首页 > 最新文献

IET Networks最新文献

英文 中文
Variance-driven security optimisation in industrial IoT sensors 方差驱动的工业物联网传感器安全优化
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-16 DOI: 10.1049/ntw2.12139
Hardik Gupta, Sunil K. Singh, Sudhakar Kumar, Karan Sharma, Hardeep Saini, Brij B. Gupta, Varsha Arya, Kwok Tai Chui

The Industrial Internet of Things (IIoT) has transformed industrial operations with real-time monitoring and control, enhancing efficiency and productivity. However, this connectivity brings significant security challenges. This study addresses these challenges by identifying abnormal sensor data patterns using machine learning-based anomaly detection models. The proposed framework employs advanced algorithms to strengthen industrial defences against cyber threats and disruptions. Focusing on temperature anomalies, a critical yet often overlooked aspect of industrial security, this research fills a gap in the literature by evaluating machine learning models for this purpose. A novel variance-based model for temperature anomaly detection is introduced, demonstrating high efficacy with accuracy scores of 0.92 and 0.82 on the NAB and AnoML-IOT datasets, respectively. Additionally, the model achieved F1 scores of 0.96 and 0.89 on these datasets, underscoring its effectiveness in enhancing IIoT security and optimising cybersecurity for industrial processes. This research not only identifies security vulnerabilities but also presents concrete solutions to improve the security posture of IIoT systems.

工业物联网(IIoT)通过实时监控改变了工业运营,提高了效率和生产力。然而,这种连接带来了重大的安全挑战。本研究通过使用基于机器学习的异常检测模型识别异常传感器数据模式来解决这些挑战。拟议的框架采用了先进的算法,以加强工业对网络威胁和中断的防御。本研究关注温度异常,这是工业安全的一个关键但经常被忽视的方面,通过评估用于此目的的机器学习模型,填补了文献中的空白。提出了一种基于方差的温度异常检测模型,该模型在NAB和AnoML-IOT数据集上的准确率分别为0.92和0.82。此外,该模型在这些数据集上的F1得分分别为0.96和0.89,强调了其在增强工业物联网安全性和优化工业过程网络安全方面的有效性。本研究不仅识别了安全漏洞,还提出了改善工业物联网系统安全态势的具体解决方案。
{"title":"Variance-driven security optimisation in industrial IoT sensors","authors":"Hardik Gupta,&nbsp;Sunil K. Singh,&nbsp;Sudhakar Kumar,&nbsp;Karan Sharma,&nbsp;Hardeep Saini,&nbsp;Brij B. Gupta,&nbsp;Varsha Arya,&nbsp;Kwok Tai Chui","doi":"10.1049/ntw2.12139","DOIUrl":"10.1049/ntw2.12139","url":null,"abstract":"<p>The Industrial Internet of Things (IIoT) has transformed industrial operations with real-time monitoring and control, enhancing efficiency and productivity. However, this connectivity brings significant security challenges. This study addresses these challenges by identifying abnormal sensor data patterns using machine learning-based anomaly detection models. The proposed framework employs advanced algorithms to strengthen industrial defences against cyber threats and disruptions. Focusing on temperature anomalies, a critical yet often overlooked aspect of industrial security, this research fills a gap in the literature by evaluating machine learning models for this purpose. A novel variance-based model for temperature anomaly detection is introduced, demonstrating high efficacy with accuracy scores of 0.92 and 0.82 on the NAB and AnoML-IOT datasets, respectively. Additionally, the model achieved F1 scores of 0.96 and 0.89 on these datasets, underscoring its effectiveness in enhancing IIoT security and optimising cybersecurity for industrial processes. This research not only identifies security vulnerabilities but also presents concrete solutions to improve the security posture of IIoT systems.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12139","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental assessment of containers running on top of virtual machines 运行在虚拟机上的容器的实验评估
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-10 DOI: 10.1049/ntw2.12138
Hossein Aqasizade, Ehsan Ataie, Mostafa Bastam

Over the past two decades, the cloud computing paradigm has gradually attracted more popularity due to its efficient resource usage and simple service access model. Virtualisation technology is the fundamental element of cloud computing that brings several benefits to cloud users and providers, such as workload isolation, energy efficiency, server consolidation, and cost reduction. This paper examines the combination of operating system-level virtualisation (containers) and hardware-level virtualisation (virtual machines). To this end, the performance of containers running on top of virtual machines is experimentally compared with standalone virtual machines and containers based on different hardware resources, including the processor, main memory, disk, and network in a real testbed by running the most commonly used benchmarks. Paravirtualisation and full virtualisation as well as type 1 and type 2 hypervisors are covered in this study. In addition, three prevalent containerisation platforms are examined.

在过去的二十年中,云计算范式由于其高效的资源利用和简单的服务访问模型而逐渐受到越来越多的欢迎。虚拟化技术是云计算的基本元素,它为云用户和提供商带来了一些好处,例如工作负载隔离、能源效率、服务器整合和降低成本。本文研究了操作系统级虚拟化(容器)和硬件级虚拟化(虚拟机)的结合。为此,通过运行最常用的基准测试,将在虚拟机上运行的容器的性能与基于不同硬件资源(包括处理器、主内存、磁盘和网络)的独立虚拟机和容器进行实验性比较。本研究涵盖了半虚拟化和完全虚拟化以及类型1和类型2管理程序。此外,三个流行的集装箱化平台进行了审查。
{"title":"Experimental assessment of containers running on top of virtual machines","authors":"Hossein Aqasizade,&nbsp;Ehsan Ataie,&nbsp;Mostafa Bastam","doi":"10.1049/ntw2.12138","DOIUrl":"10.1049/ntw2.12138","url":null,"abstract":"<p>Over the past two decades, the cloud computing paradigm has gradually attracted more popularity due to its efficient resource usage and simple service access model. Virtualisation technology is the fundamental element of cloud computing that brings several benefits to cloud users and providers, such as workload isolation, energy efficiency, server consolidation, and cost reduction. This paper examines the combination of operating system-level virtualisation (containers) and hardware-level virtualisation (virtual machines). To this end, the performance of containers running on top of virtual machines is experimentally compared with standalone virtual machines and containers based on different hardware resources, including the processor, main memory, disk, and network in a real testbed by running the most commonly used benchmarks. Paravirtualisation and full virtualisation as well as type 1 and type 2 hypervisors are covered in this study. In addition, three prevalent containerisation platforms are examined.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2024-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12138","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management 智能森林监测:采用最短路径路由的新型物联网框架,促进可持续环境管理
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-22 DOI: 10.1049/ntw2.12135
Alireza Etaati, Mostafa Bastam, Ehsan Ataie

Forests play a pivotal role in protecting the environment, preserving vital natural resources, and ultimately sustaining human life. However, the escalating occurrences of forest fires, whether of human origin or due to climate change, poses a significant threat to this ecosystem. In recent decades, the emergence of the IoT has been characterised by the utilisation of smart sensors for real-time data collection. IoT facilitates proactive decision-making for forest monitoring, control, and protection through advanced data analysis techniques, including AI algorithms. This research study presents a comprehensive approach to deploying a dynamic and adaptable network topology in forest environments, aimed at optimising data transmission and enhancing system reliability. Three distinct topologies are proposed in this research study: direct transmission from nodes to gateways, cluster formation with multi-step data transmission, and clustering with data relayed by cluster heads. A key innovation is the use of high-powered telecommunication modules in cluster heads, enabling long-range data transmission while considering energy efficiency through solar power. To enhance system reliability, this study incorporates a reserve routing mechanism to mitigate the impact of node or cluster head failures. Additionally, the placement of gateway nodes is optimised using meta-heuristic algorithms, including particle swarm optimisation (PSO), harmony search algorithm (HSA), and ant colony optimisation for continuous domains (ACOR), with ACOR emerging as the most effective. The primary objective of this article is to reduce power consumption, alleviate network traffic, and decrease nodes' interdependence, while also considering reliability coefficients and error tolerance as additional considerations. As shown in the results, the proposed methods effectively reduce network traffic, optimise routing, and ensure robust performance across various environmental conditions, highlighting the importance of these tailored topologies in enhancing energy efficiency, data accuracy, and network reliability in forest monitoring applications.

森林在保护环境、保存重要自然资源以及最终维持人类生活方面发挥着举足轻重的作用。然而,无论是人为因素还是气候变化导致的森林火灾不断升级,都对这一生态系统构成了重大威胁。近几十年来,物联网的特点是利用智能传感器进行实时数据收集。物联网通过先进的数据分析技术,包括人工智能算法,为森林监测、控制和保护的前瞻性决策提供了便利。本研究提出了一种在森林环境中部署动态、适应性强的网络拓扑的综合方法,旨在优化数据传输和提高系统可靠性。本研究提出了三种不同的拓扑结构:从节点到网关的直接传输、多步骤数据传输的集群形成,以及由集群首脑转发数据的集群。一个关键的创新是在簇头中使用大功率电信模块,从而实现远距离数据传输,同时考虑到通过太阳能发电的能源效率。为提高系统可靠性,本研究采用了一种储备路由机制,以减轻节点或簇头故障的影响。此外,还使用元启发式算法优化了网关节点的位置,包括粒子群优化算法(PSO)、和谐搜索算法(HSA)和连续域蚁群优化算法(ACOR),其中 ACOR 最为有效。本文的主要目标是降低功耗、减轻网络流量和减少节点的相互依赖性,同时还将可靠性系数和容错性作为额外的考虑因素。结果表明,所提出的方法有效地减少了网络流量,优化了路由,并确保了在各种环境条件下的稳健性能,突出了这些量身定制的拓扑结构在提高森林监测应用的能效、数据准确性和网络可靠性方面的重要性。
{"title":"Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management","authors":"Alireza Etaati,&nbsp;Mostafa Bastam,&nbsp;Ehsan Ataie","doi":"10.1049/ntw2.12135","DOIUrl":"10.1049/ntw2.12135","url":null,"abstract":"<p>Forests play a pivotal role in protecting the environment, preserving vital natural resources, and ultimately sustaining human life. However, the escalating occurrences of forest fires, whether of human origin or due to climate change, poses a significant threat to this ecosystem. In recent decades, the emergence of the IoT has been characterised by the utilisation of smart sensors for real-time data collection. IoT facilitates proactive decision-making for forest monitoring, control, and protection through advanced data analysis techniques, including AI algorithms. This research study presents a comprehensive approach to deploying a dynamic and adaptable network topology in forest environments, aimed at optimising data transmission and enhancing system reliability. Three distinct topologies are proposed in this research study: direct transmission from nodes to gateways, cluster formation with multi-step data transmission, and clustering with data relayed by cluster heads. A key innovation is the use of high-powered telecommunication modules in cluster heads, enabling long-range data transmission while considering energy efficiency through solar power. To enhance system reliability, this study incorporates a reserve routing mechanism to mitigate the impact of node or cluster head failures. Additionally, the placement of gateway nodes is optimised using meta-heuristic algorithms, including particle swarm optimisation (PSO), harmony search algorithm (HSA), and ant colony optimisation for continuous domains (ACOR), with ACOR emerging as the most effective. The primary objective of this article is to reduce power consumption, alleviate network traffic, and decrease nodes' interdependence, while also considering reliability coefficients and error tolerance as additional considerations. As shown in the results, the proposed methods effectively reduce network traffic, optimise routing, and ensure robust performance across various environmental conditions, highlighting the importance of these tailored topologies in enhancing energy efficiency, data accuracy, and network reliability in forest monitoring applications.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"528-545"},"PeriodicalIF":1.4,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12135","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method 基于 ECIE 方法分析 VANET 中 AODV、OLSR 和 DSDV 路由协议的性能
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-17 DOI: 10.1049/ntw2.12136
Moawiah El-Dalahmeh, Adi El-Dalahmeh, Usman Adeel

In a vehicular ad hoc network (VANET), vehicles communicate with each other (V2V) and with infrastructure (V2I) to optimise routing and reach their destinations efficiently. Various routing protocols in the VANET environment facilitate the dissemination of different types of messages, such as those for emergencies or traffic updates. However, previous research has not sufficiently addressed the challenges of energy efficiency, security, and reliability in VANET routing. This work aims to fill that gap by analysing the performance of three major VANET routing protocols—ad hoc on-demand distance vector (AODV), Optimised Link State Routing (OLSR), and Destination Sequenced Distance Vector—integrated with elliptic curve integrated encryption. The goal is to determine the most suitable routing protocol based on these key parameters. The study involves two key processes: registration and authentication, and the analysis of ECIE-enhanced routing protocols (ECIE-AODV, ECIE-OLSR, and ECIE-DSDV). These protocols were simulated using OMNET++ and SUMO tools, and the results were evaluated based on metrics such as throughput, packet delivery ratio, end-to-end delay (e2e), jitter, and routing overhead.

在车载临时网络(VANET)中,车辆之间(V2V)以及车辆与基础设施(V2I)之间进行通信,以优化路由并高效到达目的地。VANET 环境中的各种路由协议有助于传播不同类型的信息,如紧急情况或交通更新信息。然而,以往的研究并没有充分解决 VANET 路由中的能效、安全性和可靠性挑战。这项工作旨在通过分析三种主要 VANET 路由协议的性能来填补这一空白,这三种协议是:椭圆曲线集成加密的临时按需距离矢量(AODV)、优化链路状态路由(OLSR)和目的地排序距离矢量。目标是根据这些关键参数确定最合适的路由协议。研究涉及两个关键过程:注册和验证,以及对 ECIE 增强路由协议(ECIE-AODV、ECIE-OLSR 和 ECIE-DSDV)的分析。使用 OMNET++ 和 SUMO 工具对这些协议进行了模拟,并根据吞吐量、数据包传送率、端到端延迟(e2e)、抖动和路由开销等指标对结果进行了评估。
{"title":"Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method","authors":"Moawiah El-Dalahmeh,&nbsp;Adi El-Dalahmeh,&nbsp;Usman Adeel","doi":"10.1049/ntw2.12136","DOIUrl":"10.1049/ntw2.12136","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <p>In a vehicular ad hoc network (VANET), vehicles communicate with each other (V2V) and with infrastructure (V2I) to optimise routing and reach their destinations efficiently. Various routing protocols in the VANET environment facilitate the dissemination of different types of messages, such as those for emergencies or traffic updates. However, previous research has not sufficiently addressed the challenges of energy efficiency, security, and reliability in VANET routing. This work aims to fill that gap by analysing the performance of three major VANET routing protocols—ad hoc on-demand distance vector (AODV), Optimised Link State Routing (OLSR), and Destination Sequenced Distance Vector—integrated with elliptic curve integrated encryption. The goal is to determine the most suitable routing protocol based on these key parameters. The study involves two key processes: registration and authentication, and the analysis of ECIE-enhanced routing protocols (ECIE-AODV, ECIE-OLSR, and ECIE-DSDV). These protocols were simulated using OMNET++ and SUMO tools, and the results were evaluated based on metrics such as throughput, packet delivery ratio, end-to-end delay (e2e), jitter, and routing overhead.</p>\u0000 </section>\u0000 </div>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"377-394"},"PeriodicalIF":1.4,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12136","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks 检测物联网网络零日分布式拒绝服务攻击的无监督方法
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-08 DOI: 10.1049/ntw2.12134
Monika Roopak, Simon Parkinson, Gui Yun Tian, Yachao Ran, Saad Khan, Balasubramaniyan Chandrasekaran

The authors introduce an unsupervised Intrusion Detection System designed to detect zero-day distributed denial of service (DDoS) attacks in Internet of Things (IoT) networks. This system can identify anomalies without needing prior knowledge or training on attack information. Zero-day attacks exploit previously unknown vulnerabilities, making them hard to detect with traditional deep learning and machine learning systems that require pre-labelled data. Labelling data is also a time-consuming task for security experts. Therefore, unsupervised methods are necessary to detect these new threats. The authors focus on DDoS attacks, which have recently caused significant financial and service disruptions for many organisations. As IoT networks grow, these attacks become more sophisticated and harmful. The proposed approach detects zero-day DDoS attacks by using random projection to reduce data dimensionality and an ensemble model combining K-means, Gaussian mixture model, and one-class SVM with a hard voting technique for classification. The method was evaluated using the CIC-DDoS2019 dataset and achieved an accuracy of 94.55%, outperforming other state-of-the-art unsupervised learning methods.

作者介绍了一种无监督入侵检测系统,旨在检测物联网(IoT)网络中的零日分布式拒绝服务(DDoS)攻击。该系统无需事先了解攻击信息或接受相关培训,即可识别异常情况。零日攻击利用的是以前未知的漏洞,因此传统的深度学习和机器学习系统很难检测到它们,因为它们需要预先标记数据。对于安全专家来说,标记数据也是一项耗时的任务。因此,有必要采用无监督方法来检测这些新威胁。作者重点介绍了 DDoS 攻击,这种攻击最近给许多组织造成了严重的财务和服务中断。随着物联网网络的发展,这些攻击变得更加复杂和有害。所提出的方法通过使用随机投影来降低数据维度,并结合 K-means、高斯混合模型、单类 SVM 和硬投票技术的组合模型来进行分类,从而检测零日 DDoS 攻击。该方法使用 CIC-DDoS2019 数据集进行了评估,准确率达到 94.55%,优于其他最先进的无监督学习方法。
{"title":"An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks","authors":"Monika Roopak,&nbsp;Simon Parkinson,&nbsp;Gui Yun Tian,&nbsp;Yachao Ran,&nbsp;Saad Khan,&nbsp;Balasubramaniyan Chandrasekaran","doi":"10.1049/ntw2.12134","DOIUrl":"10.1049/ntw2.12134","url":null,"abstract":"<p>The authors introduce an unsupervised Intrusion Detection System designed to detect zero-day distributed denial of service (DDoS) attacks in Internet of Things (IoT) networks. This system can identify anomalies without needing prior knowledge or training on attack information. Zero-day attacks exploit previously unknown vulnerabilities, making them hard to detect with traditional deep learning and machine learning systems that require pre-labelled data. Labelling data is also a time-consuming task for security experts. Therefore, unsupervised methods are necessary to detect these new threats. The authors focus on DDoS attacks, which have recently caused significant financial and service disruptions for many organisations. As IoT networks grow, these attacks become more sophisticated and harmful. The proposed approach detects zero-day DDoS attacks by using random projection to reduce data dimensionality and an ensemble model combining K-means, Gaussian mixture model, and one-class SVM with a hard voting technique for classification. The method was evaluated using the CIC-DDoS2019 dataset and achieved an accuracy of 94.55%, outperforming other state-of-the-art unsupervised learning methods.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"513-527"},"PeriodicalIF":1.4,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12134","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective ensemble electricity theft detection algorithm for smart grid 用于智能电网的有效集合窃电检测算法
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-02 DOI: 10.1049/ntw2.12132
Chun-Wei Tsai, Chi-Tse Lu, Chun-Hua Li, Shuo-Wen Zhang

Several machine learning and deep learning algorithms have been presented to detect the criminal behaviours in a smart grid environment in recent studies because of many successful results. However, most learning algorithms for the electricity theft detection have their pros and cons; hence, a critical research issue nowadays has been how to develop an effective detection algorithm that leverages the strengths of different learning algorithms. To demonstrate the performance of such an integrated detection model, the algorithm proposed first builds on deep neural networks, a meta-learner for determining the weights of detection models for the construction of an ensemble detection algorithm and then uses a promising metaheuristic algorithm named search economics to optimise the hyperparameters of the meta-learner. Experimental results show that the proposed algorithm is able to find better results and outperforms all the other state-of-the-art detection algorithms for electricity theft detection compared in terms of the accuracy, F1-score, area under the curve of precision-recall (AUC-PR), and area under the curve of receiver operating characteristic (AUC-ROC). Since the results show that the meta-learner of the proposed algorithm can improve the accuracy of deep learning algorithms, the authors expect that it will be used in other deep learning-based applications.

由于取得了许多成功的结果,最近的研究提出了几种机器学习和深度学习算法来检测智能电网环境中的犯罪行为。然而,大多数用于窃电检测的学习算法都各有利弊;因此,如何开发一种有效的检测算法,充分利用不同学习算法的优势,一直是当今研究的关键问题。为了证明这种集成检测模型的性能,所提出的算法首先建立在深度神经网络的基础上,利用元学习器来确定检测模型的权重,从而构建一个集合检测算法,然后使用一种名为搜索经济学的有前途的元启发式算法来优化元学习器的超参数。实验结果表明,所提出的算法能够找到更好的结果,并且在准确率、F1-分数、精度-召回曲线下面积(AUC-PR)和接收者操作特征曲线下面积(AUC-ROC)等方面都优于所有其他最先进的窃电检测算法。由于结果表明,所提算法的元学习器可以提高深度学习算法的准确性,作者期待它能在其他基于深度学习的应用中得到应用。
{"title":"An effective ensemble electricity theft detection algorithm for smart grid","authors":"Chun-Wei Tsai,&nbsp;Chi-Tse Lu,&nbsp;Chun-Hua Li,&nbsp;Shuo-Wen Zhang","doi":"10.1049/ntw2.12132","DOIUrl":"10.1049/ntw2.12132","url":null,"abstract":"<p>Several machine learning and deep learning algorithms have been presented to detect the criminal behaviours in a smart grid environment in recent studies because of many successful results. However, most learning algorithms for the electricity theft detection have their pros and cons; hence, a critical research issue nowadays has been how to develop an effective detection algorithm that leverages the strengths of different learning algorithms. To demonstrate the performance of such an integrated detection model, the algorithm proposed first builds on deep neural networks, a meta-learner for determining the weights of detection models for the construction of an ensemble detection algorithm and then uses a promising metaheuristic algorithm named search economics to optimise the hyperparameters of the meta-learner. Experimental results show that the proposed algorithm is able to find better results and outperforms all the other state-of-the-art detection algorithms for electricity theft detection compared in terms of the accuracy, F1-score, area under the curve of precision-recall (AUC-PR), and area under the curve of receiver operating characteristic (AUC-ROC). Since the results show that the meta-learner of the proposed algorithm can improve the accuracy of deep learning algorithms, the authors expect that it will be used in other deep learning-based applications.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"471-485"},"PeriodicalIF":1.4,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM) 独立于硬状态协议的组播--特定于源的组播(HPIM-SSM)
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1049/ntw2.12133
Ana Catarina Grilo, Pedro Oliveira, Rui Valadas

Source-specific multicast is a key technology for multicast services such as IPTV broadcasting, which relies on IGMPv3/MLDv2 for source-group membership signalling and multicast routing protocols such as PIM-SSM for building and maintaining receiver-initiated source-based distribution trees across the network. The authors propose the Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM), a novel multicast routing protocol that keeps the design principles of PIM-SSM but overcomes its limitations, such as slow convergence and the possibility of creating suboptimal trees. The state machines of HPIM-SSM were designed to react promptly to all network events susceptible to reconfiguring the multicast trees, avoiding the need for soft-state maintenance through the periodic transmission of control messages. Moreover, the authors eliminated the need for designated routers, which led to suboptimal trees, and introduced a control-driven assert protocol that operates per source, allowing for considerable memory savings. Finally, the protocol enables the coexistence of multiple unicast routing protocols. HPIM-SSM was implemented in Python, and its correctness was extensively validated through model-checking techniques. Furthermore, a comparison between HPIM-SSM and PIM-SSM was conducted, encompassing both theoretical analysis and experimental evaluation of convergence times. The results demonstrate clearly that HPIM-SSM outperforms PIM-SSM, exhibiting significantly faster convergence times and completely avoiding suboptimal trees.

特定于源的组播是 IPTV 广播等组播服务的一项关键技术,它依赖 IGMPv3/MLDv2 来发送源组成员信号,并依赖 PIM-SSM 等组播路由协议来构建和维护整个网络中由接收器启动的基于源的分布树。作者提出了硬状态协议独立组播-源特定组播(HPIM-SSM),这是一种新型组播路由协议,它保留了 PIM-SSM 的设计原则,但克服了其局限性,如收敛速度慢和可能创建次优树。HPIM-SSM 的状态机被设计为能对所有易受重新配置组播树影响的网络事件做出迅速反应,从而避免了通过定期传输控制信息进行软状态维护的需要。此外,作者还消除了对指定路由器的需求(指定路由器会导致树的次优化),并引入了一种按源运行的控制驱动断言协议,从而节省了大量内存。最后,该协议实现了多个单播路由协议的共存。HPIM-SSM 是用 Python 实现的,其正确性通过模型检查技术得到了广泛验证。此外,还对 HPIM-SSM 和 PIM-SSM 进行了比较,包括理论分析和收敛时间的实验评估。结果清楚地表明,HPIM-SSM 优于 PIM-SSM,收敛时间明显更快,而且完全避免了次优树。
{"title":"Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM)","authors":"Ana Catarina Grilo,&nbsp;Pedro Oliveira,&nbsp;Rui Valadas","doi":"10.1049/ntw2.12133","DOIUrl":"10.1049/ntw2.12133","url":null,"abstract":"<p>Source-specific multicast is a key technology for multicast services such as IPTV broadcasting, which relies on IGMPv3/MLDv2 for source-group membership signalling and multicast routing protocols such as PIM-SSM for building and maintaining receiver-initiated source-based distribution trees across the network. The authors propose the Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM), a novel multicast routing protocol that keeps the design principles of PIM-SSM but overcomes its limitations, such as slow convergence and the possibility of creating suboptimal trees. The state machines of HPIM-SSM were designed to react promptly to all network events susceptible to reconfiguring the multicast trees, avoiding the need for soft-state maintenance through the periodic transmission of control messages. Moreover, the authors eliminated the need for designated routers, which led to suboptimal trees, and introduced a control-driven assert protocol that operates per source, allowing for considerable memory savings. Finally, the protocol enables the coexistence of multiple unicast routing protocols. HPIM-SSM was implemented in Python, and its correctness was extensively validated through model-checking techniques. Furthermore, a comparison between HPIM-SSM and PIM-SSM was conducted, encompassing both theoretical analysis and experimental evaluation of convergence times. The results demonstrate clearly that HPIM-SSM outperforms PIM-SSM, exhibiting significantly faster convergence times and completely avoiding suboptimal trees.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"486-512"},"PeriodicalIF":1.4,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12133","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks 在支持非正交多址接入的 B5G/6G 网络中分配资源的详细强化学习框架
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-11 DOI: 10.1049/ntw2.12131
Nouri Omheni, Anis Amiri, Faouzi Zarai

The world of communications technology has recently undergone an extremely significant revolution. This revolution is an immediate consequence of the immersion that the fifth generation B5G and 6G have just brought. The latter responds to the growing need for connectivity and it improves the speeds and qualities of the mobile connection. To improve the energy and spectral efficiency of these types of networks, the non-orthogonal multiple access (NOMA) technique is seen as the key solution that can accommodate more users and dramatically improve spectrum efficiency. The basic idea of NOMA is to achieve multiple access in the power sector and decode the required signal via continuous interference cancelation. A resource allocation approach is proposed for the B5G/6G-NOMA network that aims to maximise system throughput, spectrum and energy efficiency and fairness among users while minimising latency. The proposed approach is based on reinforcement learning (RL) with the use of the Q-Learning algorithm. First, the process of resource allocation as a problem of maximising rewards is formulated. Next, the Q-Learning algorithm is used to design a resource allocation algorithm based on RL. The results of the simulation confirm that the proposed scheme is feasible and efficient.

通信技术世界最近经历了一场极其重大的革命。这场革命是第五代 B5G 和 6G 带来的直接后果。后者满足了人们日益增长的连接需求,提高了移动连接的速度和质量。为了提高这类网络的能效和频谱效率,非正交多址接入(NOMA)技术被视为关键的解决方案,它可以容纳更多用户,并显著提高频谱效率。非正交多址技术的基本思想是在功率扇区实现多址接入,并通过连续干扰消除对所需信号进行解码。本文为 B5G/6G-NOMA 网络提出了一种资源分配方法,旨在最大限度地提高系统吞吐量、频谱和能效以及用户间的公平性,同时最大限度地减少延迟。所提方法基于强化学习(RL),使用 Q-Learning 算法。首先,将资源分配过程表述为报酬最大化问题。然后,利用 Q-Learning 算法设计了基于 RL 的资源分配算法。仿真结果证实,所提出的方案是可行且高效的。
{"title":"A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks","authors":"Nouri Omheni,&nbsp;Anis Amiri,&nbsp;Faouzi Zarai","doi":"10.1049/ntw2.12131","DOIUrl":"10.1049/ntw2.12131","url":null,"abstract":"<p>The world of communications technology has recently undergone an extremely significant revolution. This revolution is an immediate consequence of the immersion that the fifth generation B5G and 6G have just brought. The latter responds to the growing need for connectivity and it improves the speeds and qualities of the mobile connection. To improve the energy and spectral efficiency of these types of networks, the non-orthogonal multiple access (NOMA) technique is seen as the key solution that can accommodate more users and dramatically improve spectrum efficiency. The basic idea of NOMA is to achieve multiple access in the power sector and decode the required signal via continuous interference cancelation. A resource allocation approach is proposed for the B5G/6G-NOMA network that aims to maximise system throughput, spectrum and energy efficiency and fairness among users while minimising latency. The proposed approach is based on reinforcement learning (RL) with the use of the Q-Learning algorithm. First, the process of resource allocation as a problem of maximising rewards is formulated. Next, the Q-Learning algorithm is used to design a resource allocation algorithm based on RL. The results of the simulation confirm that the proposed scheme is feasible and efficient.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"455-470"},"PeriodicalIF":1.4,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12131","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Configuration of multi-shaper Time-Sensitive Networking for industrial applications 为工业应用配置多分频器时敏网络
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-30 DOI: 10.1049/ntw2.12129
Paul Pop, Konstantinos Alexandris, Tongtong Wang

IEEE 802.1 Time-Sensitive Networking (TSN) has proposed several shapers, for example, time-aware shaper (TAS, 802.1Qbv), asynchronous traffic shaping (ATS, 802.1Qcr), credit-based shaper (CBS, 802.1Qav), and cyclic queuing and forwarding (CQF, 802.1Qch). The shapers have their advantages and disadvantages and can be used in isolation or in combination to address the varied timing requirements of industrial application streams. There is very limited work on how to analyse and configure shaper combinations. The authors are interested in the configuration optimisation of multi-shaper TSN networks, targeting the TAS + CBS, TAS + ATS, and TAS + Multi-CQF combinations. The authors first propose multi-shaper integration approaches, focusing on a novel iterative delay analysis for TAS + ATS, an approach to integrate TAS and CQF by placing constraints on TAS scheduling as well as the TAS and CBS integration. We formulate the combinatorial optimisation problem of configuring multi-shaper TSN networks, which consists, for example, of the routing of streams, the assignment of streams to the egress port queues, and the synthesis of gate control lists for TAS. Then, the authors propose a solution based on a simulated annealing metaheuristic. The proposed solutions are evaluated on large realistic test cases, up to tens of thousands of streams and devices.

IEEE 802.1 时敏网络(TSN)提出了几种整形器,例如时间感知整形器(TAS,802.1Qbv)、异步流量整形器(ATS,802.1Qcr)、基于信用的整形器(CBS,802.1Qav)以及循环队列和转发(CQF,802.1Qch)。这些整形器各有优缺点,可以单独使用,也可以组合使用,以满足工业应用流的不同定时要求。关于如何分析和配置整形器组合的研究非常有限。作者对多整形器 TSN 网络的配置优化很感兴趣,目标是 TAS + CBS、TAS + ATS 和 TAS + Multi-CQF 组合。作者首先提出了多整形器集成方法,重点是 TAS + ATS 的新颖迭代延迟分析、通过对 TAS 调度以及 TAS 和 CBS 集成施加约束来集成 TAS 和 CQF 的方法。我们提出了配置多整形器 TSN 网络的组合优化问题,其中包括流的路由选择、向出口端口队列分配流以及合成 TAS 的门控列表等。然后,作者提出了一种基于模拟退火元搜索的解决方案。作者在多达数万个流和设备的大型实际测试案例中对所提出的解决方案进行了评估。
{"title":"Configuration of multi-shaper Time-Sensitive Networking for industrial applications","authors":"Paul Pop,&nbsp;Konstantinos Alexandris,&nbsp;Tongtong Wang","doi":"10.1049/ntw2.12129","DOIUrl":"10.1049/ntw2.12129","url":null,"abstract":"<p>IEEE 802.1 Time-Sensitive Networking (TSN) has proposed several shapers, for example, time-aware shaper (TAS, 802.1Qbv), asynchronous traffic shaping (ATS, 802.1Qcr), credit-based shaper (CBS, 802.1Qav), and cyclic queuing and forwarding (CQF, 802.1Qch). The shapers have their advantages and disadvantages and can be used in isolation or in combination to address the varied timing requirements of industrial application streams. There is very limited work on how to analyse and configure shaper combinations. The authors are interested in the configuration optimisation of multi-shaper TSN networks, targeting the TAS + CBS, TAS + ATS, and TAS + Multi-CQF combinations. The authors first propose multi-shaper integration approaches, focusing on a novel iterative delay analysis for TAS + ATS, an approach to integrate TAS and CQF by placing constraints on TAS scheduling as well as the TAS and CBS integration. We formulate the combinatorial optimisation problem of configuring multi-shaper TSN networks, which consists, for example, of the routing of streams, the assignment of streams to the egress port queues, and the synthesis of gate control lists for TAS. Then, the authors propose a solution based on a simulated annealing metaheuristic. The proposed solutions are evaluated on large realistic test cases, up to tens of thousands of streams and devices.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"434-454"},"PeriodicalIF":1.4,"publicationDate":"2024-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12129","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meta-analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges 异常网络入侵检测系统的元分析和系统综述:检测方法、数据集、验证方法和挑战
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-18 DOI: 10.1049/ntw2.12128
Ziadoon K. Maseer, Qusay Kanaan Kadhim, Baidaa Al-Bander, Robiah Yusof, Abdu Saif

Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta-analysis to provide an in-depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS-based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security.

建立在人工智能(AI)基础上的入侵检测系统是主动检测复杂网络上新攻击的潜在机制。作者采用定性方法系统地分析和评估了网络入侵检测系统(NIDS)的性能。不过,他们的方法也有局限性,因为这种方法只通过分析和总结数据比较找出差距,而没有考虑对 NIDS 性能进行定量测量。作者详细讨论了各种深度学习(DL)方法,并根据网络和攻击类型的基础架构解释了数据入侵网络。作者的主要贡献在于利用荟萃分析法进行了系统综述,对近期著名作品中的深度学习和传统机器学习(ML)进行了深入分析。作者评估了验证方法,并阐明了与数据集入侵、检测到的攻击和分类任务相关的最新趋势,以改进基于 NIDS 的出版物中的传统 ML 和 DL。最后,作者还讨论了网络安全面临的新风险和复杂性所带来的挑战和未来发展。
{"title":"Meta-analysis and systematic review for anomaly network intrusion detection systems: Detection methods, dataset, validation methodology, and challenges","authors":"Ziadoon K. Maseer,&nbsp;Qusay Kanaan Kadhim,&nbsp;Baidaa Al-Bander,&nbsp;Robiah Yusof,&nbsp;Abdu Saif","doi":"10.1049/ntw2.12128","DOIUrl":"10.1049/ntw2.12128","url":null,"abstract":"<p>Intrusion detection systems built on artificial intelligence (AI) are presented as latent mechanisms for actively detecting fresh attacks over a complex network. The authors used a qualitative method for analysing and evaluating the performance of network intrusion detection system (NIDS) in a systematic way. However, their approach has limitations as it only identifies gaps by analysing and summarising data comparisons without considering quantitative measurements of NIDS's performance. The authors provide a detailed discussion of various deep learning (DL) methods and explain data intrusion networks based on an infrastructure of networks and attack types. The authors’ main contribution is a systematic review that utilises meta-analysis to provide an in-depth analysis of DL and traditional machine learning (ML) in notable recent works. The authors assess validation methodologies and clarify recent trends related to dataset intrusion, detected attacks, and classification tasks to improve traditional ML and DL in NIDS-based publications. Finally, challenges and future developments are discussed to pose new risks and complexities for network security.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"339-376"},"PeriodicalIF":1.4,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12128","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1