首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
Cybersecurity Students’ Interest in Government Careers: Impact of Demographic Characteristics and Job Dynamics 网络安全学生对政府工作的兴趣:人口特征和工作动态的影响
IF 1.3 Q1 Social Sciences Pub Date : 2023-11-20 DOI: 10.1080/19361610.2023.2277513
Brian K. Payne, Ida Oesteraas, David C. May
A critical shortage of cybersecurity talent exists in the United States. The lack of personnel has resulted in increased competition for the cybersecurity professionals. As the field of cybersecuri...
美国网络安全人才严重短缺。人才的缺乏导致了对网络安全专业人员的竞争加剧。随着网络安全领域…
{"title":"Cybersecurity Students’ Interest in Government Careers: Impact of Demographic Characteristics and Job Dynamics","authors":"Brian K. Payne, Ida Oesteraas, David C. May","doi":"10.1080/19361610.2023.2277513","DOIUrl":"https://doi.org/10.1080/19361610.2023.2277513","url":null,"abstract":"A critical shortage of cybersecurity talent exists in the United States. The lack of personnel has resulted in increased competition for the cybersecurity professionals. As the field of cybersecuri...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138504949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack Model for Generic Intelligent Systems 通用智能系统的攻击模型
IF 1.3 Q1 Social Sciences Pub Date : 2023-11-20 DOI: 10.1080/19361610.2023.2283666
Sirapat Boonkrong
Intelligent systems, machine learning models, and artificial intelligence methods are increasing in complexity, and the integration of such technologies has also increased. However, the rise in the...
智能系统、机器学习模型和人工智能方法的复杂性正在增加,这些技术的集成也在增加。然而,…
{"title":"Attack Model for Generic Intelligent Systems","authors":"Sirapat Boonkrong","doi":"10.1080/19361610.2023.2283666","DOIUrl":"https://doi.org/10.1080/19361610.2023.2283666","url":null,"abstract":"Intelligent systems, machine learning models, and artificial intelligence methods are increasing in complexity, and the integration of such technologies has also increased. However, the rise in the...","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138504944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSIMH: Design of an Efficient Security-Aware Customized Sidechaining Model via Iterative Meta-Heuristics 基于迭代元启发式的高效安全感知自定义侧链模型设计
Q1 Social Sciences Pub Date : 2023-10-10 DOI: 10.1080/19361610.2023.2264068
Nisha Balani, Pallavi Chavan
AbstractBlockchains are a secure alternative for long-length data storage & security deployments. Though blockchains are unbounded, their quality of service (QoS) performance reduces after adding a certain number of blocks. Thus, sidechains have become essential for making the system decentralized, secure, and effective for use thereby improving their scalability & QoS performance. Sidechains reduce data storage and extraction delays. However, all sidechains of a single blockchain are the same in size, capacity, and security. This limits their application to real-world use cases that require dynamic security. To overcome this limitation, the authors propose a meta-heuristic approach to design a system that produces customized sidechains based on the quantity and quality of data stored on the chain. The model uses a machine-learning approach to find the best possible sidechain configuration for different data types. It makes the system fast and scalable and improves storage & memory efficiency. The proposed model is tested on multiple data sets and compared with various state-of-art sidechain deployments. An improvement of 18% in terms of mining speed, 27% in terms of energy efficiency, 10% with regards to throughput, and 8% concerning packet delivery ratio is observed. The model is tested under various attacks and faulty nodes to validate its security performance. A consistent QoS performance is observed for the proposed model under these attack types, thereby validating its resiliency for different attacks. This enhancement in performance makes the proposed model eligible for deployment in high-speed, low-energy, and high-security applications like IoT, mobile ad-hoc networks, and sensor networks.Keywords: Blockchainsidechainthroughputenergy consumptionQoSmeta-heuristic
摘要区块链是长数据存储和安全部署的安全替代方案。虽然区块链是无界的,但在增加一定数量的区块后,其服务质量(QoS)性能会降低。因此,侧链对于使系统分散、安全和有效地使用从而提高其可扩展性和QoS性能至关重要。侧链减少了数据存储和提取的延迟。但是,单个区块链的所有侧链在大小、容量和安全性上都是相同的。这将它们的应用限制在需要动态安全性的实际用例中。为了克服这一限制,作者提出了一种元启发式方法来设计一个系统,该系统根据存储在链上的数据的数量和质量来产生定制的侧链。该模型使用机器学习方法来找到不同数据类型的最佳侧链配置。它使系统快速和可扩展,并提高存储和内存效率。提出的模型在多个数据集上进行了测试,并与各种最先进的侧链部署进行了比较。在挖矿速度方面提高了18%,在能源效率方面提高了27%,在吞吐量方面提高了10%,在数据包传送率方面提高了8%。在各种攻击和故障节点下对模型进行了测试,验证了模型的安全性能。在这些攻击类型下,观察到所提出的模型具有一致的QoS性能,从而验证了其对不同攻击的弹性。这种性能的增强使所提出的模型适合部署在高速、低能耗和高安全性的应用中,如物联网、移动自组织网络和传感器网络。关键词:区块链侧链;能源消耗;qos
{"title":"CSIMH: Design of an Efficient Security-Aware Customized Sidechaining Model via Iterative Meta-Heuristics","authors":"Nisha Balani, Pallavi Chavan","doi":"10.1080/19361610.2023.2264068","DOIUrl":"https://doi.org/10.1080/19361610.2023.2264068","url":null,"abstract":"AbstractBlockchains are a secure alternative for long-length data storage & security deployments. Though blockchains are unbounded, their quality of service (QoS) performance reduces after adding a certain number of blocks. Thus, sidechains have become essential for making the system decentralized, secure, and effective for use thereby improving their scalability & QoS performance. Sidechains reduce data storage and extraction delays. However, all sidechains of a single blockchain are the same in size, capacity, and security. This limits their application to real-world use cases that require dynamic security. To overcome this limitation, the authors propose a meta-heuristic approach to design a system that produces customized sidechains based on the quantity and quality of data stored on the chain. The model uses a machine-learning approach to find the best possible sidechain configuration for different data types. It makes the system fast and scalable and improves storage & memory efficiency. The proposed model is tested on multiple data sets and compared with various state-of-art sidechain deployments. An improvement of 18% in terms of mining speed, 27% in terms of energy efficiency, 10% with regards to throughput, and 8% concerning packet delivery ratio is observed. The model is tested under various attacks and faulty nodes to validate its security performance. A consistent QoS performance is observed for the proposed model under these attack types, thereby validating its resiliency for different attacks. This enhancement in performance makes the proposed model eligible for deployment in high-speed, low-energy, and high-security applications like IoT, mobile ad-hoc networks, and sensor networks.Keywords: Blockchainsidechainthroughputenergy consumptionQoSmeta-heuristic","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136295779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dimensional Reduction With Fast ICA for IoT Botnet Detection 基于快速ICA的物联网僵尸网络降维检测
IF 1.3 Q1 Social Sciences Pub Date : 2023-10-02 DOI: 10.1080/19361610.2022.2079906
Susanto  , D. Stiawan, Dian Palupi Rini, M. Arifin, Mohd Yazid Bin Idris, Nizar Alsharif, R. Budiarto
Abstract The Internet of Things (IoT) has unique characteristics with a minimalist design and has network access with great scalability, which makes it difficult to control access. Setting up an intrusion detection system (IDS) on an IoT system while taking into account its unique characteristics is a big challenge. In this paper, we propose a dimensional reduction approach utilizing the fast independent component analysis (ICA) method to address scalability issues of IDS for IoT systems. Experimental results show that the reduction of dimensions by the fast ICA method overall improves the IDS execution time and does not significantly affect accuracy.
物联网(Internet of Things, IoT)具有极简设计的独特特点,其网络接入具有极大的可扩展性,使得接入控制变得困难。在物联网系统上设置入侵检测系统(IDS),同时考虑到其独特的特性是一项巨大的挑战。在本文中,我们提出了一种利用快速独立分量分析(ICA)方法来解决物联网系统IDS的可扩展性问题的降维方法。实验结果表明,快速ICA方法的降维总体上提高了IDS的执行时间,且对准确率没有显著影响。
{"title":"Dimensional Reduction With Fast ICA for IoT Botnet Detection","authors":"Susanto  , D. Stiawan, Dian Palupi Rini, M. Arifin, Mohd Yazid Bin Idris, Nizar Alsharif, R. Budiarto","doi":"10.1080/19361610.2022.2079906","DOIUrl":"https://doi.org/10.1080/19361610.2022.2079906","url":null,"abstract":"Abstract The Internet of Things (IoT) has unique characteristics with a minimalist design and has network access with great scalability, which makes it difficult to control access. Setting up an intrusion detection system (IDS) on an IoT system while taking into account its unique characteristics is a big challenge. In this paper, we propose a dimensional reduction approach utilizing the fast independent component analysis (ICA) method to address scalability issues of IDS for IoT systems. Experimental results show that the reduction of dimensions by the fast ICA method overall improves the IDS execution time and does not significantly affect accuracy.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44940991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Analysis of the Relationship between residents’ Perceived Probability of Property Victimization in Dwellings and the Level of Home Security Systems 居民住宅财产受害感知概率与家庭安全系统水平的关系分析
Q1 Social Sciences Pub Date : 2023-08-24 DOI: 10.1080/19361610.2023.2240305
Ingilab Shahbazov, Zaur Afandiyev, Ayshem Balayeva
Using the dataset of the first nationwide victimization survey in Azerbaijan, the current paper analyzed whether home security systems have a relationship with the perceived probability of property crime victimization. The ordinal logistic regression analysis was employed. Examination of the distribution of security systems identified that dwelling type, residential location and income had a higher level of significance than the perceived risk of property crime victimization in predicting the level of security systems at home. As to the predictive capacity of security systems in relation to the perceived risk of property crime victimization, the former is statistically significant. Additionally, being a victim of property crime, residential location, age, and perceived neighborhood disorder level predicted the perceived risk of property crime victimization.
利用阿塞拜疆第一次全国受害调查的数据集,本文分析了家庭安全系统是否与财产犯罪受害的感知概率有关。采用有序逻辑回归分析。对安全系统分布的检查发现,在预测家庭安全系统水平方面,住宅类型、居住地点和收入比财产犯罪受害的感知风险具有更高的重要性。至于安全系统对财产犯罪受害感知风险的预测能力,前者在统计上是显著的。此外,曾遭受财产犯罪、居住地点、年龄和感知邻里混乱程度对财产犯罪受害的感知风险有预测作用。
{"title":"The Analysis of the Relationship between residents’ Perceived Probability of Property Victimization in Dwellings and the Level of Home Security Systems","authors":"Ingilab Shahbazov, Zaur Afandiyev, Ayshem Balayeva","doi":"10.1080/19361610.2023.2240305","DOIUrl":"https://doi.org/10.1080/19361610.2023.2240305","url":null,"abstract":"Using the dataset of the first nationwide victimization survey in Azerbaijan, the current paper analyzed whether home security systems have a relationship with the perceived probability of property crime victimization. The ordinal logistic regression analysis was employed. Examination of the distribution of security systems identified that dwelling type, residential location and income had a higher level of significance than the perceived risk of property crime victimization in predicting the level of security systems at home. As to the predictive capacity of security systems in relation to the perceived risk of property crime victimization, the former is statistically significant. Additionally, being a victim of property crime, residential location, age, and perceived neighborhood disorder level predicted the perceived risk of property crime victimization.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135420855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Politics of “Localised Legitimacy”, Vigilantism, Non-State Policing and Counter-Banditry in Northwest Nigeria: Evidence from the Epicenter 尼日利亚西北部的“地方合法性”政治、治安维持、非国家警察和反盗匪:来自震中的证据
IF 1.3 Q1 Social Sciences Pub Date : 2023-07-30 DOI: 10.1080/19361610.2023.2240281
Folahanmi Aina
{"title":"Politics of “Localised Legitimacy”, Vigilantism, Non-State Policing and Counter-Banditry in Northwest Nigeria: Evidence from the Epicenter","authors":"Folahanmi Aina","doi":"10.1080/19361610.2023.2240281","DOIUrl":"https://doi.org/10.1080/19361610.2023.2240281","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48296573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a System of Indicators for Clustering Financial Cybercrime 开发金融网络犯罪集群指标体系
IF 1.3 Q1 Social Sciences Pub Date : 2023-07-03 DOI: 10.1080/19361610.2021.2013112
Boris Šturc, Tatyana Gurova, N.I. Zelenkova, V. Shestak
Abstract This study aims to propose a system of indicators for dividing financial cybercrime into groups. The results of this study indicate absence of taxonomic indicators regarding clustering of financial cybercrimes and wide differences in approaches to the development of such indicators in relation to cybercrimes. The proposed system of indicators for clustering of financial cybercrime is designed to help create a unified, consistent and holistic classification of cybercrime. The results of the study can be applied in the criminal legal classification of unlawful acts corresponding to the general concept of financial cybercrime.
摘要本研究旨在提出一个将金融网络犯罪分组的指标体系。这项研究的结果表明,缺乏关于金融网络犯罪集群的分类指标,并且在制定与网络犯罪相关的此类指标的方法上存在很大差异。拟议的金融网络犯罪集群指标体系旨在帮助建立统一、一致和全面的网络犯罪分类。研究结果可应用于与金融网络犯罪一般概念相对应的非法行为的刑事法律分类。
{"title":"Developing a System of Indicators for Clustering Financial Cybercrime","authors":"Boris Šturc, Tatyana Gurova, N.I. Zelenkova, V. Shestak","doi":"10.1080/19361610.2021.2013112","DOIUrl":"https://doi.org/10.1080/19361610.2021.2013112","url":null,"abstract":"Abstract This study aims to propose a system of indicators for dividing financial cybercrime into groups. The results of this study indicate absence of taxonomic indicators regarding clustering of financial cybercrimes and wide differences in approaches to the development of such indicators in relation to cybercrimes. The proposed system of indicators for clustering of financial cybercrime is designed to help create a unified, consistent and holistic classification of cybercrime. The results of the study can be applied in the criminal legal classification of unlawful acts corresponding to the general concept of financial cybercrime.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44003249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning Enabled Dynamic Spectrum Access for 6G Wireless Networks 基于机器学习的6G无线网络动态频谱接入
IF 1.3 Q1 Social Sciences Pub Date : 2023-06-21 DOI: 10.1080/19361610.2023.2226014
S. Iyer
{"title":"Machine Learning Enabled Dynamic Spectrum Access for 6G Wireless Networks","authors":"S. Iyer","doi":"10.1080/19361610.2023.2226014","DOIUrl":"https://doi.org/10.1080/19361610.2023.2226014","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48556007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transforming Pacifists into Warmongers? Separatist Movement, State Repression, and the Politics of Framing Terrorism in Nigeria: Evidence from IPOB and Yoruba Nation’s Freedom Frontiers 把Pacifists变成Warmongers?分离主义运动、国家镇压和尼日利亚的恐怖主义政治:来自IPOB和约鲁巴民族自由阵线的证据
IF 1.3 Q1 Social Sciences Pub Date : 2023-03-16 DOI: 10.1080/19361610.2023.2189867
J. Ojo
While the post-9/11 event has animated how state actors frame terrorism, contemporary studies have failed to address the politics inherent in proscribing, repressing, and labeling separatist movements as terrorists. This paper explores the politics of framing terrorism using the contemporary self-determination struggles advanced by the Indigenous People of Biafra (IPOB) and the Yoruba Nation ’ s freedom frontiers. The study proposes a United Nations-coordinated global framework for regulating and evaluating states ’ activities in identifying specific groups as terrorists. Taking such a stance would prevent aggrieved agitators from being persecuted by the state in the name of terror.
虽然9/11事件激发了国家行为者如何界定恐怖主义,但当代研究未能解决禁止、镇压分离主义运动和将其贴上恐怖分子标签所固有的政治问题。本文探讨了利用比亚夫拉土著人民(IPOB)提出的当代自决斗争和约鲁巴民族的自由边界来构建恐怖主义的政治。该研究提出了一个联合国协调的全球框架,用于监管和评估各国在确定特定群体为恐怖分子方面的活动。采取这样的立场可以防止愤愤不平的煽动者受到国家以恐怖为名的迫害。
{"title":"Transforming Pacifists into Warmongers? Separatist Movement, State Repression, and the Politics of Framing Terrorism in Nigeria: Evidence from IPOB and Yoruba Nation’s Freedom Frontiers","authors":"J. Ojo","doi":"10.1080/19361610.2023.2189867","DOIUrl":"https://doi.org/10.1080/19361610.2023.2189867","url":null,"abstract":"While the post-9/11 event has animated how state actors frame terrorism, contemporary studies have failed to address the politics inherent in proscribing, repressing, and labeling separatist movements as terrorists. This paper explores the politics of framing terrorism using the contemporary self-determination struggles advanced by the Indigenous People of Biafra (IPOB) and the Yoruba Nation ’ s freedom frontiers. The study proposes a United Nations-coordinated global framework for regulating and evaluating states ’ activities in identifying specific groups as terrorists. Taking such a stance would prevent aggrieved agitators from being persecuted by the state in the name of terror.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44305903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Natural Experiment of the Prince Hypothesis on Classroom Vandalism 关于教室破坏行为的王子假设的自然实验
IF 1.3 Q1 Social Sciences Pub Date : 2023-01-25 DOI: 10.1080/19361610.2023.2169545
William A. Chernoff
{"title":"A Natural Experiment of the Prince Hypothesis on Classroom Vandalism","authors":"William A. Chernoff","doi":"10.1080/19361610.2023.2169545","DOIUrl":"https://doi.org/10.1080/19361610.2023.2169545","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":null,"pages":null},"PeriodicalIF":1.3,"publicationDate":"2023-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41753749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1