首页 > 最新文献

International Journal of Internet Technology and Secured Transactions最新文献

英文 中文
An improved deep autoencoder-based network intrusion detection system with enhanced performance 一种改进的基于深度自编码器的网络入侵检测系统
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10056364
Bidyapati Thiyam, Shouvik Dey
{"title":"An improved deep autoencoder-based network intrusion detection system with enhanced performance","authors":"Bidyapati Thiyam, Shouvik Dey","doi":"10.1504/ijitst.2023.10056364","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10056364","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Employment contract and wage payment using blockchain and smart contract 使用区块链和智能合约的劳动合同和工资支付
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.127387
Eugene Rhee
Employment contracts recorded on blockchain have the strength to make it impossible to falsify or modify the agreements between employers and employees. The fact is that the work input through the application remains on the blockchain, and the manager shares it, which is expected to significantly improve the disadvantaged position of part-time workers. As a way to recognise and solve recent problems with employment contracts and wage problems, this paper proposes to store employment contracts in blocks using blockchain technology, enable accurate wage payments using smart contracts, and also store wage information in blocks. In addition, it can be proved by using the contents stored in the block when problems occur later.
记录在区块链上的雇佣合同具有使雇主和雇员之间的协议无法伪造或修改的优势。事实是,通过应用程序输入的工作仍然在区块链上,并且管理人员共享它,这有望显着改善兼职工人的不利地位。作为识别和解决近期劳动合同和工资问题的一种方法,本文建议使用区块链技术将劳动合同存储在区块中,使用智能合约实现准确的工资支付,并将工资信息存储在区块中。此外,当以后出现问题时,可以通过使用存储在块中的内容来证明。
{"title":"Employment contract and wage payment using blockchain and smart contract","authors":"Eugene Rhee","doi":"10.1504/ijitst.2023.127387","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127387","url":null,"abstract":"Employment contracts recorded on blockchain have the strength to make it impossible to falsify or modify the agreements between employers and employees. The fact is that the work input through the application remains on the blockchain, and the manager shares it, which is expected to significantly improve the disadvantaged position of part-time workers. As a way to recognise and solve recent problems with employment contracts and wage problems, this paper proposes to store employment contracts in blocks using blockchain technology, enable accurate wage payments using smart contracts, and also store wage information in blocks. In addition, it can be proved by using the contents stored in the block when problems occur later.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing security in IoT systems via blockchain 通过区块链实现物联网系统的安全性
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.127391
Anurag Parcha, Sanjana Mishra, Aditya Bist, Reema Agarwal, Sagar Gupta, Saahil Sharma, R. Sathyaraj
Today, IoT systems have become prominent, especially in the fields of healthcare, agriculture, and manufacturing. IoT systems encompass numerous devices that become targets for attacks and exploitation, thereby making these systems prone to security vulnerabilities. While IoT has become a widespread technology by virtue of its scalability, dependability, and ease of access, its shortcomings should also be addressed. Currently, client-server model of networking is employed in IoT devices which use a single gateway for transferring data and connecting through a cloud server. This model demands a high cost for cloud maintenance and network equipment. Furthermore, a single gateway is not secure as one failed node can compromise the entire network. To improve security, we propose the inclusion of blockchain technology; a distributed ledger where data is stored across several nodes, thereby eliminating single point failure. This project proposes the benefits of blockchain technology in conjunction with security of IoT systems.
今天,物联网系统已经变得突出,特别是在医疗保健、农业和制造业领域。物联网系统包含许多设备,这些设备成为攻击和利用的目标,从而使这些系统容易出现安全漏洞。虽然物联网凭借其可扩展性,可靠性和易于访问性已经成为一种广泛的技术,但它的缺点也应该得到解决。目前,物联网设备采用的是客户端-服务器组网模式,使用单一网关传输数据,通过云服务器进行连接。这种模式对云维护和网络设备的成本要求很高。此外,单个网关不安全,因为一个故障节点可能危及整个网络。为了提高安全性,我们建议加入区块链技术;一种分布式账本,其中数据存储在多个节点上,从而消除了单点故障。该项目提出了区块链技术与物联网系统安全性相结合的好处。
{"title":"Implementing security in IoT systems via blockchain","authors":"Anurag Parcha, Sanjana Mishra, Aditya Bist, Reema Agarwal, Sagar Gupta, Saahil Sharma, R. Sathyaraj","doi":"10.1504/ijitst.2023.127391","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127391","url":null,"abstract":"Today, IoT systems have become prominent, especially in the fields of healthcare, agriculture, and manufacturing. IoT systems encompass numerous devices that become targets for attacks and exploitation, thereby making these systems prone to security vulnerabilities. While IoT has become a widespread technology by virtue of its scalability, dependability, and ease of access, its shortcomings should also be addressed. Currently, client-server model of networking is employed in IoT devices which use a single gateway for transferring data and connecting through a cloud server. This model demands a high cost for cloud maintenance and network equipment. Furthermore, a single gateway is not secure as one failed node can compromise the entire network. To improve security, we propose the inclusion of blockchain technology; a distributed ledger where data is stored across several nodes, thereby eliminating single point failure. This project proposes the benefits of blockchain technology in conjunction with security of IoT systems.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An enhanced security framework for IoT environment using Jaya optimisation-based genetic algorithm 使用基于Jaya优化的遗传算法的物联网环境增强安全框架
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.127388
S. Velliangiri, Iwin Thanakumar Joseph, Shanthini Pandiaraj, P. Leela Jancy, Ch. Madhubabu
The internet of things (IoT) employs a cloud network, and the data stored in the cloud servers are highly vulnerable to various attacks. As per the current analysis report, around 23% of IoT devices are prone to attack. The data stored in the cloud storage are highly vulnerable to attacks leading to a pullback factor of 15% in economic growth. Considering the above security of the IoT devices, this paper proposes a framework integrating the Jaya algorithm and genetic algorithm to achieve an optimal detection of intrusion in the IoT network. The JA is a parameter less algorithm that does not require any precise control parameters. In contrast, the GA is a meta-heuristic approach that produces reasonable quality solutions for complex functions. The extensive analysis of the proposed algorithm yield better performance in vital parameters like accuracy, recall and F-score.
物联网采用云网络,存储在云服务器上的数据极易受到各种攻击。根据目前的分析报告,大约23%的物联网设备容易受到攻击。存储在云存储中的数据极易受到攻击,导致经济增长的回调系数为15%。考虑到上述物联网设备的安全性,本文提出了一种结合Jaya算法和遗传算法的框架,以实现物联网网络中入侵的最优检测。JA是一种不需要任何精确控制参数的无参数算法。相比之下,遗传算法是一种元启发式方法,可以为复杂函数产生合理的高质量解决方案。对所提出算法的广泛分析在准确率、召回率和f分等重要参数上产生了更好的性能。
{"title":"An enhanced security framework for IoT environment using Jaya optimisation-based genetic algorithm","authors":"S. Velliangiri, Iwin Thanakumar Joseph, Shanthini Pandiaraj, P. Leela Jancy, Ch. Madhubabu","doi":"10.1504/ijitst.2023.127388","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127388","url":null,"abstract":"The internet of things (IoT) employs a cloud network, and the data stored in the cloud servers are highly vulnerable to various attacks. As per the current analysis report, around 23% of IoT devices are prone to attack. The data stored in the cloud storage are highly vulnerable to attacks leading to a pullback factor of 15% in economic growth. Considering the above security of the IoT devices, this paper proposes a framework integrating the Jaya algorithm and genetic algorithm to achieve an optimal detection of intrusion in the IoT network. The JA is a parameter less algorithm that does not require any precise control parameters. In contrast, the GA is a meta-heuristic approach that produces reasonable quality solutions for complex functions. The extensive analysis of the proposed algorithm yield better performance in vital parameters like accuracy, recall and F-score.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comprehensive blockchain technology survey: architecture, applications and challenges 全面的区块链技术调查:架构、应用和挑战
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.127389
Gajala Praveen, Piyush Kumar Singh, Prabhat Ranjan
Blockchain technology has evolved to solve the complexity and privacy issues associated with online digital content distribution in the last decade. Several studies have centred on different implementations of blockchain technology, and there is no comprehensive survey of the technology from both a technical and an application viewpoint. To close this gap, we conducted a detailed blockchain technology survey. This paper gives an in-depth look at blockchain technology. It discusses the blockchain fundamentals, taxonomy, characteristics, architecture of blockchain, and accessible consensus mechanisms used in the various blockchain systems. This paper also gives blockchain applications in multiple domains, including finance, medical, banking, etc. In addition, this paper presents an overview of the various problems that currently exist in blockchain technology and future research directions.
在过去的十年里,区块链技术已经发展到可以解决与在线数字内容分发相关的复杂性和隐私问题。一些研究集中在区块链技术的不同实现上,没有从技术和应用的角度对该技术进行全面的调查。为了缩小这一差距,我们进行了详细的区块链技术调查。本文将深入研究区块链技术。它讨论了区块链的基础、分类、特征、区块链的架构,以及各种区块链系统中使用的可访问的共识机制。本文还介绍了区块链在金融、医疗、银行等多个领域的应用。此外,本文还概述了区块链技术目前存在的各种问题和未来的研究方向。
{"title":"A comprehensive blockchain technology survey: architecture, applications and challenges","authors":"Gajala Praveen, Piyush Kumar Singh, Prabhat Ranjan","doi":"10.1504/ijitst.2023.127389","DOIUrl":"https://doi.org/10.1504/ijitst.2023.127389","url":null,"abstract":"Blockchain technology has evolved to solve the complexity and privacy issues associated with online digital content distribution in the last decade. Several studies have centred on different implementations of blockchain technology, and there is no comprehensive survey of the technology from both a technical and an application viewpoint. To close this gap, we conducted a detailed blockchain technology survey. This paper gives an in-depth look at blockchain technology. It discusses the blockchain fundamentals, taxonomy, characteristics, architecture of blockchain, and accessible consensus mechanisms used in the various blockchain systems. This paper also gives blockchain applications in multiple domains, including finance, medical, banking, etc. In addition, this paper presents an overview of the various problems that currently exist in blockchain technology and future research directions.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"14 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134954974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of blockchain based smart contract system to understand its performance in different applications 分析基于区块链的智能合约系统,了解其在不同应用中的性能
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10054299
P. Amudha, V. Devi
{"title":"Analysis of blockchain based smart contract system to understand its performance in different applications","authors":"P. Amudha, V. Devi","doi":"10.1504/ijitst.2023.10054299","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10054299","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A contemporary anti-phishing framework based on visual cryptography and steganography 基于视觉密码和隐写术的当代反网络钓鱼框架
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.129586
Alkesh Gupta, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag
In new technologies developing tremendously, and with this, the usage of online commodities has also seen a surge with a drastic daily increase in the number of users. Online support has also led to increased online attacks on the user's confidential data, leading to financial and social loss. Phishing is one such online attack using which an attacker impersonates any authentic organisation to deceive and take advantage of users to steal various private information like passwords, payment card details, etc. These days, attackers have easy access to new tools and techniques which can easily evade many existing anti-phishing techniques. To enhance the security of the user's confidential information and protect them from such phishing attacks, this paper proposes a new approach that uses visual cryptography and steganography. This approach will help the user keep its identity and login credentials confidential unless the website proves its trustworthiness.
随着新技术的迅猛发展,在线商品的使用也随着用户数量的急剧增加而激增。在线支持也导致对用户机密数据的在线攻击增加,导致经济和社会损失。网络钓鱼是一种在线攻击,攻击者利用这种攻击冒充任何真实的组织来欺骗和利用用户窃取各种私人信息,如密码、支付卡详细信息等。如今,攻击者很容易获得新的工具和技术,可以很容易地逃避许多现有的反网络钓鱼技术。为了提高用户机密信息的安全性,保护用户免受网络钓鱼攻击,本文提出了一种使用视觉加密和隐写的新方法。这种方法将帮助用户保持其身份和登录凭据的机密性,除非网站证明其可靠性。
{"title":"A contemporary anti-phishing framework based on visual cryptography and steganography","authors":"Alkesh Gupta, Gaurav Choudhary, Shishir Kumar Shandilya, Vikas Sihag","doi":"10.1504/ijitst.2023.129586","DOIUrl":"https://doi.org/10.1504/ijitst.2023.129586","url":null,"abstract":"In new technologies developing tremendously, and with this, the usage of online commodities has also seen a surge with a drastic daily increase in the number of users. Online support has also led to increased online attacks on the user's confidential data, leading to financial and social loss. Phishing is one such online attack using which an attacker impersonates any authentic organisation to deceive and take advantage of users to steal various private information like passwords, payment card details, etc. These days, attackers have easy access to new tools and techniques which can easily evade many existing anti-phishing techniques. To enhance the security of the user's confidential information and protect them from such phishing attacks, this paper proposes a new approach that uses visual cryptography and steganography. This approach will help the user keep its identity and login credentials confidential unless the website proves its trustworthiness.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135584267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of consensus protocols in distributed systems 分布式系统中一致性协议的性能分析
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10053139
B. Balusamy, Ram Kumar, T. Poongodi, D. Sumathi
{"title":"Performance analysis of consensus protocols in distributed systems","authors":"B. Balusamy, Ram Kumar, T. Poongodi, D. Sumathi","doi":"10.1504/ijitst.2023.10053139","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10053139","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of internet of vehicles in smart cities: authentication and confidentiality aspects 智慧城市车联网安全:认证和保密方面
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10053899
Roumissa Sahbi, S. Ghanemi, M. Ferrag
{"title":"Security of internet of vehicles in smart cities: authentication and confidentiality aspects","authors":"Roumissa Sahbi, S. Ghanemi, M. Ferrag","doi":"10.1504/ijitst.2023.10053899","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10053899","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TRO-CP-ABE: a secure and flexible layer with traceability and easy revocation in ciphertext-policy attribute-based encryption tr - cp - abe:在基于密文策略属性的加密中具有可追溯性和易于撤销的安全灵活层
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.1504/ijitst.2023.10054300
K. Srinivas, A. Nikose
{"title":"TRO-CP-ABE: a secure and flexible layer with traceability and easy revocation in ciphertext-policy attribute-based encryption","authors":"K. Srinivas, A. Nikose","doi":"10.1504/ijitst.2023.10054300","DOIUrl":"https://doi.org/10.1504/ijitst.2023.10054300","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67219403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Internet Technology and Secured Transactions
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1