首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
Process-aware security monitoring in industrial control systems: A systematic review and future directions 工业控制系统中的过程感知安全监控:系统回顾与未来方向
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-26 DOI: 10.1016/j.ijcip.2024.100719
Muaan ur Rehman , Hayretdin Bahşi
Due to the tight coupling between the cyber and physical components, control systems are subjected to emerging cyberattacks. In addition to attacks based on networking and communication, control systems are also susceptible to process-aware attacks that target the business logic behind a physical process. Due to the increasing frequency of such attacks, the process-aware defence mechanisms that incorporate knowledge of the underlying physical model, has gained increased attention in current cyber–physical system security-related research. However, the rapid expansion of literature complicates the ability to thoroughly review and ascertain the state-of-the-art, as well as to identify existing research challenges and gaps. This paper investigates research on process-aware-based security monitoring for control systems and aims to establish a common understanding of currently used methods in this domain. A systematic literature review is performed to outline and classify the existing work and present the authors’ cybersecurity vision. From an extensive review of publications between February 1, 2009 and October 30, 2023, we analysed and categorized the existing research on process-aware security monitoring techniques for control systems. Furthermore, we identified process-aware attack categories posing threats to the physical process in critical infrastructures. We have further mapped these attacks to the MITRE ATT&CK matrix for Industrial Control Systems (ICS), detailing their tactics, techniques, and impacts.
由于网络和物理组件之间的紧密耦合,控制系统受到了新出现的网络攻击。除了基于网络和通信的攻击外,控制系统还容易受到针对物理过程背后业务逻辑的过程感知攻击。由于此类攻击日益频繁,结合底层物理模型知识的过程感知防御机制在当前的网络物理系统安全相关研究中获得了越来越多的关注。然而,文献的迅速扩充使得彻底审查和确定最先进技术以及确定现有研究挑战和差距的能力变得复杂。本文调查了基于过程感知的控制系统安全监控研究,旨在对该领域目前使用的方法建立共识。本文进行了系统的文献综述,对现有工作进行了概述和分类,并提出了作者的网络安全愿景。通过对 2009 年 2 月 1 日至 2023 年 10 月 30 日期间发表的文献进行广泛查阅,我们对现有的控制系统过程感知安全监控技术研究进行了分析和分类。此外,我们还确定了对关键基础设施中的物理过程构成威胁的过程感知攻击类别。我们进一步将这些攻击映射到 MITRE ATT&CK 工业控制系统 (ICS) 矩阵中,详细说明了它们的战术、技术和影响。
{"title":"Process-aware security monitoring in industrial control systems: A systematic review and future directions","authors":"Muaan ur Rehman ,&nbsp;Hayretdin Bahşi","doi":"10.1016/j.ijcip.2024.100719","DOIUrl":"10.1016/j.ijcip.2024.100719","url":null,"abstract":"<div><div>Due to the tight coupling between the cyber and physical components, control systems are subjected to emerging cyberattacks. In addition to attacks based on networking and communication, control systems are also susceptible to process-aware attacks that target the business logic behind a physical process. Due to the increasing frequency of such attacks, the process-aware defence mechanisms that incorporate knowledge of the underlying physical model, has gained increased attention in current cyber–physical system security-related research. However, the rapid expansion of literature complicates the ability to thoroughly review and ascertain the state-of-the-art, as well as to identify existing research challenges and gaps. This paper investigates research on process-aware-based security monitoring for control systems and aims to establish a common understanding of currently used methods in this domain. A systematic literature review is performed to outline and classify the existing work and present the authors’ cybersecurity vision. From an extensive review of publications between February 1, 2009 and October 30, 2023, we analysed and categorized the existing research on process-aware security monitoring techniques for control systems. Furthermore, we identified process-aware attack categories posing threats to the physical process in critical infrastructures. We have further mapped these attacks to the MITRE ATT&amp;CK matrix for Industrial Control Systems (ICS), detailing their tactics, techniques, and impacts.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100719"},"PeriodicalIF":4.1,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142421445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An AutoML-based security defender for industrial control systems 基于 AutoML 的工业控制系统安全防御器
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1016/j.ijcip.2024.100718
Danish Vasan , Ebtesam Jubran S. Alqahtani , Mohammad Hammoudeh , Adel F. Ahmed

Securing Industrial Control Systems (ICS) against cyber threats is crucial for maintaining operational reliability and safety in critical infrastructure. Traditional Machine Learning (ML) approaches in ICS development require substantial domain expertise, posing challenges for non-experts. To address this gap, we propose and evaluate ICS-defender, a defense mechanism to enhance ICS security through Automated Machine Learning (AutoML) techniques. Our approach leverages sophisticated feature engineering and AutoML to automate model selection, training, aggregation, and optimization, thereby reducing the dependency on specialized knowledge. We evaluate ICS-defender against state-of-the-art AutoML frameworks using diverse datasets from power systems and electric vehicle chargers. Experimental results consistently demonstrate that ICS-defender outperforms existing frameworks in terms of accuracy and robustness, achieving average accuracies of 93.75%, 94.34%, and 87.12% for power systems attacks datasets and 94.23% for the electric vehicle charging station attacks dataset, surpassing baseline algorithms. This research contributes to advancing secure and resilient ICS, offering significant implications for broader applications and future enhancements in industrial cybersecurity.

确保工业控制系统(ICS)免受网络威胁对于维护关键基础设施的运行可靠性和安全性至关重要。ICS 开发中的传统机器学习(ML)方法需要大量的领域专业知识,这给非专业人员带来了挑战。为了弥补这一差距,我们提出并评估了 ICS-defender 这种通过自动机器学习(AutoML)技术增强 ICS 安全性的防御机制。我们的方法利用复杂的特征工程和 AutoML 自动进行模型选择、训练、聚合和优化,从而减少了对专业知识的依赖。我们利用来自电力系统和电动汽车充电器的各种数据集,对照最先进的 AutoML 框架对 ICS-defender 进行了评估。实验结果一致表明,ICS-defender 在准确性和鲁棒性方面优于现有框架,在电力系统攻击数据集和电动汽车充电站攻击数据集上的平均准确性分别达到 93.75%、94.34% 和 87.12%,超过了基准算法。这项研究有助于推进安全和弹性的 ICS,对工业网络安全的更广泛应用和未来提升具有重要意义。
{"title":"An AutoML-based security defender for industrial control systems","authors":"Danish Vasan ,&nbsp;Ebtesam Jubran S. Alqahtani ,&nbsp;Mohammad Hammoudeh ,&nbsp;Adel F. Ahmed","doi":"10.1016/j.ijcip.2024.100718","DOIUrl":"10.1016/j.ijcip.2024.100718","url":null,"abstract":"<div><p>Securing Industrial Control Systems (ICS) against cyber threats is crucial for maintaining operational reliability and safety in critical infrastructure. Traditional Machine Learning (ML) approaches in ICS development require substantial domain expertise, posing challenges for non-experts. To address this gap, we propose and evaluate ICS-defender, a defense mechanism to enhance ICS security through Automated Machine Learning (AutoML) techniques. Our approach leverages sophisticated feature engineering and AutoML to automate model selection, training, aggregation, and optimization, thereby reducing the dependency on specialized knowledge. We evaluate ICS-defender against state-of-the-art AutoML frameworks using diverse datasets from power systems and electric vehicle chargers. Experimental results consistently demonstrate that ICS-defender outperforms existing frameworks in terms of accuracy and robustness, achieving average accuracies of 93.75%, 94.34%, and 87.12% for power systems attacks datasets and 94.23% for the electric vehicle charging station attacks dataset, surpassing baseline algorithms. This research contributes to advancing secure and resilient ICS, offering significant implications for broader applications and future enhancements in industrial cybersecurity.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100718"},"PeriodicalIF":4.1,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142164704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obfuscation strategies for industrial control systems 工业控制系统的混淆策略
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.ijcip.2024.100717
Vittoria Cozza , Mila Dalla Preda , Ruggero Lanotte , Marco Lucchese , Massimo Merro , Nicola Zannone

Recently released scan data on Shodan reveals that thousands of Industrial Control Systems (ICSs) worldwide are directly accessible via the Internet and, thus, exposed to cyber-attacks aiming at financial gain, espionage, or disruption and/or sabotage. Executing sophisticated cyber–physical attacks aiming to manipulate industrial functionalities requires a deep understanding of the underlying physical process at the core of the target ICS, for instance, through unauthorized access to memory registers of Programmable Logic Controllers (PLCs). However, to date, countermeasures aiming at hindering the comprehension of physical processes remain largely unexplored.

In this work, we investigate the use of obfuscation strategies to complicate process comprehension of ICSs while preserving their runtime evolution. To this end, we propose a framework to design and evaluate obfuscation strategies for PLCs, involving PLC memory registers, PLC code (user program), and the introduction of extra (spurious) physical processes. Our framework categorizes obfuscation strategies based on two dimensions: the type of (spurious) registers employed in the obfuscation strategy and the dependence on the (genuine) physical process. To evaluate the efficacy of proposed obfuscation strategies, we introduce evaluation metrics to assess their potency and resilience, in terms of system invariants the attacker can derive, and their cost in terms of computational overhead due to runtime modifications of spurious PLC registers. We developed a prototype tool to automatize the devised obfuscation strategies and applied them to a non-trivial use case in the field of water tank systems. Our results show that code obfuscation can be effectively used to counter malicious process comprehension of ICSs achieved via scanning of PLC memory registers. To our knowledge, this is the first work using obfuscation as a technique to protect ICSs from such threats. The efficacy of the proposed obfuscation strategies predominantly depends on the intrinsic complexity of the interplay introduced between genuine and spurious registers.

Shodan 最近发布的扫描数据显示,全球成千上万的工业控制系统 (ICS) 可通过互联网直接访问,因此面临着以经济利益、间谍活动或干扰和/或破坏为目的的网络攻击。要实施旨在操纵工业功能的复杂网络物理攻击,需要深入了解目标 ICS 核心的基本物理过程,例如,通过未经授权访问可编程逻辑控制器 (PLC) 的内存寄存器。然而,迄今为止,旨在阻碍理解物理过程的应对措施在很大程度上仍未得到探索。在这项工作中,我们研究了如何使用混淆策略,在保持运行时演化的同时,使综合布线系统的过程理解复杂化。为此,我们提出了一个设计和评估 PLC 混淆策略的框架,涉及 PLC 内存寄存器、PLC 代码(用户程序)和额外(虚假)物理过程的引入。我们的框架根据两个维度对混淆策略进行分类:混淆策略中使用的(虚假)寄存器类型和对(真实)物理过程的依赖性。为了评估所提出的混淆策略的有效性,我们引入了评估指标,从攻击者可以获得的系统不变性的角度来评估它们的有效性和弹性,并从运行时修改虚假 PLC 寄存器造成的计算开销的角度来评估它们的成本。我们开发了一个原型工具,用于自动执行所设计的混淆策略,并将其应用于水箱系统领域的一个非难用案例。我们的研究结果表明,代码混淆可有效对抗通过扫描 PLC 内存寄存器实现的对 ICS 恶意进程理解。据我们所知,这是首次使用混淆技术来保护 ICS 免受此类威胁。所建议的混淆策略的有效性主要取决于真实寄存器和虚假寄存器之间相互作用的内在复杂性。
{"title":"Obfuscation strategies for industrial control systems","authors":"Vittoria Cozza ,&nbsp;Mila Dalla Preda ,&nbsp;Ruggero Lanotte ,&nbsp;Marco Lucchese ,&nbsp;Massimo Merro ,&nbsp;Nicola Zannone","doi":"10.1016/j.ijcip.2024.100717","DOIUrl":"10.1016/j.ijcip.2024.100717","url":null,"abstract":"<div><p>Recently released scan data on Shodan reveals that thousands of <em>Industrial Control Systems</em> (ICSs) worldwide are directly accessible via the Internet and, thus, exposed to cyber-attacks aiming at financial gain, espionage, or disruption and/or sabotage. Executing sophisticated cyber–physical attacks aiming to manipulate industrial functionalities requires a deep understanding of the underlying physical process at the core of the target ICS, for instance, through unauthorized access to memory registers of <em>Programmable Logic Controllers</em> (PLCs). However, to date, countermeasures aiming at hindering the comprehension of physical processes remain largely unexplored.</p><p>In this work, we investigate the use of <em>obfuscation strategies</em> to complicate <em>process comprehension</em> of ICSs while preserving their runtime evolution. To this end, we propose a framework to design and evaluate obfuscation strategies for PLCs, involving PLC memory registers, PLC code (user program), and the introduction of extra (spurious) physical processes. Our framework categorizes obfuscation strategies based on two dimensions: the <em>type of (spurious) registers</em> employed in the obfuscation strategy and the <em>dependence on the (genuine) physical process</em>. To evaluate the efficacy of proposed obfuscation strategies, we introduce <em>evaluation metrics</em> to assess their <em>potency</em> and <em>resilience</em>, in terms of <em>system invariants</em> the attacker can derive, and their <em>cost</em> in terms of computational overhead due to runtime modifications of spurious PLC registers. We developed a prototype tool to automatize the devised obfuscation strategies and applied them to a non-trivial use case in the field of water tank systems. Our results show that code obfuscation can be effectively used to counter malicious process comprehension of ICSs achieved via scanning of PLC memory registers. To our knowledge, this is the first work using obfuscation as a technique to protect ICSs from such threats. The efficacy of the proposed obfuscation strategies predominantly depends on the intrinsic complexity of the interplay introduced between genuine and spurious registers.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100717"},"PeriodicalIF":4.1,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000581/pdfft?md5=34c2c309641d7172bea1f3fdf4abfc70&pid=1-s2.0-S1874548224000581-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
It is the time, are you sufficiently resilient? 现在是时候了,你有足够的应变能力吗?
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/S1874-5482(24)00051-9
Roberto Setola
{"title":"It is the time, are you sufficiently resilient?","authors":"Roberto Setola","doi":"10.1016/S1874-5482(24)00051-9","DOIUrl":"10.1016/S1874-5482(24)00051-9","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100710"},"PeriodicalIF":4.1,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000519/pdfft?md5=54538213fe2797447c3bade1b9566663&pid=1-s2.0-S1874548224000519-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of SDN security measures in the context of IEC 62443-3-3 根据 IEC 62443-3-3 评估 SDN 安全措施
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1016/j.ijcip.2024.100716
Georgios Michail Makrakis , Dakota Roberson , Constantinos Kolias , Dallin Cook

The security of assets within electrical substations is paramount to ensuring the reliable and resilient operation of the energy sector. However, implementing existing industry cybersecurity standards in these environments presents numerous technical challenges. In this work, we provide systematic guidance that emphasizes best practices and prioritizes requirement implementation. We examine the application of Software-Defined Networking (SDN) as a means to enhance security within the IEC 62443 family of standards. Specifically, we offer insights into how the security measures required for compliance with the IEC 62443 security standards can impact the stringent timing constraints of contemporary communication protocols, enabling advanced distribution system operations in the future. Utilizing a testbed modeled after a real-world electrical substation, we demonstrate that while SDN-based security features naturally introduce some additional latency, their operational impact on the network’s strict constraints is minimal.

变电站内资产的安全对于确保能源行业的可靠和弹性运行至关重要。然而,在这些环境中实施现有的行业网络安全标准面临着诸多技术挑战。在这项工作中,我们提供了系统性指导,强调最佳实践并优先考虑要求的实施。我们研究了软件定义网络(SDN)的应用,将其作为增强 IEC 62443 系列标准安全性的一种手段。具体来说,我们深入探讨了符合 IEC 62443 安全标准所需的安全措施如何影响当代通信协议的严格时序约束,从而在未来实现先进的配电系统操作。利用仿照真实世界变电站的测试平台,我们证明了虽然基于 SDN 的安全功能自然会带来一些额外的延迟,但它们对网络严格限制的运行影响微乎其微。
{"title":"Evaluation of SDN security measures in the context of IEC 62443-3-3","authors":"Georgios Michail Makrakis ,&nbsp;Dakota Roberson ,&nbsp;Constantinos Kolias ,&nbsp;Dallin Cook","doi":"10.1016/j.ijcip.2024.100716","DOIUrl":"10.1016/j.ijcip.2024.100716","url":null,"abstract":"<div><p>The security of assets within electrical substations is paramount to ensuring the reliable and resilient operation of the energy sector. However, implementing existing industry cybersecurity standards in these environments presents numerous technical challenges. In this work, we provide systematic guidance that emphasizes best practices and prioritizes requirement implementation. We examine the application of Software-Defined Networking (SDN) as a means to enhance security within the IEC 62443 family of standards. Specifically, we offer insights into how the security measures required for compliance with the IEC 62443 security standards can impact the stringent timing constraints of contemporary communication protocols, enabling advanced distribution system operations in the future. Utilizing a testbed modeled after a real-world electrical substation, we demonstrate that while SDN-based security features naturally introduce some additional latency, their operational impact on the network’s strict constraints is minimal.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100716"},"PeriodicalIF":4.1,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea 根据韩国的空间特征对环境设施进行综合脆弱性评估
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-27 DOI: 10.1016/j.ijcip.2024.100715
Young Hwan Choi , Do Guen Yoo , Pill Jae Kwak , Hyung Do Kim , Jungsu Park , Jaehyeoung Park , Younghan Yoon

Among environmental facilities, wastewater treatment facilities have a crucial role in sustaining human life, and any occurrence of an earthquake or flood within these facilities can result in various social, economic, and environmental issues, either directly or indirectly. Therefore, a quantitative vulnerability assessment of wastewater treatment facilities is necessary to minimize and prevent damage from earthquakes and flood disasters. For this reason, this study introduces a novel indicator to assess the susceptibility of disasters, considering aspects of exposure, sensitivity, and adaptive capacity. The newly proposed indicator encompasses numerous evaluation criteria, topography, natural surroundings, hydraulic systems, structural composition, and non-structural features. Also, Weights derived using the combined weight calculation (CWC) method, which combined the analytic hierarchy process (AHP) and entropy weight method were applied to the indicator. It was tested across 23 cities to validate its efficacy, revealing a substantial correlation between the vulnerability index and the specific attributes of the city's wastewater treatment facilities. Therefore, this study analyzed wastewater treatment facilities by comparing the attributes of the urban areas under investigation, such as topological characteristics, urbanization levels, population density, infrastructure quality, and disaster preparedness resources available. The suggested methodology can facilitate the development of strategies aimed at averting damage caused by earthquakes or floods and reducing the adverse impact on wastewater treatment facilities while considering the unique characteristics of the urban setting in question.

在环境设施中,污水处理设施对维持人类生活起着至关重要的作用,这些设施内发生的任何地震或洪水都会直接或间接地导致各种社会、经济和环境问题。因此,有必要对污水处理设施进行定量脆弱性评估,以最大限度地减少和预防地震和洪水灾害造成的损失。为此,本研究引入了一个新指标来评估灾害的易损性,该指标考虑了暴露程度、敏感性和适应能力等方面。新提出的指标包含多个评估标准、地形、自然环境、水力系统、结构组成和非结构特征。此外,该指标还采用了综合权重计算法(CWC),该方法结合了层次分析法(AHP)和熵权法。该指标在 23 个城市中进行了测试,以验证其有效性,结果显示脆弱性指数与城市污水处理设施的具体属性之间存在很大的相关性。因此,本研究通过比较被调查城市地区的属性,如地形特征、城市化水平、人口密度、基础设施质量和可用的备灾资源,对污水处理设施进行了分析。所建议的方法有助于制定战略,以避免地震或洪水造成的破坏,减少对污水处理设施的不利影响,同时考虑到相关城市环境的独特性。
{"title":"Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea","authors":"Young Hwan Choi ,&nbsp;Do Guen Yoo ,&nbsp;Pill Jae Kwak ,&nbsp;Hyung Do Kim ,&nbsp;Jungsu Park ,&nbsp;Jaehyeoung Park ,&nbsp;Younghan Yoon","doi":"10.1016/j.ijcip.2024.100715","DOIUrl":"10.1016/j.ijcip.2024.100715","url":null,"abstract":"<div><p>Among environmental facilities, wastewater treatment facilities have a crucial role in sustaining human life, and any occurrence of an earthquake or flood within these facilities can result in various social, economic, and environmental issues, either directly or indirectly. Therefore, a quantitative vulnerability assessment of wastewater treatment facilities is necessary to minimize and prevent damage from earthquakes and flood disasters. For this reason, this study introduces a novel indicator to assess the susceptibility of disasters, considering aspects of exposure, sensitivity, and adaptive capacity. The newly proposed indicator encompasses numerous evaluation criteria, topography, natural surroundings, hydraulic systems, structural composition, and non-structural features. Also, Weights derived using the combined weight calculation (CWC) method, which combined the analytic hierarchy process (AHP) and entropy weight method were applied to the indicator. It was tested across 23 cities to validate its efficacy, revealing a substantial correlation between the vulnerability index and the specific attributes of the city's wastewater treatment facilities. Therefore, this study analyzed wastewater treatment facilities by comparing the attributes of the urban areas under investigation, such as topological characteristics, urbanization levels, population density, infrastructure quality, and disaster preparedness resources available. The suggested methodology can facilitate the development of strategies aimed at averting damage caused by earthquakes or floods and reducing the adverse impact on wastewater treatment facilities while considering the unique characteristics of the urban setting in question.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100715"},"PeriodicalIF":4.1,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142164705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator 确保工业控制系统的安全:开发 SCADA/IoT 测试台并在硬件模拟器上评估轻量级密码性能
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-23 DOI: 10.1016/j.ijcip.2024.100705
Darshana Upadhyay , Sagarika Ghosh , Hiroyuki Ohno , Marzia Zaman , Srinivas Sampalli

This paper addresses the critical need for enhancing security in Supervisory Control and Data Acquisition (SCADA) networks within Industrial Control Systems (ICSs) to protect the industrial processes from cyber-attacks. The purpose of our work is to propose and evaluate lightweight security measures to safeguard critical infrastructure resources. The scope of our effort involves simulating a secure SCADA/IoT-based hardware test bench for ICSs, utilizing Modbus and MQTT communication protocols. Through case studies in remote servo motor control, water distribution systems, and power system voltage level indicators, vulnerabilities such as Denial of Service (DoS) and Man-in-The-Middle (MiTM) attacks are identified, and security recommendations are provided. To execute our work, we deploy lightweight ciphers such as Prime Counter & Hash Chaining (PCHC) and Ascon algorithm with Compression Rate (ACR) for secure information exchange between the plant floor and the control center. Evaluation of these ciphers on Raspberry Pi focuses on execution speed and memory utilization. Additionally, a comparison with the AGA-12 protocol standard for SCADA networks is conducted to underscore the efficacy of the proposed security measures. Our findings include the identification of SCADA network vulnerabilities and the proposal of lightweight security measures to mitigate risks. Performance evaluation of the proposed ciphers on Raspberry Pi demonstrates their effectiveness, emphasizing the importance of deploying such measures to ensure resilience against cyber threats in SCADA environments.

本文论述了加强工业控制系统(ICS)内的监控与数据采集(SCADA)网络安全性以保护工业流程免受网络攻击的迫切需要。我们工作的目的是提出并评估轻量级安全措施,以保护关键基础设施资源。我们的工作范围包括利用 Modbus 和 MQTT 通信协议,为 ICS 模拟基于 SCADA/IoT 的安全硬件测试台。通过对远程伺服电机控制、配水系统和电力系统电压等级指示器的案例研究,我们确定了拒绝服务(DoS)和中间人(MiTM)攻击等漏洞,并提供了安全建议。为了开展工作,我们部署了轻量级密码,如 Prime Counter & Hash Chaining (PCHC) 和 Ascon algorithm with Compression Rate (ACR),用于工厂底层和控制中心之间的安全信息交换。在 Raspberry Pi 上对这些密码的评估主要集中在执行速度和内存利用率上。此外,还与 SCADA 网络的 AGA-12 协议标准进行了比较,以强调所建议的安全措施的有效性。我们的研究结果包括识别 SCADA 网络漏洞和提出轻量级安全措施以降低风险。在树莓派(Raspberry Pi)上对所建议的密码进行的性能评估证明了其有效性,强调了部署此类措施以确保抵御 SCADA 环境中网络威胁的重要性。
{"title":"Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator","authors":"Darshana Upadhyay ,&nbsp;Sagarika Ghosh ,&nbsp;Hiroyuki Ohno ,&nbsp;Marzia Zaman ,&nbsp;Srinivas Sampalli","doi":"10.1016/j.ijcip.2024.100705","DOIUrl":"10.1016/j.ijcip.2024.100705","url":null,"abstract":"<div><p>This paper addresses the critical need for enhancing security in Supervisory Control and Data Acquisition (SCADA) networks within Industrial Control Systems (ICSs) to protect the industrial processes from cyber-attacks. The purpose of our work is to propose and evaluate lightweight security measures to safeguard critical infrastructure resources. The scope of our effort involves simulating a secure SCADA/IoT-based hardware test bench for ICSs, utilizing Modbus and MQTT communication protocols. Through case studies in remote servo motor control, water distribution systems, and power system voltage level indicators, vulnerabilities such as Denial of Service (DoS) and Man-in-The-Middle (MiTM) attacks are identified, and security recommendations are provided. To execute our work, we deploy lightweight ciphers such as Prime Counter &amp; Hash Chaining (PCHC) and Ascon algorithm with Compression Rate (ACR) for secure information exchange between the plant floor and the control center. Evaluation of these ciphers on Raspberry Pi focuses on execution speed and memory utilization. Additionally, a comparison with the AGA-12 protocol standard for SCADA networks is conducted to underscore the efficacy of the proposed security measures. Our findings include the identification of SCADA network vulnerabilities and the proposal of lightweight security measures to mitigate risks. Performance evaluation of the proposed ciphers on Raspberry Pi demonstrates their effectiveness, emphasizing the importance of deploying such measures to ensure resilience against cyber threats in SCADA environments.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100705"},"PeriodicalIF":4.1,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000465/pdfft?md5=aab404315863014667e25aa2e54961de&pid=1-s2.0-S1874548224000465-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city 节点与链路攻击下城市地下物流系统的弹性量化与恢复策略模拟:南京市案例研究
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-11 DOI: 10.1016/j.ijcip.2024.100704
Ying Lu, Qingling Wang, Shiyu Huang, Wenhui Yu, Shuyue Yao

Urban Underground Logistics Systems (UULS) have become an emerging solution to mitigate urban surface traffic congestion, environmental pollution, and surface transport safety risks. However, during the operation of UULS, the use of advanced technologies such as the Internet of Things (IoT) introduces cybersecurity risks to the system. Moreover, severe natural disasters can also cause damage to underground transportation network links. Existing research and planning primarily concentrate on the system design and benefits of UULS, neglecting the system's service level under attack scenarios. This study outlines three representative UULS network prototypes and proposes a resilience quantification method centered on logistics efficiency. It also focuses on comparing the effectiveness of three recovery strategies. These strategies give priority to maximum flow, betweenness centrality, and regional importance, as well as the priority of node and link repairs. The resilience quantification method and recovery strategies are applied in a case study set in Nanjing City. The case study results reveal that the Two-echelon network shows exceptional resilience. Regarding the effectiveness of recovery strategies, the strategy based on maximum flow proves to be the most effective, and focusing on node repair can lead to higher system resilience. Based on these findings, this study offers recommendations to transportation and logistics management decision-makers, focusing on UULS resilience and recovery strategy selection. These recommendations are intended to provide valuable guidance for the planning and design of future UULS, ensuring their resilience and reliability.

城市地下物流系统(UULS)已成为缓解城市地面交通拥堵、环境污染和地面交通安全风险的新兴解决方案。然而,在 UULS 运行过程中,物联网(IoT)等先进技术的使用会给系统带来网络安全风险。此外,严重的自然灾害也会对地下交通网络链接造成破坏。现有的研究和规划主要集中在 UULS 的系统设计和优势上,忽视了系统在攻击情况下的服务水平。本研究概述了三个具有代表性的 UULS 网络原型,并提出了一种以物流效率为中心的弹性量化方法。研究还重点比较了三种恢复策略的有效性。这些策略优先考虑最大流量、介度中心性和区域重要性,以及节点和链路修复的优先级。复原力量化方法和复原策略在南京市的案例研究中得到了应用。案例研究结果表明,"双核网络 "表现出了卓越的恢复能力。在恢复策略的有效性方面,基于最大流量的策略被证明是最有效的,而专注于节点修复则能带来更高的系统恢复能力。基于这些发现,本研究针对 UULS 的恢复能力和恢复策略选择,向运输和物流管理决策者提出了建议。这些建议旨在为未来 UULS 的规划和设计提供有价值的指导,确保其恢复能力和可靠性。
{"title":"Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city","authors":"Ying Lu,&nbsp;Qingling Wang,&nbsp;Shiyu Huang,&nbsp;Wenhui Yu,&nbsp;Shuyue Yao","doi":"10.1016/j.ijcip.2024.100704","DOIUrl":"10.1016/j.ijcip.2024.100704","url":null,"abstract":"<div><p>Urban Underground Logistics Systems (UULS) have become an emerging solution to mitigate urban surface traffic congestion, environmental pollution, and surface transport safety risks. However, during the operation of UULS, the use of advanced technologies such as the Internet of Things (IoT) introduces cybersecurity risks to the system. Moreover, severe natural disasters can also cause damage to underground transportation network links. Existing research and planning primarily concentrate on the system design and benefits of UULS, neglecting the system's service level under attack scenarios. This study outlines three representative UULS network prototypes and proposes a resilience quantification method centered on logistics efficiency. It also focuses on comparing the effectiveness of three recovery strategies. These strategies give priority to maximum flow, betweenness centrality, and regional importance, as well as the priority of node and link repairs. The resilience quantification method and recovery strategies are applied in a case study set in Nanjing City. The case study results reveal that the Two-echelon network shows exceptional resilience. Regarding the effectiveness of recovery strategies, the strategy based on maximum flow proves to be the most effective, and focusing on node repair can lead to higher system resilience. Based on these findings, this study offers recommendations to transportation and logistics management decision-makers, focusing on UULS resilience and recovery strategy selection. These recommendations are intended to provide valuable guidance for the planning and design of future UULS, ensuring their resilience and reliability.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100704"},"PeriodicalIF":4.1,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of cross-border electricity interconnection projects using a MCDA method 使用 MCDA 方法评估跨境电力联网项目
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1016/j.ijcip.2024.100703
Natalia Naval, Jose M. Yusta

The European Union is promoting cross-border electricity interconnection projects to achieve energy objectives, reduce the current fragmented European market, and eradicate the isolation of the most disadvantaged areas. However, selecting these projects is a complex task because there are multiple objectives, criteria, participants and alternatives involved. This paper aims to develop a multi-criteria decision analysis (MCDA) method for appropriately assessing and prioritizing cross-border electricity interconnection projects considering technical, economic, environmental and social criteria. Additionally, this work analyzes interconnection effects on the resilience of interconnected power systems. To verify its validity, this method is applied to prioritize new Spain-France interconnection infrastructure projects. From the results obtained, the technical and environmental criteria have proven to be the most important, since cross-border electricity interconnection projects are aimed at better market-coupling, less congestion and higher reliability while minimizing environmental impacts. In short, the proposed methodology provides a comprehensive view of the impact of these projects.

欧盟正在推动跨境电力互联项目,以实现能源目标,减少目前分散的欧洲市场,并消除最落后地区的孤立状态。然而,选择这些项目是一项复杂的任务,因为其中涉及多个目标、标准、参与者和备选方案。本文旨在开发一种多标准决策分析(MCDA)方法,用于考虑技术、经济、环境和社会标准,对跨境电力互联项目进行适当评估和优先排序。此外,本文还分析了互联对互联电力系统恢复能力的影响。为了验证该方法的有效性,我们将其应用于西班牙-法国新的互联基础设施项目的优先排序。从获得的结果来看,技术和环境标准被证明是最重要的,因为跨境电力互联项目的目的是更好地耦合市场、减少拥堵和提高可靠性,同时最大限度地减少对环境的影响。总之,所提出的方法能够全面反映这些项目的影响。
{"title":"Assessment of cross-border electricity interconnection projects using a MCDA method","authors":"Natalia Naval,&nbsp;Jose M. Yusta","doi":"10.1016/j.ijcip.2024.100703","DOIUrl":"10.1016/j.ijcip.2024.100703","url":null,"abstract":"<div><p>The European Union is promoting cross-border electricity interconnection projects to achieve energy objectives, reduce the current fragmented European market, and eradicate the isolation of the most disadvantaged areas. However, selecting these projects is a complex task because there are multiple objectives, criteria, participants and alternatives involved. This paper aims to develop a multi-criteria decision analysis (MCDA) method for appropriately assessing and prioritizing cross-border electricity interconnection projects considering technical, economic, environmental and social criteria. Additionally, this work analyzes interconnection effects on the resilience of interconnected power systems. To verify its validity, this method is applied to prioritize new Spain-France interconnection infrastructure projects. From the results obtained, the technical and environmental criteria have proven to be the most important, since cross-border electricity interconnection projects are aimed at better market-coupling, less congestion and higher reliability while minimizing environmental impacts. In short, the proposed methodology provides a comprehensive view of the impact of these projects.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100703"},"PeriodicalIF":4.1,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000441/pdfft?md5=8b19846c0ed1e9f07e6bf1f0af07250e&pid=1-s2.0-S1874548224000441-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141939998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber attacks on critical infrastructures and satellite communications 对关键基础设施和卫星通信的网络攻击
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-03 DOI: 10.1016/j.ijcip.2024.100701
Dr. Antonio Carlo , Dr. Kim Obergfaell

The cyber-attack on the Ukrainian positioning network at the beginning of the ongoing Russia-Ukraine war demonstrated how the branching of satellite connections can have severe repercussions for communication systems. While ground-based networks are changing, the vulnerability of critical infrastructure to cyber-attacks and technical failures has become a serious concern. As cyber attackers are increasingly targeting industrial control systems rather than stealing data, attacks have become more sophisticated and significant. Future connectivity to 5 G networks, the entry of new private players in this sector, and the economic growth of emerging countries will further increase the attack surface of the space sector. A risk-based approach is therefore needed to increase protection and resilience against cyber-attacks. This requires a comprehensive understanding of the technologies and their vulnerabilities, as well as the ability to quickly develop solutions to counter attacks. Responding effectively with legal and policy means is essential to adapting to changes and to providing continuity and security of services. This paper highlights the main qualities of communication technology, its vulnerabilities, and the critical challenges to achieving cyber resilience. It identifies significant assets, defence solutions, and legal and policy aspects that should be further researched to enhance the cyber resilience of European assets.

正在进行的俄乌战争初期对乌克兰定位网络的网络攻击表明,卫星连接的分支会对通信系统造成严重影响。在地面网络发生变化的同时,关键基础设施易受网络攻击和技术故障影响的问题已成为人们严重关切的问题。由于网络攻击者越来越多地瞄准工业控制系统,而不是窃取数据,攻击变得更加复杂和严重。未来与 5 G 网络的连接、新的私营企业进入这一领域以及新兴国家的经济增长,都将进一步增加空间部门的攻击面。因此,需要采取基于风险的方法来加强对网络攻击的保护和抵御能力。这就需要全面了解技术及其脆弱性,并有能力迅速制定应对攻击的解决方案。利用法律和政策手段有效应对,对于适应变化、提供服务的连续性和安全性至关重要。本文重点介绍了通信技术的主要特性、其脆弱性以及实现网络复原力的关键挑战。它确定了应进一步研究的重要资产、防御解决方案以及法律和政策方面,以提高欧洲资产的网络复原力。
{"title":"Cyber attacks on critical infrastructures and satellite communications","authors":"Dr. Antonio Carlo ,&nbsp;Dr. Kim Obergfaell","doi":"10.1016/j.ijcip.2024.100701","DOIUrl":"10.1016/j.ijcip.2024.100701","url":null,"abstract":"<div><p>The cyber-attack on the Ukrainian positioning network at the beginning of the ongoing Russia-Ukraine war demonstrated how the branching of satellite connections can have severe repercussions for communication systems. While ground-based networks are changing, the vulnerability of critical infrastructure to cyber-attacks and technical failures has become a serious concern. As cyber attackers are increasingly targeting industrial control systems rather than stealing data, attacks have become more sophisticated and significant. Future connectivity to 5 G networks, the entry of new private players in this sector, and the economic growth of emerging countries will further increase the attack surface of the space sector. A risk-based approach is therefore needed to increase protection and resilience against cyber-attacks. This requires a comprehensive understanding of the technologies and their vulnerabilities, as well as the ability to quickly develop solutions to counter attacks. Responding effectively with legal and policy means is essential to adapting to changes and to providing continuity and security of services. This paper highlights the main qualities of communication technology, its vulnerabilities, and the critical challenges to achieving cyber resilience. It identifies significant assets, defence solutions, and legal and policy aspects that should be further researched to enhance the cyber resilience of European assets.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"46 ","pages":"Article 100701"},"PeriodicalIF":4.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141939996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1