首页 > 最新文献

International Journal of Critical Infrastructure Protection最新文献

英文 中文
False data injection in distribution system: Attacker's perspective 分发系统中的虚假数据注入:攻击者的视角
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-02 DOI: 10.1016/j.ijcip.2024.100672
Poornachandratejasvi Laxman Bhattar , Naran M Pindoriya , Anurag Sharma

The distribution system is digitizing and occupying cyberspace with the help of information and communication technologies (ICTs). It is vulnerable to cyber-attacks like false data injection (FDI) and denial-of-services (DoS). However, limited research on cyber-attacks in the distribution system is reported in the literature, and these attacks are of serious concern to distribution system operators (DSOs). The DSO's primary challenge is to understand the attacker's perspective for FDI attack construction. Thus, the work presented in this paper aims to provide an in-depth insight for DSO to apprehend the attacker's perspective, attack flow, and the nature of the FDI attack vector. The prior knowledge of attack flow to DSO can help to protect critical infrastructures from cyber-attacks. Thus, this work comprehends the attacker's behaviour for deploying the optimal budget to disrupt the distribution system operation therein by injecting a stealthy FDI vector. The attacker is resource-constrained in terms of budget and network information. Therefore, the optimal budget for attack initiation is proposed and formulated as a multi-objective optimization problem to minimize the investment and maximize the economic loss for the DSO. Constructing the attack vectors for the attacker is challenging in the limited network information. It is complex because of network characteristics such as multi-phase configurations & an unbalanced nature, and higher resistance to reactance (r/x) ratio. Thus, the FDI attack vector construction is proposed based on non-linear programming optimization and sensitivity analysis considering partial information from the distribution system. The simulation results are presented and compared with available methods in the literature to validate the efficacy of the proposed methods.

在信息和通信技术(ICTs)的帮助下,配送系统正在数字化并占据网络空间。它很容易受到虚假数据注入(FDI)和拒绝服务(DoS)等网络攻击。然而,文献中对配电系统网络攻击的研究有限,这些攻击引起了配电系统运营商(DSO)的严重关切。配电系统运营商面临的主要挑战是如何从攻击者的角度来理解 FDI 攻击的构造。因此,本文介绍的工作旨在为 DSO 提供深入的见解,以了解攻击者的视角、攻击流和 FDI 攻击向量的性质。DSO 事先了解攻击流有助于保护关键基础设施免受网络攻击。因此,本研究了解攻击者的行为,以部署最佳预算,通过注入隐蔽的 FDI 向量破坏其中的配电系统运行。攻击者在预算和网络信息方面受到资源限制。因此,我们提出了发起攻击的最佳预算,并将其表述为一个多目标优化问题,以最小化投资并最大化 DSO 的经济损失。在网络信息有限的情况下,为攻击者构建攻击向量具有挑战性。由于多相配置&amp、不平衡性质和较高的电阻与电抗(r/x)比等网络特性,构建攻击向量非常复杂。因此,在非线性编程优化和敏感性分析的基础上,考虑到配电系统的部分信息,提出了 FDI 攻击向量构造。本文介绍了模拟结果,并与文献中的现有方法进行了比较,以验证所提方法的有效性。
{"title":"False data injection in distribution system: Attacker's perspective","authors":"Poornachandratejasvi Laxman Bhattar ,&nbsp;Naran M Pindoriya ,&nbsp;Anurag Sharma","doi":"10.1016/j.ijcip.2024.100672","DOIUrl":"10.1016/j.ijcip.2024.100672","url":null,"abstract":"<div><p>The distribution system is digitizing and occupying cyberspace with the help of information and communication technologies (ICTs). It is vulnerable to cyber-attacks like false data injection (FDI) and denial-of-services (DoS). However, limited research on cyber-attacks in the distribution system is reported in the literature, and these attacks are of serious concern to distribution system operators (DSOs). The DSO's primary challenge is to understand the attacker's perspective for FDI attack construction. Thus, the work presented in this paper aims to provide an in-depth insight for DSO to apprehend the attacker's perspective, attack flow, and the nature of the FDI attack vector. The prior knowledge of attack flow to DSO can help to protect critical infrastructures from cyber-attacks. Thus, this work comprehends the attacker's behaviour for deploying the optimal budget to disrupt the distribution system operation therein by injecting a stealthy FDI vector. The attacker is resource-constrained in terms of budget and network information. Therefore, the optimal budget for attack initiation is proposed and formulated as a multi-objective optimization problem to minimize the investment and maximize the economic loss for the DSO. Constructing the attack vectors for the attacker is challenging in the limited network information. It is complex because of network characteristics such as multi-phase configurations &amp; an unbalanced nature, and higher resistance to reactance (<span><math><mrow><mi>r</mi><mo>/</mo><mi>x</mi></mrow></math></span>) ratio. Thus, the FDI attack vector construction is proposed based on non-linear programming optimization and sensitivity analysis considering partial information from the distribution system. The simulation results are presented and compared with available methods in the literature to validate the efficacy of the proposed methods.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"45 ","pages":"Article 100672"},"PeriodicalIF":3.6,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140083874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DSACR: A defense-based system with adaptive cyber resilience for industrial control systems DSACR:具有自适应网络恢复能力的工业控制系统防御系统
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-09 DOI: 10.1016/j.ijcip.2024.100662
Yi-Wei Ma, Yi-Hao Tu, Chih-Ting Shen

Industrial Control Systems (ICS) security happens often, which makes it hard for many organizations to keep a balance between operational efficiency, system efficiency, and security. A major concern is how to protect information security and make sure that ICS keep working. This study thus presents a defense-based system with adaptive cyber resilience (DSACR). DSACR will optimize the configuration with respect to the three indices of operational efficiency, performance, and security. Whenever an assault event happens, DSACR offers protective solutions depending on the threat level to optimize the security and running costs of recovering ICS. In terms of safety and operation, DSACR is superior to other approaches by 3 % and 11 %, respectively, as shown by the results of the experiments.

工业控制系统(ICS)的安全问题时有发生,这使得许多组织很难在运行效率、系统效率和安全性之间保持平衡。如何保护信息安全并确保 ICS 持续工作是一个主要问题。因此,本研究提出了一种基于防御的自适应网络弹性系统(DSACR)。DSACR 将从运行效率、性能和安全三个方面对配置进行优化。每当攻击事件发生时,DSACR 都会根据威胁程度提供保护方案,以优化恢复 ICS 的安全性和运行成本。实验结果表明,在安全和运行方面,DSACR 比其他方法分别优越 3 % 和 11 %。
{"title":"DSACR: A defense-based system with adaptive cyber resilience for industrial control systems","authors":"Yi-Wei Ma,&nbsp;Yi-Hao Tu,&nbsp;Chih-Ting Shen","doi":"10.1016/j.ijcip.2024.100662","DOIUrl":"10.1016/j.ijcip.2024.100662","url":null,"abstract":"<div><p>Industrial Control Systems (ICS) security happens often, which makes it hard for many organizations to keep a balance between operational efficiency, system efficiency, and security. A major concern is how to protect information security and make sure that ICS keep working. This study thus presents a defense-based system with adaptive cyber resilience (DSACR). DSACR will optimize the configuration with respect to the three indices of operational efficiency, performance, and security. Whenever an assault event happens, DSACR offers protective solutions depending on the threat level to optimize the security and running costs of recovering ICS. In terms of safety and operation, DSACR is superior to other approaches by 3 % and 11 %, respectively, as shown by the results of the experiments.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"45 ","pages":"Article 100662"},"PeriodicalIF":3.6,"publicationDate":"2024-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139826085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A watchdog model for physics-based anomaly detection in digital substations 基于物理的数字变电站异常检测看门狗模型
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-17 DOI: 10.1016/j.ijcip.2024.100660
Hussam Tarazi, Sara Sutton, John Olinjyk, Benjamin Bond, Julian Rrushi

The security of cyber–physical systems (CPS) presents new challenges stemming from computations that work primarily with live physics data. Although there is a body of previous research on detection of malware on CPS, more effective designs are needed to address limitations such mimicry attacks and other forms of evasive techniques. Relay algorithms in particular, such as differential and harmonic protection algorithms, are essential to protecting physical equipment such as power transformers from faults. Relay algorithms, though, are often disabled, altered, or otherwise suppressed by malware.

In this paper, we first provide background on the main types of failures that may occur in an electrical power substation after relay algorithms are disabled by malware. We also provide some initial insights into malware methods that involve physics-informed data manipulations, which in turn may lead to power outages and physical damage to power transformers. We then describe the design of a watchdog algorithm that is continuously on the look out for anomalies in the execution time of relay algorithms along with their associated performance counters. We implemented the watchdog approach in Python, and evaluated it empirically on emulations of differential and harmonic protection algorithms on a computing machine.

网络物理系统(CPS)的计算主要使用实时物理数据,这给系统安全带来了新的挑战。虽然之前已有大量关于 CPS 恶意软件检测的研究,但还需要更有效的设计来解决模仿攻击和其他形式的规避技术等限制。尤其是继电器算法,如差分和谐波保护算法,对于保护电力变压器等物理设备免受故障影响至关重要。在本文中,我们首先介绍了继电器算法被恶意软件禁用后,变电站可能发生的主要故障类型。我们还对涉及物理信息数据操作的恶意软件方法提供了一些初步见解,这些方法反过来可能会导致停电和电力变压器的物理损坏。然后,我们介绍了一种看门狗算法的设计,该算法可持续监控中继算法及其相关性能计数器的执行时间是否出现异常。我们用 Python 实现了看门狗方法,并在计算机上对差动和谐波保护算法的仿真进行了实证评估。
{"title":"A watchdog model for physics-based anomaly detection in digital substations","authors":"Hussam Tarazi,&nbsp;Sara Sutton,&nbsp;John Olinjyk,&nbsp;Benjamin Bond,&nbsp;Julian Rrushi","doi":"10.1016/j.ijcip.2024.100660","DOIUrl":"10.1016/j.ijcip.2024.100660","url":null,"abstract":"<div><p><span>The security of cyber–physical systems (CPS) presents new challenges stemming from computations that work primarily with live physics data. Although there is a body of previous research on detection of malware on CPS, more effective designs are needed to address limitations such mimicry attacks and other forms of evasive techniques. Relay algorithms in particular, such as differential and harmonic protection algorithms, are essential to protecting physical equipment such as </span>power transformers from faults. Relay algorithms, though, are often disabled, altered, or otherwise suppressed by malware.</p><p>In this paper, we first provide background on the main types of failures that may occur in an electrical power substation<span> after relay algorithms are disabled by malware. We also provide some initial insights into malware methods that involve physics-informed data manipulations, which in turn may lead to power outages and physical damage to power transformers. We then describe the design of a watchdog algorithm that is continuously on the look out for anomalies in the execution time of relay algorithms along with their associated performance counters. We implemented the watchdog approach in Python, and evaluated it empirically on emulations of differential and harmonic protection algorithms on a computing machine.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100660"},"PeriodicalIF":3.6,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139481770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication 交叉信任:用于跨境身份验证的去中心化 MA-ABE 机制
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-17 DOI: 10.1016/j.ijcip.2024.100661
Jian Chen , Fei Lu , Yuanzhe Liu , Sheng Peng , Zhiming Cai , Fu Mo

With an increasing demand for authenticated data exchange between jurisdictions, ensuring the privacy and security of data interactions is crucial for national security, public health, and economic vitality, becoming a fundamental national infrastructure. Current solutions can be categorized into two types: fully decentralized autonomous systems based on blockchains or centralized solutions that rely on authoritative centers such as certification authorities (CAs). In reality, a balance needs to be struck between guaranteed authority and privacy independence. A certain authority is needed as an authorization guarantee, and decentralization is required to ensure privacy and the independence of the authority. This paper proposes a novel scheme, CT-MA-ABE (Cross-Trust Multiple Authorization Attribute-Based Encryption), to address these issues by implementing MA-ABE for cross-border institutional authorization interactions, utilize blockchain certification authority (BCA) for credibility and encryption-based authorization to protect attribute data privacy. This solution integrates the role of 'notary' in cross-border interactions, addressing the supervision problem in fully decentralized approaches while also considering the trust issue in centralized systems. This paper also introduces the Universal Certificate Authority Pool (UCAP), an innovative hybrid federated authorization method, creatively utilizing the implied authorization conditions of attributes to create a flexible and transitive authorization mechanism based on attribute relationships and extensions, enhancing privacy protection and improving the speed of authorization matrix calculation. The successful deployment of the system between the legal jurisdictions in South China, Zhuhai and Macau as a critical infrastructure component for securing data interactions further demonstrates its effectiveness as a reliable and secure solution.

随着各辖区之间认证数据交换的需求日益增长,确保数据交互的隐私和安全对国家安全、公共卫生和经济活力至关重要,已成为一项基本的国家基础设施。目前的解决方案可分为两类:基于区块链的完全去中心化自治系统或依赖于权威中心(如认证机构)的中心化解决方案。在现实中,需要在保证权威性和隐私独立性之间取得平衡。需要一定的权威作为授权保证,同时需要去中心化来确保隐私和权威的独立性。本文提出了一种新颖的方案 CT-MA-ABE(基于属性的交叉信任多重授权加密)来解决这些问题,该方案通过实现 MA-ABE 来进行跨境机构授权交互,利用区块链认证机构(BCA)来提高可信度,并通过基于加密的授权来保护属性数据隐私。该解决方案整合了跨境交互中的 "公证人 "角色,既解决了完全去中心化方法中的监督问题,又考虑了中心化系统中的信任问题。本文还介绍了通用证书授权池(UCAP)这一创新的混合联合授权方法,创造性地利用属性的隐含授权条件,创建了基于属性关系和扩展的灵活、跨界的授权机制,加强了隐私保护,提高了授权矩阵的计算速度。该系统在华南、珠海和澳门法律管辖区之间的成功部署,作为保障数据交互安全的关键基础设施组件,进一步证明了其作为可靠和安全解决方案的有效性。
{"title":"Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication","authors":"Jian Chen ,&nbsp;Fei Lu ,&nbsp;Yuanzhe Liu ,&nbsp;Sheng Peng ,&nbsp;Zhiming Cai ,&nbsp;Fu Mo","doi":"10.1016/j.ijcip.2024.100661","DOIUrl":"10.1016/j.ijcip.2024.100661","url":null,"abstract":"<div><p>With an increasing demand for authenticated data exchange between jurisdictions, ensuring the privacy and security of data interactions is crucial for national security, public health, and economic vitality, becoming a fundamental national infrastructure. Current solutions can be categorized into two types: fully decentralized autonomous systems based on blockchains or centralized solutions that rely on authoritative centers such as certification authorities (CAs). In reality, a balance needs to be struck between guaranteed authority and privacy independence. A certain authority is needed as an authorization guarantee, and decentralization is required to ensure privacy and the independence of the authority. This paper proposes a novel scheme, CT-MA-ABE (Cross-Trust Multiple Authorization Attribute-Based Encryption), to address these issues by implementing MA-ABE for cross-border institutional authorization interactions, utilize blockchain certification authority (BCA) for credibility and encryption-based authorization to protect attribute data privacy. This solution integrates the role of 'notary' in cross-border interactions, addressing the supervision problem in fully decentralized approaches while also considering the trust issue in centralized systems. This paper also introduces the Universal Certificate Authority Pool (UCAP), an innovative hybrid federated authorization method, creatively utilizing the implied authorization conditions of attributes to create a flexible and transitive authorization mechanism based on attribute relationships and extensions, enhancing privacy protection and improving the speed of authorization matrix calculation. The successful deployment of the system between the legal jurisdictions in South China, Zhuhai and Macau as a critical infrastructure component for securing data interactions further demonstrates its effectiveness as a reliable and secure solution.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100661"},"PeriodicalIF":3.6,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139481710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms 基于成本的新型优化模型,用于提高配电系统在沙尘暴下的恢复能力
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-29 DOI: 10.1016/j.ijcip.2023.100659
Morteza Haghshenas, Rahmat-Allah Hooshmand, Mehdi Gholipour

In the recent years, dust storms (DSs) pose a serious threat to critical infrastructure such as power distribution networks (PDNs). During DSs, the contamination of insulators, increases the possibility of damage to the PDNs insulation system and flashover induced power outage may occur. Power outages disrupt the performance of other urban infrastructures and, in addition to heavy financial losses, cause public dissatisfaction. Although this issue is of particular importance in areas with humid climate, a few studies have been reported on PDNs resilience improvement against DSs. This paper proposes a novel cost-based optimization model to make PDNs more resilient to DSs considering uncertainties. The proposed model is based on the two-stage stochastic mixed-integer programming (SMIP). In the first stage, decisions are made to equip repair crews (RCs) with insulator washing machines, hardening distribution lines with silicone-rubber insulators (SIs), and deploy backup distributed generators (DGs). Decisions in the second stage include network reconfiguration, RCs routing, DGs power dispatch, and load shedding as the critical options for PDN outage management during/after DSs. Case studies are evaluated in the IEEE 69-bus test system and a real 209-bus PDN in Khuzestan province, a coastal province in southwestern Iran. The simulation results at different budget levels have confirmed the efficiency of the proposed model for cost-optimal resilience enhancement planning of PDNs against DSs.

近年来,沙尘暴(DSs)对配电网络(PDNs)等关键基础设施构成了严重威胁。在沙尘暴期间,绝缘体受到污染,增加了配电网绝缘系统受损的可能性,并可能发生闪络引起的停电。停电会影响其他城市基础设施的运行,除了造成严重的经济损失外,还会引起公众的不满。虽然这一问题在气候潮湿的地区尤为重要,但有关提高 PDN 对 DS 的抗灾能力的研究却寥寥无几。本文提出了一种基于成本的新型优化模型,以提高 PDN 对不确定性 DS 的抗灾能力。该模型基于两阶段随机混合整数编程(SMIP)。第一阶段的决策包括为抢修人员(RC)配备绝缘子清洗机、使用硅橡胶绝缘子(SI)加固配电线路以及部署备用分布式发电机(DG)。第二阶段的决策包括网络重新配置、RC 路由、DG 功率调度和甩负荷,作为 DS 期间/之后 PDN 停机管理的关键选项。案例研究在 IEEE 69 总线测试系统和伊朗西南部沿海省份胡齐斯坦省的真实 209 总线 PDN 中进行了评估。不同预算水平下的仿真结果证实了所提模型在针对 DS 的 PDN 成本优化弹性增强规划方面的效率。
{"title":"A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms","authors":"Morteza Haghshenas,&nbsp;Rahmat-Allah Hooshmand,&nbsp;Mehdi Gholipour","doi":"10.1016/j.ijcip.2023.100659","DOIUrl":"10.1016/j.ijcip.2023.100659","url":null,"abstract":"<div><p>In the recent years, dust storms (DSs) pose a serious threat to critical infrastructure such as power distribution networks (PDNs). During DSs, the contamination of insulators, increases the possibility of damage to the PDNs insulation system and flashover induced power outage may occur. Power outages disrupt the performance of other urban infrastructures and, in addition to heavy financial losses, cause public dissatisfaction. Although this issue is of particular importance in areas with humid climate, a few studies have been reported on PDNs resilience improvement against DSs. This paper proposes a novel cost-based optimization model to make PDNs more resilient to DSs considering uncertainties. The proposed model is based on the two-stage stochastic mixed-integer programming (SMIP). In the first stage, decisions are made to equip repair crews (RCs) with insulator washing machines, hardening distribution lines with silicone-rubber insulators (SIs), and deploy backup distributed generators (DGs). Decisions in the second stage include network reconfiguration, RCs routing, DGs power dispatch, and load shedding as the critical options for PDN outage management during/after DSs. Case studies are evaluated in the IEEE 69-bus test system and a real 209-bus PDN in Khuzestan province, a coastal province in southwestern Iran. The simulation results at different budget levels have confirmed the efficiency of the proposed model for cost-optimal resilience enhancement planning of PDNs against DSs.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100659"},"PeriodicalIF":3.6,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139068225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative study of cyber security intrusion detection in healthcare systems 医疗系统网络安全入侵检测比较研究
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-23 DOI: 10.1016/j.ijcip.2023.100658
Yan Zhang, Degang Zhu, Menglin Wang, Junhan Li, Jie Zhang

Due to the proliferation of network devices and the presence of sensitive information, healthcare systems have become prime targets for cyber attackers. Therefore, it is crucial to design an efficient and accurate intrusion detection system (IDS) specifically tailored for healthcare systems. In this regard, we conducted a comprehensive comparative study on network security intrusion detection in healthcare systems. In order to tackle the challenges arising from information redundancy and noise in feature selection, we developed the Maximum Information Coefficient (MIC) method to effectively analyse the nonlinear relationships among traffic features. This method was utilized in a comparative analysis involving ten models on three datasets. The experiments demonstrated that the detection models using MIC-based feature selection outperformed other feature selection approaches, especially when applied to the WUSTL-EHMS-2020 dataset, which includes patients' biometric features. The MIC-enhanced Extreme Gradient Boosting detection model achieved remarkable results, attaining an accuracy of 95.01%, precision of 94.94%, and recall of 95.01%. These findings underscore the efficacy of our comparative study in safeguarding healthcare systems against cyber attacks. Furthermore, our study highlights the importance of feature selection and the incorporation of patient biometric features in healthcare IDS. It is imperative for medical managers to consider these factors when making informed decisions regarding cyber security measures.

由于网络设备的激增和敏感信息的存在,医疗保健系统已成为网络攻击者的主要目标。因此,设计一种专门针对医疗系统的高效、准确的入侵检测系统(IDS)至关重要。为此,我们对医疗保健系统中的网络安全入侵检测进行了全面的比较研究。为了应对特征选择中信息冗余和噪声带来的挑战,我们开发了最大信息系数(MIC)方法,以有效分析流量特征之间的非线性关系。我们利用这种方法在三个数据集上对十个模型进行了比较分析。实验结果表明,使用基于 MIC 的特征选择的检测模型优于其他特征选择方法,尤其是在应用于 WUSTL-EHMS-2020 数据集(其中包括患者的生物特征)时。MIC 增强的极端梯度提升检测模型取得了显著的成果,准确率达到 95.01%,精确率达到 94.94%,召回率达到 95.01%。这些发现强调了我们的比较研究在保护医疗系统免受网络攻击方面的有效性。此外,我们的研究还强调了特征选择和将患者生物特征纳入医疗 IDS 的重要性。医疗管理人员在做出有关网络安全措施的明智决策时,必须考虑这些因素。
{"title":"A comparative study of cyber security intrusion detection in healthcare systems","authors":"Yan Zhang,&nbsp;Degang Zhu,&nbsp;Menglin Wang,&nbsp;Junhan Li,&nbsp;Jie Zhang","doi":"10.1016/j.ijcip.2023.100658","DOIUrl":"10.1016/j.ijcip.2023.100658","url":null,"abstract":"<div><p><span><span>Due to the proliferation of network devices and the presence of sensitive information, healthcare systems have become prime targets for cyber attackers. Therefore, it is crucial to design an efficient and accurate </span>intrusion detection system<span><span> (IDS) specifically tailored for healthcare systems. In this regard, we conducted a comprehensive comparative study<span><span> on network security intrusion detection in healthcare systems. In order to tackle the challenges arising from </span>information redundancy<span> and noise in feature selection, we developed the Maximum Information Coefficient (MIC) method to effectively analyse the nonlinear relationships among traffic features. This method was utilized in a comparative analysis involving ten models on three datasets. The experiments demonstrated that the detection models using MIC-based feature selection outperformed other feature selection approaches, especially when applied to the WUSTL-EHMS-2020 dataset, which includes patients' biometric features. The MIC-enhanced </span></span></span>Extreme Gradient Boosting<span> detection model achieved remarkable results, attaining an accuracy of 95.01%, precision of 94.94%, and recall of 95.01%. These findings underscore the efficacy of our comparative study in safeguarding healthcare systems against cyber attacks<span>. Furthermore, our study highlights the importance of feature selection and the incorporation of patient biometric features in healthcare IDS. It is imperative for medical managers to consider these factors when making informed decisions regarding </span></span></span></span>cyber security measures.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100658"},"PeriodicalIF":3.6,"publicationDate":"2023-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139027911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach 保护关键基础设施免受先进的网络和物理综合威胁:PRAETORIAN 方法
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-21 DOI: 10.1016/j.ijcip.2023.100657
Lazaros Papadopoulos , Konstantinos Demestichas , Eva Muñoz-Navarro , Juan José Hernández-Montesinos , Stephane Paul , Nicolas Museux , Sandra König , Stefan Schauer , Alfonso Climente Alarcón , Israel Perez Llopis , Tim Stelkens-Kobsch , Tamara Hadjina , Jelena Levak

This work describes the PRAETORIAN system, an advanced framework for the protection of critical infrastructures from combined physical and cyber threats. It integrates components for detecting threats and generating alerts related with the physical and the cyber domains of Critical Infrastructures (CIs). These alerts are correlated by a hybrid situation awareness system that calculates the cascading effects of the attacks. Finally, a response coordination system manages notifications and assists decision making by providing mitigation actions and sharing information with the public and relevant authorities. The PRAETORIAN system was extensively validated by a large number of end users and was demonstrated in real-world environments in terms of providing support for the detection and mitigation of physical and/or cyber attacks in CIs.

本作品介绍了 PRAETORIAN 系统,这是一个保护关键基础设施免受物理和网络综合威胁的先进框架。该系统集成了多个组件,用于检测威胁并生成与关键基础设施(CI)的物理和网络领域相关的警报。这些警报由一个混合态势感知系统进行关联,该系统可计算攻击的级联效应。最后,响应协调系统管理通知,并通过提供缓解行动和与公众及相关当局共享信息来协助决策。PRAETORIAN 系统经过了大量终端用户的广泛验证,并在实际环境中进行了演示,为检测和缓解 CIs 中的物理和/或网络攻击提供了支持。
{"title":"Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach","authors":"Lazaros Papadopoulos ,&nbsp;Konstantinos Demestichas ,&nbsp;Eva Muñoz-Navarro ,&nbsp;Juan José Hernández-Montesinos ,&nbsp;Stephane Paul ,&nbsp;Nicolas Museux ,&nbsp;Sandra König ,&nbsp;Stefan Schauer ,&nbsp;Alfonso Climente Alarcón ,&nbsp;Israel Perez Llopis ,&nbsp;Tim Stelkens-Kobsch ,&nbsp;Tamara Hadjina ,&nbsp;Jelena Levak","doi":"10.1016/j.ijcip.2023.100657","DOIUrl":"10.1016/j.ijcip.2023.100657","url":null,"abstract":"<div><p><span>This work describes the PRAETORIAN system, an advanced framework for the protection of critical infrastructures from combined physical and cyber threats. It integrates components for detecting threats and generating alerts related with the physical and the cyber domains of Critical Infrastructures (CIs). These alerts are correlated by a hybrid situation awareness system that calculates the cascading effects<span> of the attacks. Finally, a response coordination system manages notifications and assists decision making by providing mitigation actions and sharing information with the public and relevant authorities. The PRAETORIAN system was extensively validated by a large number of end users and was demonstrated in real-world environments in terms of providing support for the detection and mitigation of physical and/or </span></span>cyber attacks in CIs.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100657"},"PeriodicalIF":3.6,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139027747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions 关于保护关键基础设施的调查:攻击、人工智能安全和未来方向
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-09 DOI: 10.1016/j.ijcip.2023.100647
Khushi Jatinkumar Raval , Nilesh Kumar Jadav , Tejal Rathod , Sudeep Tanwar , Vrince Vimal , Nagendar Yamsani

Technologies such as artificial intelligence (AI), blockchain, and the Internet of Things (IoT) have converged in driving the next wave of digital revolution. Amalgamating the aforementioned advancements with critical infrastructure (CI) can significantly help society by offering a quality of life and boosting the nation’s economy and productivity. However, the lack of cybersecurity in CI gave rise to advanced threats and vulnerabilities that hindered the aforementioned societal benefits. In this vein, the paper provides an in-depth analysis of cyber threats and risks associated with different critical infrastructures, such as the financial, agriculture, energy, and healthcare sectors. Further, we thoroughly investigate the staggering benefits of AI and, based on it, present an exhaustive solution taxonomy to showcase the competency of AI mechanisms in confronting cyberattacks on CI. The taxonomy specifically addresses issues like data privacy, algorithmic bias, and human-AI collaboration for CI. Further, we proposed an AI-based secure data exchange framework for smart grid CI, where we attempt to secure the sensor’s data (i.e., power consumption, energy readings, and network data) from malicious adversaries. The proposed framework is evaluated using statistical measures, such as accuracy, training time, and receiver operating characteristic (ROC) curve, and anomaly detection. Further, the paper examines the research challenges that still adhere to the critical systems and require stringent AI-based mechanisms to tackle them.

人工智能(AI)、区块链和物联网(IoT)等技术已汇聚在一起,推动下一波数字革命。将上述先进技术与关键基础设施(CI)相结合,可以极大地帮助社会提高生活质量,促进国家经济和生产力的发展。然而,由于 CI 缺乏网络安全,导致高级威胁和漏洞的出现,阻碍了上述社会效益的实现。为此,本文深入分析了与金融、农业、能源和医疗保健等不同关键基础设施相关的网络威胁和风险。此外,我们还深入研究了人工智能的惊人优势,并在此基础上提出了详尽的解决方案分类法,以展示人工智能机制在应对对 CI 的网络攻击方面的能力。该分类法特别解决了诸如数据隐私、算法偏差和人类与人工智能在 CI 方面的协作等问题。此外,我们还为智能电网 CI 提出了一个基于人工智能的安全数据交换框架,试图确保传感器数据(即功耗、能量读数和网络数据)免受恶意对手的攻击。本文通过准确度、训练时间、接收器工作特性曲线(ROC)和异常检测等统计指标对所提出的框架进行了评估。此外,本文还探讨了关键系统仍然面临的研究挑战,这些挑战需要基于人工智能的严格机制来应对。
{"title":"A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions","authors":"Khushi Jatinkumar Raval ,&nbsp;Nilesh Kumar Jadav ,&nbsp;Tejal Rathod ,&nbsp;Sudeep Tanwar ,&nbsp;Vrince Vimal ,&nbsp;Nagendar Yamsani","doi":"10.1016/j.ijcip.2023.100647","DOIUrl":"10.1016/j.ijcip.2023.100647","url":null,"abstract":"<div><p><span><span>Technologies such as artificial intelligence<span><span> (AI), blockchain, and the </span>Internet of Things (IoT) have converged in driving the next wave of digital revolution. Amalgamating the aforementioned advancements with critical infrastructure (CI) can significantly help society by offering a quality of life and boosting the nation’s economy and productivity. However, the lack of cybersecurity in CI gave rise to advanced threats and vulnerabilities that hindered the aforementioned societal benefits. In this vein, the paper provides an in-depth analysis of cyber threats and risks associated with different critical infrastructures, such as the financial, agriculture, energy, and </span></span>healthcare sectors. Further, we thoroughly investigate the staggering benefits of AI and, based on it, present an exhaustive solution taxonomy to showcase the competency of AI mechanisms in confronting cyberattacks on CI. The taxonomy specifically addresses issues like data privacy, algorithmic bias, and human-AI collaboration for CI. Further, we proposed an AI-based secure data exchange framework for smart grid CI, where we attempt to secure the sensor’s data (i.e., </span>power consumption<span>, energy readings, and network data) from malicious adversaries<span>. The proposed framework is evaluated using statistical measures, such as accuracy, training time, and receiver operating characteristic (ROC) curve, and anomaly detection. Further, the paper examines the research challenges that still adhere to the critical systems and require stringent AI-based mechanisms to tackle them.</span></span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100647"},"PeriodicalIF":3.6,"publicationDate":"2023-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138575674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks 针对隐形虚假数据注入攻击的智能配水系统机会约束脆弱性评估
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-06 DOI: 10.1016/j.ijcip.2023.100645
Nazia Raza, Faegheh Moazeni

Smart water distribution systems (SWDSs) have not only enhanced the monitoring and control of the entire water infrastructure but have also jeopardized its security and resilience. The state-of-the-art examined the uncertainties in the water supply network to obtain optimal design parameters to ensure hydraulic integrity. However, the investigations of uncertainties in SWDSs from the cybersecurity perspective remain unexplored. To address this limitation, this paper utilizes a robust chance-constrained optimization strategy to scrutinize the vulnerable location of SWDSs against False Data Injection (FDI) attacks. This is achieved by factoring in the probabilistic behavior of water demand at junctions that can potentially facilitate stealthy FDI attacks on the hourly measurements of the pump’s flow rate. The proposed nonlinear model is validated with several case studies reflecting the real-world cyberattack consequences including cutoff water supply of the network, enhanced power consumption of the pump, and the undesirable pressure surge in the system at strategic locations of SWDSs. As a result of the studied cases, the cyberattack consequences on the entire water supply network are obtained while highlighting the threat-prone regions of the network. This paper contributes to embedding additional security layers to the existing water infrastructure at the vulnerable links and junctions.

智能配水系统(SWDSs)不仅增强了对整个供水基础设施的监测和控制,但也危及其安全性和弹性。研究了供水管网的不确定性,得到了保证水力完整性的最优设计参数。然而,从网络安全角度对swds不确定性的研究仍未得到充分探讨。为了解决这一限制,本文利用稳健的机会约束优化策略来仔细检查swds对虚假数据注入(FDI)攻击的脆弱位置。这是通过考虑结合点的水需求的概率行为来实现的,这可能会促进FDI对水泵每小时流量测量的隐形攻击。通过几个案例研究验证了所提出的非线性模型,这些案例反映了现实世界网络攻击的后果,包括网络供水中断、泵功耗增加以及swds战略位置系统中不希望出现的压力波动。通过研究案例,得出了整个供水网络的网络攻击后果,同时突出了网络中容易受到威胁的区域。本文有助于在脆弱的环节和交汇处为现有的水利基础设施嵌入额外的安全层。
{"title":"Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks","authors":"Nazia Raza,&nbsp;Faegheh Moazeni","doi":"10.1016/j.ijcip.2023.100645","DOIUrl":"10.1016/j.ijcip.2023.100645","url":null,"abstract":"<div><p><span>Smart water distribution systems (SWDSs) have not only enhanced the monitoring and control of the entire water infrastructure but have also jeopardized its security and resilience. The state-of-the-art examined the uncertainties in the water supply network to obtain optimal design parameters to ensure hydraulic integrity. However, the investigations of uncertainties in SWDSs from the cybersecurity perspective remain unexplored. To address this limitation, this paper utilizes a robust chance-constrained optimization strategy to scrutinize the vulnerable location of SWDSs against False Data Injection (FDI) attacks. This is achieved by factoring in the probabilistic behavior of water demand at junctions that can potentially facilitate stealthy FDI attacks on the hourly measurements of the pump’s flow rate. The </span>proposed nonlinear model<span> is validated with several case studies reflecting the real-world cyberattack consequences including cutoff water supply of the network, enhanced power consumption<span> of the pump, and the undesirable pressure surge in the system at strategic locations of SWDSs. As a result of the studied cases, the cyberattack consequences on the entire water supply network are obtained while highlighting the threat-prone regions of the network. This paper contributes to embedding additional security layers to the existing water infrastructure at the vulnerable links and junctions.</span></span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100645"},"PeriodicalIF":3.6,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138493157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review 机器学习在相互依存的关键基础设施系统复原力中的应用--系统性文献综述
IF 3.6 3区 工程技术 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-04 DOI: 10.1016/j.ijcip.2023.100646
Basem A. Alkhaleel

The resilience of interdependent critical infrastructure systems (ICISs) is critical for the functioning of society and the economy. ICISs such as power grids and telecommunication networks are complex systems characterized by a wide range of interconnections, and disruptions to such systems can cause significant socioeconomic losses. This vital role requires the adaptation of new tools and technologies to improve the modeling of such complex systems and achieve the highest levels of resilience. One of the trending tools in many research fields to model complex systems is machine learning (ML). In this article, a systematic review of the literature on ML applications in ICISs resilience is conducted, considering the protocol of Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA), to address the lack of knowledge and scattered research articles on the topic. The main objective of this systematic review is to determine the state of the art of ML applications in the area of ICISs resilience engineering by exploring the current literature. The results found were summarized and some of the future opportunities for ML in ICISs resilience applications were outlined to encourage resilience engineering communities to adapt and use ML for various ICISs applications and to utilize its potential.

相互依存的关键基础设施系统(ICIS)的复原力对社会和经济的运行至关重要。电网和电信网络等关键基础设施系统是以广泛互连为特征的复杂系统,这些系统的中断会造成重大的社会经济损失。这种重要作用要求采用新的工具和技术来改进这类复杂系统的建模,并实现最高水平的复原力。在许多研究领域,机器学习(ML)是复杂系统建模的趋势工具之一。本文根据《系统综述和元分析首选报告项目》(PRISMA)的规定,对有关 ML 应用于 ICIS 复原力的文献进行了系统综述,以解决有关该主题的知识缺乏和研究文章分散的问题。本系统综述的主要目的是通过探索当前文献,确定智能语言在集成电路信息系统复原力工程领域的应用现状。对所发现的结果进行了总结,并概述了 ML 在 ICISs 复原力应用中的一些未来机遇,以鼓励复原力工程界在 ICISs 的各种应用中调整和使用 ML,并利用其潜力。
{"title":"Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review","authors":"Basem A. Alkhaleel","doi":"10.1016/j.ijcip.2023.100646","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100646","url":null,"abstract":"<div><p><span><span>The resilience of interdependent critical infrastructure systems (ICISs) is critical for the functioning of society and the economy. ICISs such as power grids and telecommunication networks are complex systems characterized by a wide range of interconnections, and disruptions to such systems can cause significant socioeconomic losses. This vital role requires the adaptation of new tools and technologies to improve the modeling of such complex systems and achieve the highest levels of resilience. One of the trending tools in many research fields to model complex systems is </span>machine learning (ML). In this article, a </span>systematic review<span> of the literature on ML applications in ICISs resilience is conducted, considering the protocol of Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA), to address the lack of knowledge and scattered research articles on the topic. The main objective of this systematic review is to determine the state of the art of ML applications in the area of ICISs resilience engineering by exploring the current literature. The results found were summarized and some of the future opportunities for ML in ICISs resilience applications were outlined to encourage resilience engineering communities to adapt and use ML for various ICISs applications and to utilize its potential.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"44 ","pages":"Article 100646"},"PeriodicalIF":3.6,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138490153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Critical Infrastructure Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1