首页 > 最新文献

Cyber Security and Resiliency Policy Framework最新文献

英文 中文
Cyber Security Issues of Telecommunication Infrastructure 电信基础设施的网络安全问题
Pub Date : 2014-10-01 DOI: 10.3233/978-1-61499-446-6-18
A. Risteski, M. Bogdanoski, Marjan Stoilkovski, M. Jovanovic
We live in a well connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisted of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create well designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them has defined more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing. Their creation and devoted implementation would be beneficial for all stakeholders resulting in more effective and less expensive solutions as a response to cyber attacks
我们生活在一个互联互通、依赖科技的世界。人们、机构、公司在日常生活中对沟通的需求越来越大。当今的全球无缝连接是由复杂的电信基础设施实现的,这些基础设施由各种不同的技术组成,这些技术处于不断发展和创新的过程中。但是,全球连接和对现代技术的轻松访问也使恶意用户及其活动成为可能。这些活动可能具有不同的性质:从被动监测到破坏性攻击,使信息和通信技术基础设施无法正常运作。因此,电信基础设施的安全问题必须由所有相关利益相关者彻底解决。虽然每种技术都包含一定的安全机制,但有必要为整个基础设施创建设计良好的安全概念,不仅要考虑技术问题,还要考虑策略框架和法律方面的问题。这一概念必须不断加以修订,以适应当前的威胁。因此,必须始终对网络基础设施进行监控和分析,以便创建有效的措施来应对安全威胁。马其顿共和国的电信基础设施由国家机构、电信运营商和供应商、其他公司和大学等拥有和经营。它们都面临着大量的恶意活动和利用系统漏洞的攻击,这些活动和攻击都得到了很好的监控和统计分析。同时,他们都定义了或多或少有效的安全概念,包括主动和被动的措施。然而,各主体之间缺乏一种共同的合作和交流信息和经验的做法。国家战略和政策框架也缺失。它们的创建和投入实施将有利于所有利益相关者,从而为应对网络攻击提供更有效、成本更低的解决方案
{"title":"Cyber Security Issues of Telecommunication Infrastructure","authors":"A. Risteski, M. Bogdanoski, Marjan Stoilkovski, M. Jovanovic","doi":"10.3233/978-1-61499-446-6-18","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-18","url":null,"abstract":"We live in a well connected and technology dependent world. People, institutions, companies have increasing need for communication in everyday life. Global and seamless connectivity today is enabled by complex telecommunications infrastructure consisted of a large variety of different technologies which are in a continuous process of development and innovations. But, the global connectivity and easy access to modern technology also enables malicious users and their activities. These activities might be of different nature: starting from passive monitoring to destructive attacks disabling the normal operation of ICT (information and communication technology) infrastructure. Therefore, security issues of telecommunication infrastructure must be thoroughly addressed by all relevant stakeholders. Although each technology includes certain security mechanisms, it is necessary to create well designed security concept for the infrastructure as a whole, taking into consideration not only the technical issues, but also policy framework and legal aspects. The concept must be a subject of constant revision in order to be up to date to current threats. Therefore, the network infrastructure must be always monitored and analyzed, in order to create efficient measures against the security threats. The telecommunication infrastructure in the Republic of Macedonia is owned and operated by state institutions, telecom operators and providers, other companies and universities etc. All of them are faced with number of malicious activities and attacks exploiting vulnerabilities of the systems, which are well monitored and statistically analyzed. Also, all of them has defined more or less effective security concept including proactive and reactive measures. However, a common practice of cooperation and exchange of information and experience among the subjects is missing. A national strategy and policy framework are also missing. Their creation and devoted implementation would be beneficial for all stakeholders resulting in more effective and less expensive solutions as a response to cyber attacks","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of Defense-Oriented Application Software under Fire: The Case of Israel 炮火下面向防御的应用软件开发:以以色列为例
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-115
Galit M. Ben-Israel
{"title":"Development of Defense-Oriented Application Software under Fire: The Case of Israel","authors":"Galit M. Ben-Israel","doi":"10.3233/978-1-61499-446-6-115","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-115","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121046449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengthening Cyber Security Policy by Means of End-Users Dedicated Training 通过终端用户专项培训加强网络安全政策
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-49
G. Margarov
{"title":"Strengthening Cyber Security Policy by Means of End-Users Dedicated Training","authors":"G. Margarov","doi":"10.3233/978-1-61499-446-6-49","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-49","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"67 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126021616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Government 3 Web Security Issues: Who, What, When? 电子政务3网络安全问题:谁,什么,何时?
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-11
Milan Maric
{"title":"E-Government 3 Web Security Issues: Who, What, When?","authors":"Milan Maric","doi":"10.3233/978-1-61499-446-6-11","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-11","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131648671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps 利用监测系统和脆弱性地图保护和保存地下水
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-135
K. Papatheodorou, K. Evangelidis
As Ground Water (GW) is a natural resource of vital importance, it’s protection against all types of threats can be considered as an absolute necessity. GW as a natural source can be effectively protected and managed using GW monitoring systems provided that, when developing such a system for a specific area of implementation, certain conditions are met and parameters are taken into account including GW recharge conditions, hydrogeological regime, land uses and GW vulnerability from surface pollution (as GW is often hydraulically connected to surface and surface water). To assess those parameters, reliable and accurate data are needed. The acquisition of such required data, regarding their economic cost and time needed, poses obstacles sometimes difficult to overcome. At this point, contemporary technologies as Geographic Information Systems (GIS) and Remote Sensing (RS) can provide solutions. In the present paper, a combination of case studies including the identification and delineation of GW recharge areas using RS, the GW vulnerability assessment using GIS and the development of a Web based GW monitoring system that can also be used as an early warning system for GW protection, is presented. The methodologies proposed have been tested in various areas of Northern Greece providing reliable results at minimal costs. Their combined application can provide the tools to constantly monitor GW quality, to detect GW pollution at a very early stage, to select and apply remediation measures and to continuously rate them, to detect pollution sources, to support decision making regarding land uses, to help raise public awareness and overall, to ensure GW protection and sustainability.
由于地下水(GW)是一种至关重要的自然资源,它的保护对所有类型的威胁可以被认为是绝对必要的。GW作为一种自然资源,可以使用GW监测系统进行有效的保护和管理,前提是在为特定实施区域开发此类系统时,满足一定的条件并考虑到某些参数,包括GW补给条件、水文地质制度、土地利用和GW对地表污染的脆弱性(因为GW通常与地表水和地表水通过水力连接)。为了评估这些参数,需要可靠和准确的数据。就其经济成本和所需时间而言,获取这些必要的数据有时构成难以克服的障碍。在这一点上,地理信息系统(GIS)和遥感(RS)等当代技术可以提供解决方案。本文结合案例研究,介绍了利用遥感技术识别和划定GW补给区、利用GIS技术进行GW脆弱性评估以及开发基于Web的GW监测系统,该系统可作为GW保护预警系统。提出的方法已在希腊北部的各个地区进行了测试,以最低的成本提供了可靠的结果。它们的综合应用可以为持续监测GW质量提供工具,在早期阶段检测GW污染,选择和应用修复措施并对其进行持续评级,检测污染源,支持有关土地使用的决策,帮助提高公众意识,总体上确保GW的保护和可持续性。
{"title":"Protecting and Preserving Ground Water with Monitoring Systems and Vulnerability Maps","authors":"K. Papatheodorou, K. Evangelidis","doi":"10.3233/978-1-61499-446-6-135","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-135","url":null,"abstract":"As Ground Water (GW) is a natural resource of vital importance, it’s protection against all types of threats can be considered as an absolute necessity. GW as a natural source can be effectively protected and managed using GW monitoring systems provided that, when developing such a system for a specific area of implementation, certain conditions are met and parameters are taken into account including GW recharge conditions, hydrogeological regime, land uses and GW vulnerability from surface pollution (as GW is often hydraulically connected to surface and surface water). To assess those parameters, reliable and accurate data are needed. The acquisition of such required data, regarding their economic cost and time needed, poses obstacles sometimes difficult to overcome. At this point, contemporary technologies as Geographic Information Systems (GIS) and Remote Sensing (RS) can provide solutions. In the present paper, a combination of case studies including the identification and delineation of GW recharge areas using RS, the GW vulnerability assessment using GIS and the development of a Web based GW monitoring system that can also be used as an early warning system for GW protection, is presented. The methodologies proposed have been tested in various areas of Northern Greece providing reliable results at minimal costs. Their combined application can provide the tools to constantly monitor GW quality, to detect GW pollution at a very early stage, to select and apply remediation measures and to continuously rate them, to detect pollution sources, to support decision making regarding land uses, to help raise public awareness and overall, to ensure GW protection and sustainability.","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122636958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body 概述波斯尼亚和黑塞哥维那的现状,重点是网络安全和打击网络犯罪,建立了波黑CERT机构
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-65
Sabina Baraković, Mladen Mrkaja, A. Husic, Adnan Kulovac, J. Barakovic
{"title":"Overview of the Current Situation in Bosnia and Herzegovina with Focus on Cyber Security and Fighting Cyber-Crime by Establishment of BIH CERT Body","authors":"Sabina Baraković, Mladen Mrkaja, A. Husic, Adnan Kulovac, J. Barakovic","doi":"10.3233/978-1-61499-446-6-65","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-65","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia 迈向有效的国家网络安全战略:马其顿的前进之路
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-57
M. Hadji-Janev
{"title":"Toward Effective National Cyber Security Strategy: The Path Forward For Macedonia","authors":"M. Hadji-Janev","doi":"10.3233/978-1-61499-446-6-57","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-57","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131376675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Education as a Long-Term Strategy for Cyber Security 教育是网络安全的长期战略
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-127
P. Pale
Most of strategies and policies for cyber security are in essence reactive since they devise (counter) measures for known problems or quantitative forecasts of known problems. A long term strategy should predict new problems qualitatively. The problem with cyber security stems from the fact that cyberspace will invade physical space almost completely, including human bodies ; that the speed of changes in the way people live and work ; as well as emergence of new, related security problems, is accelerating while legislative and technical counter measures merely react on detected problems and that critical mass of humans which should recognize risks, dangers and attacks, does not and will not have required knowledge and skills. In addition everybody is potentially harmful for cyber security due to his/her ignorance or to mere statistical probability for a mistake given the fact of huge number of human-machine interactions in a unit of time and human nature being unsuitable for multiple, simultaneous routine tasks. While short term strategies have to rely on development and deployment of technical means for supervision and protection of systems, (re)defining the legal framework and creating and nurturing the (new) body of cyber law enforcement, a long term strategy is also needed. It has to focus on accelerated and prompt education and awareness rising in all age groups, literally from kindergarten to retirement. This education has to be mandatory in all school systems and within the working environment in the framework of occupational safety. It has to be a major component of everyone’s continuous, lifelong education. In order to support this strategy, national centers for awareness rising and broad education should be established, strongly linked with academia both because of academia’s deep insight in cyber security development and its involvement in development of educational methods and tools. The long term strategy has to evolve new culture of self preservation as well as community (self) care and preservation providing visible and omnipresent emergency response focal points. This long term strategy needs to be devised urgently and put in operation in parallel with short term strategies.
大多数网络安全战略和政策本质上是被动的,因为它们针对已知问题设计(反)措施或对已知问题的定量预测。长期战略应该定性地预测新问题。网络安全的问题源于这样一个事实:网络空间将几乎完全侵入物理空间,包括人体;人们生活和工作方式的变化速度;新的相关安全问题正在加速出现,而立法和技术对策只是对发现的问题作出反应,而应该认识到风险、危险和攻击的关键人群没有也不会具备所需的知识和技能。此外,每个人都可能对网络安全造成潜在危害,因为他/她的无知,或者仅仅是一个错误的统计概率,因为在一个单位时间内有大量的人机交互,而且人类的本性不适合同时进行多个常规任务。虽然短期战略必须依赖于开发和部署技术手段来监督和保护系统,(重新)定义法律框架,创建和培育(新的)网络执法机构,但也需要一个长期战略。它必须把重点放在加速和迅速地提高所有年龄组的教育和意识上,从幼儿园到退休。在所有学校系统和职业安全框架内的工作环境中,这种教育必须是强制性的。它必须成为每个人持续终身教育的重要组成部分。为了支持这一战略,应该建立国家意识提升和广泛教育中心,并与学术界紧密联系,因为学术界对网络安全发展有深刻的见解,并且参与了教育方法和工具的开发。长期战略必须发展自我保护以及社区(自我)护理和保护的新文化,提供可见和无处不在的应急反应协调中心。需要紧急制定这一长期战略,并与短期战略同时实施。
{"title":"Education as a Long-Term Strategy for Cyber Security","authors":"P. Pale","doi":"10.3233/978-1-61499-446-6-127","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-127","url":null,"abstract":"Most of strategies and policies for cyber security are in essence reactive since they devise (counter) measures for known problems or quantitative forecasts of known problems. A long term strategy should predict new problems qualitatively. The problem with cyber security stems from the fact that cyberspace will invade physical space almost completely, including human bodies ; that the speed of changes in the way people live and work ; as well as emergence of new, related security problems, is accelerating while legislative and technical counter measures merely react on detected problems and that critical mass of humans which should recognize risks, dangers and attacks, does not and will not have required knowledge and skills. In addition everybody is potentially harmful for cyber security due to his/her ignorance or to mere statistical probability for a mistake given the fact of huge number of human-machine interactions in a unit of time and human nature being unsuitable for multiple, simultaneous routine tasks. While short term strategies have to rely on development and deployment of technical means for supervision and protection of systems, (re)defining the legal framework and creating and nurturing the (new) body of cyber law enforcement, a long term strategy is also needed. It has to focus on accelerated and prompt education and awareness rising in all age groups, literally from kindergarten to retirement. This education has to be mandatory in all school systems and within the working environment in the framework of occupational safety. It has to be a major component of everyone’s continuous, lifelong education. In order to support this strategy, national centers for awareness rising and broad education should be established, strongly linked with academia both because of academia’s deep insight in cyber security development and its involvement in development of educational methods and tools. The long term strategy has to evolve new culture of self preservation as well as community (self) care and preservation providing visible and omnipresent emergency response focal points. This long term strategy needs to be devised urgently and put in operation in parallel with short term strategies.","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123035587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames 网络安全-威胁情景,政策框架和网络战争游戏
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-1
Ashok Vaseashta, P. Susmann, E. Braman
{"title":"Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames","authors":"Ashok Vaseashta, P. Susmann, E. Braman","doi":"10.3233/978-1-61499-446-6-1","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-1","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133732126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Turkey's Approaches on Cyber Security Policy Framework 土耳其在网络安全政策框架上的做法
Pub Date : 1900-01-01 DOI: 10.3233/978-1-61499-446-6-82
N. Baykal
{"title":"Turkey's Approaches on Cyber Security Policy Framework","authors":"N. Baykal","doi":"10.3233/978-1-61499-446-6-82","DOIUrl":"https://doi.org/10.3233/978-1-61499-446-6-82","url":null,"abstract":"","PeriodicalId":437935,"journal":{"name":"Cyber Security and Resiliency Policy Framework","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125074650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cyber Security and Resiliency Policy Framework
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1