Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356378
W. Blair, Aspen Olmsted, Paul E. Anderson
In this paper, we compare the performance and ease of use of an Apache Spark application deployed via Docker and alternatively via KVM. Docker containers have rapidly grown in popularity for dynamic cloud computing and for general-use application deployment and collaboration. Recent work comparing the performance of Docker versus VM deployments has found that Docker's reduced overhead results in better performance. We compare Docker versus VM deployments of an Apache Spark application in regard to ease of use in a collaborative development environment. We expect that developing the application in a containerized environment will result in fewer post-deployment tests that fail compared to application versions that are developed in non-virtual or VM environments. Future work will closely examine the performance of these two implementations and more generally investigate potential trade-offs between performance and ease of use.
{"title":"Docker vs. KVM: Apache spark application performance and ease of use","authors":"W. Blair, Aspen Olmsted, Paul E. Anderson","doi":"10.23919/ICITST.2017.8356378","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356378","url":null,"abstract":"In this paper, we compare the performance and ease of use of an Apache Spark application deployed via Docker and alternatively via KVM. Docker containers have rapidly grown in popularity for dynamic cloud computing and for general-use application deployment and collaboration. Recent work comparing the performance of Docker versus VM deployments has found that Docker's reduced overhead results in better performance. We compare Docker versus VM deployments of an Apache Spark application in regard to ease of use in a collaborative development environment. We expect that developing the application in a containerized environment will result in fewer post-deployment tests that fail compared to application versions that are developed in non-virtual or VM environments. Future work will closely examine the performance of these two implementations and more generally investigate potential trade-offs between performance and ease of use.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356383
Andrew Bissada, Aspen Olmsted
Security has always been an important topic when it comes to the communication of sensitive data. With hardware advances allowing users the advantage of accessibility used in mobile devices, individuals are now spending more and more time on these devices. Additionally, with the viral popularity of social media applications and single sign-on, users do not always take as many precautions as needed with their information. Multi-factor authentication creates more and varied walls to block out the wrong people from seeing your information. Three-factor authentication can be applied to mobile devices as the first factor is already built in.
{"title":"Mobile multi-factor authentication","authors":"Andrew Bissada, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356383","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356383","url":null,"abstract":"Security has always been an important topic when it comes to the communication of sensitive data. With hardware advances allowing users the advantage of accessibility used in mobile devices, individuals are now spending more and more time on these devices. Additionally, with the viral popularity of social media applications and single sign-on, users do not always take as many precautions as needed with their information. Multi-factor authentication creates more and varied walls to block out the wrong people from seeing your information. Three-factor authentication can be applied to mobile devices as the first factor is already built in.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125395399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356419
Prathap Siddavaatam, R. Sedaghat, A. Sharma
Over the last decade, the field of Wireless Sensor Networks (WSNs) has made expansive strides in the area of Radio Communication Systems. A vast majority of these systems are deployed in failure-prone environments which results in chronic communication losses due to unreliable wireless connections, malicious attacks and resource-constrained features. Hence WSNs necessitate adaptive protocol frameworks applicable for differing network densities either as sparse or denser deployments. One of the major challenges in WSNs is to achieve an optimal trade-off between data precision and energy efficiency of a sensor node from the perspective of network longevity. In this article, we propose an optimized protocol intel-LEACH for selecting high yield nodes among randomly deployed sensor nodes based on dynamic optimization strategy. Our proposed model selects a node that can guarantee higher data precision and has maximal residual energy to serve as a cluster head (CH). Meanwhile, the others sensor nodes apart from CHs must also exhibit capability in terms of data transmission accuracy to join a given cluster irrespective of the distance between the sensor nodes and CHs. Thus our model minimizes loss of high yield nodes for every round and overall WSN performance is boosted by its network lifetime extension.
{"title":"intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks","authors":"Prathap Siddavaatam, R. Sedaghat, A. Sharma","doi":"10.23919/ICITST.2017.8356419","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356419","url":null,"abstract":"Over the last decade, the field of Wireless Sensor Networks (WSNs) has made expansive strides in the area of Radio Communication Systems. A vast majority of these systems are deployed in failure-prone environments which results in chronic communication losses due to unreliable wireless connections, malicious attacks and resource-constrained features. Hence WSNs necessitate adaptive protocol frameworks applicable for differing network densities either as sparse or denser deployments. One of the major challenges in WSNs is to achieve an optimal trade-off between data precision and energy efficiency of a sensor node from the perspective of network longevity. In this article, we propose an optimized protocol intel-LEACH for selecting high yield nodes among randomly deployed sensor nodes based on dynamic optimization strategy. Our proposed model selects a node that can guarantee higher data precision and has maximal residual energy to serve as a cluster head (CH). Meanwhile, the others sensor nodes apart from CHs must also exhibit capability in terms of data transmission accuracy to join a given cluster irrespective of the distance between the sensor nodes and CHs. Thus our model minimizes loss of high yield nodes for every round and overall WSN performance is boosted by its network lifetime extension.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132160256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356388
R. Utomo, R. Walters, G. Wills
Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuity in the event of an incident. Accordingly, in the implementation of eGovernment, information assurance (IA) should be considered. In Indonesia, the implementation of eGovernment is still in the early stage according to the eGovernment roadmap of Indonesia. However, there is no study so far that has focused on IA for eGovernment in Indonesia. Therefore, research on a framework of IA is needed to support the implementation of eGovernment in Indonesia. The aim of this research is to develop an IA framework for eGovernment within the Indonesian context. The development of the framework is divided into four stages, which are identifying the factors from IA international standards for organisations, determining success factors from literature, identifying the challenges, and evaluating and harmonising all the factors categorised into three categories. This research proposes an IA framework, which is expected to assist eGovernment implementation in Indonesia.
{"title":"Factors affecting the implementation of information assurance for eGovernment in Indonesia","authors":"R. Utomo, R. Walters, G. Wills","doi":"10.23919/ICITST.2017.8356388","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356388","url":null,"abstract":"Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuity in the event of an incident. Accordingly, in the implementation of eGovernment, information assurance (IA) should be considered. In Indonesia, the implementation of eGovernment is still in the early stage according to the eGovernment roadmap of Indonesia. However, there is no study so far that has focused on IA for eGovernment in Indonesia. Therefore, research on a framework of IA is needed to support the implementation of eGovernment in Indonesia. The aim of this research is to develop an IA framework for eGovernment within the Indonesian context. The development of the framework is divided into four stages, which are identifying the factors from IA international standards for organisations, determining success factors from literature, identifying the challenges, and evaluating and harmonising all the factors categorised into three categories. This research proposes an IA framework, which is expected to assist eGovernment implementation in Indonesia.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356389
Chatipot Srimuang, N. Cooharojananone, U. Tanlamai, A. Chandrachai, K. Atchariyachanvanich
Open Government Data (OGD) project can help citizen to better understand government administrations. In the open data initiatives. Thailand is now in the process of providing a draft OGD country roadmap. This paper, we develop OGD assessment application based on our developed assessment model and test the application acceptance. The developed assessment model consists of nine components which include the enterprise architecture as a new the assessment component. The enterprise architecture is now becoming the key activity to transform the digital government. Therefore, to enhance the user experience in assessment, the web-based application is developed. Testing the application acceptance by using Technology Acceptance Model (TAM). The data were collected from 30 public organizations. The result shows that most public organizations intend to use the application proposed model.
{"title":"The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM","authors":"Chatipot Srimuang, N. Cooharojananone, U. Tanlamai, A. Chandrachai, K. Atchariyachanvanich","doi":"10.23919/ICITST.2017.8356389","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356389","url":null,"abstract":"Open Government Data (OGD) project can help citizen to better understand government administrations. In the open data initiatives. Thailand is now in the process of providing a draft OGD country roadmap. This paper, we develop OGD assessment application based on our developed assessment model and test the application acceptance. The developed assessment model consists of nine components which include the enterprise architecture as a new the assessment component. The enterprise architecture is now becoming the key activity to transform the digital government. Therefore, to enhance the user experience in assessment, the web-based application is developed. Testing the application acceptance by using Technology Acceptance Model (TAM). The data were collected from 30 public organizations. The result shows that most public organizations intend to use the application proposed model.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123389513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356447
Kouya Tochikubo
We propose a new secret sharing scheme realizing general access structures, which is based on unauthorized subsets. In the proposed scheme, shares are generated by Tassa's (k, n)-hierarchical threshold scheme. The proposed scheme can reduce the number of shares distributed to each participant.
{"title":"Multiple assignment secret sharing scheme using hierarchical threshold scheme","authors":"Kouya Tochikubo","doi":"10.23919/ICITST.2017.8356447","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356447","url":null,"abstract":"We propose a new secret sharing scheme realizing general access structures, which is based on unauthorized subsets. In the proposed scheme, shares are generated by Tassa's (k, n)-hierarchical threshold scheme. The proposed scheme can reduce the number of shares distributed to each participant.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356435
W. P. Yuen, K. B. Chuah
This Cloud computing is a pervasive technology and has been a platform in IT for several years. Cloud service providers (CSP) have developed and offered different service platforms to accommodate different needs of enterprise subscribers. However, there still exists the situation of enterprise customers' hesitation and reluctance to deploy their core applications using cloud service platforms. Our survey results show that security is the perceived major concern of existing and prospective enterprise customers of cloud services. The research investigates the trust between enterprise customers and cloud service provider with regards to the perceived security of cloud services. Enterprise customers expected to be reassured of cloud service security in a more visible way from cloud service provider. The perception of data security in cloud computing platform can be enhanced by data visibility. The term data visibility has been widely used in the IT industry especially from ICT product and solution vendors. However, there is no common practice guideline or standard in industry. This paper defines the characteristic and elements of data visibility and proposes a model and architecture as best practice reference for the industry. We expect that the enhancement of data visibility can earn the trust of enterprise customers in adopting public cloud services.
{"title":"Data visibility and trust enhancement of enterprise customers in cloud computing services","authors":"W. P. Yuen, K. B. Chuah","doi":"10.23919/ICITST.2017.8356435","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356435","url":null,"abstract":"This Cloud computing is a pervasive technology and has been a platform in IT for several years. Cloud service providers (CSP) have developed and offered different service platforms to accommodate different needs of enterprise subscribers. However, there still exists the situation of enterprise customers' hesitation and reluctance to deploy their core applications using cloud service platforms. Our survey results show that security is the perceived major concern of existing and prospective enterprise customers of cloud services. The research investigates the trust between enterprise customers and cloud service provider with regards to the perceived security of cloud services. Enterprise customers expected to be reassured of cloud service security in a more visible way from cloud service provider. The perception of data security in cloud computing platform can be enhanced by data visibility. The term data visibility has been widely used in the IT industry especially from ICT product and solution vendors. However, there is no common practice guideline or standard in industry. This paper defines the characteristic and elements of data visibility and proposes a model and architecture as best practice reference for the industry. We expect that the enhancement of data visibility can earn the trust of enterprise customers in adopting public cloud services.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356448
Husna Siddiqui, Elizabeth Healy, Aspen Olmsted
In recent years, Twitter, a social networking website, has been affected by a steady rise in spam on its network. Hijacking of social media accounts has become a modern-day danger. Motivations for this can range from attempts in identity theft to simply skewing the perception of an audience. In this paper, we extend our previous work, Engineering Your Social Network to Detect Fraudulent Profiles, by doing an investigation of spam bots on Twitter. We propose an algorithm that will distinguish a spam bot, from a genuine user account by using a JavaScript testing framework that consumes Twitter's REST API. We ran a dataset of 700 Twitter accounts through our algorithm and identified that roughly 11% of the dataset were bots.
{"title":"Bot or not","authors":"Husna Siddiqui, Elizabeth Healy, Aspen Olmsted","doi":"10.23919/ICITST.2017.8356448","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356448","url":null,"abstract":"In recent years, Twitter, a social networking website, has been affected by a steady rise in spam on its network. Hijacking of social media accounts has become a modern-day danger. Motivations for this can range from attempts in identity theft to simply skewing the perception of an audience. In this paper, we extend our previous work, Engineering Your Social Network to Detect Fraudulent Profiles, by doing an investigation of spam bots on Twitter. We propose an algorithm that will distinguish a spam bot, from a genuine user account by using a JavaScript testing framework that consumes Twitter's REST API. We ran a dataset of 700 Twitter accounts through our algorithm and identified that roughly 11% of the dataset were bots.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130477162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356352
Roman Graf, Ross King
Modern critical infrastructures are increasingly targeted by highly sophisticated cyber attacks and are protected by increasingly complex tools. Cyber analysts face many challenges finding relevant information in large, complex data sets, and require novel distributed detection and reaction methodologies based on secured transaction techniques. These technologies should automatically analyse incident report and share analysis result in secure way between critical infrastructure stakeholders to achieve better situational awareness. Our goal is to provide solutions in real-time that could replace human input for cyber incident analysis tasks (Triage) to remove false positives and to eliminate irrelevant information. The effective and fast warning system should support cyber analyst to establish cyber situational awareness, and allow analysts to promptly respond in case of an attack. In this paper we evaluate the application of so-called “smart contracts” to an incident warning system and assess its accuracy and performance. We demonstrate how the presented techniques can be applied to support incident handling tasks performed by security operation centers. We show that a real-time “smart contracts” solution can replace human input for a large number of threat intelligence analysis tasks.
{"title":"Secured transactions technique based on smart contracts for situational awareness tools","authors":"Roman Graf, Ross King","doi":"10.23919/ICITST.2017.8356352","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356352","url":null,"abstract":"Modern critical infrastructures are increasingly targeted by highly sophisticated cyber attacks and are protected by increasingly complex tools. Cyber analysts face many challenges finding relevant information in large, complex data sets, and require novel distributed detection and reaction methodologies based on secured transaction techniques. These technologies should automatically analyse incident report and share analysis result in secure way between critical infrastructure stakeholders to achieve better situational awareness. Our goal is to provide solutions in real-time that could replace human input for cyber incident analysis tasks (Triage) to remove false positives and to eliminate irrelevant information. The effective and fast warning system should support cyber analyst to establish cyber situational awareness, and allow analysts to promptly respond in case of an attack. In this paper we evaluate the application of so-called “smart contracts” to an incident warning system and assess its accuracy and performance. We demonstrate how the presented techniques can be applied to support incident handling tasks performed by security operation centers. We show that a real-time “smart contracts” solution can replace human input for a large number of threat intelligence analysis tasks.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"342 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134357532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-01DOI: 10.23919/ICITST.2017.8356454
Keshnee Padayachee, Elias Worku
The role of participatory reportage and awareness-raising in the process of Information Security Incident Management (ISIM) has been identified as a critical approach towards proactive information security in organizations. Studies show that reporting, communication and awareness processes are fragmented and imprecise. This paper presents a review and discussion of the concept of Shared Situational Awareness towards addressing this concern. Based on this review of extant literature, this paper aims to propose a conceptual model combining the planned and participatory reporting and awareness mechanisms of Shared Situational Awareness in organizations, towards improving the process of ISIM.
{"title":"Shared situational awareness in information security incident management","authors":"Keshnee Padayachee, Elias Worku","doi":"10.23919/ICITST.2017.8356454","DOIUrl":"https://doi.org/10.23919/ICITST.2017.8356454","url":null,"abstract":"The role of participatory reportage and awareness-raising in the process of Information Security Incident Management (ISIM) has been identified as a critical approach towards proactive information security in organizations. Studies show that reporting, communication and awareness processes are fragmented and imprecise. This paper presents a review and discussion of the concept of Shared Situational Awareness towards addressing this concern. Based on this review of extant literature, this paper aims to propose a conceptual model combining the planned and participatory reporting and awareness mechanisms of Shared Situational Awareness in organizations, towards improving the process of ISIM.","PeriodicalId":440665,"journal":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}