首页 > 最新文献

Journal of Information Security and Applications最新文献

英文 中文
Secure similar patients query with homomorphically evaluated thresholds 利用同态评估阈值确保类似患者查询安全
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1016/j.jisa.2024.103861
Mounika Pratapa, Aleksander Essex

Patient-centric precision medicine requires the analysis of large volumes of genomic data to tailor treatments and medications based on individual-level characteristics. Because the amount of data held by a single institution is limited, researchers may want access to genomic data held by other institutions. Owing to the inherent privacy implications of genomic data, performing comparisons on encrypted data is preferable in certain settings. The Similar patient query (SPQ) is an application that enables a secure search across genomic databases for patients with similar genetic makeup. Query results can be used to draw meaningful conclusions regarding suitable therapies.

However, existing protocols either reveal intermediate computations, such as similarity scores, which can lead to membership-inference attacks, or they realize the ideal Boolean output (similar/not similar) through multiple protocol rounds, requiring the database owners to stay online throughout.

This paper introduces a two-party privacy-preserving approach to perform SPQs across encrypted genomic databases based on secure function extensions of additively homomorphic encryption. In contrast to related works, our scheme enables secure computation of genomic data similarity without an external party in a single round. This is achieved for more than 1000 positions of a genome in a single public key operation of 256-bit security level in the integer factorization setting.

以患者为中心的精准医疗需要分析大量的基因组数据,以便根据个体水平的特征定制治疗和药物。由于单个机构掌握的数据量有限,研究人员可能希望访问其他机构掌握的基因组数据。由于基因组数据本身涉及隐私,因此在某些情况下,最好对加密数据进行比较。相似患者查询(SPQ)是一种应用程序,可在基因组数据库中安全搜索具有相似基因构成的患者。然而,现有的协议要么会泄露中间计算(如相似性得分),从而导致成员推断攻击;要么会通过多轮协议来实现理想的布尔输出(相似/不相似),从而要求数据库所有者全程保持在线。与相关工作不同的是,我们的方案能在单轮中实现基因组数据相似性的安全计算,而无需外部参与。在整数因式分解设置中,通过 256 位安全级别的单个公钥操作,可对基因组的 1000 多个位置进行计算。
{"title":"Secure similar patients query with homomorphically evaluated thresholds","authors":"Mounika Pratapa,&nbsp;Aleksander Essex","doi":"10.1016/j.jisa.2024.103861","DOIUrl":"10.1016/j.jisa.2024.103861","url":null,"abstract":"<div><p>Patient-centric precision medicine requires the analysis of large volumes of genomic data to tailor treatments and medications based on individual-level characteristics. Because the amount of data held by a single institution is limited, researchers may want access to genomic data held by other institutions. Owing to the inherent privacy implications of genomic data, performing comparisons on <em>encrypted</em> data is preferable in certain settings. The <em>Similar patient query</em> (SPQ) is an application that enables a secure search across genomic databases for patients with similar genetic makeup. Query results can be used to draw meaningful conclusions regarding suitable therapies.</p><p>However, existing protocols either reveal intermediate computations, such as similarity scores, which can lead to membership-inference attacks, or they realize the ideal Boolean output (similar/not similar) through <em>multiple</em> protocol rounds, requiring the database owners to stay online throughout.</p><p>This paper introduces a two-party privacy-preserving approach to perform SPQs across encrypted genomic databases based on secure function extensions of additively homomorphic encryption. In contrast to related works, our scheme enables secure computation of genomic data similarity without an external party in a single round. This is achieved for more than 1000 positions of a genome in a single public key operation of 256-bit security level in the integer factorization setting.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103861"},"PeriodicalIF":3.8,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214212624001637/pdfft?md5=03b251bf5e21af75bddaf15bffd0b4fd&pid=1-s2.0-S2214212624001637-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142006706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
e-SAFE: A secure and efficient access control scheme with attribute convergence and user revocation in fog enhanced IoT for E-Health e-SAFE:雾增强型物联网中一种安全高效的访问控制方案,具有属性聚合和用户撤销功能,可用于电子健康领域
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-17 DOI: 10.1016/j.jisa.2024.103859
Richa Sarma , Sanjay Moulik

The growth of IoT led to a surge in connected devices and data production in the medical field. Therefore, to meet the rising demand for modern healthcare services, Fog and Cloud services come as a rescue for IoT-based equipment. As data travels through several levels, providing security to such data is challenging. The CP-ABE cryptographic approach allows for efficient access control. However, none of the known cryptographic CP-ABE approaches that provide granular access control offers the following features: attribute convergence, privileged access, user revocation, and outsourcing capabilities altogether. Thus, we present e-SAFE, a CP-ABE approach which addresses all these issues. In addition, in e-SAFE, the data users with resource-constrained medical gadgets must save just a constant and small-size decryption key on their gadgets. According to our assessment of security and performance, e-SAFE is found to be a secure and efficient access control technique for IoT gadgets.

物联网的发展导致医疗领域的联网设备和数据生产激增。因此,为了满足现代医疗服务不断增长的需求,雾和云服务成为了物联网设备的救星。由于数据要经过多个层级,因此为这些数据提供安全保障具有挑战性。CP-ABE 密码方法可以实现高效的访问控制。然而,目前已知的提供细粒度访问控制的 CP-ABE 密码方法都不具备以下功能:属性收敛、特权访问、用户撤销和外包功能。因此,我们提出了一种能解决所有这些问题的 CP-ABE 方法--e-SAFE。此外,在 e-SAFE 中,资源有限的医疗设备数据用户只需在设备上保存一个恒定且小尺寸的解密密钥。根据我们对安全性和性能的评估,e-SAFE 是一种安全高效的物联网小工具访问控制技术。
{"title":"e-SAFE: A secure and efficient access control scheme with attribute convergence and user revocation in fog enhanced IoT for E-Health","authors":"Richa Sarma ,&nbsp;Sanjay Moulik","doi":"10.1016/j.jisa.2024.103859","DOIUrl":"10.1016/j.jisa.2024.103859","url":null,"abstract":"<div><p>The growth of IoT led to a surge in connected devices and data production in the medical field. Therefore, to meet the rising demand for modern healthcare services, Fog and Cloud services come as a rescue for IoT-based equipment. As data travels through several levels, providing security to such data is challenging. The CP-ABE cryptographic approach allows for efficient access control. However, none of the known cryptographic CP-ABE approaches that provide granular access control offers the following features: <em>attribute convergence</em>, <em>privileged access</em>, <em>user revocation</em>, and <em>outsourcing capabilities</em> altogether. Thus, we present <em>e-SAFE</em>, a CP-ABE approach which addresses all these issues. In addition, in <em>e-SAFE</em>, the data users with resource-constrained medical gadgets must save just a constant and small-size decryption key on their gadgets. According to our assessment of security and performance, <em>e-SAFE</em> is found to be a secure and efficient access control technique for IoT gadgets.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103859"},"PeriodicalIF":3.8,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141997724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust medical image zero-watermarking algorithm using Collatz and Fresnelet Transforms 使用 Collatz 和 Fresnelet 变换的鲁棒医学图像零水印算法
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-16 DOI: 10.1016/j.jisa.2024.103855
Pavani Meesala, Moumita Roy, Dalton Meitei Thounaojam

Zero-watermarking in medical images is an emerging field that focuses on calculating the invisible data (key) using medical imagery to ensure data integrity and authenticity without compromising diagnostic accuracy. This paper introduces a robust zero-watermarking technique leveraging the Collatz and Fresnelet Transforms. The Forward Collatz Transform (FCT) is initially applied to create a secure and encrypted embedding pattern for medical images. Subsequently, the Fresnelet Transform (FT) is employed, offering superior localization and frequency selectivity. From the fresnelet values, we extract two strongest Oriented FAST and Rotated BRIEF (ORB) points to enhance watermark robustness, resulting in a 64-bit perceptual image hash. Our approach adopts a dual-layer security strategy by combining FCT and Cyclic-Shift-Transformation (CST) methods, significantly fortifying the protection of watermark image data. The watermark can be efficiently extracted using the Inverse Collatz Transform (ICT). A comprehensive performance analysis evaluates our system under single, double, and multiple attacks on medical images. Our experiments clearly show that our system outperforms existing methods in medical image watermarking, demonstrating its resilience against various manipulations. This approach can significantly improve data security and reliability in medical imaging applications.

医学图像零水印技术是一个新兴领域,其重点是利用医学图像计算隐形数据(密钥),以确保数据的完整性和真实性,同时不影响诊断的准确性。本文介绍了一种利用 Collatz 和 Fresnelet 变换的稳健零水印技术。首先应用前向科拉茨变换(FCT)为医学图像创建安全加密的嵌入模式。随后,采用弗雷斯内列变换 (FT),提供出色的定位和频率选择性。我们从小波值中提取两个最强的定向 FAST 和旋转 BRIEF(ORB)点,以增强水印的鲁棒性,从而得到 64 位感知图像哈希值。我们的方法采用双层安全策略,结合了 FCT 和循环位移变换(CST)方法,大大加强了对水印图像数据的保护。利用反科拉茨变换(ICT)可以有效地提取水印。全面的性能分析评估了我们的系统在医学图像受到单一、双重和多重攻击时的性能。我们的实验清楚地表明,我们的系统优于现有的医学图像水印方法,证明了它对各种操作的适应能力。这种方法可以大大提高医学图像应用中的数据安全性和可靠性。
{"title":"A robust medical image zero-watermarking algorithm using Collatz and Fresnelet Transforms","authors":"Pavani Meesala,&nbsp;Moumita Roy,&nbsp;Dalton Meitei Thounaojam","doi":"10.1016/j.jisa.2024.103855","DOIUrl":"10.1016/j.jisa.2024.103855","url":null,"abstract":"<div><p>Zero-watermarking in medical images is an emerging field that focuses on calculating the invisible data (key) using medical imagery to ensure data integrity and authenticity without compromising diagnostic accuracy. This paper introduces a robust zero-watermarking technique leveraging the Collatz and Fresnelet Transforms. The Forward Collatz Transform (FCT) is initially applied to create a secure and encrypted embedding pattern for medical images. Subsequently, the Fresnelet Transform (FT) is employed, offering superior localization and frequency selectivity. From the fresnelet values, we extract two strongest Oriented FAST and Rotated BRIEF (ORB) points to enhance watermark robustness, resulting in a 64-bit perceptual image hash. Our approach adopts a dual-layer security strategy by combining FCT and Cyclic-Shift-Transformation (CST) methods, significantly fortifying the protection of watermark image data. The watermark can be efficiently extracted using the Inverse Collatz Transform (ICT). A comprehensive performance analysis evaluates our system under single, double, and multiple attacks on medical images. Our experiments clearly show that our system outperforms existing methods in medical image watermarking, demonstrating its resilience against various manipulations. This approach can significantly improve data security and reliability in medical imaging applications.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103855"},"PeriodicalIF":3.8,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Color image encryption scheme combining a 2D hyperchaotic Sin–Henon system and the division algorithm 结合二维超混沌 Sin-Henon 系统和分割算法的彩色图像加密方案
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-16 DOI: 10.1016/j.jisa.2024.103858
Honglian Shen , Xiuling Shan , Zihong Tian

As an important transmission medium, color images can provide more information, but in the process of image encryption, few algorithms fully consider the relationship between three color planes. To achieve a more secure and effective color image encryption effect, we propose a novel scheme combining a 2D hyperchaotic Sin–Henon system (2D-SH) and the division algorithm. 2D-SH is designed based on Sin mapping and Henon mapping, which has a broader chaotic range, better ergodicity, and more complicated chaotic behavior. The division algorithm is applied to the chaotic sequences produced by 2D-SH to generate a position matrix and two pseudo-random matrices for cross-plane scrambling and diffusion. The main encryption process involves three steps. Firstly, a color plaintext image is dimensionally reduced and preprocessed into a 2D pixel matrix to improve the efficiency of scrambling and diffusion. Secondly, the position matrix is used to achieve cross-plane scrambling. Finally, the pseudo-random matrices and the position matrix are used to realize synchronous diffusion and scrambling. The algorithm is simple in structure and can complete the encryption with only one round of the process. Simulation experiments and security analyses demonstrate that the proposed algorithm can not only encrypt images securely and fast, but also successfully pass various tests, demonstrating robustness and effectiveness. In addition, SH-CIEA outperforms some latest algorithms in terms of variance, entropy, and other aspects. The calculation time is nearly 0.61 s, showing its efficiency for practical applications.

作为一种重要的传输介质,彩色图像能提供更多的信息,但在图像加密过程中,很少有算法能充分考虑三个彩色平面之间的关系。为了达到更安全有效的彩色图像加密效果,我们提出了一种结合二维超混沌辛-赫农系统(2D-SH)和分割算法的新方案。二维超混沌Sin-Henon系统是基于Sin映射和Henon映射设计的,它具有更宽的混沌范围、更好的遍历性和更复杂的混沌行为。分割算法应用于 2D-SH 产生的混沌序列,生成一个位置矩阵和两个伪随机矩阵,用于跨平面加扰和扩散。主要加密过程包括三个步骤。首先,将彩色明文图像降维并预处理成二维像素矩阵,以提高加扰和扩散的效率。其次,利用位置矩阵实现跨平面加扰。最后,利用伪随机矩阵和位置矩阵实现同步扩散和加扰。该算法结构简单,只需一轮过程即可完成加密。仿真实验和安全性分析表明,所提出的算法不仅能安全、快速地加密图像,还能成功通过各种测试,证明了算法的鲁棒性和有效性。此外,SH-CIEA 在方差、熵等方面都优于一些最新算法。计算时间接近 0.61 秒,显示了其在实际应用中的高效性。
{"title":"Color image encryption scheme combining a 2D hyperchaotic Sin–Henon system and the division algorithm","authors":"Honglian Shen ,&nbsp;Xiuling Shan ,&nbsp;Zihong Tian","doi":"10.1016/j.jisa.2024.103858","DOIUrl":"10.1016/j.jisa.2024.103858","url":null,"abstract":"<div><p>As an important transmission medium, color images can provide more information, but in the process of image encryption, few algorithms fully consider the relationship between three color planes. To achieve a more secure and effective color image encryption effect, we propose a novel scheme combining a 2D hyperchaotic Sin–Henon system (2D-SH) and the division algorithm. 2D-SH is designed based on Sin mapping and Henon mapping, which has a broader chaotic range, better ergodicity, and more complicated chaotic behavior. The division algorithm is applied to the chaotic sequences produced by 2D-SH to generate a position matrix and two pseudo-random matrices for cross-plane scrambling and diffusion. The main encryption process involves three steps. Firstly, a color plaintext image is dimensionally reduced and preprocessed into a 2D pixel matrix to improve the efficiency of scrambling and diffusion. Secondly, the position matrix is used to achieve cross-plane scrambling. Finally, the pseudo-random matrices and the position matrix are used to realize synchronous diffusion and scrambling. The algorithm is simple in structure and can complete the encryption with only one round of the process. Simulation experiments and security analyses demonstrate that the proposed algorithm can not only encrypt images securely and fast, but also successfully pass various tests, demonstrating robustness and effectiveness. In addition, SH-CIEA outperforms some latest algorithms in terms of variance, entropy, and other aspects. The calculation time is nearly 0.61 s, showing its efficiency for practical applications.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103858"},"PeriodicalIF":3.8,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns 卧底混淆揭示混淆分层对结构代码模式的影响
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-16 DOI: 10.1016/j.jisa.2024.103850
Sebastian Raubitzek , Sebastian Schrittwieser , Elisabeth Wimmer , Kevin Mallinger

Malware often uses code obfuscation to evade detection, employing techniques such as packing, virtualization, and data encoding or encryption. Despite widespread application, the impact of combining these techniques in a particular order – so-called obfuscation layering – on code analysis remains poorly understood. This study advances previous research by examining the effects of obfuscation layering on the classification of obfuscation techniques contained in binary code, focusing on how different layering combinations alter structural code patterns. Utilizing a dataset of 85 C programs modified with various combinations of code obfuscation techniques, we analyze the impact of obfuscation layering on structural code metrics such as its control flow complexity. Our study demonstrates that obfuscation layering significantly affects the ability to classify obfuscated code and that the order of applied obfuscations is less significant for classification than previously assumed. Through explainability methodologies our work offers novel insights for malware analysts and researchers to improve their detection strategies.

恶意软件经常利用代码混淆来逃避检测,采用的技术包括打包、虚拟化、数据编码或加密。尽管这些技术被广泛应用,但以特定顺序组合这些技术(即所谓的混淆分层)对代码分析的影响仍鲜为人知。本研究通过考察混淆分层对二进制代码中包含的混淆技术分类的影响,重点研究不同的分层组合如何改变代码结构模式,从而推进了之前的研究。利用由 85 个使用不同代码混淆技术组合修改的 C 程序组成的数据集,我们分析了混淆分层对结构代码指标(如控制流复杂性)的影响。我们的研究表明,混淆分层对混淆代码的分类能力有很大影响,而且应用混淆的顺序对分类的影响比以前假设的要小。通过可解释性方法,我们的工作为恶意软件分析师和研究人员改进检测策略提供了新的见解。
{"title":"Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns","authors":"Sebastian Raubitzek ,&nbsp;Sebastian Schrittwieser ,&nbsp;Elisabeth Wimmer ,&nbsp;Kevin Mallinger","doi":"10.1016/j.jisa.2024.103850","DOIUrl":"10.1016/j.jisa.2024.103850","url":null,"abstract":"<div><p>Malware often uses code obfuscation to evade detection, employing techniques such as packing, virtualization, and data encoding or encryption. Despite widespread application, the impact of combining these techniques in a particular order – so-called obfuscation layering – on code analysis remains poorly understood. This study advances previous research by examining the effects of obfuscation layering on the classification of obfuscation techniques contained in binary code, focusing on how different layering combinations alter structural code patterns. Utilizing a dataset of 85 C programs modified with various combinations of code obfuscation techniques, we analyze the impact of obfuscation layering on structural code metrics such as its control flow complexity. Our study demonstrates that obfuscation layering significantly affects the ability to classify obfuscated code and that the order of applied obfuscations is less significant for classification than previously assumed. Through explainability methodologies our work offers novel insights for malware analysts and researchers to improve their detection strategies.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103850"},"PeriodicalIF":3.8,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214212624001522/pdfft?md5=3de2f994e091baa96e64c5d0c427f0b4&pid=1-s2.0-S2214212624001522-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141997723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contract-based hierarchical security aggregation scheme for enhancing privacy in federated learning 基于合约的分层安全聚合方案,用于增强联合学习中的隐私保护
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1016/j.jisa.2024.103857
Qianjin Wei , Gang Rao , Xuanjing Wu

Federated learning ensures the privacy of participant data by uploading gradients rather than private data. However, it has yet to address the issue of untrusted aggregators using gradient inference attacks to obtain user privacy data. Current research introduces encryption, blockchain, or secure multi-party computation to address these issues, but these solutions suffer from significant computational and communication overhead, often requiring a trusted third party. To address these challenges, this paper proposes a contract-based hierarchical secure aggregation scheme to enhance the privacy of federated learning. Firstly, the paper designs a general hierarchical federated learning model that distinguishes among training, aggregation, and consensus layers, replacing the need for a trusted third party with smart contracts. Secondly, to prevent untrusted aggregators from inferring the privacy data of each participant, the paper proposes a novel aggregation scheme based on Paillier and secret sharing. This scheme forces aggregators to aggregate participants’ model parameters, thereby preserving the privacy of gradients. Additionally, secret sharing ensures robustness for participants dynamically joining or exiting. Furthermore, at the consensus layer, the paper proposes an accuracy-based update algorithm to mitigate the impact of Byzantine attacks and allows for the introduction of other consensus methods to ensure scalability. Experimental results demonstrate that our scheme enhances privacy protection, maintains model accuracy without loss, and exhibits robustness against Byzantine attacks. The proposed scheme effectively protects participant privacy in practical federated learning scenarios.

联合学习通过上传梯度而非隐私数据来确保参与者数据的隐私性。然而,它尚未解决不受信任的聚合者利用梯度推理攻击获取用户隐私数据的问题。目前的研究引入了加密、区块链或安全的多方计算来解决这些问题,但这些解决方案都存在巨大的计算和通信开销,通常需要一个可信的第三方。为了应对这些挑战,本文提出了一种基于合约的分层安全聚合方案,以增强联合学习的隐私性。首先,本文设计了一种通用的分层联合学习模型,区分了训练层、聚合层和共识层,用智能合约取代了对可信第三方的需求。其次,为了防止不受信任的聚合者推断出每个参与者的隐私数据,本文提出了一种基于 Paillier 和秘密共享的新型聚合方案。该方案迫使聚合者聚合参与者的模型参数,从而保护梯度隐私。此外,秘密共享还能确保动态加入或退出的参与者的稳健性。此外,在共识层,本文提出了一种基于准确性的更新算法,以减轻拜占庭攻击的影响,并允许引入其他共识方法,以确保可扩展性。实验结果表明,我们的方案增强了隐私保护,无损地保持了模型的准确性,并对拜占庭攻击表现出鲁棒性。在实际的联合学习场景中,所提出的方案能有效保护参与者的隐私。
{"title":"Contract-based hierarchical security aggregation scheme for enhancing privacy in federated learning","authors":"Qianjin Wei ,&nbsp;Gang Rao ,&nbsp;Xuanjing Wu","doi":"10.1016/j.jisa.2024.103857","DOIUrl":"10.1016/j.jisa.2024.103857","url":null,"abstract":"<div><p>Federated learning ensures the privacy of participant data by uploading gradients rather than private data. However, it has yet to address the issue of untrusted aggregators using gradient inference attacks to obtain user privacy data. Current research introduces encryption, blockchain, or secure multi-party computation to address these issues, but these solutions suffer from significant computational and communication overhead, often requiring a trusted third party. To address these challenges, this paper proposes a contract-based hierarchical secure aggregation scheme to enhance the privacy of federated learning. Firstly, the paper designs a general hierarchical federated learning model that distinguishes among training, aggregation, and consensus layers, replacing the need for a trusted third party with smart contracts. Secondly, to prevent untrusted aggregators from inferring the privacy data of each participant, the paper proposes a novel aggregation scheme based on Paillier and secret sharing. This scheme forces aggregators to aggregate participants’ model parameters, thereby preserving the privacy of gradients. Additionally, secret sharing ensures robustness for participants dynamically joining or exiting. Furthermore, at the consensus layer, the paper proposes an accuracy-based update algorithm to mitigate the impact of Byzantine attacks and allows for the introduction of other consensus methods to ensure scalability. Experimental results demonstrate that our scheme enhances privacy protection, maintains model accuracy without loss, and exhibits robustness against Byzantine attacks. The proposed scheme effectively protects participant privacy in practical federated learning scenarios.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103857"},"PeriodicalIF":3.8,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic analysis of web browsers lifecycle: A case study 网络浏览器生命周期的取证分析:案例研究
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1016/j.jisa.2024.103839
Ahmed Raza , Mehdi Hussain , Hasan Tahir , Muhammad Zeeshan , Muhammad Adil Raja , Ki-Hyun Jung

The widespread integration of the internet into daily life across sectors such as healthcare, education, business, and entertainment has led to an increasing dependence on web applications. However, inherent technological vulnerabilities attract cybercriminals, necessitating robust security measures. While these security measures, including frequent updates/fixes to applications and operating systems, are essential, they also complicate forensic investigations. This research proposes a comprehensive approach to artifact identification and collection for examining browsing activities of Firefox, Chrome, and Edge on Windows 11. The methodology includes setting up and analyzing all stages of browser usage, such as installations, executions, uninstallations, and anomalous behaviors like crashes and restarts. Simulated cyber-criminal activities are used to collect artifacts at each stage, which are then analyzed using Windows 11 components such as the registry, memory, storage, and log locations. Experimental results reveal vulnerabilities, such as crashes, that can lead to the loss of sensitive information. This methodology provides a promising foundation for advancing browser forensic analysis and enhancing cybercrime investigations.

互联网广泛融入医疗、教育、商业和娱乐等各行各业的日常生活,导致人们越来越依赖网络应用程序。然而,固有的技术漏洞吸引着网络犯罪分子,因此必须采取强有力的安全措施。虽然这些安全措施(包括对应用程序和操作系统的频繁更新/修复)是必不可少的,但它们也使取证调查变得复杂。本研究提出了一种全面的人工制品识别和收集方法,用于检查 Windows 11 上 Firefox、Chrome 浏览器和 Edge 浏览活动。该方法包括设置和分析浏览器使用的所有阶段,如安装、执行、卸载以及崩溃和重启等异常行为。模拟网络犯罪活动用于收集每个阶段的工件,然后使用注册表、内存、存储和日志位置等 Windows 11 组件对这些工件进行分析。实验结果揭示了可能导致敏感信息丢失的崩溃等漏洞。这种方法为推进浏览器取证分析和加强网络犯罪调查奠定了良好的基础。
{"title":"Forensic analysis of web browsers lifecycle: A case study","authors":"Ahmed Raza ,&nbsp;Mehdi Hussain ,&nbsp;Hasan Tahir ,&nbsp;Muhammad Zeeshan ,&nbsp;Muhammad Adil Raja ,&nbsp;Ki-Hyun Jung","doi":"10.1016/j.jisa.2024.103839","DOIUrl":"10.1016/j.jisa.2024.103839","url":null,"abstract":"<div><p>The widespread integration of the internet into daily life across sectors such as healthcare, education, business, and entertainment has led to an increasing dependence on web applications. However, inherent technological vulnerabilities attract cybercriminals, necessitating robust security measures. While these security measures, including frequent updates/fixes to applications and operating systems, are essential, they also complicate forensic investigations. This research proposes a comprehensive approach to artifact identification and collection for examining browsing activities of Firefox, Chrome, and Edge on Windows 11. The methodology includes setting up and analyzing all stages of browser usage, such as installations, executions, uninstallations, and anomalous behaviors like crashes and restarts. Simulated cyber-criminal activities are used to collect artifacts at each stage, which are then analyzed using Windows 11 components such as the registry, memory, storage, and log locations. Experimental results reveal vulnerabilities, such as crashes, that can lead to the loss of sensitive information. This methodology provides a promising foundation for advancing browser forensic analysis and enhancing cybercrime investigations.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103839"},"PeriodicalIF":3.8,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving logistic regression with improved efficiency 提高效率的隐私保护逻辑回归
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-09 DOI: 10.1016/j.jisa.2024.103848
Miaomiao Tian , Jiale Liu , Zhili Chen , Shaowei Wang

Logistic regression is a well-known method for classification and is being widely used in our daily life. To obtain a logistic regression model with sufficient accuracy, collecting a large number of data samples from multiple sources is necessary. However, in nowadays a concern about the leakage of private information contained in data samples becomes increasingly prominent, and thus privacy-preserving logistic regression that enables training logistic regression models without privacy leakage has received great attention from the community. Mohassel and Zhang at IEEE S&P’17 presented a significant protocol for privacy-preserving logistic regression in two-server setting, where two non-colluding servers collaboratively train logistic regression models in an offline–online manner. In this work, we propose a new two-server-based protocol for privacy-preserving logistic regression with an efficient approach to activation function evaluation, which incurs much less computational overhead than Mohassel–Zhang protocol while requiring the same number of online rounds. We also present a round-efficient protocol for generating correlated randomness that will be used subsequently in our activation function evaluation. We implement our protocol in C++ and the experimental results validate its efficiency.

逻辑回归是一种众所周知的分类方法,在我们的日常生活中得到了广泛应用。要获得足够准确的逻辑回归模型,必须从多个来源收集大量数据样本。然而,如今人们对数据样本中包含的隐私信息泄露的担忧日益突出,因此能在不泄露隐私的情况下训练逻辑回归模型的隐私保护逻辑回归受到了社会各界的极大关注。Mohassel 和 Zhang 在 IEEE S&P'17 大会上提出了一种重要的双服务器环境下隐私保护逻辑回归协议,即两个非共用服务器以离线-在线方式协作训练逻辑回归模型。在这项工作中,我们提出了一种基于双服务器的新隐私保护逻辑回归协议,它采用了一种高效的激活函数评估方法,与 Mohassel-Zhang 协议相比,它的计算开销要少得多,但所需的在线轮数相同。我们还提出了一种生成相关随机性的高效回合协议,随后将用于我们的激活函数评估。我们用 C++ 实现了我们的协议,实验结果验证了其效率。
{"title":"Privacy-preserving logistic regression with improved efficiency","authors":"Miaomiao Tian ,&nbsp;Jiale Liu ,&nbsp;Zhili Chen ,&nbsp;Shaowei Wang","doi":"10.1016/j.jisa.2024.103848","DOIUrl":"10.1016/j.jisa.2024.103848","url":null,"abstract":"<div><p>Logistic regression is a well-known method for classification and is being widely used in our daily life. To obtain a logistic regression model with sufficient accuracy, collecting a large number of data samples from multiple sources is necessary. However, in nowadays a concern about the leakage of private information contained in data samples becomes increasingly prominent, and thus privacy-preserving logistic regression that enables training logistic regression models without privacy leakage has received great attention from the community. Mohassel and Zhang at IEEE S&amp;P’17 presented a significant protocol for privacy-preserving logistic regression in two-server setting, where two non-colluding servers collaboratively train logistic regression models in an offline–online manner. In this work, we propose a new two-server-based protocol for privacy-preserving logistic regression with an efficient approach to activation function evaluation, which incurs much less computational overhead than Mohassel–Zhang protocol while requiring the same number of online rounds. We also present a round-efficient protocol for generating correlated randomness that will be used subsequently in our activation function evaluation. We implement our protocol in C++ and the experimental results validate its efficiency.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103848"},"PeriodicalIF":3.8,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep reinforcement learning approach for security-aware service acquisition in IoT 物联网安全感知服务获取的深度强化学习方法
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-09 DOI: 10.1016/j.jisa.2024.103856
Marco Arazzi , Serena Nicolazzo , Antonino Nocera

The emerging Internet of Things (IoT) landscape is characterized by a high number of heterogeneous smart devices and services often provided by third parties. Although machine-based Service Level Agreements (SLA) have been recently leveraged to establish and share policies in this scenario, system owners do not always give full transparency regarding the security and privacy of the offered features. Hence, the issue of making end users aware of the overall system security levels and the fulfillment of their privacy requirements through the provision of the requested service remains a challenging task. To tackle this problem, we propose a complete framework that allows users to choose suitable levels of privacy and security requirements for service acquisition in IoT. Our approach leverages a Deep Reinforcement Learning solution in which a user agent, inside the environment, is trained to select the best encountered smart objects providing the user target services on behalf of its owner. This strategy is designed to allow the agent to learn from experience by moving in a complex, multi-dimensional environment and reacting to possible changes. During the learning phase, a key task for the agent is to adhere to deadlines while ensuring user security and privacy requirements. Finally, to assess the performance of the proposed approach, we carried out an extensive experimental campaign. The obtained results also show that our solution can be successfully deployed on very basic and simple devices typically available in an IoT setting.

新兴物联网(IoT)的特点是存在大量异构智能设备和服务,这些设备和服务通常由第三方提供。虽然基于机器的服务水平协议(SLA)最近已被用于在这种情况下建立和共享策略,但系统所有者并不总是对所提供功能的安全性和隐私性完全透明。因此,如何让终端用户了解系统的整体安全级别,并通过提供所请求的服务来满足他们的隐私要求,仍然是一项具有挑战性的任务。为了解决这个问题,我们提出了一个完整的框架,允许用户为获取物联网服务选择合适的隐私和安全要求级别。我们的方法利用了深度强化学习解决方案,其中对环境中的用户代理进行了训练,使其能够选择遇到的最佳智能对象,代表所有者为用户提供目标服务。这一策略旨在让代理在复杂的多维环境中移动并对可能发生的变化做出反应,从而从经验中学习。在学习阶段,代理的一项关键任务是遵守最后期限,同时确保用户的安全和隐私要求。最后,为了评估所提出方法的性能,我们开展了广泛的实验活动。获得的结果还表明,我们的解决方案可以成功地部署在物联网环境中常见的非常基本和简单的设备上。
{"title":"A deep reinforcement learning approach for security-aware service acquisition in IoT","authors":"Marco Arazzi ,&nbsp;Serena Nicolazzo ,&nbsp;Antonino Nocera","doi":"10.1016/j.jisa.2024.103856","DOIUrl":"10.1016/j.jisa.2024.103856","url":null,"abstract":"<div><p>The emerging Internet of Things (IoT) landscape is characterized by a high number of heterogeneous smart devices and services often provided by third parties. Although machine-based Service Level Agreements (SLA) have been recently leveraged to establish and share policies in this scenario, system owners do not always give full transparency regarding the security and privacy of the offered features. Hence, the issue of making end users aware of the overall system security levels and the fulfillment of their privacy requirements through the provision of the requested service remains a challenging task. To tackle this problem, we propose a complete framework that allows users to choose suitable levels of privacy and security requirements for service acquisition in IoT. Our approach leverages a Deep Reinforcement Learning solution in which a user agent, inside the environment, is trained to select the best encountered smart objects providing the user target services on behalf of its owner. This strategy is designed to allow the agent to learn from experience by moving in a complex, multi-dimensional environment and reacting to possible changes. During the learning phase, a key task for the agent is to adhere to deadlines while ensuring user security and privacy requirements. Finally, to assess the performance of the proposed approach, we carried out an extensive experimental campaign. The obtained results also show that our solution can be successfully deployed on very basic and simple devices typically available in an IoT setting.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103856"},"PeriodicalIF":3.8,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise LSPR23:来自最大规模实弹网络安全演习的新型 IDS 数据集
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-06 DOI: 10.1016/j.jisa.2024.103847
Allard Dijk , Emre Halisdemir , Cosimo Melella , Alari Schu , Mauno Pihelgas , Roland Meier

Cybersecurity threats are constantly evolving and becoming increasingly sophisticated, automated, adaptive, and intelligent. This makes it difficult for organizations to defend their digital assets. Industry professionals are looking for solutions to improve the efficiency and effectiveness of cybersecurity operations, adopting different strategies. In cybersecurity, the importance of developing new intrusion detection systems (IDSs) to address these threats has emerged. Most of these systems today are based on machine learning. But these systems need high-quality data to “learn” the characteristics of malicious traffic. Such datasets are difficult to obtain and therefore rarely available.

This paper advances the state of the art and presents a new high-quality IDS dataset. The dataset originates from Locked Shields, one of the world’s most extensive live-fire cyber defense exercises. This ensures that (i) it contains realistic behavior of attackers and defenders; (ii) it contains sophisticated attacks; and (iii) it contains labels, as the actions of the attackers are well-documented.

The dataset includes approximately 16 million network flows, [F3] of which approximately 1.6 million were labeled malicious. What is unique about this dataset is the use of a new labeling technique that increases the accuracy level of data labeling.

We evaluate the robustness of our dataset using both quantitative and qualitative methodologies. We begin with a quantitative examination of the Suricata IDS alerts based on signatures and anomalies. Subsequently, we assess the reproducibility of machine learning experiments conducted by Känzig et al., who used a private Locked Shields dataset. We also apply the quality criteria outlined by the evaluation framework proposed by Gharib et al.

Using our dataset with an existing classifier, we demonstrate comparable results (F1 score of 0.997) to the original paper where the classifier was evaluated on a private dataset (F1 score of 0.984)

网络安全威胁不断演变,变得越来越复杂、自动化、自适应和智能化。这使得企业难以保护其数字资产。业内专业人士正在寻找解决方案,以提高网络安全操作的效率和有效性,并采取不同的策略。在网络安全领域,开发新的入侵检测系统(IDS)以应对这些威胁的重要性已经显现。目前,这些系统大多基于机器学习。但这些系统需要高质量的数据来 "学习 "恶意流量的特征。这种数据集很难获得,因此很少有。
{"title":"LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise","authors":"Allard Dijk ,&nbsp;Emre Halisdemir ,&nbsp;Cosimo Melella ,&nbsp;Alari Schu ,&nbsp;Mauno Pihelgas ,&nbsp;Roland Meier","doi":"10.1016/j.jisa.2024.103847","DOIUrl":"10.1016/j.jisa.2024.103847","url":null,"abstract":"<div><p>Cybersecurity threats are constantly evolving and becoming increasingly sophisticated, automated, adaptive, and intelligent. This makes it difficult for organizations to defend their digital assets. Industry professionals are looking for solutions to improve the efficiency and effectiveness of cybersecurity operations, adopting different strategies. In cybersecurity, the importance of developing new intrusion detection systems (IDSs) to address these threats has emerged. Most of these systems today are based on machine learning. But these systems need high-quality data to “learn” the characteristics of malicious traffic. Such datasets are difficult to obtain and therefore rarely available.</p><p>This paper advances the state of the art and presents a new high-quality IDS dataset. The dataset originates from Locked Shields, one of the world’s most extensive live-fire cyber defense exercises. This ensures that (i) it contains realistic behavior of attackers and defenders; (ii) it contains sophisticated attacks; and (iii) it contains labels, as the actions of the attackers are well-documented.</p><p>The dataset includes approximately 16 million network flows, [F3] of which approximately 1.6 million were labeled malicious. What is unique about this dataset is the use of a new labeling technique that increases the accuracy level of data labeling.</p><p>We evaluate the robustness of our dataset using both quantitative and qualitative methodologies. We begin with a quantitative examination of the Suricata IDS alerts based on signatures and anomalies. Subsequently, we assess the reproducibility of machine learning experiments conducted by Känzig et al., who used a private Locked Shields dataset. We also apply the quality criteria outlined by the evaluation framework proposed by Gharib et al.</p><p>Using our dataset with an existing classifier, we demonstrate comparable results (F1 score of 0.997) to the original paper where the classifier was evaluated on a private dataset (F1 score of 0.984)</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103847"},"PeriodicalIF":3.8,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Security and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1