首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
Assessing earthquake risks to lifeline infrastructure systems in the United States 评估美国生命线基础设施系统的地震风险
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-01 Epub Date: 2025-03-24 DOI: 10.1016/j.ijcip.2025.100758
N. Simon Kwong , Kishor S. Jaiswal
The security and economic stability of the United States rely heavily on robust lifeline infrastructure systems and yet the risks to such systems are seldom quantified at the national scale. For example, while earthquake risks to buildings in the United States have been investigated at the national scale regularly, such risks to gas pipelines have rarely been investigated nationally. In this paper, we use examples from two critical infrastructure sectors to demonstrate (1) the nature of earthquake risks to lifeline infrastructure systems, (2) complexities involved in regional seismic risk assessments, and (3) how such risks change with time. We found that bridge risks can be underestimated by at least 64 % when viewed from repair costs instead of traffic demands and that regional risks can be underestimated by 19 % when spatial correlations of ground motion are ignored. Further, exceedance of traffic demand can be 50 times more likely to occur when viewed at the regional scale than when viewed at an individual bridge. Similarly, exceedance of repairs can be 180 times more likely to occur when viewed at the pipeline network level than at a segment-specific level. Finally, sensitivity analyses with the 2018 and 2023 USGS National Seismic Hazard Models indicate an increase in bridge risk of at least 24 % and an increase in exposed gas pipeline mileage of 43 %. The evolution of risks, complexities involved in assessments, and limited resources jointly underscore the need for more routine updates to nationwide seismic risk assessments of lifeline systems in the United States.
美国的安全和经济稳定在很大程度上依赖于强大的生命线基础设施系统,但这些系统所面临的风险却很少在全国范围内进行量化。例如,美国定期在全国范围内调查建筑物的地震风险,但却很少在全国范围内调查天然气管道的此类风险。在本文中,我们用两个关键基础设施部门的例子来说明:(1) 生命线基础设施系统地震风险的性质;(2) 区域地震风险评估的复杂性;(3) 这种风险如何随时间变化。我们发现,如果从维修成本而非交通需求的角度来看,桥梁风险可能被低估至少 64%;如果忽略地动的空间相关性,区域风险可能被低估 19%。此外,从区域范围来看,交通需求超标的可能性是单座桥梁的 50 倍。同样,从管网层面来看,维修费用超标的可能性是分段层面的 180 倍。最后,使用 2018 年和 2023 年 USGS 国家地震灾害模型进行的敏感性分析表明,桥梁风险至少增加 24%,暴露的天然气管道里程增加 43%。风险的演变、评估的复杂性和有限的资源共同强调了对美国全国生命线系统地震风险评估进行更多例行更新的必要性。
{"title":"Assessing earthquake risks to lifeline infrastructure systems in the United States","authors":"N. Simon Kwong ,&nbsp;Kishor S. Jaiswal","doi":"10.1016/j.ijcip.2025.100758","DOIUrl":"10.1016/j.ijcip.2025.100758","url":null,"abstract":"<div><div>The security and economic stability of the United States rely heavily on robust lifeline infrastructure systems and yet the risks to such systems are seldom quantified at the national scale. For example, while earthquake risks to buildings in the United States have been investigated at the national scale regularly, such risks to gas pipelines have rarely been investigated nationally. In this paper, we use examples from two critical infrastructure sectors to demonstrate (1) the nature of earthquake risks to lifeline infrastructure systems, (2) complexities involved in regional seismic risk assessments, and (3) how such risks change with time. We found that bridge risks can be underestimated by at least 64 % when viewed from repair costs instead of traffic demands and that regional risks can be underestimated by 19 % when spatial correlations of ground motion are ignored. Further, exceedance of traffic demand can be 50 times more likely to occur when viewed at the regional scale than when viewed at an individual bridge. Similarly, exceedance of repairs can be 180 times more likely to occur when viewed at the pipeline network level than at a segment-specific level. Finally, sensitivity analyses with the 2018 and 2023 USGS National Seismic Hazard Models indicate an increase in bridge risk of at least 24 % and an increase in exposed gas pipeline mileage of 43 %. The evolution of risks, complexities involved in assessments, and limited resources jointly underscore the need for more routine updates to nationwide seismic risk assessments of lifeline systems in the United States.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"49 ","pages":"Article 100758"},"PeriodicalIF":4.1,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143738890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of multi-stage attack and defense mechanisms in smart grids 智能电网多阶段攻防机制仿真
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-01 Epub Date: 2024-12-05 DOI: 10.1016/j.ijcip.2024.100727
Ömer Sen , Bozhidar Ivanov , Christian Kloos , Christoph Zöll , Philipp Lutat , Martin Henze , Andreas Ulbig , Michael Andres
The power grid is a vital infrastructure in modern society, essential for ensuring public safety and welfare. As it increasingly relies on digital technologies for its operation, it becomes more vulnerable to sophisticated cyber threats. These threats, if successful, could disrupt the grid’s functionality, leading to severe consequences. To mitigate these risks, it is crucial to develop effective protective measures, such as intrusion detection systems and decision support systems, that can detect and respond to cyber attacks. Machine learning methods have shown great promise in this area, but their effectiveness is often limited by the scarcity of high-quality data, primarily due to confidentiality and access issues.
In response to this challenge, our work introduces an advanced simulation environment that replicates the power grid’s infrastructure and communication behavior. This environment enables the simulation of complex, multi-stage cyber attacks and defensive mechanisms, using attack trees to map the attacker’s steps and a game-theoretic approach to model the defender’s response strategies. The primary goal of this simulation framework is to generate a diverse range of realistic attack data that can be used to train machine learning algorithms for detecting and mitigating cyber attacks. Additionally, the environment supports the evaluation of new security technologies, including advanced decision support systems, by providing a controlled and flexible testing platform.
Our simulation environment is designed to be modular and scalable, supporting the integration of new use cases and attack scenarios without relying heavily on external components. It enables the entire process of scenario generation, data modeling, data point mapping, and power flow simulation, along with the depiction of communication traffic, in a coherent process chain. This ensures that all relevant data needed for cyber security investigations, including the interactions between attacker and defender, are captured under consistent conditions and constraints.
The simulation environment also includes a detailed modeling of communication protocols and grid operation management, providing insights into how attacks propagate through the network. The generated data are validated through laboratory tests, ensuring that the simulation reflects real-world conditions. These datasets are used to train machine learning models for intrusion detection and evaluate their performance, specifically focusing on how well they can detect complex attack patterns in power grid operations.
电网是现代社会重要的基础设施,对保障公共安全和社会福利至关重要。随着它越来越依赖数字技术进行操作,它变得更容易受到复杂的网络威胁。这些威胁如果成功,可能会破坏电网的功能,导致严重的后果。为了减轻这些风险,开发有效的保护措施至关重要,例如可以检测和响应网络攻击的入侵检测系统和决策支持系统。机器学习方法在这一领域显示出巨大的前景,但它们的有效性往往受到高质量数据稀缺的限制,主要是由于保密性和访问问题。为了应对这一挑战,我们的工作引入了一种先进的模拟环境,可以复制电网的基础设施和通信行为。这种环境能够模拟复杂的、多阶段的网络攻击和防御机制,使用攻击树来映射攻击者的步骤,并使用博弈论方法来模拟防御者的响应策略。该模拟框架的主要目标是生成各种各样的真实攻击数据,这些数据可用于训练机器学习算法,以检测和减轻网络攻击。此外,该环境通过提供一个可控和灵活的测试平台,支持评估新的安全技术,包括先进的决策支持系统。我们的模拟环境被设计成模块化和可扩展的,支持新用例和攻击场景的集成,而不严重依赖外部组件。它支持场景生成、数据建模、数据点映射和功率流模拟的整个过程,以及通信流量的描述,在一个连贯的过程链中。这确保了在一致的条件和约束下捕获网络安全调查所需的所有相关数据,包括攻击者和防御者之间的交互。仿真环境还包括通信协议和网格操作管理的详细建模,提供了对攻击如何通过网络传播的见解。生成的数据通过实验室测试进行验证,确保模拟反映了现实世界的条件。这些数据集用于训练用于入侵检测的机器学习模型并评估其性能,特别关注它们在电网运行中检测复杂攻击模式的能力。
{"title":"Simulation of multi-stage attack and defense mechanisms in smart grids","authors":"Ömer Sen ,&nbsp;Bozhidar Ivanov ,&nbsp;Christian Kloos ,&nbsp;Christoph Zöll ,&nbsp;Philipp Lutat ,&nbsp;Martin Henze ,&nbsp;Andreas Ulbig ,&nbsp;Michael Andres","doi":"10.1016/j.ijcip.2024.100727","DOIUrl":"10.1016/j.ijcip.2024.100727","url":null,"abstract":"<div><div>The power grid is a vital infrastructure in modern society, essential for ensuring public safety and welfare. As it increasingly relies on digital technologies for its operation, it becomes more vulnerable to sophisticated cyber threats. These threats, if successful, could disrupt the grid’s functionality, leading to severe consequences. To mitigate these risks, it is crucial to develop effective protective measures, such as intrusion detection systems and decision support systems, that can detect and respond to cyber attacks. Machine learning methods have shown great promise in this area, but their effectiveness is often limited by the scarcity of high-quality data, primarily due to confidentiality and access issues.</div><div>In response to this challenge, our work introduces an advanced simulation environment that replicates the power grid’s infrastructure and communication behavior. This environment enables the simulation of complex, multi-stage cyber attacks and defensive mechanisms, using attack trees to map the attacker’s steps and a game-theoretic approach to model the defender’s response strategies. The primary goal of this simulation framework is to generate a diverse range of realistic attack data that can be used to train machine learning algorithms for detecting and mitigating cyber attacks. Additionally, the environment supports the evaluation of new security technologies, including advanced decision support systems, by providing a controlled and flexible testing platform.</div><div>Our simulation environment is designed to be modular and scalable, supporting the integration of new use cases and attack scenarios without relying heavily on external components. It enables the entire process of scenario generation, data modeling, data point mapping, and power flow simulation, along with the depiction of communication traffic, in a coherent process chain. This ensures that all relevant data needed for cyber security investigations, including the interactions between attacker and defender, are captured under consistent conditions and constraints.</div><div>The simulation environment also includes a detailed modeling of communication protocols and grid operation management, providing insights into how attacks propagate through the network. The generated data are validated through laboratory tests, ensuring that the simulation reflects real-world conditions. These datasets are used to train machine learning models for intrusion detection and evaluate their performance, specifically focusing on how well they can detect complex attack patterns in power grid operations.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100727"},"PeriodicalIF":4.1,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143168301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interdependencies and third parties 相互依赖和第三方
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-01 Epub Date: 2025-02-27 DOI: 10.1016/S1874-5482(25)00011-3
Roberto Setola
{"title":"Interdependencies and third parties","authors":"Roberto Setola","doi":"10.1016/S1874-5482(25)00011-3","DOIUrl":"10.1016/S1874-5482(25)00011-3","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100750"},"PeriodicalIF":4.1,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143508441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OptAML: Optimized adversarial machine learning on water treatment and distribution systems OptAML:在水处理和分配系统上优化的对抗性机器学习
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-01 Epub Date: 2025-01-13 DOI: 10.1016/j.ijcip.2025.100740
Mustafa Sinasi Ayas , Enis Kara , Selen Ayas , Ali Kivanc Sahin
This research presents the optimized adversarial machine learning framework, OptAML, which is developed for use in water distribution and treatment systems. In consideration of the physical invariants of these systems, the OptAML generates adversarial samples capable of deceiving a hybrid convolutional neural network-long short-term memory network model. The efficacy of the framework is assessed using the Secure Water Treatment (SWaT) and Water Distribution (WADI) datasets. The findings demonstrate that OptAML is capable of effectively evading rule checkers and significantly reducing the accuracy of anomaly detection frameworks in both systems. Additionally, the study investigates a defense mechanism that demonstrates enhanced robustness against these adversarial attacks and is based on adversarial training. Our results underscore the necessity for robust and flexible protection tactics and highlight the shortcomings of the machine learning-based anomaly detection systems for critical infrastructure that are currently in place.
本研究提出了优化的对抗性机器学习框架OptAML,该框架是为水分配和处理系统而开发的。考虑到这些系统的物理不变性,OptAML生成了能够欺骗混合卷积神经网络-长短期记忆网络模型的对抗性样本。使用安全水处理(SWaT)和水分配(WADI)数据集评估该框架的有效性。结果表明,OptAML能够有效地避开规则检查器,并显著降低两个系统中异常检测框架的准确性。此外,该研究还研究了一种基于对抗性训练的防御机制,该机制展示了对这些对抗性攻击的增强鲁棒性。我们的研究结果强调了强大而灵活的保护策略的必要性,并强调了目前用于关键基础设施的基于机器学习的异常检测系统的缺点。
{"title":"OptAML: Optimized adversarial machine learning on water treatment and distribution systems","authors":"Mustafa Sinasi Ayas ,&nbsp;Enis Kara ,&nbsp;Selen Ayas ,&nbsp;Ali Kivanc Sahin","doi":"10.1016/j.ijcip.2025.100740","DOIUrl":"10.1016/j.ijcip.2025.100740","url":null,"abstract":"<div><div>This research presents the optimized adversarial machine learning framework, OptAML, which is developed for use in water distribution and treatment systems. In consideration of the physical invariants of these systems, the OptAML generates adversarial samples capable of deceiving a hybrid convolutional neural network-long short-term memory network model. The efficacy of the framework is assessed using the Secure Water Treatment (SWaT) and Water Distribution (WADI) datasets. The findings demonstrate that OptAML is capable of effectively evading rule checkers and significantly reducing the accuracy of anomaly detection frameworks in both systems. Additionally, the study investigates a defense mechanism that demonstrates enhanced robustness against these adversarial attacks and is based on adversarial training. Our results underscore the necessity for robust and flexible protection tactics and highlight the shortcomings of the machine learning-based anomaly detection systems for critical infrastructure that are currently in place.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100740"},"PeriodicalIF":4.1,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B CABBA: ADS-B兼容的认证带宽高效广播协议
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-01 Epub Date: 2024-12-07 DOI: 10.1016/j.ijcip.2024.100728
Mikaëla Ngamboé , Xiao Niu , Benoit Joly , Steven P. Biegler , Paul Berthier , Rémi Benito , Greg Rice , José M. Fernandez , Gabriela Nicolescu
The Automatic Dependent Surveillance-Broadcast (ADS-B) is a surveillance technology mandated in many airspaces. It improves safety, increases efficiency and reduces air traffic congestion by broadcasting aircraft navigation data. Yet, ADS-B is vulnerable to spoofing attacks as it lacks mechanisms to ensure the integrity and authenticity of the data being supplied. None of the existing cryptographic solutions fully meet the backward compatibility and bandwidth preservation requirements of the standard. Hence, we propose the Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B (CABBA), an improved approach that integrates TESLA, phase-overlay modulation techniques and certificate-based PKI. As a result, entity authentication, data origin authentication, and data integrity are the security services that CABBA offers. To assess compliance with the standard, we designed an SDR-based implementation of CABBA and performed backward compatibility tests on commercial and general aviation (GA) ADS-B in receivers. Besides, we calculated the 1090ES band’s activity factor and analyzed the channel occupancy rate according to ITU-R SM.2256-1 recommendation. Also, we performed a bit error rate analysis of CABBA messages. The results suggest that CABBA is backward compatible, does not incur significant communication overhead, and has an error rate that is acceptable for Eb/No values above 14 dB.
广播自动相关监视(ADS-B)是许多空域强制使用的监视技术。它通过广播飞机导航数据提高了安全性,提高了效率,减少了空中交通拥堵。然而,ADS-B很容易受到欺骗攻击,因为它缺乏机制来确保所提供数据的完整性和真实性。现有的加密解决方案都不能完全满足该标准的向后兼容性和带宽保存要求。因此,我们提出了用于ADS-B的兼容认证带宽高效广播协议(CABBA),这是一种集成了TESLA、相位覆盖调制技术和基于证书的PKI的改进方法。因此,实体身份验证、数据源身份验证和数据完整性是CABBA提供的安全服务。为了评估是否符合标准,我们设计了一个基于sdr的CABBA实现,并对商用和通用航空(GA)接收机中的ADS-B进行了向后兼容性测试。此外,我们根据ITU-R SM.2256-1建议计算了1090ES频段的活度因子,并分析了信道占用率。此外,我们还对CABBA消息进行了误码率分析。结果表明,CABBA是向后兼容的,不会产生显著的通信开销,并且在Eb/No值高于14 dB时具有可接受的错误率。
{"title":"CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B","authors":"Mikaëla Ngamboé ,&nbsp;Xiao Niu ,&nbsp;Benoit Joly ,&nbsp;Steven P. Biegler ,&nbsp;Paul Berthier ,&nbsp;Rémi Benito ,&nbsp;Greg Rice ,&nbsp;José M. Fernandez ,&nbsp;Gabriela Nicolescu","doi":"10.1016/j.ijcip.2024.100728","DOIUrl":"10.1016/j.ijcip.2024.100728","url":null,"abstract":"<div><div>The Automatic Dependent Surveillance-Broadcast (ADS-B) is a surveillance technology mandated in many airspaces. It improves safety, increases efficiency and reduces air traffic congestion by broadcasting aircraft navigation data. Yet, ADS-B is vulnerable to spoofing attacks as it lacks mechanisms to ensure the integrity and authenticity of the data being supplied. None of the existing cryptographic solutions fully meet the backward compatibility and bandwidth preservation requirements of the standard. Hence, we propose the Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B (CABBA), an improved approach that integrates TESLA, phase-overlay modulation techniques and certificate-based PKI. As a result, entity authentication, data origin authentication, and data integrity are the security services that CABBA offers. To assess compliance with the standard, we designed an SDR-based implementation of CABBA and performed backward compatibility tests on commercial and general aviation (GA) ADS-B in receivers. Besides, we calculated the 1090ES band’s activity factor and analyzed the channel occupancy rate according to ITU-R SM.2256-1 recommendation. Also, we performed a bit error rate analysis of CABBA messages. The results suggest that CABBA is backward compatible, does not incur significant communication overhead, and has an error rate that is acceptable for Eb/No values above 14 dB.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100728"},"PeriodicalIF":4.1,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems 超越僵尸网络:工业控制系统中的自主固件僵尸攻击
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-01 Epub Date: 2024-12-07 DOI: 10.1016/j.ijcip.2024.100729
Seyed Ali Alavi, Hamed Pourvali Moghadam, Amir Hossein Jahangir
This paper introduces a novel cyberattack vector called the ”Autonomous Firmware Zombie Attack.” Unlike traditional zombie attacks that rely on botnets and direct network control, this method enables attackers to covertly modify the firmware of substation Intelligent Electronic Devices (IEDs) and other firmware-based appliances, including critical industrial equipment, without requiring an active network connection, leaving minimal trace and making an offensive attack with only one infected device instead of a set of multiple devices in botnets. Unlike conventional cyber threats, this method allows attackers to manipulate devices to cause substantial damage while leaving minimal trace, thus evading traditional detection techniques. This study demonstrates the potential of the Autonomous Firmware Zombie Attack (AFZA), which causes substantial damage while evading conventional detection techniques. We first run such an attack on a series of IEDs as proof of concept for this issue. Then, we compare this approach to traditional remote control attacks, highlighting its unique advantages and implications for industrial control system security. This research underscores the critical need for a robust cybersecurity framework tailored to industrial control systems and advances our understanding of the complex risk landscape threatening critical infrastructures.
本文介绍了一种称为“自主固件僵尸攻击”的新型网络攻击向量。与依赖僵尸网络和直接网络控制的传统僵尸攻击不同,这种方法使攻击者能够秘密地修改变电站智能电子设备(ied)和其他基于固件的设备(包括关键工业设备)的固件,而不需要活动网络连接,留下最小的痕迹,并且仅对一个受感染设备而不是僵尸网络中的一组多个设备进行攻击。与传统的网络威胁不同,这种方法允许攻击者操纵设备造成重大损害,同时留下最小的痕迹,从而避开传统的检测技术。这项研究证明了自主固件僵尸攻击(AFZA)的潜力,它可以在逃避传统检测技术的同时造成重大损害。我们首先在一系列简易爆炸装置上运行这样的攻击,作为这个问题的概念证明。然后,我们将这种方法与传统的远程控制攻击进行比较,强调其独特的优势和对工业控制系统安全的影响。这项研究强调了对针对工业控制系统量身定制的强大网络安全框架的迫切需求,并提高了我们对威胁关键基础设施的复杂风险格局的理解。
{"title":"Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems","authors":"Seyed Ali Alavi,&nbsp;Hamed Pourvali Moghadam,&nbsp;Amir Hossein Jahangir","doi":"10.1016/j.ijcip.2024.100729","DOIUrl":"10.1016/j.ijcip.2024.100729","url":null,"abstract":"<div><div>This paper introduces a novel cyberattack vector called the ”Autonomous Firmware Zombie Attack.” Unlike traditional zombie attacks that rely on botnets and direct network control, this method enables attackers to covertly modify the firmware of substation Intelligent Electronic Devices (IEDs) and other firmware-based appliances, including critical industrial equipment, without requiring an active network connection, leaving minimal trace and making an offensive attack with only one infected device instead of a set of multiple devices in botnets. Unlike conventional cyber threats, this method allows attackers to manipulate devices to cause substantial damage while leaving minimal trace, thus evading traditional detection techniques. This study demonstrates the potential of the Autonomous Firmware Zombie Attack (AFZA), which causes substantial damage while evading conventional detection techniques. We first run such an attack on a series of IEDs as proof of concept for this issue. Then, we compare this approach to traditional remote control attacks, highlighting its unique advantages and implications for industrial control system security. This research underscores the critical need for a robust cybersecurity framework tailored to industrial control systems and advances our understanding of the complex risk landscape threatening critical infrastructures.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100729"},"PeriodicalIF":4.1,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling flood propagation and cascading failures in interdependent transportation and stormwater networks 在相互依赖的运输和雨水网络中模拟洪水传播和级联故障
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-01 Epub Date: 2025-01-16 DOI: 10.1016/j.ijcip.2025.100741
H M Imran Kays, Arif Mohaimin Sadri, K.K. "Muralee" Muraleetharan, P. Scott Harvey, Gerald A. Miller
This study addresses the challenge of modeling flood propagation and cascading failures in geographically interdependent transportation and stormwater systems, filling a critical gap in the literature by effectively capturing the temporal progression and spatial distribution of failures in interdependent systems. We developed a contagion-based Susceptible-Exposed-Flooded-Recovered (SEFR) model to monitor flood propagation dynamics within these interconnected systems. We established a spatial interdependency threshold for transportation and stormwater systems using a multilayer network representation and incorporated the state-of-the-art Hydrologic Engineering Center's River Analysis System (HEC-RAS) to generate reliable flood data. The SEFR model combines the topological characteristics of the multilayer network with simulated flood data to accurately model the propagation of flood damage and cascading failures. Focusing on Norman, Oklahoma, we calibrated the SEFR model using the HEC-RAS 2D flood simulation data for a major precipitation event on July 27, 2021. Results demonstrate the SEFR model's ability to identify the spatiotemporal variations in flood propagation, highlighting critical infrastructure components at risk, including specific road segments and stormwater system elements vulnerable to cascading failures during flooding events. The findings provide new insights into interdependent system resilience and inform intervention strategies to mitigate adverse flooding impacts, enhancing the robustness of critical infrastructure against natural disasters.
本研究解决了在地理上相互依赖的运输和雨水系统中洪水传播和级联故障建模的挑战,通过有效地捕获相互依赖系统中故障的时间进展和空间分布,填补了文献中的一个关键空白。我们开发了一个基于传染性的易感-暴露-洪水-恢复(SEFR)模型来监测这些相互关联系统中的洪水传播动态。我们使用多层网络表示建立了交通和雨水系统的空间相互依赖阈值,并结合了最先进的水文工程中心的河流分析系统(HEC-RAS)来生成可靠的洪水数据。SEFR模型将多层网络的拓扑特征与洪水模拟数据相结合,准确地模拟了洪水破坏和级联破坏的传播过程。以俄克拉荷马的诺曼为研究对象,我们使用HEC-RAS 2D洪水模拟数据校准了SEFR模型,模拟了2021年7月27日的一次大降水事件。结果表明,SEFR模型能够识别洪水传播的时空变化,突出显示处于风险中的关键基础设施组成部分,包括在洪水事件中容易发生级联故障的特定路段和雨水系统要素。这些发现为相互依赖的系统恢复力提供了新的见解,并为减轻不利洪水影响的干预策略提供了信息,增强了关键基础设施抵御自然灾害的稳健性。
{"title":"Modeling flood propagation and cascading failures in interdependent transportation and stormwater networks","authors":"H M Imran Kays,&nbsp;Arif Mohaimin Sadri,&nbsp;K.K. \"Muralee\" Muraleetharan,&nbsp;P. Scott Harvey,&nbsp;Gerald A. Miller","doi":"10.1016/j.ijcip.2025.100741","DOIUrl":"10.1016/j.ijcip.2025.100741","url":null,"abstract":"<div><div>This study addresses the challenge of modeling flood propagation and cascading failures in geographically interdependent transportation and stormwater systems, filling a critical gap in the literature by effectively capturing the temporal progression and spatial distribution of failures in interdependent systems. We developed a contagion-based Susceptible-Exposed-Flooded-Recovered (SEFR) model to monitor flood propagation dynamics within these interconnected systems. We established a spatial interdependency threshold for transportation and stormwater systems using a multilayer network representation and incorporated the state-of-the-art Hydrologic Engineering Center's River Analysis System (HEC-RAS) to generate reliable flood data. The SEFR model combines the topological characteristics of the multilayer network with simulated flood data to accurately model the propagation of flood damage and cascading failures. Focusing on Norman, Oklahoma, we calibrated the SEFR model using the HEC-RAS 2D flood simulation data for a major precipitation event on July 27, 2021. Results demonstrate the SEFR model's ability to identify the spatiotemporal variations in flood propagation, highlighting critical infrastructure components at risk, including specific road segments and stormwater system elements vulnerable to cascading failures during flooding events. The findings provide new insights into interdependent system resilience and inform intervention strategies to mitigate adverse flooding impacts, enhancing the robustness of critical infrastructure against natural disasters.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100741"},"PeriodicalIF":4.1,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient convolutional neural network based attack detection for smart grid in 5G-IOT 基于卷积神经网络的5G-IOT智能电网攻击检测
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-01 Epub Date: 2025-01-03 DOI: 10.1016/j.ijcip.2024.100738
Sheeja Rani S , Mostafa F. Shaaban , Abdelfatah Ali
The deployment of 5G networks and IoT devices in smart grid applications provides electricity-generated, distributed, and managed bidirectional transmission of real-time information between utility providers and consumers. However, this increased transmission and confidence in IoT devices also present novel security challenges, since they are vulnerable to malicious attacks. Ensuring robust attack detection mechanisms in 5G-IoT smart grid systems for reliable and efficient power distribution, and early accurate identification of attacks addressed. To solve these concerns, a novel technique called Target Projection Regressed Gradient Convolutional Neural Network (TPRGCNN) is introduced to improve the accuracy of attack detection during data transmission in a 5G-IoT smart grid environment. The TPRGCNN method is combined with feature selection and classification for improving secure data transmission by detecting attacks in 5G-IoT smart grid networks. In the feature selection process, TPRGCNN utilizes the Ruzicka coefficient Dichotonic projection regression method and aims to enhance the accuracy of attack detection while minimizing time complexity. Then selected significant features are fed into Jaspen’s correlative stochastic gradient convolutional neural learning classifier for attack detection. Classification indicates whether transmission is normal or an attack in the 5G-IoT smart grid network. The implementation results demonstrate that the proposed TPRGCNN method achieve a 5% of improved attack detection accuracy and 2% improvement in precision, recall, F-score while reducing time complexity and space complexity by 13% and 23% compared to conventional methods.
在智能电网应用中部署5G网络和物联网设备,可在公用事业供应商和消费者之间提供发电、分布式和受管理的实时信息双向传输。然而,物联网设备的传输和信心的增加也带来了新的安全挑战,因为它们很容易受到恶意攻击。确保5G-IoT智能电网系统中强大的攻击检测机制,实现可靠高效的配电,并及早准确识别攻击。为了解决这些问题,引入了一种名为目标投影回归梯度卷积神经网络(TPRGCNN)的新技术,以提高5G-IoT智能电网环境中数据传输过程中攻击检测的准确性。将TPRGCNN方法与特征选择和分类相结合,通过检测5G-IoT智能电网中的攻击,提高数据传输的安全性。在特征选择过程中,TPRGCNN采用Ruzicka系数二分性投影回归方法,旨在提高攻击检测的准确性,同时最小化时间复杂度。然后将选取的显著特征输入Jaspen相关随机梯度卷积神经学习分类器进行攻击检测。分类是指在5G-IoT智能电网中传输是正常还是受到攻击。实施结果表明,与传统方法相比,提出的TPRGCNN方法的攻击检测准确率提高了5%,精度、召回率、f分数提高了2%,时间复杂度和空间复杂度分别降低了13%和23%。
{"title":"An efficient convolutional neural network based attack detection for smart grid in 5G-IOT","authors":"Sheeja Rani S ,&nbsp;Mostafa F. Shaaban ,&nbsp;Abdelfatah Ali","doi":"10.1016/j.ijcip.2024.100738","DOIUrl":"10.1016/j.ijcip.2024.100738","url":null,"abstract":"<div><div>The deployment of 5G networks and IoT devices in smart grid applications provides electricity-generated, distributed, and managed bidirectional transmission of real-time information between utility providers and consumers. However, this increased transmission and confidence in IoT devices also present novel security challenges, since they are vulnerable to malicious attacks. Ensuring robust attack detection mechanisms in 5G-IoT smart grid systems for reliable and efficient power distribution, and early accurate identification of attacks addressed. To solve these concerns, a novel technique called Target Projection Regressed Gradient Convolutional Neural Network (TPRGCNN) is introduced to improve the accuracy of attack detection during data transmission in a 5G-IoT smart grid environment. The TPRGCNN method is combined with feature selection and classification for improving secure data transmission by detecting attacks in 5G-IoT smart grid networks. In the feature selection process, TPRGCNN utilizes the Ruzicka coefficient Dichotonic projection regression method and aims to enhance the accuracy of attack detection while minimizing time complexity. Then selected significant features are fed into Jaspen’s correlative stochastic gradient convolutional neural learning classifier for attack detection. Classification indicates whether transmission is normal or an attack in the 5G-IoT smart grid network. The implementation results demonstrate that the proposed TPRGCNN method achieve a 5% of improved attack detection accuracy and 2% improvement in precision, recall, F-score while reducing time complexity and space complexity by 13% and 23% compared to conventional methods.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100738"},"PeriodicalIF":4.1,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial immunity-based energy theft detection for advanced metering infrastructures 基于人工免疫的先进计量基础设施能源盗窃检测
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-03-01 Epub Date: 2025-01-09 DOI: 10.1016/j.ijcip.2025.100739
Jie Fu , Chengxi Yang , Yuxuan Liu , Kunsan Zhang , Jiaqi Li , Beibei Li
Advanced Metering Infrastructure (AMI) is envisioned to enable smart energy management and consumption while ensuring the integrity of real energy consumption data. However, existing smart meters, gateways, and communication channels are usually weakly protected, often opening a huge door for data eavesdroppers who may be easily to further construct energy thefts. Although some energy theft detection schemes have already been reported in the literature, they often fail to take into account the dense data distribution characteristics of energy consumption data, resulting in compromised detection performance. To this end, we in this paper propose a novel arTificial IMmune based Energy theft Detection (TIMED) scheme, which can effectively identify five types of energy thefts. Specifically, we first develop an energy consumption data pre-processing method, which can effectively reduce the dimensionality of raw energy consumption data to facilitate the data analyzing efficiency. Second, we design a center-distance-based energy theft detector generation method to create high-quality detectors with low elimination rates. Last, we devise a nonself-based hole repair method for energy theft detectors, which can further reduce the false negative alarms. Extensive experiments on a real public AMI dataset demonstrate that the proposed TIMED scheme is highly effective in identifying pulse attacks, scaling attacks, ramping attacks, random attacks, and smooth-curve attacks. The results show that TIMED outperforms many existing machine learning and traditional artificial immunity-based energy theft detection methods.
先进计量基础设施(AMI)旨在实现智能能源管理和消费,同时确保真实能源消耗数据的完整性。然而,现有的智能电表、网关和通信通道通常保护薄弱,往往为数据窃听者打开了巨大的大门,他们可能很容易进一步构建能源盗窃。虽然文献中已经报道了一些能源盗窃检测方案,但它们往往没有考虑到能耗数据的密集数据分布特征,导致检测性能下降。为此,本文提出了一种新的基于人工免疫的能量盗窃检测(TIMED)方案,该方案可以有效识别五种类型的能量盗窃。具体而言,我们首先开发了一种能耗数据预处理方法,该方法可以有效地降低原始能耗数据的维数,从而提高数据分析的效率。其次,我们设计了一种基于中心距离的能量盗窃探测器生成方法,以创建低淘汰率的高质量探测器。最后,我们设计了一种非自基的能量盗窃探测器孔洞修复方法,可以进一步减少误报。在真实公共AMI数据集上的大量实验表明,所提出的TIMED方案在识别脉冲攻击、缩放攻击、斜坡攻击、随机攻击和平滑曲线攻击方面具有很高的效率。结果表明,TIMED优于许多现有的机器学习和传统的基于人工免疫的能量盗窃检测方法。
{"title":"Artificial immunity-based energy theft detection for advanced metering infrastructures","authors":"Jie Fu ,&nbsp;Chengxi Yang ,&nbsp;Yuxuan Liu ,&nbsp;Kunsan Zhang ,&nbsp;Jiaqi Li ,&nbsp;Beibei Li","doi":"10.1016/j.ijcip.2025.100739","DOIUrl":"10.1016/j.ijcip.2025.100739","url":null,"abstract":"<div><div>Advanced Metering Infrastructure (AMI) is envisioned to enable smart energy management and consumption while ensuring the integrity of real energy consumption data. However, existing smart meters, gateways, and communication channels are usually weakly protected, often opening a huge door for data eavesdroppers who may be easily to further construct energy thefts. Although some energy theft detection schemes have already been reported in the literature, they often fail to take into account the dense data distribution characteristics of energy consumption data, resulting in compromised detection performance. To this end, we in this paper propose a novel ar<strong>T</strong>ificial <strong>IM</strong>mune based <strong>E</strong>nergy theft <strong>D</strong>etection (TIMED) scheme, which can effectively identify five types of energy thefts. Specifically, we first develop an energy consumption data pre-processing method, which can effectively reduce the dimensionality of raw energy consumption data to facilitate the data analyzing efficiency. Second, we design a center-distance-based energy theft detector generation method to create high-quality detectors with low elimination rates. Last, we devise a nonself-based hole repair method for energy theft detectors, which can further reduce the false negative alarms. Extensive experiments on a real public AMI dataset demonstrate that the proposed TIMED scheme is highly effective in identifying pulse attacks, scaling attacks, ramping attacks, random attacks, and smooth-curve attacks. The results show that TIMED outperforms many existing machine learning and traditional artificial immunity-based energy theft detection methods.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"48 ","pages":"Article 100739"},"PeriodicalIF":4.1,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143167950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator 确保工业控制系统的安全:开发 SCADA/IoT 测试台并在硬件模拟器上评估轻量级密码性能
IF 4.1 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 Epub Date: 2024-08-23 DOI: 10.1016/j.ijcip.2024.100705
Darshana Upadhyay , Sagarika Ghosh , Hiroyuki Ohno , Marzia Zaman , Srinivas Sampalli

This paper addresses the critical need for enhancing security in Supervisory Control and Data Acquisition (SCADA) networks within Industrial Control Systems (ICSs) to protect the industrial processes from cyber-attacks. The purpose of our work is to propose and evaluate lightweight security measures to safeguard critical infrastructure resources. The scope of our effort involves simulating a secure SCADA/IoT-based hardware test bench for ICSs, utilizing Modbus and MQTT communication protocols. Through case studies in remote servo motor control, water distribution systems, and power system voltage level indicators, vulnerabilities such as Denial of Service (DoS) and Man-in-The-Middle (MiTM) attacks are identified, and security recommendations are provided. To execute our work, we deploy lightweight ciphers such as Prime Counter & Hash Chaining (PCHC) and Ascon algorithm with Compression Rate (ACR) for secure information exchange between the plant floor and the control center. Evaluation of these ciphers on Raspberry Pi focuses on execution speed and memory utilization. Additionally, a comparison with the AGA-12 protocol standard for SCADA networks is conducted to underscore the efficacy of the proposed security measures. Our findings include the identification of SCADA network vulnerabilities and the proposal of lightweight security measures to mitigate risks. Performance evaluation of the proposed ciphers on Raspberry Pi demonstrates their effectiveness, emphasizing the importance of deploying such measures to ensure resilience against cyber threats in SCADA environments.

本文论述了加强工业控制系统(ICS)内的监控与数据采集(SCADA)网络安全性以保护工业流程免受网络攻击的迫切需要。我们工作的目的是提出并评估轻量级安全措施,以保护关键基础设施资源。我们的工作范围包括利用 Modbus 和 MQTT 通信协议,为 ICS 模拟基于 SCADA/IoT 的安全硬件测试台。通过对远程伺服电机控制、配水系统和电力系统电压等级指示器的案例研究,我们确定了拒绝服务(DoS)和中间人(MiTM)攻击等漏洞,并提供了安全建议。为了开展工作,我们部署了轻量级密码,如 Prime Counter & Hash Chaining (PCHC) 和 Ascon algorithm with Compression Rate (ACR),用于工厂底层和控制中心之间的安全信息交换。在 Raspberry Pi 上对这些密码的评估主要集中在执行速度和内存利用率上。此外,还与 SCADA 网络的 AGA-12 协议标准进行了比较,以强调所建议的安全措施的有效性。我们的研究结果包括识别 SCADA 网络漏洞和提出轻量级安全措施以降低风险。在树莓派(Raspberry Pi)上对所建议的密码进行的性能评估证明了其有效性,强调了部署此类措施以确保抵御 SCADA 环境中网络威胁的重要性。
{"title":"Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator","authors":"Darshana Upadhyay ,&nbsp;Sagarika Ghosh ,&nbsp;Hiroyuki Ohno ,&nbsp;Marzia Zaman ,&nbsp;Srinivas Sampalli","doi":"10.1016/j.ijcip.2024.100705","DOIUrl":"10.1016/j.ijcip.2024.100705","url":null,"abstract":"<div><p>This paper addresses the critical need for enhancing security in Supervisory Control and Data Acquisition (SCADA) networks within Industrial Control Systems (ICSs) to protect the industrial processes from cyber-attacks. The purpose of our work is to propose and evaluate lightweight security measures to safeguard critical infrastructure resources. The scope of our effort involves simulating a secure SCADA/IoT-based hardware test bench for ICSs, utilizing Modbus and MQTT communication protocols. Through case studies in remote servo motor control, water distribution systems, and power system voltage level indicators, vulnerabilities such as Denial of Service (DoS) and Man-in-The-Middle (MiTM) attacks are identified, and security recommendations are provided. To execute our work, we deploy lightweight ciphers such as Prime Counter &amp; Hash Chaining (PCHC) and Ascon algorithm with Compression Rate (ACR) for secure information exchange between the plant floor and the control center. Evaluation of these ciphers on Raspberry Pi focuses on execution speed and memory utilization. Additionally, a comparison with the AGA-12 protocol standard for SCADA networks is conducted to underscore the efficacy of the proposed security measures. Our findings include the identification of SCADA network vulnerabilities and the proposal of lightweight security measures to mitigate risks. Performance evaluation of the proposed ciphers on Raspberry Pi demonstrates their effectiveness, emphasizing the importance of deploying such measures to ensure resilience against cyber threats in SCADA environments.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"47 ","pages":"Article 100705"},"PeriodicalIF":4.1,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1874548224000465/pdfft?md5=aab404315863014667e25aa2e54961de&pid=1-s2.0-S1874548224000465-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142088708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1