首页 > 最新文献

2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)最新文献

英文 中文
The Effect of Motion on PPG Heart Rate Sensors 运动对PPG心率传感器的影响
Daniel Hu, Calvin Henry, S. Bagchi
As smartwatches become more commonly used for keeping track of health data, their accuracy becomes more and more important. In this paper, we investigate the accuracy of smartwatch heart rate sensors and how it depends on the movement of the wearer. Some additional steps were taken in being able to predict whether a smart watch will report an accurate heart rate based on motion using a support vector machine.
随着智能手表越来越普遍地用于跟踪健康数据,它们的准确性变得越来越重要。在本文中,我们研究了智能手表心率传感器的准确性以及它如何依赖于佩戴者的运动。在能够使用支持向量机预测智能手表是否会根据运动报告准确的心率方面,还采取了一些额外的步骤。
{"title":"The Effect of Motion on PPG Heart Rate Sensors","authors":"Daniel Hu, Calvin Henry, S. Bagchi","doi":"10.1109/dsn-s50200.2020.00032","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00032","url":null,"abstract":"As smartwatches become more commonly used for keeping track of health data, their accuracy becomes more and more important. In this paper, we investigate the accuracy of smartwatch heart rate sensors and how it depends on the movement of the wearer. Some additional steps were taken in being able to predict whether a smart watch will report an accurate heart rate based on motion using a support vector machine.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Consensus Generation with Distributed DoH 分布式DoH的安全共识生成
Philipp Jeitner, Haya Shulman, M. Waidner
Many applications and protocols depend on the ability to generate a pool of servers to conduct majority-based consensus mechanisms and often this is done by doing plain DNS queries. A recent off-path attack [1] against NTP and security enhanced NTP with Chronos [2] showed that relying on DNS for generating the pool of NTP servers introduces a weak link. In this work, we propose a secure, backward-compatible address pool generation method using distributed DNS-over-HTTPS (DoH) resolvers which is aimed to prevent such attacks against server pool generation.
许多应用程序和协议依赖于生成服务器池来执行基于多数的共识机制的能力,这通常通过执行普通DNS查询来完成。最近针对NTP和使用Chronos进行安全增强的NTP的偏离路径攻击[1]表明,依赖DNS生成NTP服务器池会引入一个薄弱环节。在这项工作中,我们提出了一种安全的,向后兼容的地址池生成方法,使用分布式DNS-over-HTTPS (DoH)解析器,旨在防止针对服务器池生成的此类攻击。
{"title":"Secure Consensus Generation with Distributed DoH","authors":"Philipp Jeitner, Haya Shulman, M. Waidner","doi":"10.1109/DSN-S50200.2020.00023","DOIUrl":"https://doi.org/10.1109/DSN-S50200.2020.00023","url":null,"abstract":"Many applications and protocols depend on the ability to generate a pool of servers to conduct majority-based consensus mechanisms and often this is done by doing plain DNS queries. A recent off-path attack [1] against NTP and security enhanced NTP with Chronos [2] showed that relying on DNS for generating the pool of NTP servers introduces a weak link. In this work, we propose a secure, backward-compatible address pool generation method using distributed DNS-over-HTTPS (DoH) resolvers which is aimed to prevent such attacks against server pool generation.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116964304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CanvasMirror: Secure Integration of Third-Party Libraries in a WebVR Environment CanvasMirror: WebVR环境下第三方库的安全集成
Jiyeon Lee
Web technology has evolved to offer 360-degree immersive browsing experiences. This new technology, called WebVR, enables virtual reality by rendering a three-dimensional world on an HTML canvas. Unfortunately, there exists no browser-supported way of sharing this canvas between different parties. As a result, third-party library providers with ill intent (e.g., stealing sensitive information from end-users) can easily distort the entire WebVR site. To mitigate the new threats posed in WebVR, we propose CanvasMirror, which allows publishers to specify the behaviors of third-party libraries and enforce this specification. We show that CanvasMirror effectively separates the third-party context from the host origin by leveraging the privilege separation technique and safely integrates VR contents on a shared canvas.
网络技术已经发展到提供360度沉浸式的浏览体验。这项名为WebVR的新技术通过在HTML画布上呈现三维世界来实现虚拟现实。不幸的是,目前还没有浏览器支持的方式来在不同的各方之间共享这个画布。因此,恶意的第三方库提供商(例如,从最终用户那里窃取敏感信息)可以很容易地扭曲整个WebVR站点。为了减轻WebVR带来的新威胁,我们提出了CanvasMirror,它允许发布者指定第三方库的行为并强制执行该规范。我们展示了CanvasMirror通过利用特权分离技术有效地将第三方上下文与主机源分离,并安全地将VR内容集成在共享画布上。
{"title":"CanvasMirror: Secure Integration of Third-Party Libraries in a WebVR Environment","authors":"Jiyeon Lee","doi":"10.1109/dsn-s50200.2020.00040","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00040","url":null,"abstract":"Web technology has evolved to offer 360-degree immersive browsing experiences. This new technology, called WebVR, enables virtual reality by rendering a three-dimensional world on an HTML canvas. Unfortunately, there exists no browser-supported way of sharing this canvas between different parties. As a result, third-party library providers with ill intent (e.g., stealing sensitive information from end-users) can easily distort the entire WebVR site. To mitigate the new threats posed in WebVR, we propose CanvasMirror, which allows publishers to specify the behaviors of third-party libraries and enforce this specification. We show that CanvasMirror effectively separates the third-party context from the host origin by leveraging the privilege separation technique and safely integrates VR contents on a shared canvas.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129687075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Industry Track Programme Committee 行业跟踪计划委员会
{"title":"Industry Track Programme Committee","authors":"","doi":"10.1109/dsn-s50200.2020.00006","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00006","url":null,"abstract":"","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Title Page iii 第三页标题
{"title":"Title Page iii","authors":"","doi":"10.1109/dsn-s50200.2020.00002","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00002","url":null,"abstract":"","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134051531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Practical Privacy-Preserving Collaborative Machine Learning at a Scale 迈向实用的大规模保护隐私的协作机器学习
Rania Talbi
Collaborative machine learning allows multiple participants to get a global and valuable insight over their joint data. Nonetheless, in data-sensitive applications, it is crucial to maintain confidentiality across the end-to-end path the data follows from model training phase to the inference phase, preventing any form of information leakage about training data, the learned model, or the inference queries. In this paper, we present our approach to addressing this problem through PrivML, a framework for end-to-end outsourced privacy-preserving data classification over encrypted data. We provide some preliminary results comparing our proposal with state of the art solutions as well as some insight on our prospective research plan.
协作式机器学习允许多个参与者获得对其联合数据的全局和有价值的见解。尽管如此,在数据敏感的应用程序中,保持数据从模型训练阶段到推理阶段的端到端路径的机密性是至关重要的,这可以防止关于训练数据、学习模型或推理查询的任何形式的信息泄露。在本文中,我们提出了通过PrivML解决这个问题的方法,PrivML是一个端到端外包的加密数据保密数据分类框架。我们提供了一些初步结果,将我们的建议与最先进的解决方案进行比较,并对我们的前瞻性研究计划提供了一些见解。
{"title":"Towards Practical Privacy-Preserving Collaborative Machine Learning at a Scale","authors":"Rania Talbi","doi":"10.1109/dsn-s50200.2020.00037","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00037","url":null,"abstract":"Collaborative machine learning allows multiple participants to get a global and valuable insight over their joint data. Nonetheless, in data-sensitive applications, it is crucial to maintain confidentiality across the end-to-end path the data follows from model training phase to the inference phase, preventing any form of information leakage about training data, the learned model, or the inference queries. In this paper, we present our approach to addressing this problem through PrivML, a framework for end-to-end outsourced privacy-preserving data classification over encrypted data. We provide some preliminary results comparing our proposal with state of the art solutions as well as some insight on our prospective research plan.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129805443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontology Configuration Management for Knowledge-Centric Systems Engineering in Industry 面向工业知识中心系统工程的本体配置管理
Borja López, J. Rodríguez, Eugenio Parra, J. Vara
The engineering of safety-critical systems is a complex process whose cost-effectiveness is very important. Reuse of system artefacts is an activity that can contribute to improving quality and to saving costs during the process. Reuse must pay attention to artefact configuration management, as an artefact evolves through different versions and such an evolution must be properly managed. An artefact type that is used nowadays in industry for the engineering of safety-critical systems and can be reused is ontologies, which represent system domain information via knowledge representations. However, academic approaches for ontology reuse do not meet industrial needs for their application for systems engineering. As a solution, this paper presents an industrial approach to define and operate ontologies as libraries of knowledge to enable ontology configuration management. The approach supports the reuse and exploitation of domain knowledge through operations for mapping, alignment, and merge of ontology elements. The proposed approach, the current implementation, and validation activities are presented on top of the Knowledge Manager tool.
安全关键系统的工程设计是一个复杂的过程,其成本效益非常重要。系统工件的重用是一种在过程中有助于提高质量和节省成本的活动。重用必须注意工件配置管理,因为工件通过不同的版本演进,并且必须对这种演进进行适当的管理。目前在工业中用于安全关键系统工程并且可以重用的一种工件类型是本体,它通过知识表示表示系统域信息。然而,学术界对本体重用的研究方法并不能满足其在系统工程中的应用。作为解决方案,本文提出了一种工业方法来定义和操作本体作为知识库,以实现本体配置管理。该方法通过映射、对齐和本体元素合并的操作来支持领域知识的重用和利用。建议的方法、当前的实现和验证活动都在Knowledge Manager工具之上呈现。
{"title":"Ontology Configuration Management for Knowledge-Centric Systems Engineering in Industry","authors":"Borja López, J. Rodríguez, Eugenio Parra, J. Vara","doi":"10.1109/dsn-s50200.2020.00022","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00022","url":null,"abstract":"The engineering of safety-critical systems is a complex process whose cost-effectiveness is very important. Reuse of system artefacts is an activity that can contribute to improving quality and to saving costs during the process. Reuse must pay attention to artefact configuration management, as an artefact evolves through different versions and such an evolution must be properly managed. An artefact type that is used nowadays in industry for the engineering of safety-critical systems and can be reused is ontologies, which represent system domain information via knowledge representations. However, academic approaches for ontology reuse do not meet industrial needs for their application for systems engineering. As a solution, this paper presents an industrial approach to define and operate ontologies as libraries of knowledge to enable ontology configuration management. The approach supports the reuse and exploitation of domain knowledge through operations for mapping, alignment, and merge of ontology elements. The proposed approach, the current implementation, and validation activities are presented on top of the Knowledge Manager tool.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128713458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
SIMBA: An Efficient Simulator for Blockchain Applications SIMBA:区块链应用程序的高效模拟器
S. Fattahi, A. Makanju, A. M. Fard
Predicting the performance of a blockchain application during the design phase is difficult and evaluation after it is built could be expensive. The ability to simulate a blockchain network during the design stage in order to evaluate it is therefore a necessity. In this paper, we present a simulator for blockchain applications, called SIMBA (SIMulator for Blockchain Applications). SIMBA extends an existing simulator by adding the Merkle tree feature to blockchain nodes to improve efficiency and allowing more realistic evaluations not possible with the base tool to be performed. Results of our experiments show that the inclusion of Merkle trees has a high impact of up to 30 times reduction in the verification time of block transactions without an impact on block propagation delay. Since block verification is a critical part of the computational load of nodes on the network, this performance improvement significantly affects the overall performance of each node and consequently the entire network.
在设计阶段预测区块链应用程序的性能是困难的,并且在构建后进行评估可能是昂贵的。因此,在设计阶段模拟区块链网络以评估它的能力是必要的。在本文中,我们提出了一个区块链应用程序模拟器,称为SIMBA(模拟器为区块链应用程序)。SIMBA通过向区块链节点添加Merkle树功能来扩展现有的模拟器,以提高效率,并允许执行基本工具无法执行的更现实的评估。我们的实验结果表明,包含Merkle树可以在不影响块传播延迟的情况下将块交易的验证时间减少多达30倍。由于块验证是网络上节点计算负载的关键部分,因此这种性能改进会显著影响每个节点的整体性能,从而影响整个网络。
{"title":"SIMBA: An Efficient Simulator for Blockchain Applications","authors":"S. Fattahi, A. Makanju, A. M. Fard","doi":"10.1109/dsn-s50200.2020.00028","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00028","url":null,"abstract":"Predicting the performance of a blockchain application during the design phase is difficult and evaluation after it is built could be expensive. The ability to simulate a blockchain network during the design stage in order to evaluate it is therefore a necessity. In this paper, we present a simulator for blockchain applications, called SIMBA (SIMulator for Blockchain Applications). SIMBA extends an existing simulator by adding the Merkle tree feature to blockchain nodes to improve efficiency and allowing more realistic evaluations not possible with the base tool to be performed. Results of our experiments show that the inclusion of Merkle trees has a high impact of up to 30 times reduction in the verification time of block transactions without an impact on block propagation delay. Since block verification is a critical part of the computational load of nodes on the network, this performance improvement significantly affects the overall performance of each node and consequently the entire network.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133250238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cross-Layer Soft-Error Resilience Analysis of Computing Systems 计算系统的跨层软错误弹性分析
A. Bosio, R. Canal, S. Carlo, D. Gizopoulos, A. Savino
In a world with computation at the epicenter of every activity, computing systems must be highly resilient to errors even if miniaturization makes the underlying hardware unreliable. Techniques able to guarantee high reliability are associated to high costs. Early resilience analysis has the potential to support informed design decisions to maximize system-level reliability while minimizing the associated costs. This tutorial focuses on early cross-layer (hardware and software) resilience analysis considering the full computing continuum (from IoT/CPS to HPC applications) with emphasis on soft errors.
在每个活动都以计算为中心的世界中,即使小型化使底层硬件不可靠,计算系统也必须对错误具有高度的弹性。能够保证高可靠性的技术往往伴随着高成本。早期弹性分析有可能支持明智的设计决策,以最大化系统级可靠性,同时最小化相关成本。本教程侧重于考虑完整计算连续体(从IoT/CPS到HPC应用程序)的早期跨层(硬件和软件)弹性分析,重点是软错误。
{"title":"Cross-Layer Soft-Error Resilience Analysis of Computing Systems","authors":"A. Bosio, R. Canal, S. Carlo, D. Gizopoulos, A. Savino","doi":"10.1109/dsn-s50200.2020.00042","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00042","url":null,"abstract":"In a world with computation at the epicenter of every activity, computing systems must be highly resilient to errors even if miniaturization makes the underlying hardware unreliable. Techniques able to guarantee high reliability are associated to high costs. Early resilience analysis has the potential to support informed design decisions to maximize system-level reliability while minimizing the associated costs. This tutorial focuses on early cross-layer (hardware and software) resilience analysis considering the full computing continuum (from IoT/CPS to HPC applications) with emphasis on soft errors.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117205900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Monitor as Key Architecture Element for Safe Self-Driving Cars 监视器是安全自动驾驶汽车的关键架构元素
Ayhan Mehmed, Moritz Antlanger, W. Steiner
While research in self-driving cars continuous to boom, research of their dependability aspects is only emerging. In particular, trade-off studies on fault-tolerant architectures for safe self-driving cars are largely missing, but desperately needed by the automotive industry. In this paper we give a brief overview of some possible architecture designs, and argue in favour of those architectures that implement a monitor element. We also formulate open research questions with respect to monitor construction and permissible interfaces from the monitor to other elements that constitute the architecture.
虽然对自动驾驶汽车的研究持续蓬勃发展,但对其可靠性方面的研究才刚刚兴起。特别是,关于安全自动驾驶汽车容错架构的权衡研究在很大程度上是缺失的,但这是汽车行业迫切需要的。在本文中,我们简要概述了一些可能的体系结构设计,并对那些实现监视器元素的体系结构进行了论证。我们还制定了关于监视器结构和监视器与构成体系结构的其他元素的允许接口的开放式研究问题。
{"title":"The Monitor as Key Architecture Element for Safe Self-Driving Cars","authors":"Ayhan Mehmed, Moritz Antlanger, W. Steiner","doi":"10.1109/dsn-s50200.2020.00015","DOIUrl":"https://doi.org/10.1109/dsn-s50200.2020.00015","url":null,"abstract":"While research in self-driving cars continuous to boom, research of their dependability aspects is only emerging. In particular, trade-off studies on fault-tolerant architectures for safe self-driving cars are largely missing, but desperately needed by the automotive industry. In this paper we give a brief overview of some possible architecture designs, and argue in favour of those architectures that implement a monitor element. We also formulate open research questions with respect to monitor construction and permissible interfaces from the monitor to other elements that constitute the architecture.","PeriodicalId":419045,"journal":{"name":"2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114405594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1