首页 > 最新文献

International Journal of Information Security最新文献

英文 中文
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review 物联网中的身份验证、协议、攻击和开放性问题:系统性文献综述
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-12 DOI: 10.1007/s10207-023-00806-8
Elham Ebrahimpour, Shahram Babaie

Internet of Things (IoT) as an emerging technology is based on the idea that smart things can connect to the Internet and exchange the collected data in a peer-to-peer paradigm. Due to its inherent features, IoT can be utilized in real-world scenarios and its expansion can improve human well-being. Internet of things is applied quite closely to humans and transmits serious information such as healthcare information, financial data, and private information through an insecure communication platform. Since almost all tasks are performed with minimal human intervention, and adversary may deploy its nodes among other legitimate elements of IoT, providing an effective mutual authentication is vital. In this Systematic Literature Review, authentication of IoT and its literature are reviewed systematically. In particular, it has endeavored that the collected literature covers the papers conducted from 2018 to 2022. Moreover, this study seeks to provide a comprehensive answer to six important Research Questions in the context of authentication of IoT that often engage the minds of scholars. It is hoped that this survey will be an effective guide for future research by addressing the relevant challenges, analyzing open issues, and providing future research directions.

物联网(IoT)作为一种新兴技术,其理念是智能事物可以连接到互联网,并以点对点模式交换收集到的数据。由于其固有的特点,物联网可以应用于现实世界的各种场景,其扩展可以改善人类的福祉。物联网与人类的应用相当密切,通过不安全的通信平台传输医疗保健信息、金融数据和私人信息等重要信息。由于几乎所有的任务都是在极少人为干预的情况下执行的,而对手可能会在物联网的其他合法元素中部署自己的节点,因此提供有效的相互认证至关重要。在本系统文献综述中,对物联网的身份验证及其文献进行了系统综述。特别是,它努力使收集的文献涵盖从 2018 年到 2022 年进行的论文。此外,本研究还力图全面回答物联网身份验证背景下的六个重要研究问题,这些问题常常牵动着学者们的心。希望本调查能通过应对相关挑战、分析未决问题和提供未来研究方向,为未来研究提供有效指导。
{"title":"Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review","authors":"Elham Ebrahimpour, Shahram Babaie","doi":"10.1007/s10207-023-00806-8","DOIUrl":"https://doi.org/10.1007/s10207-023-00806-8","url":null,"abstract":"<p>Internet of Things (IoT) as an emerging technology is based on the idea that smart things can connect to the Internet and exchange the collected data in a peer-to-peer paradigm. Due to its inherent features, IoT can be utilized in real-world scenarios and its expansion can improve human well-being. Internet of things is applied quite closely to humans and transmits serious information such as healthcare information, financial data, and private information through an insecure communication platform. Since almost all tasks are performed with minimal human intervention, and adversary may deploy its nodes among other legitimate elements of IoT, providing an effective mutual authentication is vital. In this Systematic Literature Review, authentication of IoT and its literature are reviewed systematically. In particular, it has endeavored that the collected literature covers the papers conducted from 2018 to 2022. Moreover, this study seeks to provide a comprehensive answer to six important Research Questions in the context of authentication of IoT that often engage the minds of scholars. It is hoped that this survey will be an effective guide for future research by addressing the relevant challenges, analyzing open issues, and providing future research directions.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"241 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139464502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs) 更正:针对医疗保健可穿戴无线医疗传感器网络(HWMSNs)的完全隐私保护分布式无证书批量聚合签名验证方案
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-10 DOI: 10.1007/s10207-023-00798-5
O. Rabie, S. Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammed, Abddulrhman M. Alshareef, Mueen Uddin
{"title":"Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)","authors":"O. Rabie, S. Selvarajan, Tawfiq Hasanin, Gouse Baig Mohammed, Abddulrhman M. Alshareef, Mueen Uddin","doi":"10.1007/s10207-023-00798-5","DOIUrl":"https://doi.org/10.1007/s10207-023-00798-5","url":null,"abstract":"","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"67 10","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139440971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep learning approach based on multi-view consensus for SQL injection detection 基于多视角共识的 SQL 注入检测深度学习方法
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-09 DOI: 10.1007/s10207-023-00791-y
Arzu Gorgulu Kakisim

SQL injection (SQLi) attacks are one of the oldest and most serious security threats, consistently ranking among the top ten critical web security risks. Traditional defense mechanisms against SQL injection predominantly use blacklists to disallow common injection characters or terms. However, the major challenge for these systems is to create a comprehensive list of potential SQLi characters, terms, and multi-terms that encompass various types of SQLi attacks (time-based, error-based, etc.), taking into account various SQL datasets (such as MySQL, Oracle, and NoSQL). Recently, some research studies have concentrated on feature learning from SQL queries by applying some well-known deep architectures to detect SQLi attacks. Motivated by a similar objective, this research introduces a novel deep learning-based SQLi detection system named “Bidirectional LSTM-CNN based on Multi-View Consensus” (MVC-BiCNN). The proposed method implements a pre-processing step that generates multiple views from SQL data by semantically encoding SQL statements into their corresponding SQL tags. By utilizing two different main layers, which are bidirectional long short-term memory (LSTM) and convolutional neural network (CNN), the proposed method learns a joint latent space from multi-view representations. In the detection phase, the proposed method yields separate predictions for each representation and assesses whether the query constitutes an SQLi attack based on a consensus function’s output. Moreover, Interpretable Model-Agnostic Annotations (LIME), one of the methods of Explainable Artificial Intelligence (XAI), is employed for the purpose of interpreting the model’s results and analyzing the SQL injection (SQLi) inputs. The experimental results demonstrate that MVC-BiCNN outperforms the baseline methods, yielding 99.96% detection rate.

SQL 注入(SQLi)攻击是最古老、最严重的安全威胁之一,一直被列为十大关键网络安全风险之一。传统的 SQL 注入防御机制主要使用黑名单来禁止常见的注入字符或术语。然而,这些系统面临的主要挑战是如何创建一个全面的潜在 SQLi 字符、术语和多术语列表,其中包含各种类型的 SQLi 攻击(基于时间、基于错误等),并考虑到各种 SQL 数据集(如 MySQL、Oracle 和 NoSQL)。最近,一些研究集中于通过应用一些著名的深度架构从 SQL 查询中学习特征来检测 SQLi 攻击。出于类似的目的,本研究提出了一种基于深度学习的新型 SQLi 检测系统,名为 "基于多视图共识的双向 LSTM-CNN"(MVC-BiCNN)。所提出的方法实施了一个预处理步骤,通过将 SQL 语句语义化为相应的 SQL 标记,从 SQL 数据生成多个视图。通过利用双向长短期记忆(LSTM)和卷积神经网络(CNN)这两个不同的主要层,所提出的方法从多视图表示中学习联合潜空间。在检测阶段,所提出的方法对每个表征进行单独预测,并根据共识函数的输出评估查询是否构成 SQLi 攻击。此外,为了解释模型结果和分析 SQL 注入(SQLi)输入,采用了可解释人工智能(XAI)方法之一的可解释模型诊断注释(LIME)。实验结果表明,MVC-BiCNN 的性能优于基线方法,其检测率高达 99.96%。
{"title":"A deep learning approach based on multi-view consensus for SQL injection detection","authors":"Arzu Gorgulu Kakisim","doi":"10.1007/s10207-023-00791-y","DOIUrl":"https://doi.org/10.1007/s10207-023-00791-y","url":null,"abstract":"<p>SQL injection (SQLi) attacks are one of the oldest and most serious security threats, consistently ranking among the top ten critical web security risks. Traditional defense mechanisms against SQL injection predominantly use blacklists to disallow common injection characters or terms. However, the major challenge for these systems is to create a comprehensive list of potential SQLi characters, terms, and multi-terms that encompass various types of SQLi attacks (time-based, error-based, etc.), taking into account various SQL datasets (such as MySQL, Oracle, and NoSQL). Recently, some research studies have concentrated on feature learning from SQL queries by applying some well-known deep architectures to detect SQLi attacks. Motivated by a similar objective, this research introduces a novel deep learning-based SQLi detection system named “Bidirectional LSTM-CNN based on Multi-View Consensus” (MVC-BiCNN). The proposed method implements a pre-processing step that generates multiple views from SQL data by semantically encoding SQL statements into their corresponding SQL tags. By utilizing two different main layers, which are bidirectional long short-term memory (LSTM) and convolutional neural network (CNN), the proposed method learns a joint latent space from multi-view representations. In the detection phase, the proposed method yields separate predictions for each representation and assesses whether the query constitutes an SQLi attack based on a consensus function’s output. Moreover, Interpretable Model-Agnostic Annotations (LIME), one of the methods of Explainable Artificial Intelligence (XAI), is employed for the purpose of interpreting the model’s results and analyzing the SQL injection (SQLi) inputs. The experimental results demonstrate that MVC-BiCNN outperforms the baseline methods, yielding 99.96% detection rate.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"3 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139408267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things 基于投票灰狼优化器的集合学习模型,用于物联网入侵检测
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-09 DOI: 10.1007/s10207-023-00803-x
Yakub Kayode Saheed, Sanjay Misra

The Internet of Things (IoT) has garnered considerable attention from academic and industrial circles as a pivotal technology in recent years. The escalation of security risks is observed to be associated with the growing interest in IoT applications. Intrusion detection systems (IDS) have been devised as viable instruments for identifying and averting malicious actions in this context. Several techniques described in academic papers are thought to be very accurate, but they cannot be used in the real world because the datasets used to build and test the models do not accurately reflect and simulate the IoT network. Existing methods, on the other hand, deal with these issues, but they are not good enough for commercial use because of their lack of precision, low detection rate, receiver operating characteristic (ROC), and false acceptance rate (FAR). The effectiveness of these solutions is predominantly dependent on individual learners and is consequently influenced by the inherent limitations of each learning algorithm. This study introduces a new approach for detecting intrusion attacks in an IoT network, which involves the use of an ensemble learning technique based on gray wolf optimizer (GWO). The novelty of this study lies in the proposed voting gray wolf optimizer (GWO) ensemble model, which incorporates two crucial components: a traffic analyzer and a classification phase engine. The model employs a voting technique to combine the probability averages of the base learners. Secondly, the combination of feature selection and feature extraction techniques is to reduce dimensionality. Thirdly, the utilization of GWO is employed to optimize the parameters of ensemble models. Similarly, the approach employs the most authentic intrusion detection datasets that are accessible and amalgamates multiple learners to generate ensemble learners. The hybridization of information gain (IG) and principal component analysis (PCA) was employed to reduce dimensionality. The study utilized a novel GWO ensemble learning approach that incorporated a decision tree, random forest, K-nearest neighbor, and multilayer perceptron for classification. To evaluate the efficacy of the proposed model, two authentic datasets, namely, BoT-IoT and UNSW-NB15, were scrutinized. The GWO-optimized ensemble model demonstrates superior accuracy when compared to other machine learning-based and deep learning models. Specifically, the model achieves an accuracy rate of 99.98%, a DR of 99.97%, a precision rate of 99.94%, an ROC rate of 99.99%, and an FAR rate of 1.30 on the BoT-IoT dataset. According to the experimental results, the proposed ensemble model optimized by GWO achieved an accuracy of 100%, a DR of 99.9%, a precision of 99.59%, an ROC of 99.40%, and an FAR of 1.5 when tested on the UNSW-NB15 dataset.

近年来,物联网(IoT)作为一项关键技术在学术界和工业界引起了广泛关注。随着人们对物联网应用的兴趣与日俱增,安全风险也随之升级。在这种情况下,入侵检测系统(IDS)被设计为识别和避免恶意行为的可行工具。学术论文中描述的几种技术被认为非常准确,但它们无法在现实世界中使用,因为用于构建和测试模型的数据集无法准确反映和模拟物联网网络。另一方面,现有的方法可以解决这些问题,但由于缺乏精确性、检测率低、接收器操作特征(ROC)和误判率(FAR)等原因,这些方法还不足以用于商业用途。这些解决方案的有效性主要取决于每个学习者,并因此受到每种学习算法固有局限性的影响。本研究介绍了一种在物联网网络中检测入侵攻击的新方法,其中涉及使用基于灰狼优化器(GWO)的集合学习技术。本研究的新颖之处在于所提出的投票灰狼优化器(GWO)集合模型,该模型包含两个关键组件:流量分析器和分类阶段引擎。该模型采用投票技术来组合基础学习者的概率平均值。其次,结合特征选择和特征提取技术来降低维度。第三,利用 GWO 优化集合模型的参数。同样,该方法采用了最真实的入侵检测数据集,将多个学习器合并生成集合学习器。研究采用了信息增益(IG)和主成分分析(PCA)的混合方法来降低维度。研究采用了一种新颖的 GWO 集合学习方法,其中包含决策树、随机森林、K 最近邻和多层感知器进行分类。为了评估所提出模型的有效性,研究人员仔细研究了两个真实的数据集,即 BoT-IoT 和 UNSW-NB15。与其他基于机器学习和深度学习的模型相比,GWO 优化的集合模型表现出更高的准确性。具体而言,该模型在 BoT-IoT 数据集上的准确率达到 99.98%,DR 达到 99.97%,精确率达到 99.94%,ROC 率达到 99.99%,FAR 率达到 1.30。实验结果表明,在新南威尔士州-NB15 数据集上测试时,经 GWO 优化的集合模型的准确率为 100%,DR 为 99.9%,精确率为 99.59%,ROC 为 99.40%,FAR 为 1.5。
{"title":"A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things","authors":"Yakub Kayode Saheed, Sanjay Misra","doi":"10.1007/s10207-023-00803-x","DOIUrl":"https://doi.org/10.1007/s10207-023-00803-x","url":null,"abstract":"<p>The Internet of Things (IoT) has garnered considerable attention from academic and industrial circles as a pivotal technology in recent years. The escalation of security risks is observed to be associated with the growing interest in IoT applications. Intrusion detection systems (IDS) have been devised as viable instruments for identifying and averting malicious actions in this context. Several techniques described in academic papers are thought to be very accurate, but they cannot be used in the real world because the datasets used to build and test the models do not accurately reflect and simulate the IoT network. Existing methods, on the other hand, deal with these issues, but they are not good enough for commercial use because of their lack of precision, low detection rate, receiver operating characteristic (ROC), and false acceptance rate (FAR). The effectiveness of these solutions is predominantly dependent on individual learners and is consequently influenced by the inherent limitations of each learning algorithm. This study introduces a new approach for detecting intrusion attacks in an IoT network, which involves the use of an ensemble learning technique based on gray wolf optimizer (GWO). The novelty of this study lies in the proposed voting gray wolf optimizer (GWO) ensemble model, which incorporates two crucial components: a traffic analyzer and a classification phase engine. The model employs a voting technique to combine the probability averages of the base learners. Secondly, the combination of feature selection and feature extraction techniques is to reduce dimensionality. Thirdly, the utilization of GWO is employed to optimize the parameters of ensemble models. Similarly, the approach employs the most authentic intrusion detection datasets that are accessible and amalgamates multiple learners to generate ensemble learners. The hybridization of information gain (IG) and principal component analysis (PCA) was employed to reduce dimensionality. The study utilized a novel GWO ensemble learning approach that incorporated a decision tree, random forest, K-nearest neighbor, and multilayer perceptron for classification. To evaluate the efficacy of the proposed model, two authentic datasets, namely, BoT-IoT and UNSW-NB15, were scrutinized. The GWO-optimized ensemble model demonstrates superior accuracy when compared to other machine learning-based and deep learning models. Specifically, the model achieves an accuracy rate of 99.98%, a DR of 99.97%, a precision rate of 99.94%, an ROC rate of 99.99%, and an FAR rate of 1.30 on the BoT-IoT dataset. According to the experimental results, the proposed ensemble model optimized by GWO achieved an accuracy of 100%, a DR of 99.9%, a precision of 99.59%, an ROC of 99.40%, and an FAR of 1.5 when tested on the UNSW-NB15 dataset.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"4 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139408453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated transfer learning for attack detection for Internet of Medical Things 针对医疗物联网攻击检测的联合转移学习
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-08 DOI: 10.1007/s10207-023-00805-9
Afnan A. Alharbi

In the healthcare sector, cyberattack detection systems are crucial for ensuring the privacy of patient data and building trust in the increasingly connected world of medical devices and patient monitoring systems. In light of the increasing prevalence of Internet of Medical Things (IoMT) technologies, it is essential to establish an efficient intrusion detection system (IDS). IDSs are crucial for protecting patient data and ensuring medical device reliability. Federated learning (FL) has emerged as an effective technique for enhancing distributed cyberattack detection systems. By distributing the learning process across multiple IoMT gateways, FL-based IDS offers several benefits, such as improved detection accuracy, reduced network latency, and minimized data leakage. However, as client data may not exhibit a uniform independent and identically distributed (IID) pattern, the heterogeneity of data distribution poses a significant challenge in implementing FL-based IDS for IoMT applications. In this paper, we propose a collaborative learning framework for IDS in IoMT applications. Specifically, we introduce a Federated Transfer Learning (FTL) IDS that enables clients to obtain their personalized FL model while benefiting from the knowledge of other clients. Our methodology enables clients to obtain a personalized model that addresses the challenges posed by the heterogeneity of data distribution. The experimental results show that the proposed model achieves superior detection performance with 95–99% accuracy. Moreover, our model exhibits strong performance in identifying zero-day attacks.

在医疗保健领域,网络攻击检测系统对于确保患者数据隐私以及在医疗设备和患者监控系统日益互联的世界中建立信任至关重要。鉴于医疗物联网(IoMT)技术的日益普及,建立一个高效的入侵检测系统(IDS)至关重要。IDS 对于保护患者数据和确保医疗设备可靠性至关重要。联合学习(FL)已成为增强分布式网络攻击检测系统的有效技术。通过在多个 IoMT 网关之间分配学习过程,基于 FL 的 IDS 具有多种优势,如提高检测准确性、降低网络延迟和减少数据泄漏。然而,由于客户端数据可能并不呈现统一的独立且同分布(IID)模式,数据分布的异质性给在物联网应用中实施基于 FL 的 IDS 带来了巨大挑战。在本文中,我们为物联网应用中的 IDS 提出了一个协作学习框架。具体来说,我们引入了一种联合转移学习(FTL)IDS,使客户能够获得自己的个性化 FL 模型,同时受益于其他客户的知识。我们的方法使客户能够获得个性化模型,以应对数据分布的异质性带来的挑战。实验结果表明,所提出的模型具有卓越的检测性能,准确率高达 95-99%。此外,我们的模型在识别零日攻击方面表现出色。
{"title":"Federated transfer learning for attack detection for Internet of Medical Things","authors":"Afnan A. Alharbi","doi":"10.1007/s10207-023-00805-9","DOIUrl":"https://doi.org/10.1007/s10207-023-00805-9","url":null,"abstract":"<p>In the healthcare sector, cyberattack detection systems are crucial for ensuring the privacy of patient data and building trust in the increasingly connected world of medical devices and patient monitoring systems. In light of the increasing prevalence of Internet of Medical Things (IoMT) technologies, it is essential to establish an efficient intrusion detection system (IDS). IDSs are crucial for protecting patient data and ensuring medical device reliability. Federated learning (FL) has emerged as an effective technique for enhancing distributed cyberattack detection systems. By distributing the learning process across multiple IoMT gateways, FL-based IDS offers several benefits, such as improved detection accuracy, reduced network latency, and minimized data leakage. However, as client data may not exhibit a uniform independent and identically distributed (IID) pattern, the heterogeneity of data distribution poses a significant challenge in implementing FL-based IDS for IoMT applications. In this paper, we propose a collaborative learning framework for IDS in IoMT applications. Specifically, we introduce a Federated Transfer Learning (FTL) IDS that enables clients to obtain their personalized FL model while benefiting from the knowledge of other clients. Our methodology enables clients to obtain a personalized model that addresses the challenges posed by the heterogeneity of data distribution. The experimental results show that the proposed model achieves superior detection performance with 95–99% accuracy. Moreover, our model exhibits strong performance in identifying zero-day attacks.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"144 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139408415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity training and healthcare: the AERAS approach 网络安全培训与医疗保健:AERAS 方法
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-06 DOI: 10.1007/s10207-023-00802-y

Abstract

Cyber ranges have gained significant importance in cybersecurity training in recent years, and they are still playing a role of paramount importance, thanks to their ability to give trainees hands-on experience with real-world exercises. This paper presents the motivation and objective of the AERAS project, including a thorough analysis of data from ad hoc interviews and surveys specifically designed and administered for the project’s goals. AERAS aims to apply the cyber range concept to the critical healthcare sector. The AERAS platform will be a virtual cyberwarfare solution that will simulate the operation and effects of security controls and offer hands-on training on their development, assessment, use, and management.

摘要 近年来,网络靶场在网络安全培训中的重要性日益凸显,而且由于其能够让受训人员亲身体验真实世界的演练,仍在发挥着极其重要的作用。本文介绍了 AERAS 项目的动机和目标,包括对为实现项目目标而专门设计和实施的特别访谈和调查数据的全面分析。AERAS 项目旨在将网络范围概念应用于关键的医疗保健领域。AERAS 平台将是一个虚拟的网络战解决方案,它将模拟安全控制的操作和效果,并提供有关其开发、评估、使用和管理的实践培训。
{"title":"Cybersecurity training and healthcare: the AERAS approach","authors":"","doi":"10.1007/s10207-023-00802-y","DOIUrl":"https://doi.org/10.1007/s10207-023-00802-y","url":null,"abstract":"<h3>Abstract</h3> <p>Cyber ranges have gained significant importance in cybersecurity training in recent years, and they are still playing a role of paramount importance, thanks to their ability to give trainees hands-on experience with real-world exercises. This paper presents the motivation and objective of the AERAS project, including a thorough analysis of data from ad hoc interviews and surveys specifically designed and administered for the project’s goals. AERAS aims to apply the cyber range concept to the critical healthcare sector. The AERAS platform will be a virtual cyberwarfare solution that will simulate the operation and effects of security controls and offer hands-on training on their development, assessment, use, and management. </p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"24 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139374721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability discovery based on source code patch commit mining: a systematic literature review 基于源代码补丁提交挖掘的漏洞发现:系统性文献综述
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-06 DOI: 10.1007/s10207-023-00795-8
Fei Zuo, Junghwan Rhee

In recent years, there has been a remarkable surge in the adoption of open-source software (OSS). However, with the growing usage of OSS components in both free and proprietary software, vulnerabilities that are present within them can be spread to a vast array of underlying applications. Even worse, a myriad of vulnerabilities are fixed secretly via patch commits, which causes other software re-using the vulnerable code snippets to be left in the dark. Thus, source code patch commit mining toward vulnerability discovery is receiving immense attention, and a variety of approaches are proposed. Despite that, there is no comprehensive survey summarizing and discussing the current progress within this field. To fill this gap, we survey, evaluate, and systematize a list of literature and provide the community with our insights on both successes and remaining issues in this space. Special attention is paid on the work toward vulnerability discovery. In this paper, we also provide an introductory panorama with our replicable hands-on experience, which can help readers quickly understand and step into the pertinent field. Our empirical study reveals noteworthy challenges which need to be highlighted and addressed in this field. We also discuss potential directions for the future work. To the best of knowledge, we provide the first literature review to study source code patch commit mining in the vulnerability discovery context. The systematic framework, hands-on practices, and list of potential challenges provide new knowledge for mining source code patch commit toward a more robust software eco-system. The research gaps found in this literature review show the need for future research, such as the concern on data quality, high false alarms, and the significance of textual information.

近年来,开放源码软件(OSS)的采用率显著上升。然而,随着开放源码软件组件在自由软件和专有软件中的使用日益增多,其中存在的漏洞可能会传播到大量底层应用程序中。更糟糕的是,无数的漏洞都是通过补丁提交秘密修复的,这导致其他重新使用漏洞代码段的软件被蒙在鼓里。因此,为发现漏洞而进行的源代码补丁提交挖掘受到了广泛关注,并提出了多种方法。尽管如此,目前还没有一份全面的调查报告来总结和讨论这一领域的最新进展。为了填补这一空白,我们对一系列文献进行了调查、评估和系统化,并就这一领域的成功经验和遗留问题向社区提供了我们的见解。我们特别关注了漏洞发现方面的工作。在本文中,我们还提供了一个介绍性的全景图,介绍了我们可复制的实践经验,这可以帮助读者快速了解并进入相关领域。我们的实证研究揭示了该领域亟待解决的挑战。我们还讨论了未来工作的潜在方向。据我们所知,我们提供了第一份在漏洞发现背景下研究源代码补丁提交挖掘的文献综述。系统框架、实践操作和潜在挑战清单为挖掘源代码补丁提交提供了新的知识,有助于建立更强大的软件生态系统。文献综述中发现的研究空白表明了未来研究的必要性,例如对数据质量、高误报率和文本信息重要性的关注。
{"title":"Vulnerability discovery based on source code patch commit mining: a systematic literature review","authors":"Fei Zuo, Junghwan Rhee","doi":"10.1007/s10207-023-00795-8","DOIUrl":"https://doi.org/10.1007/s10207-023-00795-8","url":null,"abstract":"<p>In recent years, there has been a remarkable surge in the adoption of open-source software (OSS). However, with the growing usage of OSS components in both free and proprietary software, vulnerabilities that are present within them can be spread to a vast array of underlying applications. Even worse, a myriad of vulnerabilities are fixed secretly via patch commits, which causes other software re-using the vulnerable code snippets to be left in the dark. Thus, source code patch commit mining toward vulnerability discovery is receiving immense attention, and a variety of approaches are proposed. Despite that, there is no comprehensive survey summarizing and discussing the current progress within this field. To fill this gap, we survey, evaluate, and systematize a list of literature and provide the community with our insights on both successes and remaining issues in this space. Special attention is paid on the work toward vulnerability discovery. In this paper, we also provide an introductory panorama with our replicable hands-on experience, which can help readers quickly understand and step into the pertinent field. Our empirical study reveals noteworthy challenges which need to be highlighted and addressed in this field. We also discuss potential directions for the future work. To the best of knowledge, we provide the first literature review to study source code patch commit mining in the vulnerability discovery context. The systematic framework, hands-on practices, and list of potential challenges provide new knowledge for mining source code patch commit toward a more robust software eco-system. The research gaps found in this literature review show the need for future research, such as the concern on data quality, high false alarms, and the significance of textual information.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"18 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139374726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A modular cyber security training programme for the maritime domain 海事领域模块化网络安全培训计划
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-03 DOI: 10.1007/s10207-023-00799-4
Aybars Oruc, Nabin Chowdhury, Vasileios Gkioulos

The global maritime industry is continuing the rapid digitization of systems and dependency on advancing technology, in a trend akin to other industrial domains. One of the main issues that this integration has brought is an increased vulnerability to a growing number of cyber threats. While several security measures are being implemented to prevent or respond to cyber attacks, the human element is still one of the main weaknesses. Many of today’s cyber attacks take advantage of human personnel’s lack of awareness, which makes cyber security awareness and training activities of critical importance. Unfortunately, current research is still limited in its offerings for cyber security training specific to maritime personnel. Moreover, such training programmes for the professionals should be developed role-based in accordance with the suggestions of many credited maritime organizations. For this reason, we developed a modular cyber security training programme for the maritime domain called Maritime Cyber Security (MarCy) by implementing Critical Events Model (CEM). Then, we evaluated the MarCy programme by utilizing the Delphi technique with the participation of 19 experts from academia and industry. In this study, we offer cyber security training for seafarers and office employees in shipping companies. We proposed eleven elective modules to improve the knowledge, skills, and attitude of learners against cyber risks. The MarCy programme can be implemented by universities, shipping companies, training institutes, and governmental organizations for maritime cyber security training purposes.

与其他工业领域一样,全球海运业正在继续快速实现系统数字化,并依赖于不断进步的技术。这种整合带来的一个主要问题是,面对越来越多的网络威胁,海运业变得更加脆弱。虽然目前正在实施一些安全措施来预防或应对网络攻击,但人为因素仍然是主要弱点之一。当今的许多网络攻击都是利用了人类缺乏安全意识的弱点,因此网络安全意识和培训活动至关重要。遗憾的是,目前针对海事人员网络安全培训的研究仍然有限。此外,应根据许多著名海事组织的建议,制定基于角色的专业人员培训计划。为此,我们通过实施关键事件模型(CEM),为海事领域开发了名为 "海事网络安全(MarCy)"的模块化网络安全培训计划。然后,我们利用德尔菲技术对 MarCy 计划进行了评估,来自学术界和工业界的 19 位专家参与了评估。在这项研究中,我们为航运公司的海员和办公室员工提供了网络安全培训。我们提出了 11 个选修模块,以提高学员应对网络风险的知识、技能和态度。大学、航运公司、培训机构和政府组织均可实施 MarCy 计划,开展海事网络安全培训。
{"title":"A modular cyber security training programme for the maritime domain","authors":"Aybars Oruc, Nabin Chowdhury, Vasileios Gkioulos","doi":"10.1007/s10207-023-00799-4","DOIUrl":"https://doi.org/10.1007/s10207-023-00799-4","url":null,"abstract":"<p>The global maritime industry is continuing the rapid digitization of systems and dependency on advancing technology, in a trend akin to other industrial domains. One of the main issues that this integration has brought is an increased vulnerability to a growing number of cyber threats. While several security measures are being implemented to prevent or respond to cyber attacks, the human element is still one of the main weaknesses. Many of today’s cyber attacks take advantage of human personnel’s lack of awareness, which makes cyber security awareness and training activities of critical importance. Unfortunately, current research is still limited in its offerings for cyber security training specific to maritime personnel. Moreover, such training programmes for the professionals should be developed role-based in accordance with the suggestions of many credited maritime organizations. For this reason, we developed a modular cyber security training programme for the maritime domain called Maritime Cyber Security (MarCy) by implementing Critical Events Model (CEM). Then, we evaluated the MarCy programme by utilizing the Delphi technique with the participation of 19 experts from academia and industry. In this study, we offer cyber security training for seafarers and office employees in shipping companies. We proposed eleven elective modules to improve the knowledge, skills, and attitude of learners against cyber risks. The MarCy programme can be implemented by universities, shipping companies, training institutes, and governmental organizations for maritime cyber security training purposes.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"50 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139095681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information security and privacy challenges of cloud computing for government adoption: a systematic review 政府采用云计算面临的信息安全和隐私挑战:系统综述
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-03 DOI: 10.1007/s10207-023-00797-6
Ndukwe Ukeje, Jairo Gutierrez, Krassie Petrova

The advent of new technologies and applications coupled with the COVID-19 pandemic tremendously increased cloud computing adoption in private and public institutions (government) and raised the demand for communication and access to a shared pool of resources and storage capabilities. Governments across the globe are moving to the cloud to improve services, reduce costs, and increase effectiveness and efficiency while fostering innovation and citizen engagement. However, information security and privacy concerns raised in the past remain significant to government adoption and utilisation of cloud computing. The study conducts a systematic literature review (SLR) using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach to examine information security and privacy as the fundamental challenges to government intention to adopt cloud computing. This study screened 758 articles and included 33 articles that revealed information security and privacy as critical factors and barriers to adopting cloud computing through a systematic evaluation (PRISMA approach). The combined two factors contributed 70% of the significant gaps to the cloud computing adoption challenges. In contrast, the individual contribution of information security and privacy as a significant gap to the challenges of cloud adoption yielded 9% and 12%, respectively. Furthermore, 9% of the authors recognised the need for a framework to address the challenges but could not attempt to develop the framework. The study contributes to the information security body of knowledge, PRISMA studies and provides direction in proposing strategies and frameworks to tackle information security and privacy challenges as future research.

新技术和新应用的出现以及 COVID-19 大流行极大地增加了云计算在私营和公共机构(政府)中的应用,并提高了对通信和访问共享资源池及存储能力的需求。全球各地的政府都在向云计算迁移,以改善服务、降低成本、提高效力和效率,同时促进创新和公民参与。然而,过去提出的信息安全和隐私问题仍然是政府采用和利用云计算的重要障碍。本研究采用系统综述和元分析首选报告项目(PRISMA)方法进行了系统文献综述(SLR),以研究信息安全和隐私是政府采用云计算的基本挑战。本研究筛选了 758 篇文章,并通过系统评估(PRISMA 方法)纳入了 33 篇揭示信息安全和隐私是采用云计算的关键因素和障碍的文章。在采用云计算所面临的挑战中,这两个因素的综合影响占了重要差距的 70%。与此相反,信息安全和隐私作为采用云计算挑战的重要差距的单独贡献率分别为 9% 和 12%。此外,9% 的作者认识到需要一个框架来应对挑战,但无法尝试开发该框架。本研究为信息安全知识体系、PRISMA 研究做出了贡献,并为提出应对信息安全和隐私挑战的策略和框架作为未来研究提供了方向。
{"title":"Information security and privacy challenges of cloud computing for government adoption: a systematic review","authors":"Ndukwe Ukeje, Jairo Gutierrez, Krassie Petrova","doi":"10.1007/s10207-023-00797-6","DOIUrl":"https://doi.org/10.1007/s10207-023-00797-6","url":null,"abstract":"<p>The advent of new technologies and applications coupled with the COVID-19 pandemic tremendously increased cloud computing adoption in private and public institutions (government) and raised the demand for communication and access to a shared pool of resources and storage capabilities. Governments across the globe are moving to the cloud to improve services, reduce costs, and increase effectiveness and efficiency while fostering innovation and citizen engagement. However, information security and privacy concerns raised in the past remain significant to government adoption and utilisation of cloud computing. The study conducts a systematic literature review (SLR) using the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) approach to examine information security and privacy as the fundamental challenges to government intention to adopt cloud computing. This study screened 758 articles and included 33 articles that revealed information security and privacy as critical factors and barriers to adopting cloud computing through a systematic evaluation (PRISMA approach). The combined two factors contributed 70% of the significant gaps to the cloud computing adoption challenges. In contrast, the individual contribution of information security and privacy as a significant gap to the challenges of cloud adoption yielded 9% and 12%, respectively. Furthermore, 9% of the authors recognised the need for a framework to address the challenges but could not attempt to develop the framework. The study contributes to the information security body of knowledge, PRISMA studies and provides direction in proposing strategies and frameworks to tackle information security and privacy challenges as future research.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"81 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139082130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maritime cybersecurity: protecting digital seas 海事网络安全:保护数字海洋
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-02 DOI: 10.1007/s10207-023-00800-0
Ferney Martínez, Luis Enrique Sànchez, Antonio Santos-Olmo, David G. Rosado, Eduardo Fernàndez-Medina

Increasing digitisation in the maritime domain and the intensive use of information technologies have become essential for the effective functioning of systems that manage navigation, communications, sensors and weapons throughout the maritime chain. In this context, the issuance and enforcement of international standards and policies are seeking to mitigate the appearance of threats and vulnerabilities that aim to compromise access to functionalities, on-board systems and network integrity. Thus, in this article, we first review the main proposals for guidelines, frameworks and other solutions related to cybersecurity in the maritime environment. Subsequently, we analyse the way in which cybersecurity challenges specific to systems and equipment in this particular environment are addressed, identifying the main cybersecurity weaknesses and needs in the maritime environment that are not completely addressed. Based on this analysis, we then propose the structure of POSEIDON, a comprehensive framework for managing cybersecurity in maritime environments that addresses the identified gaps. This cybersecurity management framework takes into account existing proposals and is complemented by a set of new elements to provide a comprehensive approach to addressing the weaknesses identified.

海事领域日益数字化和信息技术的大量使用,对整个海事链中管理导航、通信、传感器和武器的系统的有效运作至关重要。在这种情况下,国际标准和政策的发布和实施正寻求减少威胁和漏洞的出现,这些威胁和漏洞的目的是破坏对功能、船上系统和网络完整性的访问。因此,在本文中,我们首先回顾了与海事环境网络安全有关的指导方针、框架和其他解决方案的主要建议。随后,我们分析了应对这一特定环境中系统和设备特有的网络安全挑战的方式,确定了海事环境中尚未完全解决的主要网络安全弱点和需求。在此分析基础上,我们提出了 POSEIDON 的结构,这是一个用于管理海事环境中网络安全的综合框架,可解决已确定的差距。该网络安全管理框架考虑了现有的建议,并辅以一系列新要素,以提供一种全面的方法来解决所发现的薄弱环节。
{"title":"Maritime cybersecurity: protecting digital seas","authors":"Ferney Martínez, Luis Enrique Sànchez, Antonio Santos-Olmo, David G. Rosado, Eduardo Fernàndez-Medina","doi":"10.1007/s10207-023-00800-0","DOIUrl":"https://doi.org/10.1007/s10207-023-00800-0","url":null,"abstract":"<p>Increasing digitisation in the maritime domain and the intensive use of information technologies have become essential for the effective functioning of systems that manage navigation, communications, sensors and weapons throughout the maritime chain. In this context, the issuance and enforcement of international standards and policies are seeking to mitigate the appearance of threats and vulnerabilities that aim to compromise access to functionalities, on-board systems and network integrity. Thus, in this article, we first review the main proposals for guidelines, frameworks and other solutions related to cybersecurity in the maritime environment. Subsequently, we analyse the way in which cybersecurity challenges specific to systems and equipment in this particular environment are addressed, identifying the main cybersecurity weaknesses and needs in the maritime environment that are not completely addressed. Based on this analysis, we then propose the structure of POSEIDON, a comprehensive framework for managing cybersecurity in maritime environments that addresses the identified gaps. This cybersecurity management framework takes into account existing proposals and is complemented by a set of new elements to provide a comprehensive approach to addressing the weaknesses identified.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"124 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139078527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1