首页 > 最新文献

Journal of Cybersecurity最新文献

英文 中文
A systematic literature review on advanced persistent threat behaviors and its detection strategy 关于高级持续性威胁行为及其检测策略的系统文献综述
IF 3.9 Q1 Social Sciences Pub Date : 2024-01-02 DOI: 10.1093/cybsec/tyad023
Nur Ilzam Che Mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah
Advanced persistent threats (APTs) pose significant security-related challenges to organizations owing to their sophisticated and persistent nature, and are inimical to the confidentiality, integrity, and availability of organizational information and services. This study systematically reviews the literature on methods of detecting APTs by comprehensively surveying research in the area, identifying gaps in the relevant studies, and proposing directions for future work. The authors provide a detailed analysis of current methods of APT detection that are based on multi-stage attack-related behaviors. We adhered to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines and conducted an extensive search of a variety of databases. A total of 45 studies, encompassing sources from both academia and the industry, were considered in the final analysis. The findings reveal that APTs have the capability to laterally propagate and achieve their objectives by identifying and exploiting existing systemic vulnerabilities. By identifying shortcomings in prevalent methods of APT detection, we propose integrating the multi-stage attack-related behaviors of APTs with the assessment of the presence of vulnerabilities in the network and their susceptibility to being exploited in order to improve the accuracy of their identification. Such an improved approach uses vulnerability scores and probability metrics to determine the probable sequence of targeted nodes, and visualizes the path of APT attacks. This technique of advanced detection enables the early identification of the most likely targets, which, in turn, allows for the implementation of proactive measures to prevent the network from being further compromised. The research here contributes to the literature by highlighting the importance of integrating multi-stage attack-related behaviors, vulnerability assessment, and techniques of visualization for APT detection to enhance the overall security of organizations.
高级持续性威胁(APT)因其复杂性和持续性,对组织机构的信息和服务的保密性、完整性和可用性构成了重大的安全挑战。本研究通过全面调查该领域的研究,系统地回顾了有关 APT 检测方法的文献,找出了相关研究中的不足,并提出了未来工作的方向。作者详细分析了当前基于多阶段攻击相关行为的 APT 检测方法。我们遵循《系统综述和元分析首选报告项目》(PRISMA)指南,对各种数据库进行了广泛检索。最终分析共考虑了 45 项研究,包括来自学术界和工业界的研究。研究结果表明,APT 有能力横向传播,并通过识别和利用现有的系统漏洞来实现其目标。通过发现 APT 检测方法的不足之处,我们建议将 APT 的多阶段攻击行为与评估网络中存在的漏洞及其被利用的敏感性结合起来,以提高其识别的准确性。这种改进方法使用漏洞评分和概率度量来确定目标节点的可能序列,并将 APT 攻击路径可视化。这种先进的检测技术可以及早识别出最有可能的目标,进而采取主动措施,防止网络被进一步入侵。本文的研究强调了将多阶段攻击相关行为、漏洞评估和可视化技术整合到 APT 检测中以增强组织整体安全性的重要性,从而为相关文献做出了贡献。
{"title":"A systematic literature review on advanced persistent threat behaviors and its detection strategy","authors":"Nur Ilzam Che Mat, Norziana Jamil, Yunus Yusoff, Miss Laiha Mat Kiah","doi":"10.1093/cybsec/tyad023","DOIUrl":"https://doi.org/10.1093/cybsec/tyad023","url":null,"abstract":"Advanced persistent threats (APTs) pose significant security-related challenges to organizations owing to their sophisticated and persistent nature, and are inimical to the confidentiality, integrity, and availability of organizational information and services. This study systematically reviews the literature on methods of detecting APTs by comprehensively surveying research in the area, identifying gaps in the relevant studies, and proposing directions for future work. The authors provide a detailed analysis of current methods of APT detection that are based on multi-stage attack-related behaviors. We adhered to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines and conducted an extensive search of a variety of databases. A total of 45 studies, encompassing sources from both academia and the industry, were considered in the final analysis. The findings reveal that APTs have the capability to laterally propagate and achieve their objectives by identifying and exploiting existing systemic vulnerabilities. By identifying shortcomings in prevalent methods of APT detection, we propose integrating the multi-stage attack-related behaviors of APTs with the assessment of the presence of vulnerabilities in the network and their susceptibility to being exploited in order to improve the accuracy of their identification. Such an improved approach uses vulnerability scores and probability metrics to determine the probable sequence of targeted nodes, and visualizes the path of APT attacks. This technique of advanced detection enables the early identification of the most likely targets, which, in turn, allows for the implementation of proactive measures to prevent the network from being further compromised. The research here contributes to the literature by highlighting the importance of integrating multi-stage attack-related behaviors, vulnerability assessment, and techniques of visualization for APT detection to enhance the overall security of organizations.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139373999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A close look at a systematic method for analyzing sets of security advice 仔细研究用于分析安全建议集的系统方法
IF 3.9 Q1 Social Sciences Pub Date : 2023-07-03 DOI: 10.1093/cybsec/tyad013
David Barrera, Christopher Bellman, Paul C van Oorschot
We carry out a detailed analysis of the security advice coding method (SAcoding) of Barrera et al., which is designed to analyze security advice in the sense of measuring actionability and categorizing advice items as practices, policies, principles, or outcomes. The main part of our analysis explores the extent to which a second coder’s assignment of codes to advice items agrees with that of a first, for a dataset of 1013 security advice items nominally addressing Internet of Things devices. More broadly, we seek a deeper understanding of the soundness and utility of the SAcoding method, and the degree to which it meets the design goal of reducing subjectivity in assigning codes to security advice items. Our analysis results in suggestions for modifications to the coding tree methodology, and some recommendations. We believe the coding tree approach may be of interest for analysis of qualitative data beyond security advice datasets alone.
我们对Barrera等人的安全建议编码方法(SAcoding)进行了详细的分析,该方法旨在从度量可操作性和将建议项目分类为实践、策略、原则或结果的意义上分析安全建议。我们分析的主要部分探讨了第二个编码员对建议项目的代码分配与第一个编码员的代码分配在多大程度上是一致的,对于1013个名义上处理物联网设备的安全建议项目的数据集。更广泛地说,我们寻求对编码方法的可靠性和实用性的更深入的理解,以及它在多大程度上满足了将代码分配给安全通知项时减少主观性的设计目标。我们的分析结果提出了修改编码树方法的建议,以及一些建议。我们相信编码树方法可能会对定性数据的分析产生兴趣,而不仅仅是安全建议数据集。
{"title":"A close look at a systematic method for analyzing sets of security advice","authors":"David Barrera, Christopher Bellman, Paul C van Oorschot","doi":"10.1093/cybsec/tyad013","DOIUrl":"https://doi.org/10.1093/cybsec/tyad013","url":null,"abstract":"We carry out a detailed analysis of the security advice coding method (SAcoding) of Barrera et al., which is designed to analyze security advice in the sense of measuring actionability and categorizing advice items as practices, policies, principles, or outcomes. The main part of our analysis explores the extent to which a second coder’s assignment of codes to advice items agrees with that of a first, for a dataset of 1013 security advice items nominally addressing Internet of Things devices. More broadly, we seek a deeper understanding of the soundness and utility of the SAcoding method, and the degree to which it meets the design goal of reducing subjectivity in assigning codes to security advice items. Our analysis results in suggestions for modifications to the coding tree methodology, and some recommendations. We believe the coding tree approach may be of interest for analysis of qualitative data beyond security advice datasets alone.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Juror interpretations of metadata and content information: implications for the going dark debate 元数据和内容信息的陪审员解释:暗化辩论的含义
IF 3.9 Q1 Social Sciences Pub Date : 2023-02-21 DOI: 10.1093/cybsec/tyad002
Anne E Boustead, Matthew B Kugler
The rise of consumer encryption has led to a fierce debate over whether the loss of potential evidence due to encryption will be offset by the increase in evidence available from electronic metadata. One major question raised by this debate is how jurors will interpret and value metadata as opposed to content information. Though there are plausible arguments in favor of the persuasive power of each type of evidence, to date no empirical study has examined how ordinary people, potential jurors, view each of these sorts of evidence. We address this issue through a series of survey experiments that present respondents with hypothetical criminal trials, randomly assigning them to descriptions featuring either metadata or content information. These studies show that the relative power of content and metadata information is highly contextual. Content information and metadata can be equally useful when conveying logically equivalent information. However, content information may be more persuasive where the defendant’s state of mind is critical, while metadata can more convincingly establish a pattern of behavior. This suggests that the rise of encryption will have a heterogeneous effect on criminal cases, with the direction of the effect depending on the facts that the prosecution must prove.
消费者加密技术的兴起引发了一场激烈的辩论,争论的焦点是,由于加密而失去的潜在证据是否会被电子元数据提供的证据的增加所抵消。这场辩论提出的一个主要问题是,陪审员将如何解释和评估元数据,而不是内容信息。尽管有一些貌似合理的论点支持每种证据的说服力,但迄今为止,还没有实证研究调查过普通人,即潜在的陪审员,是如何看待每种证据的。我们通过一系列调查实验来解决这个问题,这些实验向受访者提供假设的刑事审判,随机分配他们到具有元数据或内容信息的描述中。这些研究表明,内容和元数据信息的相对力量是高度相关的。在传递逻辑上等价的信息时,内容信息和元数据同样有用。然而,在被告的心理状态至关重要的情况下,内容信息可能更有说服力,而元数据可以更有说服力地建立一种行为模式。这表明,加密技术的兴起将对刑事案件产生不同的影响,影响的方向取决于检方必须证明的事实。
{"title":"Juror interpretations of metadata and content information: implications for the going dark debate","authors":"Anne E Boustead, Matthew B Kugler","doi":"10.1093/cybsec/tyad002","DOIUrl":"https://doi.org/10.1093/cybsec/tyad002","url":null,"abstract":"The rise of consumer encryption has led to a fierce debate over whether the loss of potential evidence due to encryption will be offset by the increase in evidence available from electronic metadata. One major question raised by this debate is how jurors will interpret and value metadata as opposed to content information. Though there are plausible arguments in favor of the persuasive power of each type of evidence, to date no empirical study has examined how ordinary people, potential jurors, view each of these sorts of evidence. We address this issue through a series of survey experiments that present respondents with hypothetical criminal trials, randomly assigning them to descriptions featuring either metadata or content information. These studies show that the relative power of content and metadata information is highly contextual. Content information and metadata can be equally useful when conveying logically equivalent information. However, content information may be more persuasive where the defendant’s state of mind is critical, while metadata can more convincingly establish a pattern of behavior. This suggests that the rise of encryption will have a heterogeneous effect on criminal cases, with the direction of the effect depending on the facts that the prosecution must prove.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning about simulated adversaries from human defenders using interactive cyber-defense games 通过互动网络防御游戏,从人类防御者那里了解模拟对手
Q1 Social Sciences Pub Date : 2023-01-01 DOI: 10.1093/cybsec/tyad022
Baptiste Prebot, Yinuo Du, Cleotilde Gonzalez
Abstract Given the increase in cybercrime, cybersecurity analysts (i.e. defenders) are in high demand. Defenders must monitor an organization’s network to evaluate threats and potential breaches into the network. Adversary simulation is commonly used to test defenders’ performance against known threats to organizations. However, it is unclear how effective this training process is in preparing defenders for this highly demanding job. In this paper, we demonstrate how to use adversarial algorithms to investigate defenders’ learning using interactive cyber-defense games. We created an Interactive Defense Game (IDG) that represents a cyber-defense scenario, which requires monitoring of incoming network alerts and allows a defender to analyze, remove, and restore services based on the events observed in a network. The participants in our study faced one of two types of simulated adversaries. A Beeline adversary is a fast, targeted, and informed attacker; and a Meander adversary is a slow attacker that wanders the network until it finds the right target to exploit. Our results suggest that although human defenders have more difficulty to stop the Beeline adversary initially, they were able to learn to stop this adversary by taking advantage of their attack strategy. Participants who played against the Beeline adversary learned to anticipate the adversary’s actions and took more proactive actions, while decreasing their reactive actions. These findings have implications for understanding how to help cybersecurity analysts speed up their training.
鉴于网络犯罪的增加,网络安全分析师(即防御者)的需求量很大。防御者必须监视组织的网络,以评估威胁和对网络的潜在破坏。对手模拟通常用于测试防御者应对组织已知威胁的性能。然而,目前尚不清楚这种训练过程在为这项高要求的工作做好准备方面是否有效。在本文中,我们演示了如何使用对抗算法来研究防御者的学习使用交互式网络防御游戏。我们创建了一个交互式防御游戏(IDG),它代表了一个网络防御场景,它需要监视传入的网络警报,并允许防御者根据在网络中观察到的事件分析、删除和恢复服务。在我们的研究中,参与者面对两种类型的模拟对手之一。直线攻击者是一种快速、有针对性且消息灵通的攻击者;迂回攻击者是一种缓慢的攻击者,它在网络中徘徊,直到找到合适的攻击目标。我们的研究结果表明,尽管人类防御者最初很难阻止直线对手,但他们能够通过利用攻击策略来学会阻止对手。与“直线”对手对抗的参与者学会了预测对手的行动,并采取了更积极的行动,同时减少了他们的被动行动。这些发现对理解如何帮助网络安全分析师加快培训具有启示意义。
{"title":"Learning about simulated adversaries from human defenders using interactive cyber-defense games","authors":"Baptiste Prebot, Yinuo Du, Cleotilde Gonzalez","doi":"10.1093/cybsec/tyad022","DOIUrl":"https://doi.org/10.1093/cybsec/tyad022","url":null,"abstract":"Abstract Given the increase in cybercrime, cybersecurity analysts (i.e. defenders) are in high demand. Defenders must monitor an organization’s network to evaluate threats and potential breaches into the network. Adversary simulation is commonly used to test defenders’ performance against known threats to organizations. However, it is unclear how effective this training process is in preparing defenders for this highly demanding job. In this paper, we demonstrate how to use adversarial algorithms to investigate defenders’ learning using interactive cyber-defense games. We created an Interactive Defense Game (IDG) that represents a cyber-defense scenario, which requires monitoring of incoming network alerts and allows a defender to analyze, remove, and restore services based on the events observed in a network. The participants in our study faced one of two types of simulated adversaries. A Beeline adversary is a fast, targeted, and informed attacker; and a Meander adversary is a slow attacker that wanders the network until it finds the right target to exploit. Our results suggest that although human defenders have more difficulty to stop the Beeline adversary initially, they were able to learn to stop this adversary by taking advantage of their attack strategy. Participants who played against the Beeline adversary learned to anticipate the adversary’s actions and took more proactive actions, while decreasing their reactive actions. These findings have implications for understanding how to help cybersecurity analysts speed up their training.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135212854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations 来自俄罗斯的恐惧:恐惧诉求和网络影响行动的模式
Q1 Social Sciences Pub Date : 2023-01-01 DOI: 10.1093/cybsec/tyad016
Ugochukwu Etudo, Christopher Whyte, Victoria Yoon, Niam Yaraghi
Abstract Much research on influence operations (IO) and cyber-enabled influence operations (CEIO) rests on the assumption that state-backed digital interference attempts to generically produce sociopolitical division favorable to the perpetrator’s own interests. And yet, the empirical record of malicious IO during the 2010s show that social media manipulation and messaging takes a number of forms. In this article, we survey arguments regarding the targeting tactics and techniques associated with digital age IO and suggest that existing accounts tend to ignore the strategic context of foreign interference. We propose that state-sponsored IO are not unlike conventional political messaging campaigns in that they are an evolving flow of information rooted in several key objectives and assumptions. However, the strategic position of foreign actors as an outside force constrains opportunities for effective manipulation and forces certain operational constraints that shape practice. These outside actors, generally unable to create sensation from nothing without being unveiled, rely on domestic events tied to a broad macrosocial division (e.g. an act of race violence or protest activity) to create the conditions wherein social media manipulation can be leveraged to strategic gain. Once an event occurs, belligerents tailor steps being taken to embed themselves in relevant social networks with the goal of turning that influence toward some action. We illustrate and validate this framework using the content of the Russian Federation’s coordinated trolling campaign against the USA between 2015 and 2016. We deploy an empirical testing approach centered on fear appeals as a likely method for engaging foreign populations relative to some domestic triggering event and find support of our framework. Specifically, we show that while strong associations exist between Russian ad emissions on Facebook and societal unrest in the period, those relationships are not statistically causal. We find a temporal ordering of social media content that is highly suggestive of a fear appeals strategy responsive to macrosocial dividing events. Of unique interest, we also see that malware is targeted to social media populations at later stages of the fear appeal threat lifecycle, implying lessons for those specifically interested in the relationship between CEIO and disinformation tactics.
关于影响行动(IO)和网络支持影响行动(CEIO)的许多研究都基于这样的假设:国家支持的数字干预试图产生有利于犯罪者自身利益的社会政治分裂。然而,2010年代恶意IO的经验记录表明,社交媒体操纵和消息传递采取了多种形式。在本文中,我们调查了关于与数字时代IO相关的目标策略和技术的争论,并建议现有账户往往忽视外国干预的战略背景。我们认为,国家发起的国际活动与传统的政治信息传递活动没有什么不同,因为它们是基于几个关键目标和假设的不断发展的信息流。然而,外国行动者作为外部力量的战略地位限制了有效操纵的机会,并迫使某些影响实践的操作限制。这些外部行动者通常无法在不被揭露的情况下无中生有地制造轰动,他们依靠与广泛的宏观社会分裂相关的国内事件(例如种族暴力行为或抗议活动)来创造条件,从而利用社交媒体操纵来获得战略利益。一旦事件发生,交战各方就会调整采取的步骤,将自己嵌入相关的社交网络,目标是将这种影响转化为某种行动。我们使用俄罗斯联邦在2015年至2016年期间针对美国的协调网络攻击活动的内容来说明和验证这一框架。我们采用了一种以恐惧诉求为中心的实证测试方法,作为一种可能的方法来吸引外国人口相对于一些国内触发事件,并找到我们框架的支持。具体来说,我们表明,虽然俄罗斯在Facebook上投放的广告与这一时期的社会动荡之间存在强烈的联系,但这些关系在统计上并不是因果关系。我们发现社交媒体内容的时间顺序高度暗示了对宏观社会分裂事件做出反应的恐惧呼吁策略。特别有趣的是,我们还发现恶意软件针对的是处于恐惧吸引力威胁生命周期后期阶段的社交媒体人群,这对于那些对CEIO和虚假信息策略之间关系特别感兴趣的人来说意味着教训。
{"title":"From Russia with fear: fear appeals and the patterns of cyber-enabled influence operations","authors":"Ugochukwu Etudo, Christopher Whyte, Victoria Yoon, Niam Yaraghi","doi":"10.1093/cybsec/tyad016","DOIUrl":"https://doi.org/10.1093/cybsec/tyad016","url":null,"abstract":"Abstract Much research on influence operations (IO) and cyber-enabled influence operations (CEIO) rests on the assumption that state-backed digital interference attempts to generically produce sociopolitical division favorable to the perpetrator’s own interests. And yet, the empirical record of malicious IO during the 2010s show that social media manipulation and messaging takes a number of forms. In this article, we survey arguments regarding the targeting tactics and techniques associated with digital age IO and suggest that existing accounts tend to ignore the strategic context of foreign interference. We propose that state-sponsored IO are not unlike conventional political messaging campaigns in that they are an evolving flow of information rooted in several key objectives and assumptions. However, the strategic position of foreign actors as an outside force constrains opportunities for effective manipulation and forces certain operational constraints that shape practice. These outside actors, generally unable to create sensation from nothing without being unveiled, rely on domestic events tied to a broad macrosocial division (e.g. an act of race violence or protest activity) to create the conditions wherein social media manipulation can be leveraged to strategic gain. Once an event occurs, belligerents tailor steps being taken to embed themselves in relevant social networks with the goal of turning that influence toward some action. We illustrate and validate this framework using the content of the Russian Federation’s coordinated trolling campaign against the USA between 2015 and 2016. We deploy an empirical testing approach centered on fear appeals as a likely method for engaging foreign populations relative to some domestic triggering event and find support of our framework. Specifically, we show that while strong associations exist between Russian ad emissions on Facebook and societal unrest in the period, those relationships are not statistically causal. We find a temporal ordering of social media content that is highly suggestive of a fear appeals strategy responsive to macrosocial dividing events. Of unique interest, we also see that malware is targeted to social media populations at later stages of the fear appeal threat lifecycle, implying lessons for those specifically interested in the relationship between CEIO and disinformation tactics.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136298190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector 英国大学的网络安全:绘制(或管理)高等教育部门的威胁情报共享
Q1 Social Sciences Pub Date : 2023-01-01 DOI: 10.1093/cybsec/tyad019
Anna Piazza, Srinidhi Vasudevan, Madeline Carr
Abstract Higher education has recently been identified as a sector of concern by the UK National Cyber Security Centre (NCSC). In 2021, the NCSC reported that universities and higher education institutions (HEI) had been exponentially targeted by cyber-criminals. Existing challenges were amplified or highlighted over the course of the global pandemic when universities struggled to continue to function through hybrid and remote teaching provision that relied heavily on their digital estate and services. Despite the value of the sector and the vulnerabilities within it, higher education has received relatively little attention from the cybersecurity research community. Over 2 years, we carried out numerous interventions and engagements with the UK higher education sector. Through interviews with cybersecurity practitioners working in the sector as well as roundtables, and questionnaires, we conducted a qualitative and quantitative analysis of threat intelligence sharing, which we use as a proxy for measuring and analysing collaboration. In a unique approach to studying collaboration in cybersecurity, we utilized social network analysis. This paper presents the study and our findings about the state of cybersecurity in UK universities. It also presents some recommendations for future steps that we argue will be necessary to equip the higher education sector to continue to support UK national interests going forward. Key findings include the positive inclination of those working in university cybersecurity to collaborate as well as the factors that impede that collaboration. These include management and insurance constraints, concerns about individual and institutional reputational damage, a lack of trusted relationships, and the lack of effective mechanisms or channels for sectoral collaboration. In terms of the network itself, we found that it is highly fragmented with a very small number of the possible connections active, none of the organizations we might expect to facilitate collaboration in the network are playing a significant role, and some universities are currently acting as key information bridges. For these reasons, any changes that might be led by sectoral bodies such as Jisc, UCISA or government bodies such as NCSC, would need to go through these information brokers.
高等教育最近被英国国家网络安全中心(NCSC)确定为关注的一个部门。2021年,NCSC报告称,大学和高等教育机构(HEI)成为网络犯罪分子的目标。在全球大流行期间,当大学努力通过严重依赖其数字资产和服务的混合和远程教学提供继续发挥作用时,现有的挑战被放大或突出。尽管该行业价值巨大,也存在漏洞,但高等教育受到网络安全研究界的关注相对较少。在两年多的时间里,我们与英国高等教育部门进行了多次干预和合作。通过与该行业的网络安全从业人员的访谈,以及圆桌会议和问卷调查,我们对威胁情报共享进行了定性和定量分析,并将其作为衡量和分析合作的代理。在研究网络安全协作的独特方法中,我们利用了社会网络分析。本文介绍了我们对英国大学网络安全状况的研究和发现。它还提出了一些建议,为未来的步骤,我们认为是必要的装备高等教育部门继续支持英国的国家利益向前发展。主要发现包括大学网络安全工作人员合作的积极倾向以及阻碍这种合作的因素。这些问题包括管理和保险方面的限制、对个人和机构声誉受损的担忧、缺乏可信任的关系以及缺乏有效的部门合作机制或渠道。就网络本身而言,我们发现它是高度碎片化的,活跃的可能连接的数量非常少,我们期望在网络中促进合作的组织都没有发挥重要作用,一些大学目前正在发挥关键的信息桥梁作用。由于这些原因,可能由Jisc、UCISA等部门机构或NCSC等政府机构领导的任何更改都需要通过这些信息代理。
{"title":"Cybersecurity in UK Universities: mapping (or managing) threat intelligence sharing within the higher education sector","authors":"Anna Piazza, Srinidhi Vasudevan, Madeline Carr","doi":"10.1093/cybsec/tyad019","DOIUrl":"https://doi.org/10.1093/cybsec/tyad019","url":null,"abstract":"Abstract Higher education has recently been identified as a sector of concern by the UK National Cyber Security Centre (NCSC). In 2021, the NCSC reported that universities and higher education institutions (HEI) had been exponentially targeted by cyber-criminals. Existing challenges were amplified or highlighted over the course of the global pandemic when universities struggled to continue to function through hybrid and remote teaching provision that relied heavily on their digital estate and services. Despite the value of the sector and the vulnerabilities within it, higher education has received relatively little attention from the cybersecurity research community. Over 2 years, we carried out numerous interventions and engagements with the UK higher education sector. Through interviews with cybersecurity practitioners working in the sector as well as roundtables, and questionnaires, we conducted a qualitative and quantitative analysis of threat intelligence sharing, which we use as a proxy for measuring and analysing collaboration. In a unique approach to studying collaboration in cybersecurity, we utilized social network analysis. This paper presents the study and our findings about the state of cybersecurity in UK universities. It also presents some recommendations for future steps that we argue will be necessary to equip the higher education sector to continue to support UK national interests going forward. Key findings include the positive inclination of those working in university cybersecurity to collaborate as well as the factors that impede that collaboration. These include management and insurance constraints, concerns about individual and institutional reputational damage, a lack of trusted relationships, and the lack of effective mechanisms or channels for sectoral collaboration. In terms of the network itself, we found that it is highly fragmented with a very small number of the possible connections active, none of the organizations we might expect to facilitate collaboration in the network are playing a significant role, and some universities are currently acting as key information bridges. For these reasons, any changes that might be led by sectoral bodies such as Jisc, UCISA or government bodies such as NCSC, would need to go through these information brokers.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135653642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-quantum cryptographic assemblages and the governance of the quantum threat 后量子密码组合和量子威胁的治理
Q1 Social Sciences Pub Date : 2023-01-01 DOI: 10.1093/cybsec/tyad001
Kristen Csenkey, Nina Bindel
Abstract Threats against security in the Internet often have a wide range and can have serious impacts within society. Large quantum computers will be able to break the cryptographic algorithms used to ensure security today, which is known as the quantum threat. Quantum threats are multi-faceted and very complex cybersecurity issues. We use assemblage theory to explore the complexities associated with these threats, including how they are understood within policy and strategy. It is in this way that we explore how the governance of the quantum threat is made visible. Generally, the private and academic sectors have been a primary driver in this field, but other actors (especially states) have begun to grapple with the threat and have begun to understand the relation to defence challenges, and pathways to cooperation in order to prepare against the threat. This may pose challenges for traditional avenues of defence cooperation as states attempt to understand and manage the associated technologies and perceived threats. We examine how traditionally cooperating allies attempt to govern the quantum threat by focusing on Australia, Canada, European Union, New Zealand, UK, and USA. We explore the linkages within post-quantum cryptographic assemblages and identify several governmental interventions as attempts to understand and manage the threat and associated technologies. In examining over 40 policy and strategy-related documents between traditionally defence cooperating allies, we identify six main linkages: Infrastructure, Standardization, Education, Partnerships, Economy, and Defence. These linkages highlight the governmental interventions to govern through standardization and regulation as a way to define the contours of the quantum threat.
互联网上的安全威胁往往涉及面广,会对社会造成严重影响。大型量子计算机将能够破解目前用于确保安全的加密算法,这被称为量子威胁。量子威胁是多方面的、非常复杂的网络安全问题。我们使用组合理论来探索与这些威胁相关的复杂性,包括如何在政策和战略中理解它们。正是通过这种方式,我们探索了如何使量子威胁的治理变得可见。一般来说,私营和学术部门一直是这一领域的主要驱动力,但其他行为者(特别是国家)已经开始努力应对这一威胁,并开始了解与国防挑战的关系,以及为应对威胁而进行合作的途径。随着各国试图理解和管理相关技术和感知到的威胁,这可能对传统的防务合作途径构成挑战。我们通过关注澳大利亚、加拿大、欧盟、新西兰、英国和美国来研究传统合作盟友如何试图治理量子威胁。我们探讨了后量子密码组合中的联系,并确定了一些政府干预措施,试图理解和管理威胁和相关技术。在研究了传统防务合作盟友之间的40多个政策和战略相关文件后,我们确定了六个主要联系:基础设施、标准化、教育、伙伴关系、经济和国防。这些联系突出了政府干预,通过标准化和监管来界定量子威胁的轮廓。
{"title":"Post-quantum cryptographic assemblages and the governance of the quantum threat","authors":"Kristen Csenkey, Nina Bindel","doi":"10.1093/cybsec/tyad001","DOIUrl":"https://doi.org/10.1093/cybsec/tyad001","url":null,"abstract":"Abstract Threats against security in the Internet often have a wide range and can have serious impacts within society. Large quantum computers will be able to break the cryptographic algorithms used to ensure security today, which is known as the quantum threat. Quantum threats are multi-faceted and very complex cybersecurity issues. We use assemblage theory to explore the complexities associated with these threats, including how they are understood within policy and strategy. It is in this way that we explore how the governance of the quantum threat is made visible. Generally, the private and academic sectors have been a primary driver in this field, but other actors (especially states) have begun to grapple with the threat and have begun to understand the relation to defence challenges, and pathways to cooperation in order to prepare against the threat. This may pose challenges for traditional avenues of defence cooperation as states attempt to understand and manage the associated technologies and perceived threats. We examine how traditionally cooperating allies attempt to govern the quantum threat by focusing on Australia, Canada, European Union, New Zealand, UK, and USA. We explore the linkages within post-quantum cryptographic assemblages and identify several governmental interventions as attempts to understand and manage the threat and associated technologies. In examining over 40 policy and strategy-related documents between traditionally defence cooperating allies, we identify six main linkages: Infrastructure, Standardization, Education, Partnerships, Economy, and Defence. These linkages highlight the governmental interventions to govern through standardization and regulation as a way to define the contours of the quantum threat.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135127077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Testing human ability to detect ‘deepfake’ images of human faces 测试人类检测“深度伪造”人脸图像的能力
Q1 Social Sciences Pub Date : 2023-01-01 DOI: 10.1093/cybsec/tyad011
Sergi D Bray, Shane D Johnson, Bennett Kleinberg
Abstract ‘Deepfakes’ are computationally created entities that falsely represent reality. They can take image, video, and audio modalities, and pose a threat to many areas of systems and societies, comprising a topic of interest to various aspects of cybersecurity and cybersafety. In 2020, a workshop consulting AI experts from academia, policing, government, the private sector, and state security agencies ranked deepfakes as the most serious AI threat. These experts noted that since fake material can propagate through many uncontrolled routes, changes in citizen behaviour may be the only effective defence. This study aims to assess human ability to identify image deepfakes of human faces (these being uncurated output from the StyleGAN2 algorithm as trained on the FFHQ dataset) from a pool of non-deepfake images (these being random selection of images from the FFHQ dataset), and to assess the effectiveness of some simple interventions intended to improve detection accuracy. Using an online survey, participants (N = 280) were randomly allocated to one of four groups: a control group, and three assistance interventions. Each participant was shown a sequence of 20 images randomly selected from a pool of 50 deepfake images of human faces and 50 images of real human faces. Participants were asked whether each image was AI-generated or not, to report their confidence, and to describe the reasoning behind each response. Overall detection accuracy was only just above chance and none of the interventions significantly improved this. Of equal concern was the fact that participants’ confidence in their answers was high and unrelated to accuracy. Assessing the results on a per-image basis reveals that participants consistently found certain images easy to label correctly and certain images difficult, but reported similarly high confidence regardless of the image. Thus, although participant accuracy was 62% overall, this accuracy across images ranged quite evenly between 85 and 30%, with an accuracy of below 50% for one in every five images. We interpret the findings as suggesting that there is a need for an urgent call to action to address this threat.
“深度伪造”是通过计算创造的虚假代表现实的实体。它们可以采用图像、视频和音频方式,对系统和社会的许多领域构成威胁,包括网络安全和网络安全的各个方面感兴趣的主题。2020年,一个研讨会咨询了来自学术界、警方、政府、私营部门和国家安全机构的人工智能专家,将深度伪造列为最严重的人工智能威胁。这些专家指出,由于虚假材料可以通过许多不受控制的途径传播,改变公民的行为可能是唯一有效的防御措施。本研究旨在评估人类从非深度伪造图像池(这些是从FFHQ数据集中随机选择的图像)中识别人脸图像深度伪造(这些是在FFHQ数据集上训练的StyleGAN2算法的未经整理的输出)的能力,并评估一些旨在提高检测精度的简单干预措施的有效性。通过在线调查,参与者(N = 280)被随机分配到四组中的一组:对照组和三组辅助干预。研究人员从50张深度伪造的人脸图像和50张真实人脸图像中随机选择了20张图像,向每位参与者展示了这些图像。参与者被问及每张图片是否是人工智能生成的,报告他们的信心,并描述每个回答背后的原因。总体检测精度仅略高于偶然,没有任何干预措施显着改善这一点。同样令人担忧的是,参与者对自己答案的信心很高,与准确性无关。在每张图片的基础上评估结果显示,参与者一致认为某些图片很容易被正确标记,而某些图片很难被正确标记,但无论图片是什么,他们都报告了同样高的信心。因此,尽管参与者的总体准确率为62%,但图像的准确率在85%到30%之间相当均匀,每五张图像中有一张的准确率低于50%。我们认为,这些发现表明,有必要紧急呼吁采取行动来应对这一威胁。
{"title":"Testing human ability to detect ‘deepfake’ images of human faces","authors":"Sergi D Bray, Shane D Johnson, Bennett Kleinberg","doi":"10.1093/cybsec/tyad011","DOIUrl":"https://doi.org/10.1093/cybsec/tyad011","url":null,"abstract":"Abstract ‘Deepfakes’ are computationally created entities that falsely represent reality. They can take image, video, and audio modalities, and pose a threat to many areas of systems and societies, comprising a topic of interest to various aspects of cybersecurity and cybersafety. In 2020, a workshop consulting AI experts from academia, policing, government, the private sector, and state security agencies ranked deepfakes as the most serious AI threat. These experts noted that since fake material can propagate through many uncontrolled routes, changes in citizen behaviour may be the only effective defence. This study aims to assess human ability to identify image deepfakes of human faces (these being uncurated output from the StyleGAN2 algorithm as trained on the FFHQ dataset) from a pool of non-deepfake images (these being random selection of images from the FFHQ dataset), and to assess the effectiveness of some simple interventions intended to improve detection accuracy. Using an online survey, participants (N = 280) were randomly allocated to one of four groups: a control group, and three assistance interventions. Each participant was shown a sequence of 20 images randomly selected from a pool of 50 deepfake images of human faces and 50 images of real human faces. Participants were asked whether each image was AI-generated or not, to report their confidence, and to describe the reasoning behind each response. Overall detection accuracy was only just above chance and none of the interventions significantly improved this. Of equal concern was the fact that participants’ confidence in their answers was high and unrelated to accuracy. Assessing the results on a per-image basis reveals that participants consistently found certain images easy to label correctly and certain images difficult, but reported similarly high confidence regardless of the image. Thus, although participant accuracy was 62% overall, this accuracy across images ranged quite evenly between 85 and 30%, with an accuracy of below 50% for one in every five images. We interpret the findings as suggesting that there is a need for an urgent call to action to address this threat.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135182590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient collective action for tackling time-critical cybersecurity threats 应对时间紧迫的网络安全威胁的有效集体行动
Q1 Social Sciences Pub Date : 2023-01-01 DOI: 10.1093/cybsec/tyad021
Sébastien Gillard, Dimitri Percia David, Alain Mermoud, Thomas Maillart
Abstract The latency reduction between the discovery of vulnerabilities, the build-up, and the dissemination of cyberattacks has put significant pressure on cybersecurity professionals. For that, security researchers have increasingly resorted to collective action in order to reduce the time needed to characterize and tame outstanding threats. Here, we investigate how joining and contribution dynamics on Malware Information Sharing Platform (MISP), an open-source threat intelligence sharing platform, influence the time needed to collectively complete threat descriptions. We find that performance, defined as the capacity to characterize quickly a threat event, is influenced by (i) its own complexity (negatively), by (ii) collective action (positively), and by (iii) learning, information integration, and modularity (positively). Our results inform on how collective action can be organized at scale and in a modular way to overcome a large number of time-critical tasks, such as cybersecurity threats.
网络攻击从漏洞发现、构建到传播之间的延迟减少给网络安全专业人员带来了巨大的压力。为此,安全研究人员越来越多地采取集体行动,以减少表征和驯服突出威胁所需的时间。在这里,我们研究了恶意软件信息共享平台(MISP)(一个开源的威胁情报共享平台)上的加入和贡献动态如何影响集体完成威胁描述所需的时间。我们发现,性能(定义为快速表征威胁事件的能力)受到(i)其自身复杂性(负向)、(ii)集体行动(正向)和(iii)学习、信息集成和模块化(正向)的影响。我们的研究结果告诉我们,如何以模块化的方式大规模组织集体行动,以克服大量时间紧迫的任务,如网络安全威胁。
{"title":"Efficient collective action for tackling time-critical cybersecurity threats","authors":"Sébastien Gillard, Dimitri Percia David, Alain Mermoud, Thomas Maillart","doi":"10.1093/cybsec/tyad021","DOIUrl":"https://doi.org/10.1093/cybsec/tyad021","url":null,"abstract":"Abstract The latency reduction between the discovery of vulnerabilities, the build-up, and the dissemination of cyberattacks has put significant pressure on cybersecurity professionals. For that, security researchers have increasingly resorted to collective action in order to reduce the time needed to characterize and tame outstanding threats. Here, we investigate how joining and contribution dynamics on Malware Information Sharing Platform (MISP), an open-source threat intelligence sharing platform, influence the time needed to collectively complete threat descriptions. We find that performance, defined as the capacity to characterize quickly a threat event, is influenced by (i) its own complexity (negatively), by (ii) collective action (positively), and by (iii) learning, information integration, and modularity (positively). Our results inform on how collective action can be organized at scale and in a modular way to overcome a large number of time-critical tasks, such as cybersecurity threats.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135604439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: cross-border criminal investigations and digital evidence SoK:跨境刑事调查和数字证据
IF 3.9 Q1 Social Sciences Pub Date : 2022-12-15 DOI: 10.1093/cybsec/tyac014
Fran Casino, Claudia Pina, Pablo López-Aguilar, Edgar Batista, Agusti Solanas, Constantinos Patsakis
Digital evidence underpin the majority of crimes as their analysis is an integral part of almost every criminal investigation. Even if we temporarily disregard the numerous challenges in the collection and analysis of digital evidence, the exchange of the evidence among the different stakeholders has many thorny issues. Of specific interest are cross-border criminal investigations as the complexity is significantly high due to the heterogeneity of legal frameworks, which beyond time bottlenecks can also become prohibiting. The aim of this article is to analyse the current state of practice of cross-border investigations considering the efficacy of current collaboration protocols along with the challenges and drawbacks to be overcome. Further to performing a legally oriented research treatise, we recall all the challenges raised in the literature and discuss them from a more practical yet global perspective. Thus, this article paves the way to enabling practitioners and stakeholders to leverage horizontal strategies to fill in the identified gaps timely and accurately.
数字证据是大多数犯罪的基础,因为它们的分析几乎是所有刑事调查的组成部分。即使我们暂时忽略数字证据收集和分析中的众多挑战,不同利益相关者之间的证据交换也存在许多棘手的问题。特别令人感兴趣的是跨境刑事调查,因为由于法律框架的异质性,其复杂性非常高,超出时间瓶颈也可能成为禁止。本文的目的是分析跨境调查的实践现状,考虑到当前合作协议的有效性以及需要克服的挑战和缺点。为了进一步进行以法律为导向的研究论文,我们回顾了文献中提出的所有挑战,并从更实际但全球的角度进行了讨论。因此,本文为使从业者和涉众能够利用水平策略及时而准确地填补已确定的差距铺平了道路。
{"title":"SoK: cross-border criminal investigations and digital evidence","authors":"Fran Casino, Claudia Pina, Pablo López-Aguilar, Edgar Batista, Agusti Solanas, Constantinos Patsakis","doi":"10.1093/cybsec/tyac014","DOIUrl":"https://doi.org/10.1093/cybsec/tyac014","url":null,"abstract":"Digital evidence underpin the majority of crimes as their analysis is an integral part of almost every criminal investigation. Even if we temporarily disregard the numerous challenges in the collection and analysis of digital evidence, the exchange of the evidence among the different stakeholders has many thorny issues. Of specific interest are cross-border criminal investigations as the complexity is significantly high due to the heterogeneity of legal frameworks, which beyond time bottlenecks can also become prohibiting. The aim of this article is to analyse the current state of practice of cross-border investigations considering the efficacy of current collaboration protocols along with the challenges and drawbacks to be overcome. Further to performing a legally oriented research treatise, we recall all the challenges raised in the literature and discuss them from a more practical yet global perspective. Thus, this article paves the way to enabling practitioners and stakeholders to leverage horizontal strategies to fill in the identified gaps timely and accurately.","PeriodicalId":44310,"journal":{"name":"Journal of Cybersecurity","volume":null,"pages":null},"PeriodicalIF":3.9,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138505421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Cybersecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1