首页 > 最新文献

Journal of Network and Systems Management最新文献

英文 中文
On Feature Selection Algorithms for Effective Botnet Detection 论有效检测僵尸网络的特征选择算法
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-14 DOI: 10.1007/s10922-024-09817-9
Meher Afroz, Muntaka Ibnath, Ashikur Rahman, Jakia Sultana, Raqeebir Rab

The threats of botnets are becoming a growing concern infecting more and more computers every day. Although botnets can be detected from their behavioral patterns, it is becoming more challenging to differentiate the behavior between the malicious traffic and the legitimate traffic as with the advancement of the technologies the malicious traffics are following the similar behavioral patterns of benign traffics. The detection of malicious traffic largely depends on the traffic features that are being used to feed in the detection process. Selecting the best features for effective botnet detection is the main contribution of this paper. At the very beginning, we show the impact of different features on botnet detection process. Then we propose several heuristics to select the best features from a handful of possible features. Some proposed heuristics are truly feature-based and some are group-based, thus generating different accuracy levels. We also analyze time complexity of each heuristic and provide a detailed performance analysis. As working with all combinations of a large number of features is not feasible, some heuristics work by grouping the features based on their similarity in patterns and checking all combinations within the groups of small number of features which improves the time complexity by a large margin. Through experiments we show the efficacy of the proposed feature selection heuristics. The result shows that some heuristics outperform state-of-the-art feature selection algorithms.

僵尸网络的威胁日益令人担忧,每天都有越来越多的计算机受到僵尸网络的感染。虽然可以从僵尸网络的行为模式中检测出僵尸网络,但要区分恶意流量和合法流量的行为变得越来越具有挑战性,因为随着技术的进步,恶意流量的行为模式与良性流量的行为模式相似。恶意流量的检测在很大程度上取决于检测过程中使用的流量特征。本文的主要贡献在于为有效的僵尸网络检测选择最佳特征。首先,我们展示了不同特征对僵尸网络检测过程的影响。然后,我们提出了几种启发式方法,以便从大量可能的特征中选择最佳特征。有些启发式方法是真正基于特征的,有些是基于组的,因此会产生不同的准确度。我们还分析了每种启发式方法的时间复杂性,并提供了详细的性能分析。由于处理大量特征的所有组合并不可行,一些启发式方法根据特征在模式上的相似性对特征进行分组,并检查少量特征组内的所有组合,从而大大提高了时间复杂度。通过实验,我们证明了所提出的特征选择启发式方法的有效性。结果表明,一些启发式方法优于最先进的特征选择算法。
{"title":"On Feature Selection Algorithms for Effective Botnet Detection","authors":"Meher Afroz, Muntaka Ibnath, Ashikur Rahman, Jakia Sultana, Raqeebir Rab","doi":"10.1007/s10922-024-09817-9","DOIUrl":"https://doi.org/10.1007/s10922-024-09817-9","url":null,"abstract":"<p>The threats of botnets are becoming a growing concern infecting more and more computers every day. Although botnets can be detected from their behavioral patterns, it is becoming more challenging to differentiate the behavior between the malicious traffic and the legitimate traffic as with the advancement of the technologies the malicious traffics are following the similar behavioral patterns of benign traffics. The detection of malicious traffic largely depends on the traffic features that are being used to feed in the detection process. Selecting the best features for effective botnet detection is the main contribution of this paper. At the very beginning, we show the impact of different features on botnet detection process. Then we propose several heuristics to select the best features from a handful of possible features. Some proposed heuristics are truly feature-based and some are group-based, thus generating different accuracy levels. We also analyze time complexity of each heuristic and provide a detailed performance analysis. As working with all combinations of a large number of features is not feasible, some heuristics work by grouping the features based on their similarity in patterns and checking all combinations within the groups of small number of features which improves the time complexity by a large margin. Through experiments we show the efficacy of the proposed feature selection heuristics. The result shows that some heuristics outperform state-of-the-art feature selection algorithms.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"25 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140563554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams 设计网络安全学习环境:SOC 团队的网络范围
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-09 DOI: 10.1007/s10922-024-09816-w
Stylianos Karagiannis, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian

Cybersecurity has become an increasingly important field as cyber threats continue to grow in number and complexity. The NICE framework, developed by NIST, provides a structured approach to cybersecurity education. Despite the publication of cybersecurity frameworks, scenario design in cybersecurity is not yet governed by structured design principles, leading to ambiguous learning outcomes. This research uses the NICE framework to provide structure design and development of a cyber range and the relevant scenarios. The proposed methodology and research results can assist the scenario design in cybersecurity and as a methodological procedure for evaluation. Finally, the research provides a better understanding of the NICE framework and demonstrates how it can assist in creating practical cybersecurity scenarios.

随着网络威胁的数量和复杂性不断增加,网络安全已成为一个日益重要的领域。美国国家标准与技术研究院制定的 NICE 框架为网络安全教育提供了结构化方法。尽管发布了网络安全框架,但网络安全中的情景设计尚未遵循结构化设计原则,导致学习结果模糊不清。本研究利用 NICE 框架对网络范围和相关情景进行结构设计和开发。所提出的方法和研究成果有助于网络安全中的情景设计,并可作为评估的方法程序。最后,这项研究让人们更好地了解了 NICE 框架,并展示了该框架如何帮助创建实用的网络安全情景。
{"title":"Towards NICE-by-Design Cybersecurity Learning Environments: A Cyber Range for SOC Teams","authors":"Stylianos Karagiannis, Emmanouil Magkos, Eleftherios Karavaras, Antonios Karnavas, Maria Nefeli Nikiforos, Christoforos Ntantogian","doi":"10.1007/s10922-024-09816-w","DOIUrl":"https://doi.org/10.1007/s10922-024-09816-w","url":null,"abstract":"<p>Cybersecurity has become an increasingly important field as cyber threats continue to grow in number and complexity. The NICE framework, developed by NIST, provides a structured approach to cybersecurity education. Despite the publication of cybersecurity frameworks, scenario design in cybersecurity is not yet governed by structured design principles, leading to ambiguous learning outcomes. This research uses the NICE framework to provide structure design and development of a cyber range and the relevant scenarios. The proposed methodology and research results can assist the scenario design in cybersecurity and as a methodological procedure for evaluation. Finally, the research provides a better understanding of the NICE framework and demonstrates how it can assist in creating practical cybersecurity scenarios.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"48 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140563469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach 确保基于意图的网络系统中的高效路径选择:图神经网络和深度强化学习方法
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-03 DOI: 10.1007/s10922-024-09814-y
Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Afaq Muhammad, Wang-Cheol Song

The recent advancements in network systems, including Software-Defined Networking (SDN), Network Functions Virtualization (NFV), and cloud networking, have significantly enhanced network management. These technologies increase efficiency, reduce manual efforts, and improve agility in deploying new services. They also enable scalable network resources, facilitate handling demand surges, and provide efficient access to innovative solutions. Despite these advancements, the performance of interconnected nodes is still influenced by the heterogeneity of network infrastructure and the capabilities of physical links. This work introduces a comprehensive solution addressing these challenges through Intent-Based Networking (IBN). Our approach utilizes IBN for defining high-level service requirements (QoS) tailored to individual node specifications. Further, we integrate a Graph Neural Network (GNN) to model the network’s overlay topology and understand the behavior of nodes and links. This integration enables the translation of defined intents into optimal paths between end-to-end nodes, ensuring efficient path selection. Additionally, our system incorporates Deep Deterministic Policy Gradients (DDPG) for dynamic weight calculation of QoS metrics to adjust the link cost assigned to network paths based on performance metrics, ensuring the network adapts to the specified QoS intents. The proposed solution has been implemented as an IBN system design comprising an intent definition manager, a GNN model for optimal path selection, an Off-Platform Application (OPA) for policy creation, an assurance module consisting of the DDPG mechanism, and a real-time monitoring system. This design ensures continuous efficient path selection assurance, dynamically adapting to changing conditions and maintaining optimal service levels per the defined intents.

网络系统的最新进展,包括软件定义网络(SDN)、网络功能虚拟化(NFV)和云网络,极大地增强了网络管理。这些技术提高了效率,减少了人工操作,提高了部署新服务的灵活性。它们还实现了网络资源的可扩展性,便于应对需求激增,并提供了对创新解决方案的有效访问。尽管取得了这些进步,互联节点的性能仍然受到网络基础设施的异构性和物理链路能力的影响。这项工作通过基于意图的网络(IBN)引入了一个全面的解决方案来应对这些挑战。我们的方法利用 Intent-Based Networking (IBN) 定义高级服务要求 (QoS),以适应单个节点的规格。此外,我们还整合了图神经网络(GNN),以建立网络覆盖拓扑模型,并了解节点和链路的行为。这种整合可将定义的意图转化为端到端节点之间的最佳路径,确保高效的路径选择。此外,我们的系统还采用了用于动态计算 QoS 指标权重的深度确定性策略梯度(DDPG),以根据性能指标调整分配给网络路径的链路成本,确保网络适应指定的 QoS 意图。建议的解决方案已作为 IBN 系统设计实现,包括一个意图定义管理器、一个用于优化路径选择的 GNN 模型、一个用于创建策略的非平台应用程序 (OPA)、一个由 DDPG 机制组成的保证模块和一个实时监控系统。这种设计可确保持续高效的路径选择保证,动态适应不断变化的条件,并根据所定义的意图保持最佳服务水平。
{"title":"Assuring Efficient Path Selection in an Intent-Based Networking System: A Graph Neural Networks and Deep Reinforcement Learning Approach","authors":"Sajid Alam, Javier Jose Diaz Rivera, Mir Muhammad Suleman Sarwar, Afaq Muhammad, Wang-Cheol Song","doi":"10.1007/s10922-024-09814-y","DOIUrl":"https://doi.org/10.1007/s10922-024-09814-y","url":null,"abstract":"<p>The recent advancements in network systems, including Software-Defined Networking (SDN), Network Functions Virtualization (NFV), and cloud networking, have significantly enhanced network management. These technologies increase efficiency, reduce manual efforts, and improve agility in deploying new services. They also enable scalable network resources, facilitate handling demand surges, and provide efficient access to innovative solutions. Despite these advancements, the performance of interconnected nodes is still influenced by the heterogeneity of network infrastructure and the capabilities of physical links. This work introduces a comprehensive solution addressing these challenges through Intent-Based Networking (IBN). Our approach utilizes IBN for defining high-level service requirements (QoS) tailored to individual node specifications. Further, we integrate a Graph Neural Network (GNN) to model the network’s overlay topology and understand the behavior of nodes and links. This integration enables the translation of defined intents into optimal paths between end-to-end nodes, ensuring efficient path selection. Additionally, our system incorporates Deep Deterministic Policy Gradients (DDPG) for dynamic weight calculation of QoS metrics to adjust the link cost assigned to network paths based on performance metrics, ensuring the network adapts to the specified QoS intents. The proposed solution has been implemented as an IBN system design comprising an intent definition manager, a GNN model for optimal path selection, an Off-Platform Application (OPA) for policy creation, an assurance module consisting of the DDPG mechanism, and a real-time monitoring system. This design ensures continuous efficient path selection assurance, dynamically adapting to changing conditions and maintaining optimal service levels per the defined intents.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"94 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140597357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Edge Cloud Based Coordination Platform for Multi-user AR Applications 基于边缘云的多用户 AR 应用协调平台
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1007/s10922-024-09809-9
Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gerő

Augmented Reality (AR) applications can reshape our society enabling novel ways of interactions and immersive experiences in many fields. However, multi-user and collaborative AR applications pose several challenges. The expected user experience requires accurate position and orientation information for each device and precise synchronization of the respective coordinate systems in real-time. Unlike mobile phones or AR glasses running on battery with constrained resource capacity, cloud and edge platforms can provide the computing power for the core functions under the hood. In this paper, we propose a novel edge cloud based platform for multi-user AR applications realizing an essential coordination service among the users. The latency critical, computation intensive Simultaneous Localization And Mapping (SLAM) function is offloaded from the device to the edge cloud infrastructure. Our solution is built on open-source SLAM libraries and the Robot Operating System (ROS). Our contribution is threefold. First, we propose an extensible, edge cloud based AR architecture. Second, we develop a proof-of-concept prototype supporting multiple devices and building on an AI-based SLAM selection component. Third, a dedicated measurement methodology is described, including energy consumption aspects as well, and the overall performance of the system is evaluated via real experiments.

增强现实(AR)应用可以重塑我们的社会,在许多领域实现新颖的交互方式和身临其境的体验。然而,多用户和协作式 AR 应用带来了一些挑战。预期的用户体验需要每个设备的准确位置和方向信息,以及各自坐标系的实时精确同步。与资源容量有限的手机或 AR 眼镜不同,云平台和边缘平台可以为引擎盖下的核心功能提供计算能力。在本文中,我们为多用户 AR 应用程序提出了一种基于边缘云的新型平台,以实现用户之间的基本协调服务。延迟关键、计算密集的同步定位和映射(SLAM)功能从设备卸载到边缘云基础设施。我们的解决方案基于开源 SLAM 库和机器人操作系统(ROS)。我们的贡献体现在三个方面。首先,我们提出了一种基于边缘云的可扩展 AR 架构。其次,我们开发了一个概念验证原型,支持多种设备并基于人工智能的 SLAM 选择组件。第三,我们介绍了一种专门的测量方法,包括能耗方面,并通过实际实验对系统的整体性能进行了评估。
{"title":"An Edge Cloud Based Coordination Platform for Multi-user AR Applications","authors":"Balázs Sonkoly, Bálint György Nagy, János Dóka, Zsófia Kecskés-Solymosi, János Czentye, Bence Formanek, Dávid Jocha, Balázs Péter Gerő","doi":"10.1007/s10922-024-09809-9","DOIUrl":"https://doi.org/10.1007/s10922-024-09809-9","url":null,"abstract":"<p>Augmented Reality (AR) applications can reshape our society enabling novel ways of interactions and immersive experiences in many fields. However, multi-user and collaborative AR applications pose several challenges. The expected user experience requires accurate position and orientation information for each device and precise synchronization of the respective coordinate systems in real-time. Unlike mobile phones or AR glasses running on battery with constrained resource capacity, cloud and edge platforms can provide the computing power for the core functions under the hood. In this paper, we propose a novel edge cloud based platform for multi-user AR applications realizing an essential coordination service among the users. The latency critical, computation intensive Simultaneous Localization And Mapping (SLAM) function is offloaded from the device to the edge cloud infrastructure. Our solution is built on open-source SLAM libraries and the Robot Operating System (ROS). Our contribution is threefold. First, we propose an extensible, edge cloud based AR architecture. Second, we develop a proof-of-concept prototype supporting multiple devices and building on an AI-based SLAM selection component. Third, a dedicated measurement methodology is described, including energy consumption aspects as well, and the overall performance of the system is evaluated via real experiments.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"96 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140597473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Placement Optimization of Virtual Network Functions in a Cloud Computing Environment 云计算环境中虚拟网络功能的布局优化
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-29 DOI: 10.1007/s10922-024-09812-0
Imad Eddine Said, Lamri Sayad, Djamil Aissani

The use of Network Function Virtualization is constantly increasing in Cloud environments, especially for next-generation networks such as 5G. In this context, the definition of a deployment scheme defining for each Virtual Network Function (VNF) the appropriate server in order to meet the quality of service requirements. This problem is known in the literature as virtual fetwork function placement. However, proper deployment of VNFs on servers can minimize the number of servers used, but may increase service latency. In this article, we propose a multi-objective integer linear programming model to solve the problem of network function placement. The objective is to find the best compromise between minimizing end-to-end total latency for users and reducing the number of servers used, while ensuring that the maximum number of VNFs is connected in the network. Our proposal to solve the NP-hard problem involves developing an algorithm based on the Particle Swarm Optimization metaheuristic to obtain a polynomial time resolution. By performing tests on a simple VNF deployment problem, we validated the relevance of our optimization model and demonstrated the effectiveness of our algorithm. The results obtained showed that our method provides feasible solutions very close to the exact optimal solutions.

网络功能虚拟化(Network Function Virtualization)在云环境中的使用不断增加,尤其是在 5G 等下一代网络中。在这种情况下,需要定义一种部署方案,为每个虚拟网络功能(VNF)定义合适的服务器,以满足服务质量要求。这个问题在文献中被称为虚拟网络功能部署。然而,在服务器上适当部署 VNF 可以最大限度地减少使用的服务器数量,但可能会增加服务延迟。在本文中,我们提出了一个多目标整数线性规划模型来解决网络功能放置问题。其目标是在确保网络中连接最大数量的 VNF 的同时,在最小化用户端到端总延迟和减少所用服务器数量之间找到最佳折中方案。我们提出的解决 NP 难问题的建议包括开发一种基于粒子群优化元启发式的算法,以获得多项式时间的解决方案。通过对一个简单的 VNF 部署问题进行测试,我们验证了优化模型的相关性,并证明了算法的有效性。结果表明,我们的方法提供了非常接近精确最优解的可行解决方案。
{"title":"Placement Optimization of Virtual Network Functions in a Cloud Computing Environment","authors":"Imad Eddine Said, Lamri Sayad, Djamil Aissani","doi":"10.1007/s10922-024-09812-0","DOIUrl":"https://doi.org/10.1007/s10922-024-09812-0","url":null,"abstract":"<p>The use of Network Function Virtualization is constantly increasing in Cloud environments, especially for next-generation networks such as 5G. In this context, the definition of a deployment scheme defining for each Virtual Network Function (VNF) the appropriate server in order to meet the quality of service requirements. This problem is known in the literature as virtual fetwork function placement. However, proper deployment of VNFs on servers can minimize the number of servers used, but may increase service latency. In this article, we propose a multi-objective integer linear programming model to solve the problem of network function placement. The objective is to find the best compromise between minimizing end-to-end total latency for users and reducing the number of servers used, while ensuring that the maximum number of VNFs is connected in the network. Our proposal to solve the NP-hard problem involves developing an algorithm based on the Particle Swarm Optimization metaheuristic to obtain a polynomial time resolution. By performing tests on a simple VNF deployment problem, we validated the relevance of our optimization model and demonstrated the effectiveness of our algorithm. The results obtained showed that our method provides feasible solutions very close to the exact optimal solutions.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"34 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140323464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings 改进应急响应:深入分析平交道口公交车堵塞紧急情况的 ITS-G5 消息传递策略
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-28 DOI: 10.1007/s10922-024-09811-1
Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed

The Intelligent Transportation System protocol stack has revolutionized traffic efficiency and road safety applications in vehicular environments. This is due to the incorporation of the 802.11p standard in the 5.9 GHz band. This study introduces a novel architecture for vehicular communications. It employs Internet Protocol version 4 multicast over the 5.9 GHz band allocated for Intelligent Transportation Systems. The frequency band was designated by the European Telecommunications Standards Institute. Our proposed architecture addresses challenges in a specific urban use case. The use case involves a Level Crossing in Bordeaux. It focuses on the broadcast of Cooperative Awareness Message (CAM) and Decentralized Environmental Notification Message (DENM) to enhance road-user safety. To prevent accidents, we present an algorithm for CAM and DENM dissemination that ensures timely alerts for sudden vehicle blockage emergencies. Moreover, we introduce a comprehensive and optimized train braking strategy to further minimize accident risks. This strategy aims to provide efficient and timely train deceleration, allowing sufficient time for road users to clear the Level Crossing and mitigating the potential risk for collisions. We analyze End-to-End delay and Packet Reception Ratio to gauge our system’s performance. We also compare our edge-server-based architecture with cloud-based alternatives, showcasing improved latency and Packet Loss Rate in our approach. The obtained results illustrate the effectiveness of our edge-server-based architecture in the context of Intelligent Transportation Systems, particularly utilizing the 5.9 GHz band technology. The findings of this study provide a foundation for future deployments and improvements in urban environments, fostering safer and more reliable transportation systems.

智能交通系统协议栈彻底改变了车辆环境中的交通效率和道路安全应用。这要归功于在 5.9 GHz 频段采用了 802.11p 标准。本研究为车辆通信引入了一种新型架构。它在分配给智能交通系统的 5.9 GHz 频段上采用互联网协议版本 4 组播。该频段由欧洲电信标准协会指定。我们提出的架构可应对特定城市用例中的挑战。该使用案例涉及波尔多的一个平交道口。其重点是广播合作意识信息(CAM)和分散环境通知信息(DENM),以加强道路使用者的安全。为防止事故发生,我们提出了一种 CAM 和 DENM 传播算法,可确保在车辆突然堵塞的紧急情况下及时发出警报。此外,我们还介绍了一种全面优化的列车制动策略,以进一步降低事故风险。该策略旨在提供高效及时的列车减速,为道路使用者留出足够的时间通过平交道口,并降低潜在的碰撞风险。我们分析了端到端延迟和数据包接收率,以衡量系统的性能。我们还将基于边缘服务器的架构与基于云的替代方案进行了比较,结果表明我们的方法改善了延迟和数据包丢失率。获得的结果表明,我们基于边缘服务器的架构在智能交通系统中非常有效,尤其是利用了 5.9 GHz 频段技术。这项研究的结果为未来在城市环境中的部署和改进奠定了基础,有助于建立更安全、更可靠的交通系统。
{"title":"Improving Emergency Response: An In-Depth Analysis of an ITS-G5 Messaging Strategy for Bus Blockage Emergencies at Level Crossings","authors":"Mayssa Dardour, Mohamed Mosbah, Toufik Ahmed","doi":"10.1007/s10922-024-09811-1","DOIUrl":"https://doi.org/10.1007/s10922-024-09811-1","url":null,"abstract":"<p>The Intelligent Transportation System protocol stack has revolutionized traffic efficiency and road safety applications in vehicular environments. This is due to the incorporation of the 802.11p standard in the 5.9 GHz band. This study introduces a novel architecture for vehicular communications. It employs Internet Protocol version 4 multicast over the 5.9 GHz band allocated for Intelligent Transportation Systems. The frequency band was designated by the European Telecommunications Standards Institute. Our proposed architecture addresses challenges in a specific urban use case. The use case involves a Level Crossing in Bordeaux. It focuses on the broadcast of Cooperative Awareness Message (CAM) and Decentralized Environmental Notification Message (DENM) to enhance road-user safety. To prevent accidents, we present an algorithm for CAM and DENM dissemination that ensures timely alerts for sudden vehicle blockage emergencies. Moreover, we introduce a comprehensive and optimized train braking strategy to further minimize accident risks. This strategy aims to provide efficient and timely train deceleration, allowing sufficient time for road users to clear the Level Crossing and mitigating the potential risk for collisions. We analyze End-to-End delay and Packet Reception Ratio to gauge our system’s performance. We also compare our edge-server-based architecture with cloud-based alternatives, showcasing improved latency and Packet Loss Rate in our approach. The obtained results illustrate the effectiveness of our edge-server-based architecture in the context of Intelligent Transportation Systems, particularly utilizing the 5.9 GHz band technology. The findings of this study provide a foundation for future deployments and improvements in urban environments, fostering safer and more reliable transportation systems.\u0000</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"15 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140323477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification NFV 背景下网络服务的可依赖性:分类标准和最新技术分类
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-26 DOI: 10.1007/s10922-024-09810-2
Siamak Azadiabad, Ferhat Khendek

In the context of Network Function Virtualization (NFV), Network Services (NS) are realized by interconnecting Virtual Network Functions (VNF) using Virtual Links (VL). Service dependability is an important characteristic of NSs. Service dependability includes service availability, reliability, and continuity attributes. The NFV framework brings new challenges to NS dependability because of the resource-sharing possibility, NS and VNF elasticity, and the dynamicity in the NFV environment. There has been a lot of work on the dependability of NSs in the context of NFV. Existing works address different dependability attributes and use different methods and mechanisms in the proposed solutions. Thus, it is difficult to evaluate and compare these solutions, determine the well-investigated areas, and identify gaps. In this paper, we investigate the state of the art for NS dependability in the context of NFV and survey existing solutions. We define a taxonomy that represents the different aspects of NS dependability and their relations in this context. We analyze 102 papers published in the past 5 years and map them to our proposed taxonomy to understand what is addressed in the proposed solution and how. We identify the gaps and discuss potential future work directions.

在网络功能虚拟化(NFV)的背景下,网络服务(NS)是通过使用虚拟链路(VL)将虚拟网络功能(VNF)互连实现的。服务可靠性是 NS 的一个重要特征。服务可靠性包括服务可用性、可靠性和连续性属性。由于 NFV 环境中的资源共享可能性、NS 和 VNF 弹性以及动态性,NFV 框架给 NS 的可靠性带来了新的挑战。关于 NFV 环境中 NS 的可依赖性,已有大量研究工作。现有工作涉及不同的可依赖性属性,并在提出的解决方案中使用了不同的方法和机制。因此,很难对这些解决方案进行评估和比较,也很难确定哪些领域已得到充分研究,并找出差距。在本文中,我们研究了 NFV 背景下 NS 可靠性的最新技术,并调查了现有的解决方案。我们定义了一种分类法,它代表了 NS 可靠性的不同方面及其在此背景下的关系。我们分析了过去 5 年中发表的 102 篇论文,并将它们与我们提出的分类法进行映射,以了解我们提出的解决方案涉及哪些方面以及如何解决。我们找出了差距,并讨论了未来潜在的工作方向。
{"title":"Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification","authors":"Siamak Azadiabad, Ferhat Khendek","doi":"10.1007/s10922-024-09810-2","DOIUrl":"https://doi.org/10.1007/s10922-024-09810-2","url":null,"abstract":"<p>In the context of Network Function Virtualization (NFV), Network Services (NS) are realized by interconnecting Virtual Network Functions (VNF) using Virtual Links (VL). Service dependability is an important characteristic of NSs. Service dependability includes service availability, reliability, and continuity attributes. The NFV framework brings new challenges to NS dependability because of the resource-sharing possibility, NS and VNF elasticity, and the dynamicity in the NFV environment. There has been a lot of work on the dependability of NSs in the context of NFV. Existing works address different dependability attributes and use different methods and mechanisms in the proposed solutions. Thus, it is difficult to evaluate and compare these solutions, determine the well-investigated areas, and identify gaps. In this paper, we investigate the state of the art for NS dependability in the context of NFV and survey existing solutions. We define a taxonomy that represents the different aspects of NS dependability and their relations in this context. We analyze 102 papers published in the past 5 years and map them to our proposed taxonomy to understand what is addressed in the proposed solution and how. We identify the gaps and discuss potential future work directions.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"358 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140303051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems 评估数据预处理技术对入侵检测系统性能的影响
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-22 DOI: 10.1007/s10922-024-09813-z
Kelson Carvalho Santos, Rodrigo Sanches Miani, Flávio de Oliveira Silva

The development of Intrusion Detection Systems using Machine Learning techniques (ML-based IDS) has emerged as an important research topic in the cybersecurity field. However, there is a noticeable absence of systematic studies to comprehend the usability of such systems in real-world applications. This paper analyzes the impact of data preprocessing techniques on the performance of ML-based IDS using two public datasets, UNSW-NB15 and CIC-IDS2017. Specifically, we evaluated the effects of data cleaning, encoding, and normalization techniques on the performance of binary and multiclass intrusion detection models. This work investigates the impact of data preprocessing techniques on the performance of ML-based IDS and how the performance of different ML-based IDS is affected by data preprocessing techniques. To this end, we implemented a machine learning pipeline to apply the data preprocessing techniques in different scenarios to answer such questions. The findings analyzed using the Friedman statistical test and Nemenyi post-hoc test revealed significant differences in groups of data preprocessing techniques and ML-based IDS, according to the evaluation metrics. However, these differences were not observed in multiclass scenarios for data preprocessing techniques. Additionally, ML-based IDS exhibited varying performances in binary and multiclass classifications. Therefore, our investigation presents insights into the efficacy of different data preprocessing techniques for building robust and accurate intrusion detection models.

利用机器学习技术开发入侵检测系统(基于 ML 的 IDS)已成为网络安全领域的一个重要研究课题。然而,在了解此类系统在实际应用中的可用性方面,却明显缺乏系统性的研究。本文利用 UNSW-NB15 和 CIC-IDS2017 这两个公开数据集,分析了数据预处理技术对基于 ML 的 IDS 性能的影响。具体来说,我们评估了数据清理、编码和规范化技术对二元和多类入侵检测模型性能的影响。这项工作研究了数据预处理技术对基于 ML 的 IDS 性能的影响,以及不同基于 ML 的 IDS 的性能如何受到数据预处理技术的影响。为此,我们实施了一个机器学习管道,在不同场景中应用数据预处理技术来回答这些问题。使用 Friedman 统计检验和 Nemenyi 事后检验分析的结果显示,根据评估指标,数据预处理技术组和基于 ML 的 IDS 组之间存在显著差异。不过,在数据预处理技术的多类情况下,没有观察到这些差异。此外,基于 ML 的 IDS 在二分类和多分类中表现出不同的性能。因此,我们的研究深入揭示了不同数据预处理技术在构建稳健、准确的入侵检测模型方面的功效。
{"title":"Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems","authors":"Kelson Carvalho Santos, Rodrigo Sanches Miani, Flávio de Oliveira Silva","doi":"10.1007/s10922-024-09813-z","DOIUrl":"https://doi.org/10.1007/s10922-024-09813-z","url":null,"abstract":"<p>The development of Intrusion Detection Systems using Machine Learning techniques (ML-based IDS) has emerged as an important research topic in the cybersecurity field. However, there is a noticeable absence of systematic studies to comprehend the usability of such systems in real-world applications. This paper analyzes the impact of data preprocessing techniques on the performance of ML-based IDS using two public datasets, UNSW-NB15 and CIC-IDS2017. Specifically, we evaluated the effects of data cleaning, encoding, and normalization techniques on the performance of binary and multiclass intrusion detection models. This work investigates the impact of data preprocessing techniques on the performance of ML-based IDS and how the performance of different ML-based IDS is affected by data preprocessing techniques. To this end, we implemented a machine learning pipeline to apply the data preprocessing techniques in different scenarios to answer such questions. The findings analyzed using the Friedman statistical test and Nemenyi post-hoc test revealed significant differences in groups of data preprocessing techniques and ML-based IDS, according to the evaluation metrics. However, these differences were not observed in multiclass scenarios for data preprocessing techniques. Additionally, ML-based IDS exhibited varying performances in binary and multiclass classifications. Therefore, our investigation presents insights into the efficacy of different data preprocessing techniques for building robust and accurate intrusion detection models.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"12 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140202089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks DDT:软件定义网络中动态流量超时分配的强化学习方法
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-21 DOI: 10.1007/s10922-024-09815-x
Nathan Harris, Sajad Khorsandroo

OpenFlow-compliant commodity switches face challenges in efficiently managing flow rules due to the limited capacity of expensive high-speed memories used to store them. The accumulation of inactive flows can disrupt ongoing communication, necessitating an optimized approach to flow rule timeouts. This paper proposes Delayed Dynamic Timeout (DDT), a Reinforcement Learning-based approach to dynamically adjust flow rule timeouts and enhance the utilization of a switch’s flow table(s) for improved efficiency. Despite the dynamic nature of network traffic, our DDT algorithm leverages advancements in Reinforcement Learning algorithms to adapt and achieve flow-specific optimization objectives. The evaluation results demonstrate that DDT outperforms static timeout values in terms of both flow rule match rate and flow rule activity. By continuously adapting to changing network conditions, DDT showcases the potential of Reinforcement Learning algorithms to effectively optimize flow rule management. This research contributes to the advancement of flow rule optimization techniques and highlights the feasibility of applying Reinforcement Learning in the context of SDN.

由于用于存储流量规则的昂贵高速存储器容量有限,兼容 OpenFlow 的商品交换机在有效管理流量规则方面面临挑战。不活动流量的累积会中断正在进行的通信,因此需要一种优化的流量规则超时方法。本文提出了延迟动态超时(DDT),这是一种基于强化学习的方法,可动态调整流量规则超时,提高交换机流量表的利用率,从而提高效率。尽管网络流量是动态的,但我们的 DDT 算法充分利用了强化学习算法的先进性,以适应和实现特定流量的优化目标。评估结果表明,DDT 在流量规则匹配率和流量规则活动方面都优于静态超时值。通过持续适应不断变化的网络条件,DDT 展示了强化学习算法有效优化流量规则管理的潜力。这项研究有助于推动流规则优化技术的发展,并强调了在 SDN 背景下应用强化学习的可行性。
{"title":"DDT: A Reinforcement Learning Approach to Dynamic Flow Timeout Assignment in Software Defined Networks","authors":"Nathan Harris, Sajad Khorsandroo","doi":"10.1007/s10922-024-09815-x","DOIUrl":"https://doi.org/10.1007/s10922-024-09815-x","url":null,"abstract":"<p>OpenFlow-compliant commodity switches face challenges in efficiently managing flow rules due to the limited capacity of expensive high-speed memories used to store them. The accumulation of inactive flows can disrupt ongoing communication, necessitating an optimized approach to flow rule timeouts. This paper proposes Delayed Dynamic Timeout (DDT), a Reinforcement Learning-based approach to dynamically adjust flow rule timeouts and enhance the utilization of a switch’s flow table(s) for improved efficiency. Despite the dynamic nature of network traffic, our DDT algorithm leverages advancements in Reinforcement Learning algorithms to adapt and achieve flow-specific optimization objectives. The evaluation results demonstrate that DDT outperforms static timeout values in terms of both flow rule match rate and flow rule activity. By continuously adapting to changing network conditions, DDT showcases the potential of Reinforcement Learning algorithms to effectively optimize flow rule management. This research contributes to the advancement of flow rule optimization techniques and highlights the feasibility of applying Reinforcement Learning in the context of SDN.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"163 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140202088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Discrete Adaptive Lion Optimization Algorithm for QoS-Driven IoT Service Composition with Global Constraints 用于具有全局约束条件的 QoS 驱动型物联网服务组合的离散自适应狮子优化算法
IF 3.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-13 DOI: 10.1007/s10922-024-09808-w
Souhila Ait Hacène Ouhadda, Samia Chibani Sadouki, Achour Achroufene, Abdelkamel Tari

In an Internet of Things (IoT) environment, multiple objects usually interact with one another to meet a complex user’s request. This involves the composition of several atomic IoT services. Given a large number of functionally equivalent services with different Quality of Service (QoS) values, the service composition problem remains one of the main challenges in IoT environments. This paper presents a Discrete Adaptive Lion Optimization Algorithm (DALOA) to select IoT services in a composition process while considering global user QoS constraints. DALOA is based on the Lion Optimization Algorithm (LOA) and developed by combining several LOA operators, such as roaming, mating, and migration. First, DALOA divides the initial population into two sub-populations: pride and nomad, and each sub-population has its search strategies. Second, the roaming nomad process follows a random searching mode (strong exploration) to avoid being trapped in local optima. Third, the roaming pride searching mode represents strong local research, ensuring more efficient exploitation. Four, mating (mating pride, mating nomad) allows for information sharing between members of the same population. Finally, the migration operator is used to ensure population diversity by allowing information sharing between the pride and the nomad. The simulation results show that DALOA obtains the best compositional optimality and finds the near-optimal composition of the IoT services in a reasonable execution time compared to other approaches. Indeed, the combination of the previous operators provides a good trade-off between exploration and exploitation.

在物联网(IoT)环境中,多个对象通常会相互影响,以满足用户的复杂要求。这涉及到多个原子物联网服务的组合。鉴于存在大量功能等同、服务质量(QoS)值不同的服务,服务组合问题仍然是物联网环境中的主要挑战之一。本文提出了一种离散自适应狮子优化算法(DALOA),用于在组合过程中选择物联网服务,同时考虑全局用户 QoS 约束。DALOA 以狮子优化算法(LOA)为基础,结合了多个 LOA 算子(如漫游、交配和迁移)而开发。首先,DALOA 将初始种群分为两个子种群:狮群和游牧群,每个子种群都有自己的搜索策略。其次,游牧过程遵循随机搜索模式(强探索),以避免陷入局部最优。第三,"骄傲 "的漫游搜索模式代表了强大的局部研究,确保更有效的开发。第四,交配(交配骄傲、交配游牧)允许同一种群成员之间共享信息。最后,迁移算子允许骄傲和游牧之间共享信息,从而确保种群多样性。模拟结果表明,与其他方法相比,DALOA 能获得最佳的优化组合,并能在合理的执行时间内找到接近最优的物联网服务组合。事实上,结合之前的运算符可以在探索和利用之间取得良好的平衡。
{"title":"A Discrete Adaptive Lion Optimization Algorithm for QoS-Driven IoT Service Composition with Global Constraints","authors":"Souhila Ait Hacène Ouhadda, Samia Chibani Sadouki, Achour Achroufene, Abdelkamel Tari","doi":"10.1007/s10922-024-09808-w","DOIUrl":"https://doi.org/10.1007/s10922-024-09808-w","url":null,"abstract":"<p>In an Internet of Things (IoT) environment, multiple objects usually interact with one another to meet a complex user’s request. This involves the composition of several atomic IoT services. Given a large number of functionally equivalent services with different Quality of Service (QoS) values, the service composition problem remains one of the main challenges in IoT environments. This paper presents a Discrete Adaptive Lion Optimization Algorithm (DALOA) to select IoT services in a composition process while considering global user QoS constraints. DALOA is based on the Lion Optimization Algorithm (LOA) and developed by combining several LOA operators, such as roaming, mating, and migration. First, DALOA divides the initial population into two sub-populations: pride and nomad, and each sub-population has its search strategies. Second, the roaming nomad process follows a random searching mode (strong exploration) to avoid being trapped in local optima. Third, the roaming pride searching mode represents strong local research, ensuring more efficient exploitation. Four, mating (mating pride, mating nomad) allows for information sharing between members of the same population. Finally, the migration operator is used to ensure population diversity by allowing information sharing between the pride and the nomad. The simulation results show that DALOA obtains the best compositional optimality and finds the near-optimal composition of the IoT services in a reasonable execution time compared to other approaches. Indeed, the combination of the previous operators provides a good trade-off between exploration and exploitation.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"10 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140115897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Systems Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1