首页 > 最新文献

Journal of Network and Systems Management最新文献

英文 中文
Reinforcement Learning for Real-Time Federated Learning for Resource-Constrained Edge Cluster 为资源受限的边缘集群进行实时联合学习的强化学习
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1007/s10922-024-09857-1
Kolichala Rajashekar, Souradyuti Paul, Sushanta Karmakar, Subhajit Sidhanta

For performing various predictive analytics tasks for real-time mission-critical applications, Federated Learning (FL) have emerged as the go-to machine learning paradigm for its ability to leverage perform machine learning workloads on resource-constrained edge devices. For such FL applications working under stringent deadlines, the overall local training time needs to be minimized, which consists of the retrieval delay, i.e., the delay in fetching the data from the IoT devices to the FL clients as well as the time consumed in training the local models. Since the latter component is mostly uniform among the FL clients, we have to minimize the retrieval delay to reduce the local training time. To that end, we formulate the Client Assignment Problem (CAP) as an intelligent assignment of selected IoT devices to each FL client such that the FL client may retrieve training data from these IoT devices with minimal retrieval delay. CAP must perform assignments for each FL client considering its relative distances from each IoT device such that each FL client does not experience an arbitrarily large retrieval delay in fetching data from a remotely placed IoT device. We prove that CAP is NP-Hard, and as such, obtaining a polynomial time solution to CAP is infeasible. To deal with the challenges faced by such heuristics approaches, we propose Deep Reinforcement Learning-based algorithms to produce near-optimal solution to CAP. We demonstrate that our algorithms outperform the state of the art in reducing the local training time, while producing a near-optimal solution.

为了在实时关键任务应用中执行各种预测分析任务,联邦学习(Federated Learning,FL)因其能够在资源有限的边缘设备上利用执行机器学习工作负载的能力而成为机器学习的首选范例。对于此类在严格期限内工作的 FL 应用程序,需要最大限度地减少整体本地训练时间,其中包括检索延迟(即从物联网设备向 FL 客户端获取数据的延迟)以及训练本地模型所消耗的时间。由于后一部分在 FL 客户端之间大多是一致的,因此我们必须尽量减少检索延迟,以缩短本地训练时间。为此,我们将客户分配问题(CAP)表述为将选定的物联网设备智能分配给每个 FL 客户端,以便 FL 客户端能以最小的检索延迟从这些物联网设备中检索训练数据。CAP 必须考虑每个 FL 客户端与每个物联网设备的相对距离,为每个 FL 客户端执行分配,使每个 FL 客户端在从远程放置的物联网设备获取数据时不会出现任意大的检索延迟。我们证明 CAP 是 NP-Hard,因此,获得 CAP 的多项式时间解决方案是不可行的。为了应对此类启发式方法所面临的挑战,我们提出了基于深度强化学习的算法,以产生接近最优的 CAP 解决方案。我们证明,我们的算法在减少局部训练时间方面优于现有技术,同时还能生成近乎最优的解决方案。
{"title":"Reinforcement Learning for Real-Time Federated Learning for Resource-Constrained Edge Cluster","authors":"Kolichala Rajashekar, Souradyuti Paul, Sushanta Karmakar, Subhajit Sidhanta","doi":"10.1007/s10922-024-09857-1","DOIUrl":"https://doi.org/10.1007/s10922-024-09857-1","url":null,"abstract":"<p>For performing various predictive analytics tasks for real-time mission-critical applications, Federated Learning (FL) have emerged as the go-to machine learning paradigm for its ability to leverage perform machine learning workloads on resource-constrained edge devices. For such FL applications working under stringent deadlines, the overall <i>local training time</i> needs to be minimized, which consists of the <i>retrieval delay</i>, i.e., the delay in fetching the data from the IoT devices to the FL clients as well as the time consumed in training the local models. Since the latter component is mostly uniform among the FL clients, we have to minimize the retrieval delay to reduce the local training time. To that end, we formulate the Client Assignment Problem (CAP) as an intelligent assignment of selected IoT devices to each FL client such that the FL client may retrieve training data from these IoT devices with minimal retrieval delay. CAP must perform assignments for each FL client considering its relative distances from each IoT device such that each FL client does not experience an arbitrarily large retrieval delay in fetching data from a remotely placed IoT device. We prove that CAP is NP-Hard, and as such, obtaining a polynomial time solution to CAP is infeasible. To deal with the challenges faced by such heuristics approaches, we propose Deep Reinforcement Learning-based algorithms to produce near-optimal solution to CAP. We demonstrate that our algorithms outperform the state of the art in reducing the local training time, while producing a near-optimal solution.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Availability and Performance Assessment of IoMT Systems: A Stochastic Modeling Approach IoMT 系统的可用性和性能评估:随机建模方法
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1007/s10922-024-09868-y
Thiago Valentim, Gustavo Callou, Cleunio França, Eduardo Tavares

Internet of Things (IoT) allows distinct elements of an environment to be remotely monitored using existing network infrastructures, creating a prominent integration of disparate computing systems. Such an integration commonly results in efficient data collection and processing. Indeed, the adoption of IoT can improve communication in gathering and transmitting data, especially in locations that deal with connectivity challenges. For instance, hospitals have adopted IoT to collect and transmit patient data to health professionals, as critical patients must be monitored uninterruptedly. As a consequence, healthcare systems typically require high availability, in which connectivity is essential for critical medical decisions. Some works have conceived techniques to assess the availability of Internet of Medical Things (IoMT) systems, but the joint assessment of performance and availability is generally neglected. This paper presents a modeling approach based on stochastic Petri nets (SPN) and reliability block diagrams (RBD) to evaluate IoMT systems. The proposed technique evaluates availability and response time of the communication between devices in an IoMT architecture. Experimental results show the practical feasibility of the proposed approach, in which a sensitivity analysis is adopted to indicate the components with the most significant impact on the system operation. Our approach contributes to the state of the art as an additional technique to evaluate different system designs before modifying or implementing the real system or a prototype.

物联网(IoT)允许利用现有的网络基础设施对环境中的不同元素进行远程监控,从而将不同的计算系统集成在一起。这种整合通常可以实现高效的数据收集和处理。事实上,采用物联网可以改善数据收集和传输方面的通信,尤其是在面临连接挑战的地方。例如,医院采用物联网来收集病人数据并将其传输给医疗专业人员,因为必须不间断地监控危重病人。因此,医疗保健系统通常需要高可用性,其中连接性对关键医疗决策至关重要。一些著作构想了评估医疗物联网(IoMT)系统可用性的技术,但一般都忽略了对性能和可用性的联合评估。本文介绍了一种基于随机 Petri 网(SPN)和可靠性框图(RBD)的建模方法,用于评估 IoMT 系统。所提出的技术可评估 IoMT 架构中设备间通信的可用性和响应时间。实验结果表明了所提方法的实际可行性,其中采用了敏感性分析来指出对系统运行影响最大的组件。作为在修改或实施真实系统或原型之前评估不同系统设计的一项附加技术,我们的方法为技术发展做出了贡献。
{"title":"Availability and Performance Assessment of IoMT Systems: A Stochastic Modeling Approach","authors":"Thiago Valentim, Gustavo Callou, Cleunio França, Eduardo Tavares","doi":"10.1007/s10922-024-09868-y","DOIUrl":"https://doi.org/10.1007/s10922-024-09868-y","url":null,"abstract":"<p>Internet of Things (IoT) allows distinct elements of an environment to be remotely monitored using existing network infrastructures, creating a prominent integration of disparate computing systems. Such an integration commonly results in efficient data collection and processing. Indeed, the adoption of IoT can improve communication in gathering and transmitting data, especially in locations that deal with connectivity challenges. For instance, hospitals have adopted IoT to collect and transmit patient data to health professionals, as critical patients must be monitored uninterruptedly. As a consequence, healthcare systems typically require high availability, in which connectivity is essential for critical medical decisions. Some works have conceived techniques to assess the availability of Internet of Medical Things (IoMT) systems, but the joint assessment of performance and availability is generally neglected. This paper presents a modeling approach based on stochastic Petri nets (SPN) and reliability block diagrams (RBD) to evaluate IoMT systems. The proposed technique evaluates availability and response time of the communication between devices in an IoMT architecture. Experimental results show the practical feasibility of the proposed approach, in which a sensitivity analysis is adopted to indicate the components with the most significant impact on the system operation. Our approach contributes to the state of the art as an additional technique to evaluate different system designs before modifying or implementing the real system or a prototype.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142257611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative Adversarial Network Models for Anomaly Detection in Software-Defined Networks 用于软件定义网络异常检测的生成对抗网络模型
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1007/s10922-024-09867-z
Alexandro Marcelo Zacaron, Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, Luiz Fernando Carvalho, Mario Lemes Proença

Software-defined Networking (SDN) is a modern network management paradigm that decouples the data and control planes. The centralized control plane offers comprehensive control and orchestration over the network infrastructure. Although SDN provides better control over traffic flow, ensuring network security and service availability remains challenging. This paper presents an anomaly-based intrusion detection system (IDS) for monitoring and securing SDN networks. The system utilizes deep learning models to identify anomalous traffic behavior. When an anomaly is detected, a mitigation module blocks suspicious communications and restores the network to its normal state. Three versions of the proposed solution were implemented and compared: the traditional Generative Adversarial Network (GAN), Deep Convolutional GAN (DCGAN), and Wasserstein GAN with Gradient Penalty (WGAN-GP). These models were incorporated into the system’s detection structure and tested on two benchmark datasets. The first is emulated, and the second is the well-known CICDDoS2019 dataset. The results indicate that the IDS adequately identified potential threats, regardless of the deep learning algorithm. Although the traditional GAN is a simpler model, it could still efficiently detect when the network was under attack and was considerably faster than the other models. Additionally, the employed mitigation strategy successfully dropped over 89% of anomalous flows in the emulated dataset and over 99% in the public dataset, preventing the effects of the threats from being accentuated and jeopardizing the proper functioning of the SDN network.

软件定义网络(Software-defined Networking,SDN)是一种将数据平面和控制平面分离的现代网络管理范式。集中式控制平面可对网络基础设施进行全面控制和协调。虽然 SDN 可以更好地控制流量,但确保网络安全和服务可用性仍是一项挑战。本文介绍了一种基于异常的入侵检测系统(IDS),用于监控和保护 SDN 网络。该系统利用深度学习模型来识别异常流量行为。检测到异常时,缓解模块会阻止可疑通信,并将网络恢复到正常状态。我们实施并比较了所提解决方案的三个版本:传统生成对抗网络(GAN)、深度卷积 GAN(DCGAN)和带梯度惩罚的 Wasserstein GAN(WGAN-GP)。这些模型被纳入系统的检测结构,并在两个基准数据集上进行了测试。第一个是模拟数据集,第二个是著名的 CICDDoS2019 数据集。结果表明,无论采用哪种深度学习算法,IDS 都能充分识别潜在威胁。虽然传统的 GAN 是一种更简单的模型,但它仍能在网络受到攻击时有效地检测到,而且速度比其他模型快得多。此外,所采用的缓解策略在仿真数据集中成功拦截了 89% 以上的异常流,在公共数据集中拦截了 99% 以上的异常流,从而防止了威胁的影响加剧,危及 SDN 网络的正常运行。
{"title":"Generative Adversarial Network Models for Anomaly Detection in Software-Defined Networks","authors":"Alexandro Marcelo Zacaron, Daniel Matheus Brandão Lent, Vitor Gabriel da Silva Ruffo, Luiz Fernando Carvalho, Mario Lemes Proença","doi":"10.1007/s10922-024-09867-z","DOIUrl":"https://doi.org/10.1007/s10922-024-09867-z","url":null,"abstract":"<p>Software-defined Networking (SDN) is a modern network management paradigm that decouples the data and control planes. The centralized control plane offers comprehensive control and orchestration over the network infrastructure. Although SDN provides better control over traffic flow, ensuring network security and service availability remains challenging. This paper presents an anomaly-based intrusion detection system (IDS) for monitoring and securing SDN networks. The system utilizes deep learning models to identify anomalous traffic behavior. When an anomaly is detected, a mitigation module blocks suspicious communications and restores the network to its normal state. Three versions of the proposed solution were implemented and compared: the traditional Generative Adversarial Network (GAN), Deep Convolutional GAN (DCGAN), and Wasserstein GAN with Gradient Penalty (WGAN-GP). These models were incorporated into the system’s detection structure and tested on two benchmark datasets. The first is emulated, and the second is the well-known CICDDoS2019 dataset. The results indicate that the IDS adequately identified potential threats, regardless of the deep learning algorithm. Although the traditional GAN is a simpler model, it could still efficiently detect when the network was under attack and was considerably faster than the other models. Additionally, the employed mitigation strategy successfully dropped over 89% of anomalous flows in the emulated dataset and over 99% in the public dataset, preventing the effects of the threats from being accentuated and jeopardizing the proper functioning of the SDN network.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack Detection in IoT Network Using Support Vector Machine and Improved Feature Selection Technique 使用支持向量机和改进的特征选择技术检测物联网网络攻击
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1007/s10922-024-09871-3
Noura Ben Henda, Amina Msolli, Imen Haggui, Abdelhamid Helali, Hassen Maaref

As a result of the rapid advancement of technology, the Internet of Things (IoT) has emerged as an essential research question, capable of collecting and sending data through a network between linked items without the need for human interaction. However, these interconnected devices often encounter challenges related to data security, encompassing aspects of confidentiality, integrity, availability, authentication, and privacy, particularly when facing potential intruders. Addressing this concern, our study propose a novel host-based intrusion detection system grounded in machine learning. Our approach incorporates a feature selection (FS) technique based on the correlation between features and a ranking function utilizing Support Vector Machine (SVM). The experimentation, conducted on the NSL-KDD dataset, demonstrates the efficacy of our methodology. The results showcase superiority over comparable approaches in both binary and multi-class classification scenarios, achieving remarkable accuracy rates of 99.094% and 99.11%, respectively. This underscores the potential of our proposed system in enhancing security measures for IoT devices.

随着技术的飞速发展,物联网(IoT)已成为一个重要的研究课题,它能够通过网络在相互连接的物品之间收集和发送数据,而无需人工交互。然而,这些互联设备经常会遇到与数据安全有关的挑战,包括保密性、完整性、可用性、身份验证和隐私等方面,尤其是在面对潜在入侵者时。针对这一问题,我们的研究提出了一种基于机器学习的新型主机入侵检测系统。我们的方法结合了基于特征间相关性的特征选择(FS)技术和利用支持向量机(SVM)的排序功能。在 NSL-KDD 数据集上进行的实验证明了我们方法的有效性。实验结果表明,在二类和多类分类场景中,我们的方法都优于同类方法,准确率分别达到了 99.094% 和 99.11%。这凸显了我们提出的系统在增强物联网设备安全措施方面的潜力。
{"title":"Attack Detection in IoT Network Using Support Vector Machine and Improved Feature Selection Technique","authors":"Noura Ben Henda, Amina Msolli, Imen Haggui, Abdelhamid Helali, Hassen Maaref","doi":"10.1007/s10922-024-09871-3","DOIUrl":"https://doi.org/10.1007/s10922-024-09871-3","url":null,"abstract":"<p>As a result of the rapid advancement of technology, the Internet of Things (IoT) has emerged as an essential research question, capable of collecting and sending data through a network between linked items without the need for human interaction. However, these interconnected devices often encounter challenges related to data security, encompassing aspects of confidentiality, integrity, availability, authentication, and privacy, particularly when facing potential intruders. Addressing this concern, our study propose a novel host-based intrusion detection system grounded in machine learning. Our approach incorporates a feature selection (FS) technique based on the correlation between features and a ranking function utilizing Support Vector Machine (SVM). The experimentation, conducted on the NSL-KDD dataset, demonstrates the efficacy of our methodology. The results showcase superiority over comparable approaches in both binary and multi-class classification scenarios, achieving remarkable accuracy rates of 99.094% and 99.11%, respectively. This underscores the potential of our proposed system in enhancing security measures for IoT devices.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Distance-based Strategy for Detection of Sybil Attackers and Sybil Nodes in VANET 基于分散距离的 VANET 仿冒攻击者和仿冒节点检测策略
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-10 DOI: 10.1007/s10922-024-09869-x
P. Remya krishnan, Ritesh Koushik

Rapid development and deployment of VANET necessitate solutions to support its safe applications. One of the major threats to VANET is the Sybil attack that uses numerous fake identities to spread misleading information around the network, resulting in traffic jams, accidents, and theft. Most of the existing solutions to Sybil attacks in VANET concentrate mainly on detecting the presence of Sybil attacks and identifying the virtual Sybil nodes. Though solutions exist to detect the Sybil attacker node, the attack scenarios where multiple Sybil attackers generate the Sybil nodes collaboratively persist as a research gap that needs to be addressed effectively. In this paper, we concentrate on detecting multiple Sybil attackers and the Sybil nodes generated in VANET using a decentralized, distance-based strategy. Despite the performance verification of the proposed technique using simulation, in this paper, we evaluate it in a real-time test-bed environment of VANET to verify its practical applicability.

VANET 的快速发展和部署需要有支持其安全应用的解决方案。VANET面临的主要威胁之一是Sybil攻击,它利用大量虚假身份在网络中传播误导信息,导致交通堵塞、事故和盗窃。针对 VANET 中的仿冒攻击,现有的大多数解决方案主要集中在检测仿冒攻击的存在和识别虚拟仿冒节点上。虽然存在检测假冒攻击者节点的解决方案,但多个假冒攻击者协同生成假冒节点的攻击场景仍然是一个需要有效解决的研究空白。在本文中,我们采用一种分散的、基于距离的策略,专注于检测 VANET 中产生的多个假冒攻击者和假冒节点。尽管本文利用仿真验证了所提技术的性能,但我们还是在 VANET 的实时测试平台环境中对其进行了评估,以验证其实际应用性。
{"title":"Decentralized Distance-based Strategy for Detection of Sybil Attackers and Sybil Nodes in VANET","authors":"P. Remya krishnan, Ritesh Koushik","doi":"10.1007/s10922-024-09869-x","DOIUrl":"https://doi.org/10.1007/s10922-024-09869-x","url":null,"abstract":"<p>Rapid development and deployment of VANET necessitate solutions to support its safe applications. One of the major threats to VANET is the Sybil attack that uses numerous fake identities to spread misleading information around the network, resulting in traffic jams, accidents, and theft. Most of the existing solutions to Sybil attacks in VANET concentrate mainly on detecting the presence of Sybil attacks and identifying the virtual Sybil nodes. Though solutions exist to detect the Sybil attacker node, the attack scenarios where multiple Sybil attackers generate the Sybil nodes collaboratively persist as a research gap that needs to be addressed effectively. In this paper, we concentrate on detecting multiple Sybil attackers and the Sybil nodes generated in VANET using a decentralized, distance-based strategy. Despite the performance verification of the proposed technique using simulation, in this paper, we evaluate it in a real-time test-bed environment of VANET to verify its practical applicability.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tri-objective Optimization for Large-Scale Workflow Scheduling and Execution in Clouds 云中大规模工作流调度和执行的三目标优化
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-06 DOI: 10.1007/s10922-024-09863-3
Huda Alrammah, Yi Gu, Daqing Yun, Ning Zhang

Cloud computing has become the most popular distributed paradigm with massive computing resources and a large data storage capacity to run large-scale scientific workflow applications without the need to own any infrastructure. Scheduling workflows in a distributed system is a well-known NP-complete problem, which has become even more challenging with a dynamic and heterogeneous pool of resources in a cloud computing platform. The aim of this work is to design efficient and effective scheduling algorithms for multi-objective optimization of large-scale scientific workflows in cloud environments. We propose two novel genetic algorithm (GA)-based scheduling algorithms to assign workflow tasks to different cloud resources in order to simultaneously optimize makespan, monetary cost, and energy consumption. One is multi-objective optimization for makespan, cost and energy (MOMCE), which combines the strengths of two widely adopted solutions, genetic algorithm and particle swarm optimization, for multi-objective optimization problems. The other is pareto dominance for makespan, cost and energy (PDMCE), which is based on genetic algorithm and non-dominated solutions to achieve a better convergence and a uniform distribution of the approximate Pareto front. The proposed solutions are evaluated by an extensive set of different workflow applications and cloud environments, and compared with other existing methods in the literature to show the performance stability and superiority. We also conduct performance evaluation and comparison between MOMCE and PDMCE for different criteria.

云计算已成为最流行的分布式范例,它拥有海量计算资源和大容量数据存储,无需拥有任何基础设施即可运行大规模科学工作流应用。在分布式系统中调度工作流是一个众所周知的 NP-完全问题,而在云计算平台的动态异构资源池中,这一问题变得更具挑战性。这项工作的目的是为云环境中大规模科学工作流的多目标优化设计高效的调度算法。我们提出了两种基于遗传算法(GA)的新型调度算法,将工作流任务分配给不同的云资源,以同时优化时间跨度、货币成本和能耗。其中一种算法是 "工期、成本和能耗多目标优化算法(MOMCE)",它结合了遗传算法和粒子群优化这两种被广泛采用的多目标优化问题解决方案的优点。另一种是帕累托支配法(PDMCE),它基于遗传算法和非支配解,以实现更好的收敛性和近似帕累托前沿的均匀分布。我们通过大量不同的工作流应用和云环境对所提出的解决方案进行了评估,并与文献中现有的其他方法进行了比较,以显示其性能的稳定性和优越性。我们还针对不同标准对 MOMCE 和 PDMCE 进行了性能评估和比较。
{"title":"Tri-objective Optimization for Large-Scale Workflow Scheduling and Execution in Clouds","authors":"Huda Alrammah, Yi Gu, Daqing Yun, Ning Zhang","doi":"10.1007/s10922-024-09863-3","DOIUrl":"https://doi.org/10.1007/s10922-024-09863-3","url":null,"abstract":"<p>Cloud computing has become the most popular distributed paradigm with massive computing resources and a large data storage capacity to run large-scale scientific workflow applications without the need to own any infrastructure. Scheduling workflows in a distributed system is a well-known NP-complete problem, which has become even more challenging with a dynamic and heterogeneous pool of resources in a cloud computing platform. The aim of this work is to design efficient and effective scheduling algorithms for multi-objective optimization of large-scale scientific workflows in cloud environments. We propose two novel genetic algorithm (GA)-based scheduling algorithms to assign workflow tasks to different cloud resources in order to simultaneously optimize makespan, monetary cost, and energy consumption. One is multi-objective optimization for makespan, cost and energy (MOMCE), which combines the strengths of two widely adopted solutions, genetic algorithm and particle swarm optimization, for multi-objective optimization problems. The other is pareto dominance for makespan, cost and energy (PDMCE), which is based on genetic algorithm and non-dominated solutions to achieve a better convergence and a uniform distribution of the approximate Pareto front. The proposed solutions are evaluated by an extensive set of different workflow applications and cloud environments, and compared with other existing methods in the literature to show the performance stability and superiority. We also conduct performance evaluation and comparison between MOMCE and PDMCE for different criteria.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering UAV Communications with AI-Assisted Software-Defined Networks: A Review on Performance, Security, and Efficiency 利用人工智能辅助软件定义网络增强无人机通信能力:性能、安全性和效率综述
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-06 DOI: 10.1007/s10922-024-09866-0
Mohamed Amine Ould Rabah, Hamza Drid, Mohamed Rahouti, Nadjib Lazaar

Intelligent software-defined network (SDN) in unmanned aerial vehicles (UAVs) is an emerging research area to enhance UAV communication networks’ performance, security, and efficiency. By incorporating artificial intelligence (AI) and machine learning (ML) algorithms, SDN-based UAV networks enable real-time decision-making, proactive network management, and dynamic resource allocation. These advancements improve network performance, reduce latency, and enhance network efficiency. Moreover, AI-based security mechanisms can swiftly detect and mitigate potential threats, bolstering UAV networks’ overall security. Integrating intelligent SDN in UAVs holds tremendous potential for revolutionizing the UAV communication and networking field. This paper comprehensively discusses the solutions available for UAV-based intelligent SDNs. It provides an in-depth exploration of UAVs and SDNs and presents a comprehensive analysis of the evolution from traditional networking environments to UAV-based SDN environments. Our research primarily focuses on UAV communication’s performance, security, latency, and efficiency. It includes a taxonomy, comparison, and analysis of existing ML solutions specifically designed for UAV-based SDNs.

无人机(UAV)中的智能软件定义网络(SDN)是一个新兴的研究领域,旨在提高无人机通信网络的性能、安全性和效率。通过结合人工智能(AI)和机器学习(ML)算法,基于 SDN 的无人机网络可实现实时决策、主动网络管理和动态资源分配。这些先进技术可改善网络性能、减少延迟并提高网络效率。此外,基于人工智能的安全机制可以迅速检测和缓解潜在威胁,从而增强无人机网络的整体安全性。在无人机中集成智能 SDN 具有巨大潜力,可彻底改变无人机通信和网络领域。本文全面讨论了基于无人机的智能 SDN 解决方案。它深入探讨了无人机和 SDN,并全面分析了从传统网络环境到基于无人机的 SDN 环境的演变。我们的研究主要关注无人机通信的性能、安全性、延迟和效率。它包括对专门为基于无人机的 SDN 设计的现有 ML 解决方案进行分类、比较和分析。
{"title":"Empowering UAV Communications with AI-Assisted Software-Defined Networks: A Review on Performance, Security, and Efficiency","authors":"Mohamed Amine Ould Rabah, Hamza Drid, Mohamed Rahouti, Nadjib Lazaar","doi":"10.1007/s10922-024-09866-0","DOIUrl":"https://doi.org/10.1007/s10922-024-09866-0","url":null,"abstract":"<p>Intelligent software-defined network (SDN) in unmanned aerial vehicles (UAVs) is an emerging research area to enhance UAV communication networks’ performance, security, and efficiency. By incorporating artificial intelligence (AI) and machine learning (ML) algorithms, SDN-based UAV networks enable real-time decision-making, proactive network management, and dynamic resource allocation. These advancements improve network performance, reduce latency, and enhance network efficiency. Moreover, AI-based security mechanisms can swiftly detect and mitigate potential threats, bolstering UAV networks’ overall security. Integrating intelligent SDN in UAVs holds tremendous potential for revolutionizing the UAV communication and networking field. This paper comprehensively discusses the solutions available for UAV-based intelligent SDNs. It provides an in-depth exploration of UAVs and SDNs and presents a comprehensive analysis of the evolution from traditional networking environments to UAV-based SDN environments. Our research primarily focuses on UAV communication’s performance, security, latency, and efficiency. It includes a taxonomy, comparison, and analysis of existing ML solutions specifically designed for UAV-based SDNs.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis XAITrafficIntell:用于暗网流量分析的可解读网络威胁情报
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1007/s10922-024-09842-8
Dincy R. Arikkat, P. Vinod, K. A. Rafidha Rehiman, Rabeeba Abdul Rasheed, Mauro Conti

Network traffic analysis is essential for enhancing network security and management. Integrating Machine Learning and Explainable Artificial Intelligence (XAI) offers a promising avenue for exploring darknet traffic. XAI’s integration into security domains paves the way to enriching our understanding of network traffic patterns and extracting valuable insights for security purposes. This investigation delves into the intricacies of darknet traffic classification by analyzing the datasets ISCXTor2016 and CIC-Darknet2020. By employing XAI techniques, we identify the most crucial features for accurate network traffic categorization. We conduct an in-depth analysis of darknet traffic models by utilizing explainable tools such as SHAP, LIME, Permutation Importance, and Counterfactual Explanations. Our experimental results highlight Protocol as the crucial factor in the ISXCTor2016 traffic classification, Source Port in the ISCXTor2016 application identification, and IdleMax in the CIC-Darknet2020 traffic classification. Additionally, our analysis encompassed the extraction of Cyber Threat Intelligence from the IP addresses within the network traffic. We explored the prevalent malware types and discerned specific targeted countries. Furthermore, a comprehensive exploration was conducted on the sophisticated attack techniques employed by adversaries. Our analysis identified T1071 as a frequently employed attack technique in which adversaries utilize OSI application layer protocols to communicate, strategically evading detection and network filtering measures.

网络流量分析对于加强网络安全和管理至关重要。整合机器学习和可解释人工智能(XAI)为探索暗网流量提供了一条大有可为的途径。XAI 与安全领域的整合为丰富我们对网络流量模式的理解以及为安全目的提取有价值的见解铺平了道路。本研究通过分析 ISCXTor2016 和 CIC-Darknet2020 数据集,深入探讨了暗网流量分类的复杂性。通过采用 XAI 技术,我们确定了准确进行网络流量分类的最关键特征。我们利用 SHAP、LIME、Permutation Importance 和 Counterfactual Explanations 等可解释工具对暗网流量模型进行了深入分析。实验结果表明,在 ISXCTor2016 流量分类中,协议是关键因素;在 ISCXTor2016 应用识别中,源端口是关键因素;在 CIC-Darknet2020 流量分类中,IdleMax 是关键因素。此外,我们的分析还包括从网络流量的 IP 地址中提取网络威胁情报。我们探索了流行的恶意软件类型,并发现了特定的目标国家。此外,我们还对对手采用的复杂攻击技术进行了全面探索。我们的分析发现,T1071 是一种经常使用的攻击技术,在这种技术中,对手利用 OSI 应用层协议进行通信,战略性地躲避检测和网络过滤措施。
{"title":"XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis","authors":"Dincy R. Arikkat, P. Vinod, K. A. Rafidha Rehiman, Rabeeba Abdul Rasheed, Mauro Conti","doi":"10.1007/s10922-024-09842-8","DOIUrl":"https://doi.org/10.1007/s10922-024-09842-8","url":null,"abstract":"<p>Network traffic analysis is essential for enhancing network security and management. Integrating Machine Learning and Explainable Artificial Intelligence (XAI) offers a promising avenue for exploring darknet traffic. XAI’s integration into security domains paves the way to enriching our understanding of network traffic patterns and extracting valuable insights for security purposes. This investigation delves into the intricacies of darknet traffic classification by analyzing the datasets ISCXTor2016 and CIC-Darknet2020. By employing XAI techniques, we identify the most crucial features for accurate network traffic categorization. We conduct an in-depth analysis of darknet traffic models by utilizing explainable tools such as SHAP, LIME, Permutation Importance, and Counterfactual Explanations. Our experimental results highlight <i>Protocol</i> as the crucial factor in the ISXCTor2016 traffic classification, <i>Source Port</i> in the ISCXTor2016 application identification, and <i>IdleMax</i> in the CIC-Darknet2020 traffic classification. Additionally, our analysis encompassed the extraction of Cyber Threat Intelligence from the IP addresses within the network traffic. We explored the prevalent malware types and discerned specific targeted countries. Furthermore, a comprehensive exploration was conducted on the sophisticated attack techniques employed by adversaries. Our analysis identified T1071 as a frequently employed attack technique in which adversaries utilize OSI application layer protocols to communicate, strategically evading detection and network filtering measures.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Microservice Provisioning in 5G Networks Using Edge–Cloud Continuum 利用边缘-云连续性在 5G 网络中动态提供微服务
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1007/s10922-024-09859-z
Priyal Thakkar, Ashish Singh Patel, Gaurav Shukla, Arzad Alam Kherani, Brejesh Lall

With the advent of 5G and beyond, the mobile network operator is integrated with edge computing capabilities along with the cloud. This paradigm requires the application at UE to consist of multiple microservices that are appropriately placed at the edge/cloud with dynamic relocation to enhance the overall Quality of Service (QoS) of the application. In this work, a Microservice-Scheduler is developed to dynamically relocate an application’s microservices between the edge and cloud server. The relocation decision is based on the CPU utilization of the edge server. The developed Microservice-Scheduler is integrated in ETSI compliant 5G testbed. The deployment is evaluated by analyzing the different scenarios obtained while monitoring the completion time of the microservices. It is observed that in the majority of scenarios, relocating microservices between the edge and cloud server outperforms the edge-only and cloud-only approaches. In addition, the dynamic relocation mechanism aids in better utilization of the resources while enhancing the overall QoS of the application’s microservices.

随着 5G 及更先进技术的出现,移动网络运营商将边缘计算能力与云相结合。这种模式要求 UE 上的应用由多个微服务组成,这些微服务被适当地放置在边缘/云上,并进行动态重新定位,以提高应用的整体服务质量(QoS)。在这项工作中,开发了一种微服务调度程序,用于在边缘和云服务器之间动态重新定位应用程序的微服务。迁移决策基于边缘服务器的 CPU 利用率。开发的微服务调度程序集成在符合 ETSI 标准的 5G 测试平台中。通过分析监测微服务完成时间时获得的不同场景,对部署进行了评估。据观察,在大多数场景中,在边缘和云服务器之间重新定位微服务的效果优于仅在边缘和仅在云的方法。此外,动态重新定位机制有助于更好地利用资源,同时提高应用程序微服务的整体服务质量。
{"title":"Dynamic Microservice Provisioning in 5G Networks Using Edge–Cloud Continuum","authors":"Priyal Thakkar, Ashish Singh Patel, Gaurav Shukla, Arzad Alam Kherani, Brejesh Lall","doi":"10.1007/s10922-024-09859-z","DOIUrl":"https://doi.org/10.1007/s10922-024-09859-z","url":null,"abstract":"<p>With the advent of 5G and beyond, the mobile network operator is integrated with edge computing capabilities along with the cloud. This paradigm requires the application at UE to consist of multiple microservices that are appropriately placed at the edge/cloud with dynamic relocation to enhance the overall Quality of Service (QoS) of the application. In this work, a <i>Microservice-Scheduler</i> is developed to dynamically relocate an application’s microservices between the edge and cloud server. The relocation decision is based on the CPU utilization of the edge server. The developed <i>Microservice-Scheduler</i> is integrated in ETSI compliant 5G testbed. The deployment is evaluated by analyzing the different scenarios obtained while monitoring the completion time of the microservices. It is observed that in the majority of scenarios, relocating microservices between the edge and cloud server outperforms the edge-only and cloud-only approaches. In addition, the dynamic relocation mechanism aids in better utilization of the resources while enhancing the overall QoS of the application’s microservices.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Intelligent Decision Making for Charging Scheduling in Rechargeable Wireless Sensor Networks 实现可充电无线传感器网络充电调度的智能决策
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1007/s10922-024-09861-5
Abhinav Tomar, Raj Anwit, Piyush Nawnath Raut, Gaurav Singal

Wireless energy transfer (WET) technology has been proven to mitigate the energy shortage challenge faced by the Internet of Things (IoT), which encompasses sensor networks. Exploiting a Mobile Charger (MC) to energize critical sensors provides a new dimension to maintain continual network operations. Still, existing solutions are not robust as they suffer from high charging delays at the sensor end due to inefficient scheduling. Moreover, charging efficiency is degraded in those schemes due to fixed charging thresholds and ignoring scheduling feasibility conditions. Thus, intelligent scheduling for an MC is needed based on decision-making through multiple network performance-affecting attributes, but blending multiple attributes together for wise scheduling decision-making remains challenging, which is overlooked in previous research. Fortunately, Multi-Criteria Decision Making (MCDM) is best-fit herein for considering numerous attributes and picking the most suitable sensor node to charge next. To this end, we have proposed solving the scheduling problem by combining two MCDM techniques, i.e., Combinative Distance Based Assessment (CODAS) and the Best Worst Method (BWM). The attributes used for the decision are the distance to MC, energy consumption rate, the remaining energy of nodes, and neighborhood criticality. The relative weights of all considered network attributes are calculated by BWM, which is followed by CODAS to select the most appropriate node to be charged next. To make the scheme more realistic and practical in time-critical applications, the dynamic threshold of nodes is calculated along with formulation scheduling feasibility conditions. Simulation results demonstrate the efficiency of the proposed scheme over the competing approaches on various performance parameters.

事实证明,无线能量传输技术(WET)可以缓解包括传感器网络在内的物联网(IoT)所面临的能源短缺挑战。利用移动充电器(MC)为关键传感器供电为维持网络的持续运行提供了一个新的维度。然而,现有的解决方案并不强大,因为它们在传感器端会因调度效率低下而导致充电延迟。此外,由于固定充电阈值和忽略调度可行性条件,这些方案的充电效率也会降低。因此,需要通过多个影响网络性能的属性来决策 MC 的智能调度,但将多个属性融合在一起进行明智的调度决策仍具有挑战性,这一点在以往的研究中被忽视了。幸运的是,多标准决策(MCDM)是考虑多种属性并选择下一个最适合充电的传感器节点的最佳方法。为此,我们建议结合两种 MCDM 技术(即基于距离的组合评估 (CODAS) 和最佳最差法 (BWM))来解决调度问题。用于决策的属性包括到 MC 的距离、能耗率、节点剩余能量和邻域临界度。BWM 计算所有考虑过的网络属性的相对权重,然后用 CODAS 选择最合适的节点进行下一步充电。为了使该方案在时间紧迫的应用中更加现实和实用,在计算节点动态阈值的同时,还制定了调度可行性条件。仿真结果表明,在各种性能参数上,拟议方案的效率优于其他竞争方案。
{"title":"Towards Intelligent Decision Making for Charging Scheduling in Rechargeable Wireless Sensor Networks","authors":"Abhinav Tomar, Raj Anwit, Piyush Nawnath Raut, Gaurav Singal","doi":"10.1007/s10922-024-09861-5","DOIUrl":"https://doi.org/10.1007/s10922-024-09861-5","url":null,"abstract":"<p>Wireless energy transfer (WET) technology has been proven to mitigate the energy shortage challenge faced by the Internet of Things (IoT), which encompasses sensor networks. Exploiting a Mobile Charger (MC) to energize critical sensors provides a new dimension to maintain continual network operations. Still, existing solutions are not robust as they suffer from high charging delays at the sensor end due to inefficient scheduling. Moreover, charging efficiency is degraded in those schemes due to fixed charging thresholds and ignoring scheduling feasibility conditions. Thus, intelligent scheduling for an MC is needed based on decision-making through multiple network performance-affecting attributes, but blending multiple attributes together for wise scheduling decision-making remains challenging, which is overlooked in previous research. Fortunately, Multi-Criteria Decision Making (MCDM) is best-fit herein for considering numerous attributes and picking the most suitable sensor node to charge next. To this end, we have proposed solving the scheduling problem by combining two MCDM techniques, i.e., Combinative Distance Based Assessment (CODAS) and the Best Worst Method (BWM). The attributes used for the decision are the distance to MC, energy consumption rate, the remaining energy of nodes, and neighborhood criticality. The relative weights of all considered network attributes are calculated by BWM, which is followed by CODAS to select the most appropriate node to be charged next. To make the scheme more realistic and practical in time-critical applications, the dynamic threshold of nodes is calculated along with formulation scheduling feasibility conditions. Simulation results demonstrate the efficiency of the proposed scheme over the competing approaches on various performance parameters.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142216630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Systems Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1