首页 > 最新文献

Computer Science Review最新文献

英文 中文
Flow based containerized honeypot approach for network traffic analysis: An empirical study 基于流量的容器化蜜罐网络流量分析方法的实证研究
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.cosrev.2023.100600
Sibi Chakkaravarthy Sethuraman , Tharshith Goud Jadapalli , Devi Priya Vimala Sudhakaran , Saraju P. Mohanty

The world of connected devices has been attributed to applications that relied upon multitude of devices to acquire and distribute data over extremely diverse networks. This caused a plethora of potential threats. In the field of IT security, the concept of digital baits, or honeypots, which are typically network components (computer systems, access points, or switches) launched to be interrogated, savaged, and impacted, is currently popular as it allows scientists to comprehend further on assault patterns and behavior. Combining the inherent modularity with the administration enabled by the container makes security management simple and permits dispersed deployments, resulting in a very dynamic system. This study delivers several contributions in this regard. First, it comprehends the patterns, methods, and malware types that container honeypots deal with thus examining new developments in existing honeypot research to fill gaps in knowledge about the honeypot technology. A broad range of independently initiated and jointly conducted container honeypot strategies and studies that encompass various methodologies is surveyed. Second, using numerous use cases that aid scientific research, we address and investigate a number of challenges pertaining to container honeypots, such as identification problems, honeypot security issues, and dependability issues. Furthermore, based on our extensive honeypot research, we developed VIKRANT, a containerized research honeypot which assists researchers as well as enthusiasts in generating real-time flow data for threat intelligence. The configured approach was monitored resulting in several data points that allowed relevant conclusions about the malevolent users’ activities.

连接设备的世界被认为是依赖于大量设备在极其多样化的网络上获取和分发数据的应用程序。这造成了过多的潜在威胁。在信息技术安全领域,数字诱饵或蜜罐的概念目前很流行,因为它可以让科学家进一步了解攻击模式和行为,数字诱饵通常是为了被审问、攻击和影响而启动的网络组件(计算机系统、接入点或交换机)。将固有的模块化与容器启用的管理相结合,使安全管理变得简单,并允许分散部署,从而形成一个非常动态的系统。这项研究在这方面作出了若干贡献。首先,它了解了容器蜜罐处理的模式、方法和恶意软件类型,从而考察了现有蜜罐研究的新进展,以填补有关蜜罐技术的知识空白。调查了一系列独立发起和联合进行的容器蜜罐策略和研究,包括各种方法。其次,使用大量有助于科学研究的用例,我们解决并调查了与容器蜜罐有关的许多挑战,如识别问题、蜜罐安全问题和可靠性问题。此外,在我们广泛的蜜罐研究的基础上,我们开发了VIKRANT,这是一种集装箱化的研究蜜罐,它可以帮助研究人员和爱好者为威胁情报生成实时流量数据。对配置的方法进行了监控,得到了几个数据点,这些数据点允许对恶意用户的活动得出相关结论。
{"title":"Flow based containerized honeypot approach for network traffic analysis: An empirical study","authors":"Sibi Chakkaravarthy Sethuraman ,&nbsp;Tharshith Goud Jadapalli ,&nbsp;Devi Priya Vimala Sudhakaran ,&nbsp;Saraju P. Mohanty","doi":"10.1016/j.cosrev.2023.100600","DOIUrl":"10.1016/j.cosrev.2023.100600","url":null,"abstract":"<div><p><span>The world of connected devices has been attributed to applications that relied upon multitude of devices to acquire and distribute data over extremely diverse networks. This caused a plethora of potential threats. In the field of IT security, the concept of digital baits, or honeypots, which are typically network components (computer systems, access points, or switches) launched to be interrogated, savaged, and impacted, is currently popular as it allows scientists to comprehend further on assault patterns and behavior. Combining the inherent modularity with the administration enabled by the container makes security management simple and permits dispersed deployments, resulting in a very dynamic system. This study delivers several contributions in this regard. First, it comprehends the patterns, methods, and </span>malware types that container honeypots deal with thus examining new developments in existing honeypot research to fill gaps in knowledge about the honeypot technology. A broad range of independently initiated and jointly conducted container honeypot strategies and studies that encompass various methodologies is surveyed. Second, using numerous use cases that aid scientific research, we address and investigate a number of challenges pertaining to container honeypots, such as identification problems, honeypot security issues, and dependability issues. Furthermore, based on our extensive honeypot research, we developed VIKRANT, a containerized research honeypot which assists researchers as well as enthusiasts in generating real-time flow data for threat intelligence. The configured approach was monitored resulting in several data points that allowed relevant conclusions about the malevolent users’ activities.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71514353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A comprehensive survey on data aggregation techniques in UAV-enabled Internet of things 无人机物联网数据聚合技术综述
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2023-11-01 DOI: 10.1016/j.cosrev.2023.100599
Asif Mahmud Raivi, Sangman Moh

In recent years, unmanned aerial vehicles (UAVs) have been used to extend the Internet of things (IoT) framework owing to their vast applications, monitoring and surveillance capability, ubiquity, and mobility. To support IoT requirements, UAVs must be capable of aggregating, processing, and transmitting data in real-time basis. As not only the number of IoT devices but also the amount of data to be collected is increased, data aggregation is of great importance. Recently, the UAV can also function as a mobile edge computing server in association with aerial data aggregation. This paper is the first to survey the various aspects and techniques of UAV-based aerial data aggregation for IoT networks. After addressing key design issues, we review the existing data aggregation techniques along with possible future direction. They are then compared with each other in terms of major operational features, performance characteristics, advantages, and limitations. Open issues and research challenges are also discussed with possible solution approaches.

近年来,无人机由于其广泛的应用、监测和监视能力、普遍性和移动性,已被用于扩展物联网(IoT)框架。为了支持物联网需求,无人机必须能够实时聚合、处理和传输数据。随着物联网设备数量的增加,以及要收集的数据量的增加,数据聚合至关重要。最近,无人机还可以作为与空中数据聚合相关联的移动边缘计算服务器。本文首次综述了物联网网络中基于无人机的空中数据聚合的各个方面和技术。在解决了关键的设计问题后,我们回顾了现有的数据聚合技术以及未来可能的方向。然后,将它们在主要操作特征、性能特征、优势和局限性方面进行比较。还讨论了悬而未决的问题和研究挑战,以及可能的解决方法。
{"title":"A comprehensive survey on data aggregation techniques in UAV-enabled Internet of things","authors":"Asif Mahmud Raivi,&nbsp;Sangman Moh","doi":"10.1016/j.cosrev.2023.100599","DOIUrl":"10.1016/j.cosrev.2023.100599","url":null,"abstract":"<div><p>In recent years, unmanned aerial vehicles (UAVs) have been used to extend the Internet of things (IoT) framework owing to their vast applications, monitoring and surveillance capability, ubiquity, and mobility. To support IoT requirements, UAVs must be capable of aggregating, processing, and transmitting data in real-time basis. As not only the number of IoT devices but also the amount of data to be collected is increased, data aggregation is of great importance. Recently, the UAV can also function as a mobile edge computing server in association with aerial data aggregation. This paper is the first to survey the various aspects and techniques of UAV-based aerial data aggregation for IoT networks. After addressing key design issues, we review the existing data aggregation techniques along with possible future direction. They are then compared with each other in terms of major operational features, performance characteristics, advantages, and limitations. Open issues and research challenges are also discussed with possible solution approaches.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574013723000667/pdfft?md5=6f2cd703bc7b8c1c9010e724a3c8a10e&pid=1-s2.0-S1574013723000667-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71514351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph-based deep learning techniques for remote sensing applications: Techniques, taxonomy, and applications — A comprehensive review 遥感应用的基于图的深度学习技术:技术、分类和应用-综合综述
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2023-10-05 DOI: 10.1016/j.cosrev.2023.100596
Manel Khazri Khlifi , Wadii Boulila , Imed Riadh Farah

In the last decade, there has been a significant surge of interest in machine learning, primarily driven by advancements in deep learning (DL). DL has emerged as a powerful solution to address various challenges in numerous fields, including remote sensing (RS). Graph Deep Learning (GDL), a sub-field of DL, has recently gained increasing attention in the RS community. Tasks in RS requiring detailed information about the relationships between image/scene features are particularly well-suited for GDL. This study examines the notion of GDL and its recent developments in RS-related fields. An extensive survey of the current state-of-the-art in GDL is presented in this paper, with a specific emphasis on five established graph learning techniques: Graph Convolutional Networks (GCNs), Graph Attention Networks (GATs), Graph Recurrent Neural Networks (GRNNs), Graph Auto-encoders (GAEs), and Graph Generative Adversarial Networks (GGANs). A taxonomy is proposed based on the input data type (dynamic or static) or task being considered. Several promising research directions for GDL in RS are suggested in this paper to foster productive collaborations between the two domains. To the best of our knowledge, this study is the first to provide a comprehensive review that focuses on graph deep learning in remote sensing.

在过去的十年里,人们对机器学习的兴趣激增,这主要是由深度学习(DL)的进步推动的。DL已成为解决包括遥感(RS)在内的众多领域的各种挑战的强大解决方案。图深度学习(GDL)是DL的一个子领域,近年来在RS社区越来越受到关注。RS中需要有关图像/场景特征之间关系的详细信息的任务特别适合GDL。本研究考察了GDL的概念及其在RS相关领域的最新发展。本文对GDL的当前技术进行了广泛的综述,特别强调了五种已建立的图学习技术:图卷积网络(GCN)、图注意力网络(GATs)、图递归神经网络(GRNN)、图自动编码器(GAE)和图生成对抗性网络(GGAN)。根据所考虑的输入数据类型(动态或静态)或任务,提出了一种分类法。本文提出了RS中GDL的几个有前景的研究方向,以促进这两个领域之间的富有成效的合作。据我们所知,这项研究首次对遥感中的图形深度学习进行了全面综述。
{"title":"Graph-based deep learning techniques for remote sensing applications: Techniques, taxonomy, and applications — A comprehensive review","authors":"Manel Khazri Khlifi ,&nbsp;Wadii Boulila ,&nbsp;Imed Riadh Farah","doi":"10.1016/j.cosrev.2023.100596","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100596","url":null,"abstract":"<div><p><span><span>In the last decade, there has been a significant surge of interest in machine learning<span>, primarily driven by advancements in deep learning<span><span> (DL). DL has emerged as a powerful solution to address various challenges in numerous fields, including remote sensing (RS). Graph Deep Learning (GDL), a sub-field of DL, has recently gained increasing attention in the RS community. Tasks in RS requiring detailed information about the relationships between image/scene features are particularly well-suited for GDL. This study examines the notion of GDL and its recent developments in RS-related fields. An extensive survey of the current state-of-the-art in GDL is presented in this paper, with a specific emphasis on five established graph learning techniques: Graph Convolutional Networks (GCNs), Graph </span>Attention Networks<span> (GATs), Graph Recurrent Neural Networks (GRNNs), Graph Auto-encoders (GAEs), and Graph </span></span></span></span>Generative Adversarial Networks (GGANs). A taxonomy is proposed based on the </span>input data type (dynamic or static) or task being considered. Several promising research directions for GDL in RS are suggested in this paper to foster productive collaborations between the two domains. To the best of our knowledge, this study is the first to provide a comprehensive review that focuses on graph deep learning in remote sensing.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asynchronous federated learning on heterogeneous devices: A survey 异构设备上的异步联邦学习:综述
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2023-10-04 DOI: 10.1016/j.cosrev.2023.100595
Chenhao Xu , Youyang Qu , Yong Xiang , Longxiang Gao

Federated learning (FL) is a kind of distributed machine learning framework, where the global model is generated on the centralized aggregation server based on the parameters of local models, addressing concerns about privacy leakage caused by the collection of local training data. With the growing computational and communication capacities of edge and IoT devices, applying FL on heterogeneous devices to train machine learning models is becoming a prevailing trend. Nonetheless, the synchronous aggregation strategy in the classic FL paradigm, particularly on heterogeneous devices, encounters limitations in resource utilization due to the need to wait for slow devices before aggregation in each training round. Furthermore, the uneven distribution of data across devices (i.e. data heterogeneity) in real-world scenarios adversely impacts the accuracy of the global model. Consequently, many asynchronous FL (AFL) approaches have been introduced across various application contexts to enhance efficiency, performance, privacy, and security. This survey comprehensively analyzes and summarizes existing AFL variations using a novel classification scheme, including device heterogeneity, data heterogeneity, privacy, and security on heterogeneous devices, as well as applications on heterogeneous devices. Finally, this survey reveals rising challenges and presents potentially promising research directions in this under-investigated domain.

联合学习(FL)是一种分布式机器学习框架,其中基于本地模型的参数在集中式聚合服务器上生成全局模型,解决了由于收集本地训练数据而导致的隐私泄露问题。随着边缘设备和物联网设备的计算和通信能力不断增长,在异构设备上应用FL来训练机器学习模型正成为一种流行趋势。尽管如此,经典FL范式中的同步聚合策略,特别是在异构设备上,由于在每一轮训练中聚合之前需要等待慢速设备,因此在资源利用率方面遇到了限制。此外,在现实世界场景中,数据在设备之间的不均匀分布(即数据异构性)对全局模型的准确性产生了不利影响。因此,在各种应用程序上下文中引入了许多异步FL(AFL)方法,以提高效率、性能、隐私和安全性。这项调查使用一种新的分类方案全面分析和总结了现有的AFL变体,包括设备异构性、数据异构性、异构设备上的隐私和安全性,以及异构设备的应用。最后,这项调查揭示了日益增长的挑战,并在这一研究不足的领域提出了潜在的有前景的研究方向。
{"title":"Asynchronous federated learning on heterogeneous devices: A survey","authors":"Chenhao Xu ,&nbsp;Youyang Qu ,&nbsp;Yong Xiang ,&nbsp;Longxiang Gao","doi":"10.1016/j.cosrev.2023.100595","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100595","url":null,"abstract":"<div><p>Federated learning (FL) is a kind of distributed machine learning framework, where the global model is generated on the centralized aggregation server based on the parameters of local models, addressing concerns about privacy leakage caused by the collection of local training data. With the growing computational and communication capacities of edge and IoT devices, applying FL on heterogeneous devices to train machine learning models is becoming a prevailing trend. Nonetheless, the synchronous aggregation strategy in the classic FL paradigm, particularly on heterogeneous devices, encounters limitations in resource utilization due to the need to wait for slow devices before aggregation in each training round. Furthermore, the uneven distribution of data across devices (i.e. data heterogeneity) in real-world scenarios adversely impacts the accuracy of the global model. Consequently, many asynchronous FL (AFL) approaches have been introduced across various application contexts to enhance efficiency, performance, privacy, and security. This survey comprehensively analyzes and summarizes existing AFL variations using a novel classification scheme, including device heterogeneity, data heterogeneity, privacy, and security on heterogeneous devices, as well as applications on heterogeneous devices. Finally, this survey reveals rising challenges and presents potentially promising research directions in this under-investigated domain.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Blockchain-based solutions for mobile crowdsensing: A comprehensive survey 基于区块链的移动众测解决方案:一项综合调查
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2023-09-16 DOI: 10.1016/j.cosrev.2023.100589
Ruiyun Yu , Ann Move Oguti , Mohammad S. Obaidat , Shuchen Li , Pengfei Wang , Kuei-Fang Hsiao

Mobile crowdsensing (MCS) is an emerging data-driven paradigm that leverages the collective intelligence of the crowd, their mobility, and the crowd-companioned smart mobile devices embedded with powerful sensors to acquire information from the physical environment for crowd intelligence extraction and human-centric service delivery. However, existing MCS systems operate in a centralized manner, giving rise to several challenges, including privacy, security, incentives, and dependence on a central service provider. Blockchain is a novel application paradigm that incorporates point-to-point transmission, consensus mechanisms, cryptography, intelligent contracts, distributed data storage, and other computing technologies, creating a shift from the current centralized paradigm to a decentralized paradigm. Nonetheless, the convergence of MCS and blockchains necessitates addressing numerous fundamental challenges arising from their merger. This paper examines the major issues facing MCS systems and blockchain’s potential role in addressing them. We present the MCS-blockchain integrated deployment strategies, architectural designs, and core blockchain technology principles that contribute significantly to the performance of blockchain-based MCS applications. Additionally, the advancement of blockchain technology and its impact on MCS system security and performance requirements are investigated. Finally, we highlight current research gaps and future research opportunities that may inspire the deployment of novel blockchain-based MCS systems.

移动众包感知(MCS)是一种新兴的数据驱动范式,它利用人群的集体智能、他们的移动性以及嵌入强大传感器的与人群相关的智能移动设备,从物理环境中获取信息,用于人群智能提取和以人为中心的服务提供。然而,现有的MCS系统以集中的方式运行,这带来了一些挑战,包括隐私、安全、激励和对中央服务提供商的依赖。区块链是一种新的应用范式,它融合了点对点传输、共识机制、密码学、智能合约、分布式数据存储和其他计算技术,创造了从当前集中式范式向去中心化范式的转变。尽管如此,MCS和区块链的融合需要解决它们合并带来的许多根本挑战。本文探讨了MCS系统面临的主要问题以及区块链在解决这些问题中的潜在作用。我们介绍了MCS区块链集成部署策略、架构设计和核心区块链技术原则,这些原则对基于区块链的MCS应用程序的性能做出了重大贡献。此外,还研究了区块链技术的发展及其对MCS系统安全性和性能要求的影响。最后,我们强调了当前的研究空白和未来的研究机会,这些空白和机会可能会启发部署基于区块链的新型MCS系统。
{"title":"Blockchain-based solutions for mobile crowdsensing: A comprehensive survey","authors":"Ruiyun Yu ,&nbsp;Ann Move Oguti ,&nbsp;Mohammad S. Obaidat ,&nbsp;Shuchen Li ,&nbsp;Pengfei Wang ,&nbsp;Kuei-Fang Hsiao","doi":"10.1016/j.cosrev.2023.100589","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100589","url":null,"abstract":"<div><p>Mobile crowdsensing (MCS) is an emerging data-driven paradigm that leverages the collective intelligence<span> of the crowd, their mobility, and the crowd-companioned smart mobile devices<span><span> embedded with powerful sensors to acquire information from the physical environment for crowd intelligence extraction and human-centric service delivery. However, existing MCS systems operate in a centralized manner, giving rise to several challenges, including privacy, security, incentives, and dependence on a central service provider. Blockchain<span> is a novel application paradigm that incorporates point-to-point transmission, consensus mechanisms, cryptography, intelligent contracts, </span></span>distributed data storage<span><span>, and other computing technologies, creating a shift from the current centralized paradigm to a decentralized paradigm. Nonetheless, the convergence of MCS and blockchains necessitates addressing numerous fundamental challenges arising from their merger. This paper examines the major issues facing MCS systems and blockchain’s potential role in addressing them. We present the MCS-blockchain integrated deployment strategies, </span>architectural designs, and core blockchain technology principles that contribute significantly to the performance of blockchain-based MCS applications. Additionally, the advancement of blockchain technology and its impact on MCS system security and performance requirements are investigated. Finally, we highlight current research gaps and future research opportunities that may inspire the deployment of novel blockchain-based MCS systems.</span></span></span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic review of federated learning incentive mechanisms and associated security challenges 联邦学习激励机制和相关安全挑战的系统综述
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2023-09-13 DOI: 10.1016/j.cosrev.2023.100593
Asad Ali , Inaam Ilahi , Adnan Qayyum , Ihab Mohammed , Ala Al-Fuqaha , Junaid Qadir

In response to various privacy risks, researchers and practitioners have been exploring different paradigms that can leverage the increased computational capabilities of consumer devices to train machine learning (ML) models in a distributed fashion without requiring the uploading of the training data from individual devices to central facilities. For this purpose, federated learning (FL) was proposed as a technique that can learn a global machine model at a central master node by the aggregation of models trained locally using private data. However, organizations may be reluctant to train models locally and to share these local ML models due to the required computational resources for model training at their end and due to privacy risks that may result from adversaries inverting these models to infer information about the private training data. Incentive mechanisms have been proposed to motivate end users to participate in collaborative training of ML models (using their local data) in return for certain rewards. However, the design of an optimal incentive mechanism for FL is challenging due to its distributed nature and the fact that the central server has no access to clients’ hyperparameters information and the amount/quality data used for training, which makes the task of determining the reward based on the contribution of individual clients in FL environment difficult. Even though several incentive mechanisms have been proposed for FL, a thorough up-to-date systematic review is missing and this paper fills this gap. To the best of our knowledge, this paper is the first systematic review that comprehensively enlists the design principles required for implementing these incentive mechanisms and then categorizes various incentive mechanisms according to their design principles. In addition, we also provide a comprehensive overview of security challenges associated with incentive-driven FL. Finally, we highlight the limitations and pitfalls of these incentive schemes and elaborate upon open-research issues that require further research attention.

为了应对各种隐私风险,研究人员和从业者一直在探索不同的范式,这些范式可以利用消费者设备增加的计算能力,以分布式方式训练机器学习(ML)模型,而不需要将训练数据从单个设备上传到中央设施。为此,提出了联邦学习(FL),作为一种可以通过聚合使用私有数据在本地训练的模型来在中央主节点学习全局机器模型的技术。然而,组织可能不愿意在本地训练模型并共享这些本地ML模型,这是因为它们末端的模型训练所需的计算资源,以及由于对手反转这些模型以推断有关私人训练数据的信息可能导致的隐私风险。已经提出了激励机制来激励最终用户参与ML模型的协作训练(使用他们的本地数据),以换取某些奖励。然而,由于FL的分布式性质以及中央服务器无法访问客户端的超参数信息和用于训练的数量/质量数据,因此FL的最佳激励机制的设计具有挑战性,这使得基于单个客户端在FL环境中的贡献来确定奖励的任务变得困难。尽管已经为FL提出了几种激励机制,但缺乏最新的系统综述,本文填补了这一空白。据我们所知,本文是第一篇系统综述,全面列出了实施这些激励机制所需的设计原则,然后根据其设计原则对各种激励机制进行了分类。此外,我们还全面概述了与激励驱动的FL相关的安全挑战。最后,我们强调了这些激励方案的局限性和陷阱,并详细阐述了需要进一步研究关注的开放研究问题。
{"title":"A systematic review of federated learning incentive mechanisms and associated security challenges","authors":"Asad Ali ,&nbsp;Inaam Ilahi ,&nbsp;Adnan Qayyum ,&nbsp;Ihab Mohammed ,&nbsp;Ala Al-Fuqaha ,&nbsp;Junaid Qadir","doi":"10.1016/j.cosrev.2023.100593","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100593","url":null,"abstract":"<div><p>In response to various privacy risks, researchers and practitioners have been exploring different paradigms that can leverage the increased computational capabilities of consumer devices to train machine learning<span> (ML) models in a distributed fashion without requiring the uploading of the training data from individual devices to central facilities. For this purpose, federated learning (FL) was proposed as a technique that can learn a global machine model at a central master node by the aggregation of models trained locally using private data. However, organizations may be reluctant to train models locally and to share these local ML models due to the required computational resources for model training at their end and due to privacy risks that may result from adversaries inverting these models to infer information about the private training data. Incentive mechanisms have been proposed to motivate end users to participate in collaborative training of ML models (using their local data) in return for certain rewards. However, the design of an optimal incentive mechanism for FL is challenging due to its distributed nature and the fact that the central server has no access to clients’ hyperparameters information and the amount/quality data used for training, which makes the task of determining the reward based on the contribution of individual clients in FL environment difficult. Even though several incentive mechanisms have been proposed for FL, a thorough up-to-date systematic review is missing and this paper fills this gap. To the best of our knowledge, this paper is the first systematic review that comprehensively enlists the design principles required for implementing these incentive mechanisms and then categorizes various incentive mechanisms according to their design principles. In addition, we also provide a comprehensive overview of security challenges associated with incentive-driven FL. Finally, we highlight the limitations and pitfalls of these incentive schemes and elaborate upon open-research issues that require further research attention.</span></p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises 对中小型企业网络安全意识的研究和知识差距的探索
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2023-09-12 DOI: 10.1016/j.cosrev.2023.100592
Sunil Chaudhary , Vasileios Gkioulos , Sokratis Katsikas

The proliferation of information and communication technologies in enterprises enables them to develop new business models and enhance their operational and commercial activities. Nevertheless, this practice also introduces new cybersecurity risks and vulnerabilities. This may not be an issue for large organizations with the resources and mature cybersecurity programs in place; the situation with small and medium-sized enterprises (SMEs) is different since they often lack the resources, expertise, and incentives to prioritize cybersecurity. In such cases, cybersecurity awareness can be a critical component of cyberdefense. However, research studies dealing with cybersecurity awareness or related domains exclusively for SMEs are rare, indicating a pressing need for research addressing the cybersecurity awareness requirements of SMEs.

Prior to that, though, it is crucial to identify which aspects of cybersecurity awareness require further research in order to adapt or conform to the needs of SMEs. In this study, we conducted a systematic literature review that focused on cybersecurity awareness, prioritizing those performed with a particular focus on SMEs. The study seeks to analyze and evaluate such studies primarily to determine knowledge and research gaps in the cybersecurity awareness field for SMEs, thus providing a direction for future research.

信息和通信技术在企业中的普及使它们能够发展新的商业模式,加强其经营和商业活动。尽管如此,这种做法也带来了新的网络安全风险和漏洞。对于拥有资源和成熟网络安全计划的大型组织来说,这可能不是一个问题;中小企业的情况有所不同,因为它们往往缺乏资源、专业知识和激励措施来优先考虑网络安全。在这种情况下,网络安全意识可能是网络防御的关键组成部分。然而,专门针对中小企业的网络安全意识或相关领域的研究很少,这表明迫切需要针对中小企业网络安全意识要求进行研究。不过,在此之前,至关重要的是要确定网络安全意识的哪些方面需要进一步研究,以适应或符合中小企业的需求。在这项研究中,我们进行了一项系统的文献综述,重点关注网络安全意识,优先考虑那些特别关注中小企业的研究。该研究旨在分析和评估此类研究,主要是为了确定中小企业在网络安全意识领域的知识和研究差距,从而为未来的研究提供方向。
{"title":"A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises","authors":"Sunil Chaudhary ,&nbsp;Vasileios Gkioulos ,&nbsp;Sokratis Katsikas","doi":"10.1016/j.cosrev.2023.100592","DOIUrl":"https://doi.org/10.1016/j.cosrev.2023.100592","url":null,"abstract":"<div><p>The proliferation of information and communication technologies in enterprises enables them to develop new business models and enhance their operational and commercial activities. Nevertheless, this practice also introduces new cybersecurity risks and vulnerabilities. This may not be an issue for large organizations with the resources and mature cybersecurity programs in place; the situation with small and medium-sized enterprises (SMEs) is different since they often lack the resources, expertise, and incentives to prioritize cybersecurity. In such cases, cybersecurity awareness can be a critical component of cyberdefense. However, research studies dealing with cybersecurity awareness or related domains exclusively for SMEs are rare, indicating a pressing need for research addressing the cybersecurity awareness requirements of SMEs.</p><p>Prior to that, though, it is crucial to identify which aspects of cybersecurity awareness require further research in order to adapt or conform to the needs of SMEs. In this study, we conducted a systematic literature review that focused on cybersecurity awareness, prioritizing those performed with a particular focus on SMEs. The study seeks to analyze and evaluate such studies primarily to determine knowledge and research gaps in the cybersecurity awareness field for SMEs, thus providing a direction for future research.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns 全面回顾“医疗物联网”:网络方面、技术、服务、应用、挑战和安全问题
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2023-09-07 DOI: 10.1016/j.cosrev.2023.100591
Himanshu Verma , Naveen Chauhan , Lalit Kumar Awasthi

The Internet of Things (IoT) is a smart, internet-connected, and omnipresent network. Healthcare is one of the most critical sectors that could benefit from IoT technology. In the medical sphere, the rise of the IoT transforms traditional healthcare services by encouraging technological, social, and economic factors. This study rigorously analyzes various aspects of the Internet of Healthcare Things (IoHT), such as networking terminology, enabling communication technologies, services, applications, implementation issues, research challenges, and security-related concerns. Communication techniques under licensed and unlicensed spectra are extensively investigated and compared on various identified parameters for short- and long-range connectivity. The aforementioned aspects thoroughly review the operational and implementation roles of enabling technology. Following a rigorous analysis, multiple research issues and challenges are identified and discussed, along with recommendations to address them. After that, several IoHT services and applications are highlighted and reviewed with a comparative analysis regarding enabling technologies. Additionally, essential security and privacy concerns, along with probable threats and attacks related to the Internet of Healthcare Things, are mentioned in this work. Finally, this paper also emphasizes the future directions of the IoHT domain.

物联网(IoT)是一个智能的、与互联网连接的、无所不在的网络。医疗保健是可以从物联网技术中受益的最关键行业之一。在医疗领域,物联网的兴起通过鼓励技术、社会和经济因素来改变传统的医疗保健服务。本研究严格分析了医疗物联网(IoHT)的各个方面,如网络术语、启用通信技术、服务、应用、实施问题、研究挑战和安全相关问题。对许可和非许可频谱下的通信技术进行了广泛的研究,并在各种已确定的参数上进行了短距离和远距离连接的比较。上述方面全面回顾了启用技术的操作和实现角色。经过严格的分析,确定和讨论了多个研究问题和挑战,并提出了解决这些问题的建议。之后,重点介绍了几种物联网服务和应用,并对使能技术进行了比较分析。此外,本工作还提到了基本的安全和隐私问题,以及与医疗保健物联网相关的可能威胁和攻击。最后,本文还强调了IoHT领域的未来发展方向。
{"title":"A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns","authors":"Himanshu Verma ,&nbsp;Naveen Chauhan ,&nbsp;Lalit Kumar Awasthi","doi":"10.1016/j.cosrev.2023.100591","DOIUrl":"10.1016/j.cosrev.2023.100591","url":null,"abstract":"<div><p><span><span>The Internet of Things (IoT) is a smart, internet-connected, and omnipresent network. Healthcare is one of the most critical sectors that could benefit from IoT technology. In the medical sphere, the rise of the IoT transforms traditional </span>healthcare services by encouraging technological, social, and economic factors. This study rigorously analyzes various aspects of the </span><em>Internet of Healthcare Things (IoHT)</em>, such as networking terminology, enabling communication technologies, services, applications, implementation issues, research challenges, and security-related concerns. Communication techniques under licensed and unlicensed spectra are extensively investigated and compared on various identified parameters for short- and long-range connectivity. The aforementioned aspects thoroughly review the operational and implementation roles of enabling technology. Following a rigorous analysis, multiple research issues and challenges are identified and discussed, along with recommendations to address them. After that, several IoHT services and applications are highlighted and reviewed with a comparative analysis regarding enabling technologies. Additionally, essential security and privacy concerns, along with probable threats and attacks related to the Internet of Healthcare Things, are mentioned in this work. Finally, this paper also emphasizes the future directions of the IoHT domain.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44660637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Uncertainty in runtime verification: A survey 运行时验证中的不确定性:调查
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2023-09-07 DOI: 10.1016/j.cosrev.2023.100594
Rania Taleb , Sylvain Hallé , Raphaël Khoury

Runtime Verification can be defined as a collection of formal methods for studying the dynamic evaluation of execution traces against formal specifications. Aside from creating a monitor from specifications and building algorithms for the evaluation of the trace, the process of gathering events and making them available for the monitor and the communication between the system under analysis and the monitor are critical and important steps in the runtime verification process. In many situations and for a variety of reasons, the event trace could be incomplete or could contain imprecise events. When a missing or ambiguous event is detected, the monitor may be unable to deliver a sound verdict. In this survey, we review the literature dealing with the problem of monitoring with incomplete traces. We list the different causes of uncertainty that have been identified, and analyze their effect on the monitoring process. We identify and compare the different methods that have been proposed to perform monitoring on such traces, highlighting the advantages and drawbacks of each method.

运行时验证可以定义为一组形式化方法,用于根据形式化规范研究执行轨迹的动态评估。除了根据规范创建监视器和构建用于评估跟踪的算法之外,收集事件并使其可用于监视器的过程以及正在分析的系统与监视器之间的通信是运行时验证过程中的关键和重要步骤。在许多情况下,由于各种原因,事件跟踪可能是不完整的,或者可能包含不精确的事件。当检测到缺失或模糊事件时,监视器可能无法提供可靠的判决。在这篇综述中,我们回顾了处理不完整痕迹监测问题的文献。我们列出了已确定的不确定性的不同原因,并分析了它们对监测过程的影响。我们确定并比较了已经提出的对这些痕迹进行监测的不同方法,突出了每种方法的优点和缺点。
{"title":"Uncertainty in runtime verification: A survey","authors":"Rania Taleb ,&nbsp;Sylvain Hallé ,&nbsp;Raphaël Khoury","doi":"10.1016/j.cosrev.2023.100594","DOIUrl":"10.1016/j.cosrev.2023.100594","url":null,"abstract":"<div><p>Runtime Verification can be defined as a collection of formal methods for studying the dynamic evaluation of execution traces against formal specifications. Aside from creating a monitor from specifications and building algorithms for the evaluation of the trace, the process of gathering events and making them available for the monitor and the communication between the system under analysis and the monitor are critical and important steps in the runtime verification process. In many situations and for a variety of reasons, the event trace could be incomplete or could contain imprecise events. When a missing or ambiguous event is detected, the monitor may be unable to deliver a sound verdict. In this survey, we review the literature dealing with the problem of monitoring with incomplete traces. We list the different causes of uncertainty that have been identified, and analyze their effect on the monitoring process. We identify and compare the different methods that have been proposed to perform monitoring on such traces, highlighting the advantages and drawbacks of each method.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46060737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey 网络应用中用于身份验证和访问控制的分布式账本技术:综合调查
IF 12.9 1区 计算机科学 Q1 Computer Science Pub Date : 2023-09-02 DOI: 10.1016/j.cosrev.2023.100590
Fariba Ghaffari , Emmanuel Bertin , Noel Crespi , Julien Hatin

The accelerated growth of networking technologies highlights the importance of Authentication and Access Control (AAC) as protection against associated attacks. Controlling access to resources, facilitating resource sharing, and managing user mobility are some of the notable capabilities provided by AAC methods. Centralized methods are the most common deployment architectures, that can be threatened by several attacks at their central points. Emerging Distributed Ledger Technology (DLT) has attracted significant interest in the AAA community. The distributed nature of DLT and its immutability can bring unprecedented opportunities to resolve many of the challenges of conventional systems. We survey the state-of-the-art in deploying authentication and access control approaches via DLT for several networking use cases. More precisely, we explore DLT applications in (1) Authentication; (2) Access Control; and (3) Comprehensive AAC solutions. First, we present the challenges of centralized solutions and discuss the capability of DLT for their resolution. Then, we propose a taxonomy to categorize the existing methods. Analysis, comparison, and discussion on the advantages and disadvantages of these methods have been provided regarding different parameters such as DLT types, AAC approaches, security, reliability, scalability, etc. While DLT provides various benefits, several challenges remain for the migration to DLT-based AAC. In light of these general limitations, we propose some future directions, targeting the current lacunae and future needs.

网络技术的加速发展凸显了身份验证和访问控制(AAC)作为防范相关攻击的保护的重要性。控制对资源的访问、促进资源共享和管理用户移动性是AAC方法提供的一些重要功能。集中式方法是最常见的部署体系结构,其中心点可能受到多种攻击的威胁。新兴的分布式账本技术(DLT)已经引起了AAA社区的极大兴趣。DLT的分布式特性及其不变性可以为解决传统系统的许多挑战带来前所未有的机会。我们调查了通过DLT为几个网络用例部署身份验证和访问控制方法的最新技术。更准确地说,我们探索了DLT在(1)身份验证中的应用;(2)访问控制;(3)综合AAC解决方案。首先,我们提出了集中式解决方案的挑战,并讨论了DLT解决这些挑战的能力。然后,我们提出了一个分类法对现有的方法进行分类。针对DLT类型、AAC方法、安全性、可靠性、可扩展性等不同参数,对这些方法的优缺点进行了分析、比较和讨论。虽然DLT提供了各种好处,但向基于DLT的AAC迁移仍然存在一些挑战。鉴于这些普遍的限制,我们提出了一些未来的方向,针对当前的空白和未来的需求。
{"title":"Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey","authors":"Fariba Ghaffari ,&nbsp;Emmanuel Bertin ,&nbsp;Noel Crespi ,&nbsp;Julien Hatin","doi":"10.1016/j.cosrev.2023.100590","DOIUrl":"10.1016/j.cosrev.2023.100590","url":null,"abstract":"<div><p><span>The accelerated growth of networking technologies highlights the importance of Authentication and Access Control (AAC) as protection against associated attacks. Controlling access to resources, facilitating resource sharing, and managing user mobility are some of the notable capabilities provided by AAC methods. Centralized methods are the most common </span>deployment architectures, that can be threatened by several attacks at their central points. Emerging Distributed Ledger Technology (DLT) has attracted significant interest in the AAA community. The distributed nature of DLT and its immutability can bring unprecedented opportunities to resolve many of the challenges of conventional systems. We survey the state-of-the-art in deploying authentication and access control approaches via DLT for several networking use cases. More precisely, we explore DLT applications in (1) Authentication; (2) Access Control; and (3) Comprehensive AAC solutions. First, we present the challenges of centralized solutions and discuss the capability of DLT for their resolution. Then, we propose a taxonomy to categorize the existing methods. Analysis, comparison, and discussion on the advantages and disadvantages of these methods have been provided regarding different parameters such as DLT types, AAC approaches, security, reliability, scalability, etc. While DLT provides various benefits, several challenges remain for the migration to DLT-based AAC. In light of these general limitations, we propose some future directions, targeting the current lacunae and future needs.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":null,"pages":null},"PeriodicalIF":12.9,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48129408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Science Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1