首页 > 最新文献

Journal of Network and Systems Management最新文献

英文 中文
Distributed AgriFood Supply Chains 分布式农业食品供应链
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1007/s10922-024-09839-3
Hélio Pesanhane, Wesley R. Bezerra, Fernando Koch, Carlos Westphall

In Agrifood scenarios, where farmers need to ensure that their produce is safely produced, transported, and stored, they rely on a network of IoT devices to monitor conditions such as temperature and humidity throughout the supply chain. However, managing this large-scale IoT environment poses significant challenges, including transparency, traceability, data tampering, and accountability. Blockchain is portrayed as a technology capable of solving the problems of transparency, traceability, data tampering, and accountability, which are key issues in the AgriFood supply chain. Nonetheless, there are challenges related to managing a large-scale IoT environment using the current security, authentication, and access control solutions. To address these issues, we introduce an architecture in which IoT devices record data and store them in the participant’s cloud after validation by endorsing peers following an attribute-based access control (ABAC) policy. This policy allows IoT device owners to specify the physical quantities, value ranges, time periods, and types of data that each device is permitted to measure and transmit. Authorized users can access this data under the ABAC policy contract. Our solution demonstrates efficiency, with 50% of IoT data write requests completed in less than 0.14 s using solo ordering service and 2.5 s with raft ordering service. Data retrieval shows an average latency between 0.34 and 0.57 s and a throughput ranging from 124.8 to 9.9 Transactions Per Second (TPS) for data sizes between 8 and 512 kilobytes. This architecture not only enhances the management of IoT environments in the AgriFood supply chain but also ensures data privacy and security.

在农业食品场景中,农民需要确保农产品的安全生产、运输和储存,他们依靠物联网设备网络来监控整个供应链中的温度和湿度等条件。然而,管理这种大规模物联网环境带来了巨大挑战,包括透明度、可追溯性、数据篡改和问责制。区块链被认为是一种能够解决透明度、可追溯性、数据篡改和问责制等问题的技术,这些都是农业食品供应链中的关键问题。尽管如此,使用当前的安全、身份验证和访问控制解决方案管理大规模物联网环境仍面临挑战。为了解决这些问题,我们引入了一种架构,在这种架构中,物联网设备会记录数据,并按照基于属性的访问控制(ABAC)策略由认可的同行验证后将数据存储在参与者的云中。该策略允许物联网设备所有者指定允许每个设备测量和传输的物理量、值范围、时间段和数据类型。授权用户可根据 ABAC 政策合同访问这些数据。我们的解决方案体现了高效性,使用单独订购服务,50% 的物联网数据写入请求可在 0.14 秒内完成;使用筏式订购服务,则可在 2.5 秒内完成。数据检索的平均延迟时间在 0.34 至 0.57 秒之间,吞吐量在 124.8 至 9.9 次/秒(TPS)之间,数据大小在 8 至 512 千字节之间。这种架构不仅加强了农业食品供应链中物联网环境的管理,还确保了数据的隐私和安全。
{"title":"Distributed AgriFood Supply Chains","authors":"Hélio Pesanhane, Wesley R. Bezerra, Fernando Koch, Carlos Westphall","doi":"10.1007/s10922-024-09839-3","DOIUrl":"https://doi.org/10.1007/s10922-024-09839-3","url":null,"abstract":"<p>In Agrifood scenarios, where farmers need to ensure that their produce is safely produced, transported, and stored, they rely on a network of IoT devices to monitor conditions such as temperature and humidity throughout the supply chain. However, managing this large-scale IoT environment poses significant challenges, including transparency, traceability, data tampering, and accountability. Blockchain is portrayed as a technology capable of solving the problems of transparency, traceability, data tampering, and accountability, which are key issues in the AgriFood supply chain. Nonetheless, there are challenges related to managing a large-scale IoT environment using the current security, authentication, and access control solutions. To address these issues, we introduce an architecture in which IoT devices record data and store them in the participant’s cloud after validation by endorsing peers following an attribute-based access control (ABAC) policy. This policy allows IoT device owners to specify the physical quantities, value ranges, time periods, and types of data that each device is permitted to measure and transmit. Authorized users can access this data under the ABAC policy contract. Our solution demonstrates efficiency, with 50% of IoT data write requests completed in less than 0.14 s using solo ordering service and 2.5 s with raft ordering service. Data retrieval shows an average latency between 0.34 and 0.57 s and a throughput ranging from 124.8 to 9.9 Transactions Per Second (TPS) for data sizes between 8 and 512 kilobytes. This architecture not only enhances the management of IoT environments in the AgriFood supply chain but also ensures data privacy and security.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing BERT-Based Language Model for Multi-label Vulnerability Detection of Smart Contract in Blockchain 为区块链智能合约的多标签漏洞检测增强基于 BERT 的语言模型
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-24 DOI: 10.1007/s10922-024-09832-w
Van Tong, Cuong Dao, Hai-Anh Tran, Truong X. Tran, Sami Souihi

Smart contracts are decentralized applications that hold a pivotal role in blockchain-based systems. Smart contracts are composed of error-prone programming languages, so it is affected by many vulnerabilities (e.g., time dependence, outdated version, etc.), which can result in a substantial economic loss within the blockchain ecosystem. Therefore, many vulnerability detection tools are designed to detect the vulnerabilities in smart contracts such as Slither, Mythrill and so forth. However, these tools require high processing time and cannot achieve good accuracy with complex smart contracts nowadays. Consequently, many studies have shifted towards using Deep Learning (DL) techniques, which consider bytecode to determine vulnerabilities in smart contracts. However, these mechanisms reveal three main limitations. First, these mechanisms focus on multi-class problems, assuming that a given smart contract contains only a single vulnerability while the smart contract can contain more than one vulnerability. Second, these approaches encounter ineffective word embedding with large input sequences. Third, the learning model in these mechanisms is forced to classify into one of pre-defined labels even when it cannot make decisions accurately, leading to misclassifications. Therefore, in this paper, we propose a multi-label vulnerability classification mechanism using a language model. To deal with the ineffective word embedding, the proposed mechanism not only takes into account the implicit features derived from the language models (e.g., SecBERT, etc.) but also auxiliary features extracted from other word embedding techniques (e.g., TF-IDF, etc.). Besides, a trustworthy neural network model is proposed to reduce the misclassification rate of vulnerability classification. In detail, an additional neuron is added to the output of the model to indicate whether the model is able to make decisions accurately or not. The experimental results illustrate that the trustworthy model outperforms benchmarks (e.g., binary relevance, label powerset, classifier chain, etc.), achieving up to approximately 98% f1-score while requiring low execution time with 26 ms.

智能合约是去中心化的应用程序,在基于区块链的系统中占有举足轻重的地位。智能合约由容易出错的编程语言组成,因此会受到许多漏洞(如时间依赖性、版本过时等)的影响,从而在区块链生态系统中造成巨大的经济损失。因此,许多漏洞检测工具被设计用来检测智能合约中的漏洞,如 Slither、Mythrill 等。然而,这些工具需要很高的处理时间,而且对于现在复杂的智能合约无法达到很好的准确性。因此,许多研究转向使用深度学习(DL)技术,即考虑字节码来确定智能合约中的漏洞。然而,这些机制有三大局限性。首先,这些机制侧重于多类问题,假设给定的智能合约只包含一个漏洞,而智能合约可能包含不止一个漏洞。其次,这些方法在处理大量输入序列时会遇到词嵌入效果不佳的问题。第三,这些机制中的学习模型即使在无法做出准确决策的情况下,也会被迫分类到预先定义的标签中,从而导致错误分类。因此,本文提出了一种使用语言模型的多标签漏洞分类机制。为了应对无效的词嵌入,本文提出的机制不仅考虑了从语言模型(如 SecBERT 等)中提取的隐含特征,还考虑了从其他词嵌入技术(如 TF-IDF 等)中提取的辅助特征。此外,还提出了一种可信神经网络模型,以降低漏洞分类的误判率。具体来说,在模型的输出中添加了一个额外的神经元,以指示模型是否能做出准确的决策。实验结果表明,可信模型的性能优于基准(如二元相关性、标签权集、分类器链等),f1-分数高达约 98%,而执行时间仅需 26 毫秒。
{"title":"Enhancing BERT-Based Language Model for Multi-label Vulnerability Detection of Smart Contract in Blockchain","authors":"Van Tong, Cuong Dao, Hai-Anh Tran, Truong X. Tran, Sami Souihi","doi":"10.1007/s10922-024-09832-w","DOIUrl":"https://doi.org/10.1007/s10922-024-09832-w","url":null,"abstract":"<p>Smart contracts are decentralized applications that hold a pivotal role in blockchain-based systems. Smart contracts are composed of error-prone programming languages, so it is affected by many vulnerabilities (e.g., time dependence, outdated version, etc.), which can result in a substantial economic loss within the blockchain ecosystem. Therefore, many vulnerability detection tools are designed to detect the vulnerabilities in smart contracts such as Slither, Mythrill and so forth. However, these tools require high processing time and cannot achieve good accuracy with complex smart contracts nowadays. Consequently, many studies have shifted towards using Deep Learning (DL) techniques, which consider bytecode to determine vulnerabilities in smart contracts. However, these mechanisms reveal three main limitations. First, these mechanisms focus on multi-class problems, assuming that a given smart contract contains only a single vulnerability while the smart contract can contain more than one vulnerability. Second, these approaches encounter ineffective word embedding with large input sequences. Third, the learning model in these mechanisms is forced to classify into one of pre-defined labels even when it cannot make decisions accurately, leading to misclassifications. Therefore, in this paper, we propose a multi-label vulnerability classification mechanism using a language model. To deal with the ineffective word embedding, the proposed mechanism not only takes into account the implicit features derived from the language models (e.g., SecBERT, etc.) but also auxiliary features extracted from other word embedding techniques (e.g., TF-IDF, etc.). Besides, a trustworthy neural network model is proposed to reduce the misclassification rate of vulnerability classification. In detail, an additional neuron is added to the output of the model to indicate whether the model is able to make decisions accurately or not. The experimental results illustrate that the trustworthy model outperforms benchmarks (e.g., binary relevance, label powerset, classifier chain, etc.), achieving up to approximately 98% f1-score while requiring low execution time with 26 ms.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS-aided Cooperative FD-SWIPT-NOMA Performance Over Nakagami-m Channels 中上-m 信道上的 RIS 辅助合作 FD-SWIPT-NOMA 性能
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-19 DOI: 10.1007/s10922-024-09838-4
Wilson de Souza, Taufik Abrão

In this work, we investigate Reconfigurable Intelligent Surface (RIS)-aided Full-Duplex (FD)-Simultaneous Wireless Information Power Transfer (SWIPT)-Cooperative non-Orthogonal Multiple Access (C-NOMA) consisting of two paired devices. The device with better channel conditions ((D_1)) is designated to act as a FD relay to assist the device with poor channel conditions ((D_2)). We assume that (D_1) does not use its own battery energy to cooperate but harvests energy by utilizing SWIPT. A practical non-linear Energy Harvesting (EH) model is considered. We first approximate the harvested power as a Gamma Random Variable (RV) via the Moment Matching (MM) technique. This allows us to derive analytical expressions for Outage Probability (OP) and ergodic rate (ER) that are simple to compute yet accurate for a wide range of system parameters, such as EH coefficients and residual Self-Interference (SI) levels, being extensively validated by numerical simulations. The OP and ER expressions reveal how important it is to mitigate the SI in the FD relay mode since, for reasonable values of residual SI coefficient, its detrimental effect on the system performance, is extremely noticeable. Also, numerical results reveal that increasing the number of RIS elements can benefit the cooperative system much more than the non-cooperative one.

在这项工作中,我们研究了由两个配对设备组成的可重构智能表面(RIS)辅助全双工(FD)-同步无线信息功率传输(SWIPT)-合作非正交多址(C-NOMA)。信道条件较好的设备((D_1))被指定为 FD 中继器,协助信道条件较差的设备((D_2))。我们假设 (D_1) 不使用自己的电池能量进行合作,而是利用 SWIPT 收集能量。我们考虑了一个实用的非线性能量收集(EH)模型。我们首先通过矩匹配(Moment Matching,MM)技术将收获的能量近似为伽马随机变量(Ramma Random Variable,RV)。这样,我们就能推导出停电概率 (OP) 和遍历率 (ER) 的分析表达式,这些表达式易于计算,但对于 EH 系数和残余自干扰 (SI) 水平等各种系统参数而言却非常精确,并通过数值模拟进行了广泛验证。OP 和 ER 表达式揭示了在 FD 中继模式下减轻 SI 的重要性,因为对于合理的残余 SI 系数值,其对系统性能的不利影响极为明显。此外,数值结果表明,增加 RIS 单元的数量对合作系统的益处远远大于非合作系统。
{"title":"RIS-aided Cooperative FD-SWIPT-NOMA Performance Over Nakagami-m Channels","authors":"Wilson de Souza, Taufik Abrão","doi":"10.1007/s10922-024-09838-4","DOIUrl":"https://doi.org/10.1007/s10922-024-09838-4","url":null,"abstract":"<p>In this work, we investigate Reconfigurable Intelligent Surface (RIS)-aided Full-Duplex (FD)-Simultaneous Wireless Information Power Transfer (SWIPT)-Cooperative non-Orthogonal Multiple Access (C-NOMA) consisting of two paired devices. The device with better channel conditions (<span>(D_1)</span>) is designated to act as a FD relay to assist the device with poor channel conditions (<span>(D_2)</span>). We assume that <span>(D_1)</span> does not use its own battery energy to cooperate but harvests energy by utilizing SWIPT. A practical non-linear Energy Harvesting (EH) model is considered. We first approximate the harvested power as a Gamma Random Variable (RV) via the Moment Matching (MM) technique. This allows us to derive analytical expressions for Outage Probability (OP) and ergodic rate (ER) that are simple to compute yet accurate for a wide range of system parameters, such as EH coefficients and residual Self-Interference (SI) levels, being extensively validated by numerical simulations. The OP and ER expressions reveal how important it is to mitigate the SI in the FD relay mode since, for reasonable values of residual SI coefficient, its detrimental effect on the system performance, is extremely noticeable. Also, numerical results reveal that increasing the number of RIS elements can benefit the cooperative system much more than the non-cooperative one.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches 面向 SDN 交换机的高效流量表缓存架构和替换策略
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-18 DOI: 10.1007/s10922-024-09824-w
Xianfeng Li, Haoran Sun, Yan Huang

Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding, the rules in the flow table should reside in the forwarding plane as much as possible to reduce the chances of consulting the SDN controller, which is a slow process. The rules are usually cached in the forwarding plane with a Ternary Content Addressable Memory (TCAM) device. However, a TCAM has limited capacity, because it is expensive and power-hungry. As a result, wise caching of a subset of flow rules in TCAM is needed. In this paper, we address two related issues that affect caching efficiency: rules to be cached and rules to be replaced. For the first issue, caching an active rule hit by a flow may need to cache inactive rules due to rule dependency. We propose a two-stage caching architecture called CRAFT, which reduces inactive rules in cache by cutting down long dependent chains and by partitioning rules with massive dependent rules into non-overlapping sub-rules. For the second issue, unawareness of the flow traffic characteristics may evict heavy hitters instead of mice flows. We propose RRTC to address this issue, which is a rule replacement policy taking the real-time network traffic characteristics into consideration. By recognizing the heavy hitters and protecting their matching rules in TCAM, RRTC performs better than least recently used(LRU) policy in terms of cache hit ratio. Simulation results show that our combined rule caching and replacement framework outperforms previous work considerably.

软件定义网络(SDN)依靠流量表来转发来自不同策略的不同流量的数据包。为加快数据包转发速度,流表中的规则应尽可能位于转发平面内,以减少向 SDN 控制器咨询的机会,而这是一个缓慢的过程。规则通常通过三元内容可寻址存储器(TCAM)设备缓存在转发平面中。但是,TCAM 的容量有限,因为它既昂贵又耗电。因此,需要在 TCAM 中明智地缓存流量规则子集。在本文中,我们将讨论影响缓存效率的两个相关问题:需要缓存的规则和需要替换的规则。对于第一个问题,由于规则的依赖性,缓存流量命中的活动规则可能需要缓存非活动规则。我们提出了一种名为 CRAFT 的两阶段缓存架构,该架构通过削减冗长的依赖链,以及将具有大量依赖规则的规则划分为不重叠的子规则,来减少缓存中的非活动规则。第二个问题是,不了解流量特征可能会驱逐大流量而不是小流量。针对这一问题,我们提出了 RRTC,这是一种考虑到实时网络流量特征的规则替换策略。通过识别重灾区并保护其在 TCAM 中的匹配规则,RRTC 在缓存命中率方面比最近最少使用(LRU)策略表现更好。仿真结果表明,我们的规则缓存和替换组合框架大大优于之前的工作。
{"title":"Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches","authors":"Xianfeng Li, Haoran Sun, Yan Huang","doi":"10.1007/s10922-024-09824-w","DOIUrl":"https://doi.org/10.1007/s10922-024-09824-w","url":null,"abstract":"<p>Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding, the rules in the flow table should reside in the forwarding plane as much as possible to reduce the chances of consulting the SDN controller, which is a slow process. The rules are usually cached in the forwarding plane with a Ternary Content Addressable Memory (TCAM) device. However, a TCAM has limited capacity, because it is expensive and power-hungry. As a result, wise caching of a subset of flow rules in TCAM is needed. In this paper, we address two related issues that affect caching efficiency: <i>rules to be cached</i> and <i>rules to be replaced</i>. For the first issue, caching an active rule hit by a flow may need to cache inactive rules due to rule dependency. We propose a two-stage caching architecture called CRAFT, which reduces inactive rules in cache by cutting down long dependent chains and by partitioning rules with massive dependent rules into non-overlapping sub-rules. For the second issue, unawareness of the flow traffic characteristics may evict heavy hitters instead of mice flows. We propose RRTC to address this issue, which is a rule replacement policy taking the real-time network traffic characteristics into consideration. By recognizing the heavy hitters and protecting their matching rules in TCAM, RRTC performs better than least recently used(LRU) policy in terms of cache hit ratio. Simulation results show that our combined rule caching and replacement framework outperforms previous work considerably.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multiobjective Metaheuristic-Based Container Consolidation Model for Cloud Application Performance Improvement 基于多目标元搜索的容器整合模型,用于提高云应用性能
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-18 DOI: 10.1007/s10922-024-09835-7
Vincent Bracke, José Santos, Tim Wauters, Filip De Turck, Bruno Volckaert

This work describes an approach to enhance container orchestration platforms with an autonomous and dynamic rescheduling system that aims at improving application service time by co-locating highly interdependent containers for network delay reduction. Unreasonable container consolidation may however lead to host CPU saturation, in turn impairing the service time. The multiobjective approach proposed in this work aims to improve application service-time by minimizing both inter-server network traffic and CPU throttling on overloaded servers. To this extent, the Simulated Annealing combinatorial optimization heuristic is used and compared on its relative performance towards the optimal solution obtained by Mathematical Programming. Additionally, the impact of the proposed system is validated on a Kubernetes cluster hosting three concurrent applications, and this under varying load scenarios. The proposed rescheduling system systematically i) improves the application service-time (up to 27.2% from our experiments) and ii) surpasses the improvement reached by the Kubernetes descheduler.

这项工作描述了一种利用自主动态重新安排系统来增强容器编排平台的方法,该系统旨在通过将高度相互依赖的容器放在一起以减少网络延迟,从而改善应用程序的服务时间。然而,不合理的容器合并可能会导致主机 CPU 饱和,进而影响服务时间。本研究提出的多目标方法旨在通过最大限度地减少服务器之间的网络流量和过载服务器的 CPU 节流来改善应用程序的服务时间。为此,我们使用了模拟退火组合优化启发式,并比较了它与数学编程获得的最优解之间的相对性能。此外,在不同的负载情况下,对托管三个并发应用程序的 Kubernetes 集群验证了所提系统的影响。建议的重新调度系统 i) 显著改善了应用服务时间(实验结果高达 27.2%),ii) 超越了 Kubernetes 调度器的改善效果。
{"title":"A Multiobjective Metaheuristic-Based Container Consolidation Model for Cloud Application Performance Improvement","authors":"Vincent Bracke, José Santos, Tim Wauters, Filip De Turck, Bruno Volckaert","doi":"10.1007/s10922-024-09835-7","DOIUrl":"https://doi.org/10.1007/s10922-024-09835-7","url":null,"abstract":"<p>This work describes an approach to enhance container orchestration platforms with an autonomous and dynamic rescheduling system that aims at improving application service time by co-locating highly interdependent containers for network delay reduction. Unreasonable container consolidation may however lead to host CPU saturation, in turn impairing the service time. The multiobjective approach proposed in this work aims to improve application service-time by minimizing both inter-server network traffic and CPU throttling on overloaded servers. To this extent, the Simulated Annealing combinatorial optimization heuristic is used and compared on its relative performance towards the optimal solution obtained by Mathematical Programming. Additionally, the impact of the proposed system is validated on a Kubernetes cluster hosting three concurrent applications, and this under varying load scenarios. The proposed rescheduling system systematically i) improves the application service-time (up to 27.2% from our experiments) and ii) surpasses the improvement reached by the Kubernetes descheduler.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Benchmarking Large Language Models for Log Analysis, Security, and Interpretation 为日志分析、安全和解释建立大型语言模型基准
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-13 DOI: 10.1007/s10922-024-09831-x
Egil Karlsen, Xiao Luo, Nur Zincir-Heywood, Malcolm Heywood

Large Language Models (LLM) continue to demonstrate their utility in a variety of emergent capabilities in different fields. An area that could benefit from effective language understanding in cybersecurity is the analysis of log files. This work explores LLMs with different architectures (BERT, RoBERTa, DistilRoBERTa, GPT-2, and GPT-Neo) that are benchmarked for their capacity to better analyze application and system log files for security. Specifically, 60 fine-tuned language models for log analysis are deployed and benchmarked. The resulting models demonstrate that they can be used to perform log analysis effectively with fine-tuning being particularly important for appropriate domain adaptation to specific log types. The best-performing fine-tuned sequence classification model (DistilRoBERTa) outperforms the current state-of-the-art; with an average F1-Score of 0.998 across six datasets from both web application and system log sources. To achieve this, we propose and implement a new experimentation pipeline (LLM4Sec) which leverages LLMs for log analysis experimentation, evaluation, and analysis.

大型语言模型(LLM)在不同领域的各种新兴功能中不断显示出其实用性。在网络安全领域,日志文件分析是一个可以从有效的语言理解中受益的领域。这项工作探索了具有不同架构(BERT、RoBERTa、DistilRoBERTa、GPT-2 和 GPT-Neo)的 LLM,并对其能力进行了基准测试,以更好地分析应用程序和系统日志文件的安全性。具体来说,我们部署了 60 个用于日志分析的微调语言模型,并对其进行了基准测试。结果表明,这些模型可用于有效地执行日志分析,而微调对于特定日志类型的适当领域适应性尤为重要。性能最佳的微调序列分类模型(DistilRoBERTa)优于目前最先进的模型;在来自网络应用程序和系统日志源的六个数据集中,平均 F1 分数为 0.998。为此,我们提出并实施了一个新的实验管道(LLM4Sec),利用 LLM 进行日志分析实验、评估和分析。
{"title":"Benchmarking Large Language Models for Log Analysis, Security, and Interpretation","authors":"Egil Karlsen, Xiao Luo, Nur Zincir-Heywood, Malcolm Heywood","doi":"10.1007/s10922-024-09831-x","DOIUrl":"https://doi.org/10.1007/s10922-024-09831-x","url":null,"abstract":"<p>Large Language Models (LLM) continue to demonstrate their utility in a variety of emergent capabilities in different fields. An area that could benefit from effective language understanding in cybersecurity is the analysis of log files. This work explores LLMs with different architectures (BERT, RoBERTa, DistilRoBERTa, GPT-2, and GPT-Neo) that are benchmarked for their capacity to better analyze application and system log files for security. Specifically, 60 fine-tuned language models for log analysis are deployed and benchmarked. The resulting models demonstrate that they can be used to perform log analysis effectively with fine-tuning being particularly important for appropriate domain adaptation to specific log types. The best-performing fine-tuned sequence classification model (DistilRoBERTa) outperforms the current state-of-the-art; with an average F1-Score of 0.998 across six datasets from both web application and system log sources. To achieve this, we propose and implement a new experimentation pipeline (LLM4Sec) which leverages LLMs for log analysis experimentation, evaluation, and analysis.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution 基于离线和实时策略的虚拟化服务管理:冲突和冗余检测以及自动解决方案
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-12 DOI: 10.1007/s10922-024-09830-y
Hanan Suwi, Nadjia Kara, Omar Abdel Wahab, Claes Edstrom, Yves Lemieux

Network Function Virtualization (NFV) is a new technology that allows service providers to improve the cost efficiency of network service provisioning. This is accomplished by decoupling the network functions from the physical environment within which they are deployed and converting them into software components that run on top of commodity hardware. Despite its importance, NFV encounters many challenges at the placement, resource management, and adaptation levels. For example, any placement strategy must take into account the minimization of several factors, including those of hardware resource utilization, network bandwidth and latency. Moreover, Virtual Network Functions (VNFs) should continuously be adjusted to keep up with the changes that occur at both the data center and user levels. Over the past few years several efforts have been made to come up with innovative placement, resource management, and readjustment policies. However, a problem arises when these policies exhibit some conflicts and/or redundancies with one another, since the policies are proposed by multiple sources (e.g., service providers, network administrators, NFV-orchestrators and customers). This constitutes a serious problem for the network service as a whole and has several negative impacts such as Service-Level Agreement (SLA) violations and performance degradation. Besides, as conflicts may occur among a set of policies, pairwise detection will not adequate. In this paper, we tackle this problem by defining a conflict and redundancy detection and an automated resolution mechanisms to identify and solve the issues within and between NFV policies. Finally, we integrate a real-time detection component into our solution to provide continuous and comprehensive conflict and redundancy resolution, as new policies are introduced. The experimental results show that the proposed policy detection and resolution tools could rapidly identify, detect and solve conflicts and redundancies among NFV policies and extremely fast than other frameworks. Furthermore, the results show that our solution is efficient even in scenarios that consist of more than 2000 policies. Moreover, our proposed detection mechanisms can detect and solve the conflicts and redundancies for various types of policies such as placement, scaling and migration.

网络功能虚拟化(NFV)是一种新技术,可使服务提供商提高网络服务供应的成本效率。实现这一目标的方法是将网络功能与其部署的物理环境分离,并将其转换为在商品硬件上运行的软件组件。尽管 NFV 非常重要,但它在部署、资源管理和适应性层面仍面临许多挑战。例如,任何部署策略都必须考虑到最大限度地减少若干因素,包括硬件资源利用率、网络带宽和延迟。此外,虚拟网络功能(VNF)应不断调整,以跟上数据中心和用户层面发生的变化。在过去几年中,人们已经做出了许多努力,提出了创新的放置、资源管理和重新调整策略。然而,由于这些策略是由多个来源(如服务提供商、网络管理员、NFV-协调器和客户)提出的,当这些策略相互之间出现一些冲突和/或冗余时,问题就出现了。这对整个网络服务来说是一个严重的问题,会产生一些负面影响,如违反服务等级协议(SLA)和性能下降。此外,由于一组策略之间可能会发生冲突,因此成对检测是不够的。在本文中,我们通过定义冲突和冗余检测以及自动解决机制来解决这一问题,从而识别并解决 NFV 策略内部和策略之间的问题。最后,我们在解决方案中集成了实时检测组件,以便在引入新策略时提供持续、全面的冲突和冗余解决方案。实验结果表明,所提出的策略检测和解决工具可以快速识别、检测和解决 NFV 策略之间的冲突和冗余问题,其速度比其他框架快得多。此外,实验结果表明,即使在包含 2000 多条策略的场景中,我们的解决方案也是高效的。此外,我们提出的检测机制可以检测和解决各种类型策略的冲突和冗余,如放置、扩展和迁移。
{"title":"Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution","authors":"Hanan Suwi, Nadjia Kara, Omar Abdel Wahab, Claes Edstrom, Yves Lemieux","doi":"10.1007/s10922-024-09830-y","DOIUrl":"https://doi.org/10.1007/s10922-024-09830-y","url":null,"abstract":"<p>Network Function Virtualization (NFV) is a new technology that allows service providers to improve the cost efficiency of network service provisioning. This is accomplished by decoupling the network functions from the physical environment within which they are deployed and converting them into software components that run on top of commodity hardware. Despite its importance, NFV encounters many challenges at the placement, resource management, and adaptation levels. For example, any placement strategy must take into account the minimization of several factors, including those of hardware resource utilization, network bandwidth and latency. Moreover, Virtual Network Functions (VNFs) should continuously be adjusted to keep up with the changes that occur at both the data center and user levels. Over the past few years several efforts have been made to come up with innovative placement, resource management, and readjustment policies. However, a problem arises when these policies exhibit some conflicts and/or redundancies with one another, since the policies are proposed by multiple sources (e.g., service providers, network administrators, NFV-orchestrators and customers). This constitutes a serious problem for the network service as a whole and has several negative impacts such as Service-Level Agreement (SLA) violations and performance degradation. Besides, as conflicts may occur among a set of policies, pairwise detection will not adequate. In this paper, we tackle this problem by defining a conflict and redundancy detection and an automated resolution mechanisms to identify and solve the issues within and between NFV policies. Finally, we integrate a real-time detection component into our solution to provide continuous and comprehensive conflict and redundancy resolution, as new policies are introduced. The experimental results show that the proposed policy detection and resolution tools could rapidly identify, detect and solve conflicts and redundancies among NFV policies and extremely fast than other frameworks. Furthermore, the results show that our solution is efficient even in scenarios that consist of more than 2000 policies. Moreover, our proposed detection mechanisms can detect and solve the conflicts and redundancies for various types of policies such as placement, scaling and migration.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Cloud Gaming QoE Estimation by Stacking Learning 通过堆叠学习增强云游戏 QoE 估算
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-12 DOI: 10.1007/s10922-024-09836-6
Daniel Soares, Marcos Carvalho, Daniel F. Macedo

The Cloud Gaming sector is burgeoning with an estimated annual growth of more than 50%, poised to reach a market value of $22 billion by 2030, and notably, GeForce Now, launched in 2020, reached 20 million users by August 2022. Cloud gaming presents cost-effective advantages for users and developers by eliminating hardware investments and game purchases, reducing development costs, and optimizing distribution efforts. However, it introduces challenges for network operators and providers, demanding low latency and substantial computational power. User satisfaction in cloud gaming depends on various factors, including game content, network type, and context, all shaping Quality of Experience. This study extends prior research, merging datasets from wired and mobile cloud gaming services to create an Expanded stacking model. All data gathering involves actual users engaging in gameplay within a realistic test environment, employing protocols akin to those utilized by the Geforce Now cloud gaming platform. Results indicate significant improvements in QoE estimation across different gaming contexts, highlighting the feasibility of a versatile predictive model for cloud gaming experiences, building upon previous stacking learning approaches.

云游戏领域正在蓬勃发展,预计年增长率将超过 50%,到 2030 年,市场价值将达到 220 亿美元,特别是 2020 年推出的 GeForce Now,到 2022 年 8 月,用户已达到 2000 万。云游戏省去了硬件投资和游戏购买,降低了开发成本,优化了分发工作,为用户和开发商带来了具有成本效益的优势。然而,它也给网络运营商和提供商带来了挑战,要求低延迟和强大的计算能力。云游戏的用户满意度取决于各种因素,包括游戏内容、网络类型和环境,所有这些都会影响体验质量。本研究扩展了之前的研究,合并了有线和移动云游戏服务的数据集,创建了扩展堆叠模型。所有数据的收集都涉及到实际用户在真实测试环境中参与游戏,采用的协议与 Geforce Now 云游戏平台使用的协议类似。结果表明,在不同的游戏环境中,QoE 评估都有了明显改善,这突出表明了在以往堆叠学习方法的基础上,为云游戏体验建立多功能预测模型的可行性。
{"title":"Enhancing Cloud Gaming QoE Estimation by Stacking Learning","authors":"Daniel Soares, Marcos Carvalho, Daniel F. Macedo","doi":"10.1007/s10922-024-09836-6","DOIUrl":"https://doi.org/10.1007/s10922-024-09836-6","url":null,"abstract":"<p>The Cloud Gaming sector is burgeoning with an estimated annual growth of more than 50%, poised to reach a market value of $22 billion by 2030, and notably, GeForce Now, launched in 2020, reached 20 million users by August 2022. Cloud gaming presents cost-effective advantages for users and developers by eliminating hardware investments and game purchases, reducing development costs, and optimizing distribution efforts. However, it introduces challenges for network operators and providers, demanding low latency and substantial computational power. User satisfaction in cloud gaming depends on various factors, including game content, network type, and context, all shaping Quality of Experience. This study extends prior research, merging datasets from wired and mobile cloud gaming services to create an Expanded stacking model. All data gathering involves actual users engaging in gameplay within a realistic test environment, employing protocols akin to those utilized by the Geforce Now cloud gaming platform. Results indicate significant improvements in QoE estimation across different gaming contexts, highlighting the feasibility of a versatile predictive model for cloud gaming experiences, building upon previous stacking learning approaches.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141526890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Based Intrusion Detection for a Secure Internet of Things (IoT) 基于人工智能的入侵检测,实现安全的物联网 (IoT)
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-09 DOI: 10.1007/s10922-024-09829-5
Reham Aljohani, Anas Bushnag, Ali Alessa

The increasing use of intelligent devices connected to the internet has contributed to the introduction of a new paradigm: the Internet of Things (IoT). The IoT is a set of devices connected via the internet that cooperate to achieve a specific goal. Smart cities, smart airports, smart transportation, smart homes, and many applications in the medical and educational fields all use the IoT. However, one major challenge is detecting malicious intrusions on IoT networks. Intrusion Detection Systems (IDSs) should detect these types of intrusions. This work proposes an effective model for detecting malicious IoT activities using machine learning techniques. The ToN-IoT dataset, which consists of seven connected devices (subdatasets), is used to construct an IoT network. The proposed model is a multilevel classification model. The first level distinguishes between attack and normal network activities. The second level is to classify the types of detected attacks. The experimental results prove the effectiveness of the proposed model in terms of time and classification performance metrics. The proposed model and seven baseline techniques in the literature are compared. The proposed model outperformed the baseline techniques in all subdatasets except for the Garage Door dataset.

与互联网相连的智能设备的使用日益增多,推动了一种新模式的出现:物联网(IoT)。物联网是一组通过互联网连接的设备,它们通过合作来实现特定的目标。智能城市、智能机场、智能交通、智能家居以及医疗和教育领域的许多应用都在使用物联网。然而,检测物联网网络上的恶意入侵是一项重大挑战。入侵检测系统(IDS)应能检测到这些类型的入侵。这项工作提出了一种利用机器学习技术检测恶意物联网活动的有效模型。ToN-IoT 数据集由七个连接设备(子数据集)组成,用于构建物联网网络。所提出的模型是一个多级分类模型。第一级区分攻击和正常网络活动。第二层是对检测到的攻击类型进行分类。实验结果证明了所提模型在时间和分类性能指标方面的有效性。实验中对所提出的模型和文献中的七种基线技术进行了比较。除了 "车库门 "数据集之外,所提出的模型在所有子数据集中的表现都优于基线技术。
{"title":"AI-Based Intrusion Detection for a Secure Internet of Things (IoT)","authors":"Reham Aljohani, Anas Bushnag, Ali Alessa","doi":"10.1007/s10922-024-09829-5","DOIUrl":"https://doi.org/10.1007/s10922-024-09829-5","url":null,"abstract":"<p>The increasing use of intelligent devices connected to the internet has contributed to the introduction of a new paradigm: the Internet of Things (IoT). The IoT is a set of devices connected via the internet that cooperate to achieve a specific goal. Smart cities, smart airports, smart transportation, smart homes, and many applications in the medical and educational fields all use the IoT. However, one major challenge is detecting malicious intrusions on IoT networks. Intrusion Detection Systems (IDSs) should detect these types of intrusions. This work proposes an effective model for detecting malicious IoT activities using machine learning techniques. The ToN-IoT dataset, which consists of seven connected devices (subdatasets), is used to construct an IoT network. The proposed model is a multilevel classification model. The first level distinguishes between attack and normal network activities. The second level is to classify the types of detected attacks. The experimental results prove the effectiveness of the proposed model in terms of time and classification performance metrics. The proposed model and seven baseline techniques in the literature are compared. The proposed model outperformed the baseline techniques in all subdatasets except for the Garage Door dataset.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach 无线充电式传感器网络中充电器-无人机的高效调度:基于社会群体优化的方法
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-05 DOI: 10.1007/s10922-024-09833-9
Sk Md Abidar Rahaman, Md Azharuddin, Pratyay Kuila

Wireless power transfer (WPT) technology enables the replenishment of rechargeable battery energy by the sensor nodes (SNs) in wireless rechargeable sensor networks (WRSNs). The deployment of unmanned aerial vehicles (UAVs) as flying chargers to replenish battery energy is established as an emerging technique, especially in harsh environments. The UAV is also operated by limited battery power and, hence, is also power-constrained. Therefore, the UAV has to timely return to the depot to be fully recharged for the next cycle. The SNs should also be timely recharged before they completely deplete their energy. The design of an efficient charging schedule for the charger-UAV for WRSNs is challenging due to the above-mentioned constraints. Moreover, the problem is non-deterministic polynomial hard (NP-hard). This paper addresses the problem of scheduling the charger-UAV to replenish the energy of SNs in WRSNs. A population-based, nature-inspired algorithm, social group optimization (SGO), is employed to design an efficient charging schedule. The flying energy of the UAV is considered to ensure that the UAV will safely and timely return back to the depot. The fitness function is designed with a novel reward-based approach. The proposed work is extensively simulated, and performance comparisons are done along with statistical analysis.

无线充电传感器网络(WRSN)中的传感器节点(SN)可以利用无线功率传输(WPT)技术补充充电电池的能量。部署无人驾驶飞行器(UAV)作为飞行充电器来补充电池能量已成为一种新兴技术,尤其是在恶劣环境中。无人飞行器也是在电池电量有限的情况下运行的,因此也受到电力限制。因此,无人飞行器必须及时返回仓库,为下一个周期充满电。SN 也应在能量完全耗尽之前及时充电。由于上述限制因素,为 WRSN 的充电器-无人机设计一个高效的充电时间表具有挑战性。此外,该问题还具有非确定性多项式难(NP-hard)的特点。本文探讨了在 WRSN 中调度充电器-无人机为 SN 补充能量的问题。本文采用基于群体的自然启发算法--社会群体优化(SGO)来设计高效的充电调度。该算法考虑了无人机的飞行能量,以确保无人机能够安全及时地返回仓库。适配函数采用基于奖励的新方法设计。对提出的工作进行了广泛的模拟,并进行了性能比较和统计分析。
{"title":"Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach","authors":"Sk Md Abidar Rahaman, Md Azharuddin, Pratyay Kuila","doi":"10.1007/s10922-024-09833-9","DOIUrl":"https://doi.org/10.1007/s10922-024-09833-9","url":null,"abstract":"<p>Wireless power transfer (WPT) technology enables the replenishment of rechargeable battery energy by the sensor nodes (SNs) in wireless rechargeable sensor networks (WRSNs). The deployment of unmanned aerial vehicles (UAVs) as flying chargers to replenish battery energy is established as an emerging technique, especially in harsh environments. The UAV is also operated by limited battery power and, hence, is also power-constrained. Therefore, the UAV has to timely return to the depot to be fully recharged for the next cycle. The SNs should also be timely recharged before they completely deplete their energy. The design of an efficient charging schedule for the charger-UAV for WRSNs is challenging due to the above-mentioned constraints. Moreover, the problem is non-deterministic polynomial hard (NP-hard). This paper addresses the problem of scheduling the charger-UAV to replenish the energy of SNs in WRSNs. A population-based, nature-inspired algorithm, social group optimization (SGO), is employed to design an efficient charging schedule. The flying energy of the UAV is considered to ensure that the UAV will safely and timely return back to the depot. The fitness function is designed with a novel reward-based approach. The proposed work is extensively simulated, and performance comparisons are done along with statistical analysis.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141526891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Systems Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1