首页 > 最新文献

Computer Science Review最新文献

英文 中文
A systematic review of federated learning incentive mechanisms and associated security challenges 联邦学习激励机制和相关安全挑战的系统综述
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-13 DOI: 10.1016/j.cosrev.2023.100593
Asad Ali , Inaam Ilahi , Adnan Qayyum , Ihab Mohammed , Ala Al-Fuqaha , Junaid Qadir

In response to various privacy risks, researchers and practitioners have been exploring different paradigms that can leverage the increased computational capabilities of consumer devices to train machine learning (ML) models in a distributed fashion without requiring the uploading of the training data from individual devices to central facilities. For this purpose, federated learning (FL) was proposed as a technique that can learn a global machine model at a central master node by the aggregation of models trained locally using private data. However, organizations may be reluctant to train models locally and to share these local ML models due to the required computational resources for model training at their end and due to privacy risks that may result from adversaries inverting these models to infer information about the private training data. Incentive mechanisms have been proposed to motivate end users to participate in collaborative training of ML models (using their local data) in return for certain rewards. However, the design of an optimal incentive mechanism for FL is challenging due to its distributed nature and the fact that the central server has no access to clients’ hyperparameters information and the amount/quality data used for training, which makes the task of determining the reward based on the contribution of individual clients in FL environment difficult. Even though several incentive mechanisms have been proposed for FL, a thorough up-to-date systematic review is missing and this paper fills this gap. To the best of our knowledge, this paper is the first systematic review that comprehensively enlists the design principles required for implementing these incentive mechanisms and then categorizes various incentive mechanisms according to their design principles. In addition, we also provide a comprehensive overview of security challenges associated with incentive-driven FL. Finally, we highlight the limitations and pitfalls of these incentive schemes and elaborate upon open-research issues that require further research attention.

为了应对各种隐私风险,研究人员和从业者一直在探索不同的范式,这些范式可以利用消费者设备增加的计算能力,以分布式方式训练机器学习(ML)模型,而不需要将训练数据从单个设备上传到中央设施。为此,提出了联邦学习(FL),作为一种可以通过聚合使用私有数据在本地训练的模型来在中央主节点学习全局机器模型的技术。然而,组织可能不愿意在本地训练模型并共享这些本地ML模型,这是因为它们末端的模型训练所需的计算资源,以及由于对手反转这些模型以推断有关私人训练数据的信息可能导致的隐私风险。已经提出了激励机制来激励最终用户参与ML模型的协作训练(使用他们的本地数据),以换取某些奖励。然而,由于FL的分布式性质以及中央服务器无法访问客户端的超参数信息和用于训练的数量/质量数据,因此FL的最佳激励机制的设计具有挑战性,这使得基于单个客户端在FL环境中的贡献来确定奖励的任务变得困难。尽管已经为FL提出了几种激励机制,但缺乏最新的系统综述,本文填补了这一空白。据我们所知,本文是第一篇系统综述,全面列出了实施这些激励机制所需的设计原则,然后根据其设计原则对各种激励机制进行了分类。此外,我们还全面概述了与激励驱动的FL相关的安全挑战。最后,我们强调了这些激励方案的局限性和陷阱,并详细阐述了需要进一步研究关注的开放研究问题。
{"title":"A systematic review of federated learning incentive mechanisms and associated security challenges","authors":"Asad Ali ,&nbsp;Inaam Ilahi ,&nbsp;Adnan Qayyum ,&nbsp;Ihab Mohammed ,&nbsp;Ala Al-Fuqaha ,&nbsp;Junaid Qadir","doi":"10.1016/j.cosrev.2023.100593","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100593","url":null,"abstract":"<div><p>In response to various privacy risks, researchers and practitioners have been exploring different paradigms that can leverage the increased computational capabilities of consumer devices to train machine learning<span> (ML) models in a distributed fashion without requiring the uploading of the training data from individual devices to central facilities. For this purpose, federated learning (FL) was proposed as a technique that can learn a global machine model at a central master node by the aggregation of models trained locally using private data. However, organizations may be reluctant to train models locally and to share these local ML models due to the required computational resources for model training at their end and due to privacy risks that may result from adversaries inverting these models to infer information about the private training data. Incentive mechanisms have been proposed to motivate end users to participate in collaborative training of ML models (using their local data) in return for certain rewards. However, the design of an optimal incentive mechanism for FL is challenging due to its distributed nature and the fact that the central server has no access to clients’ hyperparameters information and the amount/quality data used for training, which makes the task of determining the reward based on the contribution of individual clients in FL environment difficult. Even though several incentive mechanisms have been proposed for FL, a thorough up-to-date systematic review is missing and this paper fills this gap. To the best of our knowledge, this paper is the first systematic review that comprehensively enlists the design principles required for implementing these incentive mechanisms and then categorizes various incentive mechanisms according to their design principles. In addition, we also provide a comprehensive overview of security challenges associated with incentive-driven FL. Finally, we highlight the limitations and pitfalls of these incentive schemes and elaborate upon open-research issues that require further research attention.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100593"},"PeriodicalIF":12.9,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises 对中小型企业网络安全意识的研究和知识差距的探索
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-12 DOI: 10.1016/j.cosrev.2023.100592
Sunil Chaudhary , Vasileios Gkioulos , Sokratis Katsikas

The proliferation of information and communication technologies in enterprises enables them to develop new business models and enhance their operational and commercial activities. Nevertheless, this practice also introduces new cybersecurity risks and vulnerabilities. This may not be an issue for large organizations with the resources and mature cybersecurity programs in place; the situation with small and medium-sized enterprises (SMEs) is different since they often lack the resources, expertise, and incentives to prioritize cybersecurity. In such cases, cybersecurity awareness can be a critical component of cyberdefense. However, research studies dealing with cybersecurity awareness or related domains exclusively for SMEs are rare, indicating a pressing need for research addressing the cybersecurity awareness requirements of SMEs.

Prior to that, though, it is crucial to identify which aspects of cybersecurity awareness require further research in order to adapt or conform to the needs of SMEs. In this study, we conducted a systematic literature review that focused on cybersecurity awareness, prioritizing those performed with a particular focus on SMEs. The study seeks to analyze and evaluate such studies primarily to determine knowledge and research gaps in the cybersecurity awareness field for SMEs, thus providing a direction for future research.

信息和通信技术在企业中的普及使它们能够发展新的商业模式,加强其经营和商业活动。尽管如此,这种做法也带来了新的网络安全风险和漏洞。对于拥有资源和成熟网络安全计划的大型组织来说,这可能不是一个问题;中小企业的情况有所不同,因为它们往往缺乏资源、专业知识和激励措施来优先考虑网络安全。在这种情况下,网络安全意识可能是网络防御的关键组成部分。然而,专门针对中小企业的网络安全意识或相关领域的研究很少,这表明迫切需要针对中小企业网络安全意识要求进行研究。不过,在此之前,至关重要的是要确定网络安全意识的哪些方面需要进一步研究,以适应或符合中小企业的需求。在这项研究中,我们进行了一项系统的文献综述,重点关注网络安全意识,优先考虑那些特别关注中小企业的研究。该研究旨在分析和评估此类研究,主要是为了确定中小企业在网络安全意识领域的知识和研究差距,从而为未来的研究提供方向。
{"title":"A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises","authors":"Sunil Chaudhary ,&nbsp;Vasileios Gkioulos ,&nbsp;Sokratis Katsikas","doi":"10.1016/j.cosrev.2023.100592","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100592","url":null,"abstract":"<div><p>The proliferation of information and communication technologies in enterprises enables them to develop new business models and enhance their operational and commercial activities. Nevertheless, this practice also introduces new cybersecurity risks and vulnerabilities. This may not be an issue for large organizations with the resources and mature cybersecurity programs in place; the situation with small and medium-sized enterprises (SMEs) is different since they often lack the resources, expertise, and incentives to prioritize cybersecurity. In such cases, cybersecurity awareness can be a critical component of cyberdefense. However, research studies dealing with cybersecurity awareness or related domains exclusively for SMEs are rare, indicating a pressing need for research addressing the cybersecurity awareness requirements of SMEs.</p><p>Prior to that, though, it is crucial to identify which aspects of cybersecurity awareness require further research in order to adapt or conform to the needs of SMEs. In this study, we conducted a systematic literature review that focused on cybersecurity awareness, prioritizing those performed with a particular focus on SMEs. The study seeks to analyze and evaluate such studies primarily to determine knowledge and research gaps in the cybersecurity awareness field for SMEs, thus providing a direction for future research.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100592"},"PeriodicalIF":12.9,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns 全面回顾“医疗物联网”:网络方面、技术、服务、应用、挑战和安全问题
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-07 DOI: 10.1016/j.cosrev.2023.100591
Himanshu Verma , Naveen Chauhan , Lalit Kumar Awasthi

The Internet of Things (IoT) is a smart, internet-connected, and omnipresent network. Healthcare is one of the most critical sectors that could benefit from IoT technology. In the medical sphere, the rise of the IoT transforms traditional healthcare services by encouraging technological, social, and economic factors. This study rigorously analyzes various aspects of the Internet of Healthcare Things (IoHT), such as networking terminology, enabling communication technologies, services, applications, implementation issues, research challenges, and security-related concerns. Communication techniques under licensed and unlicensed spectra are extensively investigated and compared on various identified parameters for short- and long-range connectivity. The aforementioned aspects thoroughly review the operational and implementation roles of enabling technology. Following a rigorous analysis, multiple research issues and challenges are identified and discussed, along with recommendations to address them. After that, several IoHT services and applications are highlighted and reviewed with a comparative analysis regarding enabling technologies. Additionally, essential security and privacy concerns, along with probable threats and attacks related to the Internet of Healthcare Things, are mentioned in this work. Finally, this paper also emphasizes the future directions of the IoHT domain.

物联网(IoT)是一个智能的、与互联网连接的、无所不在的网络。医疗保健是可以从物联网技术中受益的最关键行业之一。在医疗领域,物联网的兴起通过鼓励技术、社会和经济因素来改变传统的医疗保健服务。本研究严格分析了医疗物联网(IoHT)的各个方面,如网络术语、启用通信技术、服务、应用、实施问题、研究挑战和安全相关问题。对许可和非许可频谱下的通信技术进行了广泛的研究,并在各种已确定的参数上进行了短距离和远距离连接的比较。上述方面全面回顾了启用技术的操作和实现角色。经过严格的分析,确定和讨论了多个研究问题和挑战,并提出了解决这些问题的建议。之后,重点介绍了几种物联网服务和应用,并对使能技术进行了比较分析。此外,本工作还提到了基本的安全和隐私问题,以及与医疗保健物联网相关的可能威胁和攻击。最后,本文还强调了IoHT领域的未来发展方向。
{"title":"A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns","authors":"Himanshu Verma ,&nbsp;Naveen Chauhan ,&nbsp;Lalit Kumar Awasthi","doi":"10.1016/j.cosrev.2023.100591","DOIUrl":"10.1016/j.cosrev.2023.100591","url":null,"abstract":"<div><p><span><span>The Internet of Things (IoT) is a smart, internet-connected, and omnipresent network. Healthcare is one of the most critical sectors that could benefit from IoT technology. In the medical sphere, the rise of the IoT transforms traditional </span>healthcare services by encouraging technological, social, and economic factors. This study rigorously analyzes various aspects of the </span><em>Internet of Healthcare Things (IoHT)</em>, such as networking terminology, enabling communication technologies, services, applications, implementation issues, research challenges, and security-related concerns. Communication techniques under licensed and unlicensed spectra are extensively investigated and compared on various identified parameters for short- and long-range connectivity. The aforementioned aspects thoroughly review the operational and implementation roles of enabling technology. Following a rigorous analysis, multiple research issues and challenges are identified and discussed, along with recommendations to address them. After that, several IoHT services and applications are highlighted and reviewed with a comparative analysis regarding enabling technologies. Additionally, essential security and privacy concerns, along with probable threats and attacks related to the Internet of Healthcare Things, are mentioned in this work. Finally, this paper also emphasizes the future directions of the IoHT domain.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100591"},"PeriodicalIF":12.9,"publicationDate":"2023-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44660637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Uncertainty in runtime verification: A survey 运行时验证中的不确定性:调查
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-07 DOI: 10.1016/j.cosrev.2023.100594
Rania Taleb , Sylvain Hallé , Raphaël Khoury

Runtime Verification can be defined as a collection of formal methods for studying the dynamic evaluation of execution traces against formal specifications. Aside from creating a monitor from specifications and building algorithms for the evaluation of the trace, the process of gathering events and making them available for the monitor and the communication between the system under analysis and the monitor are critical and important steps in the runtime verification process. In many situations and for a variety of reasons, the event trace could be incomplete or could contain imprecise events. When a missing or ambiguous event is detected, the monitor may be unable to deliver a sound verdict. In this survey, we review the literature dealing with the problem of monitoring with incomplete traces. We list the different causes of uncertainty that have been identified, and analyze their effect on the monitoring process. We identify and compare the different methods that have been proposed to perform monitoring on such traces, highlighting the advantages and drawbacks of each method.

运行时验证可以定义为一组形式化方法,用于根据形式化规范研究执行轨迹的动态评估。除了根据规范创建监视器和构建用于评估跟踪的算法之外,收集事件并使其可用于监视器的过程以及正在分析的系统与监视器之间的通信是运行时验证过程中的关键和重要步骤。在许多情况下,由于各种原因,事件跟踪可能是不完整的,或者可能包含不精确的事件。当检测到缺失或模糊事件时,监视器可能无法提供可靠的判决。在这篇综述中,我们回顾了处理不完整痕迹监测问题的文献。我们列出了已确定的不确定性的不同原因,并分析了它们对监测过程的影响。我们确定并比较了已经提出的对这些痕迹进行监测的不同方法,突出了每种方法的优点和缺点。
{"title":"Uncertainty in runtime verification: A survey","authors":"Rania Taleb ,&nbsp;Sylvain Hallé ,&nbsp;Raphaël Khoury","doi":"10.1016/j.cosrev.2023.100594","DOIUrl":"10.1016/j.cosrev.2023.100594","url":null,"abstract":"<div><p>Runtime Verification can be defined as a collection of formal methods for studying the dynamic evaluation of execution traces against formal specifications. Aside from creating a monitor from specifications and building algorithms for the evaluation of the trace, the process of gathering events and making them available for the monitor and the communication between the system under analysis and the monitor are critical and important steps in the runtime verification process. In many situations and for a variety of reasons, the event trace could be incomplete or could contain imprecise events. When a missing or ambiguous event is detected, the monitor may be unable to deliver a sound verdict. In this survey, we review the literature dealing with the problem of monitoring with incomplete traces. We list the different causes of uncertainty that have been identified, and analyze their effect on the monitoring process. We identify and compare the different methods that have been proposed to perform monitoring on such traces, highlighting the advantages and drawbacks of each method.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100594"},"PeriodicalIF":12.9,"publicationDate":"2023-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46060737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey 网络应用中用于身份验证和访问控制的分布式账本技术:综合调查
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-02 DOI: 10.1016/j.cosrev.2023.100590
Fariba Ghaffari , Emmanuel Bertin , Noel Crespi , Julien Hatin

The accelerated growth of networking technologies highlights the importance of Authentication and Access Control (AAC) as protection against associated attacks. Controlling access to resources, facilitating resource sharing, and managing user mobility are some of the notable capabilities provided by AAC methods. Centralized methods are the most common deployment architectures, that can be threatened by several attacks at their central points. Emerging Distributed Ledger Technology (DLT) has attracted significant interest in the AAA community. The distributed nature of DLT and its immutability can bring unprecedented opportunities to resolve many of the challenges of conventional systems. We survey the state-of-the-art in deploying authentication and access control approaches via DLT for several networking use cases. More precisely, we explore DLT applications in (1) Authentication; (2) Access Control; and (3) Comprehensive AAC solutions. First, we present the challenges of centralized solutions and discuss the capability of DLT for their resolution. Then, we propose a taxonomy to categorize the existing methods. Analysis, comparison, and discussion on the advantages and disadvantages of these methods have been provided regarding different parameters such as DLT types, AAC approaches, security, reliability, scalability, etc. While DLT provides various benefits, several challenges remain for the migration to DLT-based AAC. In light of these general limitations, we propose some future directions, targeting the current lacunae and future needs.

网络技术的加速发展凸显了身份验证和访问控制(AAC)作为防范相关攻击的保护的重要性。控制对资源的访问、促进资源共享和管理用户移动性是AAC方法提供的一些重要功能。集中式方法是最常见的部署体系结构,其中心点可能受到多种攻击的威胁。新兴的分布式账本技术(DLT)已经引起了AAA社区的极大兴趣。DLT的分布式特性及其不变性可以为解决传统系统的许多挑战带来前所未有的机会。我们调查了通过DLT为几个网络用例部署身份验证和访问控制方法的最新技术。更准确地说,我们探索了DLT在(1)身份验证中的应用;(2)访问控制;(3)综合AAC解决方案。首先,我们提出了集中式解决方案的挑战,并讨论了DLT解决这些挑战的能力。然后,我们提出了一个分类法对现有的方法进行分类。针对DLT类型、AAC方法、安全性、可靠性、可扩展性等不同参数,对这些方法的优缺点进行了分析、比较和讨论。虽然DLT提供了各种好处,但向基于DLT的AAC迁移仍然存在一些挑战。鉴于这些普遍的限制,我们提出了一些未来的方向,针对当前的空白和未来的需求。
{"title":"Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey","authors":"Fariba Ghaffari ,&nbsp;Emmanuel Bertin ,&nbsp;Noel Crespi ,&nbsp;Julien Hatin","doi":"10.1016/j.cosrev.2023.100590","DOIUrl":"10.1016/j.cosrev.2023.100590","url":null,"abstract":"<div><p><span>The accelerated growth of networking technologies highlights the importance of Authentication and Access Control (AAC) as protection against associated attacks. Controlling access to resources, facilitating resource sharing, and managing user mobility are some of the notable capabilities provided by AAC methods. Centralized methods are the most common </span>deployment architectures, that can be threatened by several attacks at their central points. Emerging Distributed Ledger Technology (DLT) has attracted significant interest in the AAA community. The distributed nature of DLT and its immutability can bring unprecedented opportunities to resolve many of the challenges of conventional systems. We survey the state-of-the-art in deploying authentication and access control approaches via DLT for several networking use cases. More precisely, we explore DLT applications in (1) Authentication; (2) Access Control; and (3) Comprehensive AAC solutions. First, we present the challenges of centralized solutions and discuss the capability of DLT for their resolution. Then, we propose a taxonomy to categorize the existing methods. Analysis, comparison, and discussion on the advantages and disadvantages of these methods have been provided regarding different parameters such as DLT types, AAC approaches, security, reliability, scalability, etc. While DLT provides various benefits, several challenges remain for the migration to DLT-based AAC. In light of these general limitations, we propose some future directions, targeting the current lacunae and future needs.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100590"},"PeriodicalIF":12.9,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48129408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of IoT security and privacy using decentralized blockchain techniques 使用去中心化区块链技术的物联网安全和隐私综述
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.cosrev.2023.100585
Vinay Gugueoth , Sunitha Safavat , Sachin Shetty , Danda Rawat

IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different consensus protocols, existing security techniques and evaluation parameters are discussed in brief. In addition, the paper also outlines the open issues and highlights possible research opportunities which can be beneficial for future research.

物联网安全是近年来引起研究人员高度关注的突出问题之一。物联网的最新进展引入了各种关键的安全问题,并增加了物联网数据隐私泄露的风险。区块链的实施可以成为物联网安全问题的潜在解决方案。本文深入探讨了物联网中的安全威胁和问题,这些威胁和问题降低了物联网系统的有效性。本文对区块链与物联网融合过程中的安全威胁、基于区块链的解决方案、安全特征和挑战进行了直观描述。简要分析了不同的共识协议、现有的安全技术和评估参数。此外,本文还概述了开放的问题,并强调了可能的研究机会,这可能有利于未来的研究。
{"title":"A review of IoT security and privacy using decentralized blockchain techniques","authors":"Vinay Gugueoth ,&nbsp;Sunitha Safavat ,&nbsp;Sachin Shetty ,&nbsp;Danda Rawat","doi":"10.1016/j.cosrev.2023.100585","DOIUrl":"10.1016/j.cosrev.2023.100585","url":null,"abstract":"<div><p>IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different consensus protocols, existing security techniques and evaluation parameters are discussed in brief. In addition, the paper also outlines the open issues and highlights possible research opportunities which can be beneficial for future research.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100585"},"PeriodicalIF":12.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42243609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An empirical investigation of task scheduling and VM consolidation schemes in cloud environment 云环境下任务调度和虚拟机整合方案的实证研究
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-01 DOI: 10.1016/j.cosrev.2023.100583
Sweta Singh , Rakesh Kumar , Dayashankar Singh

Cloud computing has evolved as a new paradigm in Internet computing, offering services to the end-users and large-organizations, on-demand and pay-per-the-usage basis with high availability, elasticity, scalability and resiliency. In order to improve the performance of the Cloud system, handling multiple heterogeneous tasks concurrently, an appropriate task scheduler is required. To meet the user’s requirements in terms of Quality of Service (QoS) parameters, the task scheduling algorithm should identify the order in which tasks should be executed. Energy efficiency is the significant challenge in today’s task scheduling to meet the prerequisite for green computing. By increasing resource utilization at the data centers, virtual machine (VM) Consolidation is also recognized as the most widely used and promising approach in terms of energy consumption and system performance. However, excessive VM Consolidation could constitute a violation of the Service Level Agreement (SLA). The paper makes a contribution by outlining the numerous approaches that researchers have used thus far to achieve the goals of scheduling and VM Consolidation, assuring energy efficiency, and maintaining system performance. This would give readers a better understanding of the problems and the potential for improvement while assisting them in selecting the ideal scheduling algorithm with Consolidation technique. Additionally, the techniques are divided into three categories: those that primarily focus on task scheduling; those that target Consolidation; and complete computation, integrating task scheduling with VM Consolidation. Further classification for the scheduling algorithms include heuristic, meta-heuristic, greedy, and hybrid task scheduling algorithms. In addition to a summary of the benefits and drawbacks of the suggested algorithms, prospective research directions and recent developments in this area is also covered in this paper.

云计算已经发展成为互联网计算中的一种新范式,为最终用户和大型组织提供服务,按需和按使用付费,具有高可用性、弹性、可伸缩性和弹性。为了提高云系统的性能,并发处理多个异构任务,需要一个合适的任务调度器。为了满足用户对QoS (Quality of Service)参数的要求,任务调度算法需要确定任务执行的顺序。能源效率是当前任务调度面临的重大挑战,是实现绿色计算的前提。通过提高数据中心的资源利用率,虚拟机(VM)整合也被认为是在能耗和系统性能方面使用最广泛和最有前途的方法。但是,过多的VM整合可能会违反服务水平协议(SLA)。本文通过概述研究人员迄今为止使用的许多方法来实现调度和VM整合,确保能源效率和维护系统性能的目标,从而做出贡献。这将使读者更好地理解问题和改进的潜力,同时帮助他们选择理想的调度算法与整合技术。此外,这些技术分为三类:主要关注任务调度的技术;以整合为目标的;完成计算,将任务调度与VM整合在一起。调度算法的进一步分类包括启发式、元启发式、贪心和混合任务调度算法。除了总结所建议算法的优点和缺点外,本文还涵盖了该领域的前瞻性研究方向和最新发展。
{"title":"An empirical investigation of task scheduling and VM consolidation schemes in cloud environment","authors":"Sweta Singh ,&nbsp;Rakesh Kumar ,&nbsp;Dayashankar Singh","doi":"10.1016/j.cosrev.2023.100583","DOIUrl":"10.1016/j.cosrev.2023.100583","url":null,"abstract":"<div><p><span><span>Cloud computing has evolved as a new paradigm in Internet computing, offering services to the end-users and large-organizations, on-demand and pay-per-the-usage basis with high availability, elasticity, scalability and resiliency. In order to improve the performance of the </span>Cloud system, handling multiple heterogeneous tasks concurrently, an appropriate task scheduler is required. To meet the user’s requirements in terms of Quality of Service (QoS) parameters, the task </span>scheduling algorithm<span><span> should identify the order in which tasks should be executed. Energy efficiency is the significant challenge in today’s task scheduling to meet the prerequisite for green computing. By increasing resource utilization at the </span>data centers, virtual machine (VM) Consolidation is also recognized as the most widely used and promising approach in terms of energy consumption and system performance. However, excessive VM Consolidation could constitute a violation of the Service Level Agreement (SLA). The paper makes a contribution by outlining the numerous approaches that researchers have used thus far to achieve the goals of scheduling and VM Consolidation, assuring energy efficiency, and maintaining system performance. This would give readers a better understanding of the problems and the potential for improvement while assisting them in selecting the ideal scheduling algorithm with Consolidation technique. Additionally, the techniques are divided into three categories: those that primarily focus on task scheduling; those that target Consolidation; and complete computation, integrating task scheduling with VM Consolidation. Further classification for the scheduling algorithms include heuristic, meta-heuristic, greedy, and hybrid task scheduling algorithms. In addition to a summary of the benefits and drawbacks of the suggested algorithms, prospective research directions and recent developments in this area is also covered in this paper.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100583"},"PeriodicalIF":12.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47118855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of hyperspectral imaging and autoencoders: Benefits, applications, hyperparameter tunning and challenges 高光谱成像和自动编码器的集成:优势、应用、超参数调谐和挑战
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-31 DOI: 10.1016/j.cosrev.2023.100584
Garima Jaiswal , Ritu Rani , Harshita Mangotra , Arun Sharma

Hyperspectral imaging (HSI) is a powerful tool that can capture and analyze a range of spectral bands, providing unparalleled levels of precision and accuracy in data analysis. Another technology gaining popularity in many industries is Autoencoders (AE). AE uses advanced deep learning algorithms for encoding and decoding data, leading to highly precise and efficient neural network-based models. Within the domain of HSI, AE emerges as a potent approach to tackle the essential hurdles associated with data analysis and feature extraction. Combining both HSI and AE (HSI – AE) can lead to a revolution in various industries, including but not limited to healthcare and environmental monitoring, because of more efficient analysis approaches and decision-making. AE can be used to discover hidden patterns and insights in large-scale datasets, allowing researchers to make more informed decisions based on much better predictions. Similarly, HSI can benefit from the scalability and flexibility AE offers, leading to faster and more efficient data processing. This article aims to provide a comprehensive review of the integration of HSI - AE, covering the history and background knowledge, motivation, and combined benefits of HSI and AE. It examines the applicability of HSI-AE in many use-case domains, such as classification, hyperspectral unmixing, and anomaly detection. It also provides a hyperparameter tuning and an in-depth survey of their use. The article emphasizes crucial areas for future exploration, such as conducting further research to enhance AE’s performance in HSI applications and devising novel algorithms to overcome the distinctive challenges presented by HSI data. Overall, the culmination of the HSI with AE can be seen as offering a promising solution for challenges like data analysis management and pattern recognition, enabling accurate and efficient decision-making across industries.

高光谱成像(HSI)是一种强大的工具,可以捕获和分析一系列光谱带,在数据分析中提供无与伦比的精度和准确性。另一种在许多行业中越来越受欢迎的技术是自动编码器(AE)。AE使用先进的深度学习算法对数据进行编码和解码,从而产生高度精确和高效的基于神经网络的模型。在恒生指数领域,AE作为一种有效的方法出现,可以解决与数据分析和特征提取相关的基本障碍。结合HSI和AE (HSI - AE)可以在多个行业(包括但不限于医疗保健和环境监测)中引发一场革命,因为它提供了更有效的分析方法和决策。AE可用于发现大规模数据集中隐藏的模式和见解,使研究人员能够根据更好的预测做出更明智的决策。同样,HSI可以从AE提供的可扩展性和灵活性中受益,从而实现更快、更有效的数据处理。本文旨在对HSI - AE整合的历史、背景知识、动机以及HSI和AE整合的综合效益等方面进行综述。它检查了HSI-AE在许多用例领域中的适用性,例如分类、高光谱分解和异常检测。它还提供了一个超参数调优和它们的使用的深入调查。本文强调了未来探索的关键领域,例如开展进一步的研究以提高声发射在恒指应用中的性能,并设计新的算法来克服恒指数据带来的独特挑战。总的来说,具有AE的恒生指数的顶峰可以被视为为数据分析管理和模式识别等挑战提供了一个有前途的解决方案,从而实现了跨行业的准确和高效决策。
{"title":"Integration of hyperspectral imaging and autoencoders: Benefits, applications, hyperparameter tunning and challenges","authors":"Garima Jaiswal ,&nbsp;Ritu Rani ,&nbsp;Harshita Mangotra ,&nbsp;Arun Sharma","doi":"10.1016/j.cosrev.2023.100584","DOIUrl":"10.1016/j.cosrev.2023.100584","url":null,"abstract":"<div><p><span>Hyperspectral imaging (HSI) is a powerful tool that can capture and analyze a range of spectral bands, providing unparalleled levels of precision and accuracy in data analysis. Another technology gaining popularity in many industries is </span>Autoencoders<span> (AE). AE uses advanced deep learning algorithms<span><span> for encoding and decoding data, leading to highly precise and efficient neural network-based models. Within the domain of HSI, AE emerges as a potent approach to tackle the essential hurdles associated with data analysis and feature extraction. Combining both HSI and AE (HSI – AE) can lead to a revolution in various industries, including but not limited to healthcare and environmental monitoring, because of more efficient analysis approaches and decision-making. AE can be used to discover hidden patterns and insights in large-scale datasets, allowing researchers to make more informed decisions based on much better predictions. Similarly, HSI can benefit from the scalability and flexibility AE offers, leading to faster and more efficient data processing. This article aims to provide a comprehensive review of the integration of HSI - AE, covering the history and background knowledge, motivation, and combined benefits of HSI and AE. It examines the applicability of HSI-AE in many use-case domains, such as classification, hyperspectral </span>unmixing<span>, and anomaly detection. It also provides a hyperparameter tuning and an in-depth survey of their use. The article emphasizes crucial areas for future exploration, such as conducting further research to enhance AE’s performance in HSI applications and devising novel algorithms to overcome the distinctive challenges presented by HSI data. Overall, the culmination of the HSI with AE can be seen as offering a promising solution for challenges like data analysis management and pattern recognition, enabling accurate and efficient decision-making across industries.</span></span></span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100584"},"PeriodicalIF":12.9,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48705588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comprehensive survey of the solving puzzle problems 全面调查解谜问题
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-25 DOI: 10.1016/j.cosrev.2023.100586
Seçkin Yılmaz , Vasif V. Nabiyev

Solving puzzle problems using computer-aided methods is becoming more common with applications in forensic science, restoration, banking system, and multimedia. However, only a few surveys have been published on this topic, the most recent being more than a decade old. The scope of 2D puzzle problems is extensive, and the number of computer-aided methods has increased in recent years. In this paper, we have presented a comprehensive survey to pave a roadmap for researchers dealing with puzzle problems. This study classifies 2D puzzle problems in a novel way, considering many examples such as dissection, combinatorial and double-sided puzzles and reclassifies computer-aided methods to cover the studies carried out in recent years. Various strategies (pre-grouping and global consistency approach) have been investigated to solve the puzzle problem effectively. The computer-aided methods have been examined deeply, including many recent methods related to squared jigsaw puzzles, torn photographs, banknotes, and fragmented documents, and they are compared to each other. In addition, new topics such as combining mosaic pieces and Islamic architectural motif puzzle problems have been proposed to the interest of researchers. In conclusion, our study shows many research opportunities that are not yet solved by any computer-aided method.

利用计算机辅助方法解决难题在法医学、修复学、银行系统和多媒体等领域的应用越来越普遍。然而,关于这个话题的调查只发表了几次,最近的一次是在十多年前。二维拼图问题的范围很广,近年来计算机辅助方法的数量有所增加。在本文中,我们提出了一个全面的调查,为研究人员处理谜题问题铺平了道路。本研究以一种新颖的方式对二维拼图问题进行分类,考虑了解剖、组合、双面拼图等许多例子,并对计算机辅助方法进行了重新分类,以涵盖近年来开展的研究。为了有效地解决谜题问题,研究了各种策略(预分组和全局一致性方法)。对计算机辅助方法进行了深入的研究,包括许多与方形拼图、撕裂的照片、钞票和碎片化的文件有关的最新方法,并对它们进行了比较。此外,结合马赛克和伊斯兰建筑主题拼图问题等新课题也引起了研究者的兴趣。总之,我们的研究显示了许多尚未通过任何计算机辅助方法解决的研究机会。
{"title":"Comprehensive survey of the solving puzzle problems","authors":"Seçkin Yılmaz ,&nbsp;Vasif V. Nabiyev","doi":"10.1016/j.cosrev.2023.100586","DOIUrl":"10.1016/j.cosrev.2023.100586","url":null,"abstract":"<div><p>Solving puzzle problems using computer-aided methods is becoming more common with applications in forensic science, restoration, banking system, and multimedia. However, only a few surveys have been published on this topic, the most recent being more than a decade old. The scope of 2D puzzle problems is extensive, and the number of computer-aided methods has increased in recent years. In this paper, we have presented a comprehensive survey to pave a roadmap for researchers dealing with puzzle problems. This study classifies 2D puzzle problems in a novel way, considering many examples such as dissection, combinatorial and double-sided puzzles and reclassifies computer-aided methods to cover the studies carried out in recent years. Various strategies (pre-grouping and global consistency approach) have been investigated to solve the puzzle problem effectively. The computer-aided methods have been examined deeply, including many recent methods related to squared jigsaw puzzles, torn photographs, banknotes, and fragmented documents, and they are compared to each other. In addition, new topics such as combining mosaic pieces and Islamic architectural motif puzzle problems have been proposed to the interest of researchers. In conclusion, our study shows many research opportunities that are not yet solved by any computer-aided method.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100586"},"PeriodicalIF":12.9,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42925912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding blockchain: Definitions, architecture, design, and system comparison 理解区块链:定义、体系结构、设计和系统比较
IF 12.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-16 DOI: 10.1016/j.cosrev.2023.100575
Mohammad Hossein Tabatabaei, Roman Vitenberg, Narasimha Raghavan Veeraragavan

The explosive advent of the blockchain technology has led to hundreds of blockchain systems in the industry, thousands of academic papers published over the last few years, and an even larger number of new initiatives and projects. Despite the emerging consolidation efforts, the area remains highly turbulent without systematization, educational materials, or cross-system comparative analysis.

In this paper, we provide a systematic and comprehensive study of four popular yet widely different blockchain systems: Bitcoin, Ethereum, Hyperledger Fabric, and IOTA. The study is presented as a cross-system comparison, which is organized by clearly identified aspects: definitions, roles of the participants, entities, and the characteristics and design of each of the commonly used layers in the cross-system blockchain architecture. Our exploration goes deeper compared to what is currently available in academic surveys and tutorials. For example, we provide the first extensive coverage of the storage layer in Ethereum and the most comprehensive explanation of the consensus protocol in IOTA. The exposition is due to the consolidation of fragmented information gathered from white and yellow papers, academic publications, blogs, developer documentation, communication with the developers, as well as additional analysis gleaned from the source code. We hope that this survey will help the readers gain in-depth understanding of the design principles behind blockchain systems and contribute towards systematization of the area.

区块链技术的爆炸性出现导致了行业中数百个区块链系统,在过去几年中发表了数千篇学术论文,以及更多的新举措和项目。尽管正在进行整合工作,但该地区仍然高度动荡,没有系统化、教育材料或跨系统的比较分析。在本文中,我们对四个流行但差异很大的区块链系统进行了系统而全面的研究:比特币、以太坊、Hyperledger Fabric和IOTA。该研究以跨系统比较的形式进行,由明确的方面组织:定义、参与者的角色、实体,以及跨系统区块链架构中每个常用层的特征和设计。与目前学术调查和教程中的内容相比,我们的探索更深入。例如,我们提供了以太坊中存储层的首次广泛覆盖,以及IOTA中共识协议的最全面解释。此次博览会是由于整合了从白皮书和黄色论文、学术出版物、博客、开发人员文档、与开发人员的沟通以及从源代码中收集的额外分析中收集的零散信息。我们希望这项调查能帮助读者深入了解区块链系统背后的设计原则,并为该领域的系统化做出贡献。
{"title":"Understanding blockchain: Definitions, architecture, design, and system comparison","authors":"Mohammad Hossein Tabatabaei,&nbsp;Roman Vitenberg,&nbsp;Narasimha Raghavan Veeraragavan","doi":"10.1016/j.cosrev.2023.100575","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100575","url":null,"abstract":"<div><p>The explosive advent of the blockchain technology has led to hundreds of blockchain systems in the industry, thousands of academic papers published over the last few years, and an even larger number of new initiatives and projects. Despite the emerging consolidation efforts, the area remains highly turbulent without systematization, educational materials, or cross-system comparative analysis.</p><p>In this paper, we provide a systematic and comprehensive study of four popular yet widely different blockchain systems: Bitcoin<span>, Ethereum, Hyperledger Fabric, and IOTA. The study is presented as a cross-system comparison, which is organized by clearly identified aspects: definitions, roles of the participants, entities, and the characteristics and design of each of the commonly used layers in the cross-system blockchain architecture. Our exploration goes deeper compared to what is currently available in academic surveys and tutorials. For example, we provide the first extensive coverage of the storage layer in Ethereum and the most comprehensive explanation of the consensus protocol in IOTA. The exposition is due to the consolidation of fragmented information gathered from white and yellow papers, academic publications, blogs, developer documentation, communication with the developers, as well as additional analysis gleaned from the source code. We hope that this survey will help the readers gain in-depth understanding of the design principles behind blockchain systems and contribute towards systematization of the area.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"50 ","pages":"Article 100575"},"PeriodicalIF":12.9,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Science Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1