used it to analyse a sample of illicit IPTV websites, application (app) stores, and software. Our results show that our IPTV Technologies Malware Analysis Framework (IITMAF) classified 32 of the 60 sample URLs tested as malicious compared to running the same test using publicly available online antivirus solutions, which only detected 23 of the 60 sample URLs as malicious. Moreover, the IITMAF also detected malicious URLs and files from 31 of the sample’s websites, one of which had reported ransomware behaviour.
提供侵犯版权的IPTV内容的技术通常被用作合法IPTV订阅和服务的非法替代品,因为它们通常具有较低的货币成本,并且对于从不同来源关注内容的用户来说更方便。这些侵权的IPTV技术可能包括网站、软件、软件附加组件和物理机顶盒。由于非法IPTV技术的免费或低成本,非法IPTV内容提供商通常会诉诸侵入性广告,诈骗和恶意软件的分发来增加他们的收入。我们开发了一个自动解决方案,用于收集和分析来自非法IPTV技术的恶意软件,并使用它来分析非法IPTV网站,应用程序(应用程序)商店和软件的样本。我们的结果显示,我们的IPTV Technologies恶意软件分析框架(IITMAF)将测试的60个样本url中的32个分类为恶意,而使用公开可用的在线反病毒解决方案运行相同的测试,后者仅检测到60个样本url中的23个为恶意。此外,IITMAF还从31个样本网站中检测到恶意url和文件,其中一个网站报告了勒索软件行为。
{"title":"Investigating IPTV Malware in the Wild","authors":"Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer, Vasilis Katos","doi":"10.3390/fi15100325","DOIUrl":"https://doi.org/10.3390/fi15100325","url":null,"abstract":"Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from different sources. These infringing IPTV technologies may include websites, software, software add-ons, and physical set-top boxes. Due to the free or low cost of illegal IPTV technologies, illicit IPTV content providers will often resort to intrusive advertising, scams, and the distribution of malware to increase their revenue. We developed an automated solution for collecting and analysing malware from illegal IPTV technologies and used it to analyse a sample of illicit IPTV websites, application (app) stores, and software. Our results show that our IPTV Technologies Malware Analysis Framework (IITMAF) classified 32 of the 60 sample URLs tested as malicious compared to running the same test using publicly available online antivirus solutions, which only detected 23 of the 60 sample URLs as malicious. Moreover, the IITMAF also detected malicious URLs and files from 31 of the sample’s websites, one of which had reported ransomware behaviour.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135425075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review 网络安全动态风险评估:系统文献综述
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-28 DOI: 10.3390/fi15100324
Pavlos Cheimonidis, Konstantinos Rantos
Traditional information security risk assessment (RA) methodologies and standards, adopted by information security management systems and frameworks as a foundation stone towards robust environments, face many difficulties in modern environments where the threat landscape changes rapidly and new vulnerabilities are being discovered. In order to overcome this problem, dynamic risk assessment (DRA) models have been proposed to continuously and dynamically assess risks to organisational operations in (near) real time. The aim of this work is to analyse the current state of DRA models that have been proposed for cybersecurity, through a systematic literature review. The screening process led us to study 50 DRA models, categorised based on the respective primary analysis methods they used. The study provides insights into the key characteristics of these models, including the maturity level of the examined models, the domain or application area in which these models flourish, and the information they utilise in order to produce results. The aim of this work is to answer critical research questions regarding the development of dynamic risk assessment methodologies and provide insights on the already developed methods as well as future research directions.
传统的信息安全风险评估方法和标准被信息安全管理系统和框架作为健壮环境的基石,在威胁形势迅速变化和新漏洞不断被发现的现代环境中面临许多困难。为了克服这一问题,动态风险评估(DRA)模型被提出,以持续地、动态地(近)实时地评估组织运营的风险。这项工作的目的是通过系统的文献综述,分析已经提出的网络安全DRA模型的现状。筛选过程使我们研究了50个DRA模型,并根据它们各自使用的主要分析方法进行了分类。该研究提供了对这些模型的关键特征的见解,包括被检查模型的成熟度水平,这些模型蓬勃发展的领域或应用领域,以及它们为了产生结果而利用的信息。这项工作的目的是回答关于动态风险评估方法发展的关键研究问题,并对已经开发的方法以及未来的研究方向提供见解。
{"title":"Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review","authors":"Pavlos Cheimonidis, Konstantinos Rantos","doi":"10.3390/fi15100324","DOIUrl":"https://doi.org/10.3390/fi15100324","url":null,"abstract":"Traditional information security risk assessment (RA) methodologies and standards, adopted by information security management systems and frameworks as a foundation stone towards robust environments, face many difficulties in modern environments where the threat landscape changes rapidly and new vulnerabilities are being discovered. In order to overcome this problem, dynamic risk assessment (DRA) models have been proposed to continuously and dynamically assess risks to organisational operations in (near) real time. The aim of this work is to analyse the current state of DRA models that have been proposed for cybersecurity, through a systematic literature review. The screening process led us to study 50 DRA models, categorised based on the respective primary analysis methods they used. The study provides insights into the key characteristics of these models, including the maturity level of the examined models, the domain or application area in which these models flourish, and the information they utilise in order to produce results. The aim of this work is to answer critical research questions regarding the development of dynamic risk assessment methodologies and provide insights on the already developed methods as well as future research directions.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135424943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection Web应用程序安全的新方法:利用GPT语言模型进行源代码检查
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-28 DOI: 10.3390/fi15100326
Zoltán Szabó, Vilmos Bilicki
Due to the proliferation of large language models (LLMs) and their widespread use in applications such as ChatGPT, there has been a significant increase in interest in AI over the past year. Multiple researchers have raised the question: how will AI be applied and in what areas? Programming, including the generation, interpretation, analysis, and documentation of static program code based on promptsis one of the most promising fields. With the GPT API, we have explored a new aspect of this: static analysis of the source code of front-end applications at the endpoints of the data path. Our focus was the detection of the CWE-653 vulnerability—inadequately isolated sensitive code segments that could lead to unauthorized access or data leakage. This type of vulnerability detection consists of the detection of code segments dealing with sensitive data and the categorization of the isolation and protection levels of those segments that were previously not feasible without human intervention. However, we believed that the interpretive capabilities of GPT models could be explored to create a set of prompts to detect these cases on a file-by-file basis for the applications under study, and the efficiency of the method could pave the way for additional analysis tasks that were previously unavailable for automation. In the introduction to our paper, we characterize in detail the problem space of vulnerability and weakness detection, the challenges of the domain, and the advances that have been achieved in similarly complex areas using GPT or other LLMs. Then, we present our methodology, which includes our classification of sensitive data and protection levels. This is followed by the process of preprocessing, analyzing, and evaluating static code. This was achieved through a series of GPT prompts containing parts of static source code, utilizing few-shot examples and chain-of-thought techniques that detected sensitive code segments and mapped the complex code base into manageable JSON structures.Finally, we present our findings and evaluation of the open source project analysis, comparing the results of the GPT-based pipelines with manual evaluations, highlighting that the field yields a high research value. The results show a vulnerability detection rate for this particular type of model of 88.76%, among others.
由于大型语言模型(llm)的激增及其在ChatGPT等应用程序中的广泛使用,在过去的一年中,人们对人工智能的兴趣显著增加。许多研究人员提出了这样一个问题:人工智能将如何应用?应用在哪些领域?编程,包括基于提示的静态程序代码的生成、解释、分析和文档,是最有前途的领域之一。使用GPT API,我们探索了这方面的一个新方面:在数据路径的端点处对前端应用程序的源代码进行静态分析。我们的重点是检测CWE-653漏洞——隔离不充分的敏感代码段,可能导致未经授权的访问或数据泄露。这种类型的漏洞检测包括检测处理敏感数据的代码段,并对这些段的隔离和保护级别进行分类,这些段以前如果没有人为干预是不可行的。然而,我们相信可以探索GPT模型的解释能力,为正在研究的应用程序创建一组提示,以逐个文件地检测这些案例,并且该方法的效率可以为以前无法自动化的附加分析任务铺平道路。在我们论文的引言中,我们详细描述了漏洞和弱点检测的问题空间,领域的挑战,以及使用GPT或其他llm在类似复杂领域取得的进展。然后,我们介绍了我们的方法,其中包括我们对敏感数据和保护级别的分类。接下来是预处理、分析和评估静态代码的过程。这是通过一系列包含静态源代码部分的GPT提示实现的,使用少量示例和思维链技术来检测敏感代码段并将复杂的代码库映射到可管理的JSON结构中。最后,我们展示了我们的发现和对开源项目分析的评估,将基于gbp的管道的结果与人工评估的结果进行了比较,强调了该领域具有很高的研究价值。结果显示,该特定类型模型的漏洞检测率为88.76%。
{"title":"A New Approach to Web Application Security: Utilizing GPT Language Models for Source Code Inspection","authors":"Zoltán Szabó, Vilmos Bilicki","doi":"10.3390/fi15100326","DOIUrl":"https://doi.org/10.3390/fi15100326","url":null,"abstract":"Due to the proliferation of large language models (LLMs) and their widespread use in applications such as ChatGPT, there has been a significant increase in interest in AI over the past year. Multiple researchers have raised the question: how will AI be applied and in what areas? Programming, including the generation, interpretation, analysis, and documentation of static program code based on promptsis one of the most promising fields. With the GPT API, we have explored a new aspect of this: static analysis of the source code of front-end applications at the endpoints of the data path. Our focus was the detection of the CWE-653 vulnerability—inadequately isolated sensitive code segments that could lead to unauthorized access or data leakage. This type of vulnerability detection consists of the detection of code segments dealing with sensitive data and the categorization of the isolation and protection levels of those segments that were previously not feasible without human intervention. However, we believed that the interpretive capabilities of GPT models could be explored to create a set of prompts to detect these cases on a file-by-file basis for the applications under study, and the efficiency of the method could pave the way for additional analysis tasks that were previously unavailable for automation. In the introduction to our paper, we characterize in detail the problem space of vulnerability and weakness detection, the challenges of the domain, and the advances that have been achieved in similarly complex areas using GPT or other LLMs. Then, we present our methodology, which includes our classification of sensitive data and protection levels. This is followed by the process of preprocessing, analyzing, and evaluating static code. This was achieved through a series of GPT prompts containing parts of static source code, utilizing few-shot examples and chain-of-thought techniques that detected sensitive code segments and mapped the complex code base into manageable JSON structures.Finally, we present our findings and evaluation of the open source project analysis, comparing the results of the GPT-based pipelines with manual evaluations, highlighting that the field yields a high research value. The results show a vulnerability detection rate for this particular type of model of 88.76%, among others.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135424945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1