首页 > 最新文献

International Journal of Information Security最新文献

英文 中文
Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network 利用加权集合平均深度神经网络协同入侵检测异构网络中的协同攻击检测
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1007/s10207-024-00891-3
Aulia Arif Wardana, Grzegorz Kołaczek, Arkadiusz Warzyński, Parman Sukarno

Detecting coordinated attacks in cybersecurity is challenging due to their sophisticated and distributed nature, making traditional Intrusion Detection Systems often ineffective, especially in heterogeneous networks with diverse devices and systems. This research introduces a novel Collaborative Intrusion Detection System (CIDS) using a Weighted Ensemble Averaging Deep Neural Network (WEA-DNN) designed to detect such attacks. The WEA-DNN combines deep learning techniques and ensemble methods to enhance detection capabilities by integrating multiple Deep Neural Network (DNN) models, each trained on different data subsets with varying architectures. Differential Evolution optimizes the model’s contributions by calculating optimal weights, allowing the system to collaboratively analyze network traffic data from diverse sources. Extensive experiments on real-world datasets like CICIDS2017, CSE-CICIDS2018, CICToNIoT, and CICBotIoT show that the CIDS framework achieves an average accuracy of 93.8%, precision of 78.6%, recall of 60.4%, and an F1-score of 62.4%, surpassing traditional ensemble models and matching the performance of local DNN models. This demonstrates the practical benefits of WEA-DNN in improving detection capabilities in real-world heterogeneous network environments, offering superior adaptability and robustness in handling complex attack patterns.

网络安全领域的协同攻击具有复杂性和分布性,因此传统的入侵检测系统往往无法有效检测,尤其是在具有不同设备和系统的异构网络中。本研究利用加权集合平均深度神经网络(WEA-DNN)引入了一种新型协同入侵检测系统(CIDS),旨在检测此类攻击。WEA-DNN 结合了深度学习技术和集合方法,通过整合多个深度神经网络(DNN)模型来增强检测能力,每个模型都在不同的数据子集上经过训练,具有不同的架构。差分进化通过计算最佳权重来优化模型的贡献,使系统能够协同分析来自不同来源的网络流量数据。在 CICIDS2017、CSE-CICIDS2018、CICToNIoT 和 CICBotIoT 等实际数据集上进行的大量实验表明,CIDS 框架的平均准确率达到 93.8%,精确率达到 78.6%,召回率达到 60.4%,F1 分数达到 62.4%,超过了传统的集合模型,与本地 DNN 模型的性能不相上下。这证明了 WEA-DNN 在提高真实世界异构网络环境中的检测能力方面具有实际优势,在处理复杂攻击模式时具有卓越的适应性和鲁棒性。
{"title":"Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network","authors":"Aulia Arif Wardana, Grzegorz Kołaczek, Arkadiusz Warzyński, Parman Sukarno","doi":"10.1007/s10207-024-00891-3","DOIUrl":"https://doi.org/10.1007/s10207-024-00891-3","url":null,"abstract":"<p>Detecting coordinated attacks in cybersecurity is challenging due to their sophisticated and distributed nature, making traditional Intrusion Detection Systems often ineffective, especially in heterogeneous networks with diverse devices and systems. This research introduces a novel Collaborative Intrusion Detection System (CIDS) using a Weighted Ensemble Averaging Deep Neural Network (WEA-DNN) designed to detect such attacks. The WEA-DNN combines deep learning techniques and ensemble methods to enhance detection capabilities by integrating multiple Deep Neural Network (DNN) models, each trained on different data subsets with varying architectures. Differential Evolution optimizes the model’s contributions by calculating optimal weights, allowing the system to collaboratively analyze network traffic data from diverse sources. Extensive experiments on real-world datasets like CICIDS2017, CSE-CICIDS2018, CICToNIoT, and CICBotIoT show that the CIDS framework achieves an average accuracy of 93.8%, precision of 78.6%, recall of 60.4%, and an F1-score of 62.4%, surpassing traditional ensemble models and matching the performance of local DNN models. This demonstrates the practical benefits of WEA-DNN in improving detection capabilities in real-world heterogeneous network environments, offering superior adaptability and robustness in handling complex attack patterns.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"94 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The $$mathrm {ACAC_{D}}$$ model for mutable activity control and chain of dependencies in smart and connected systems 用于智能互联系统中可变活动控制和依赖链的 $$mathrm {ACAC_{D}}$ 模型
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-20 DOI: 10.1007/s10207-024-00881-5
Tanjila Mawla, Maanak Gupta, Safwa Ameer, Ravi Sandhu
<p>With the integration of connected devices, artificial intelligence, and heterogeneous networks in IoT-driven cyber-physical systems, our society is evolving as a smart, automated, and connected community. In such dynamic and distributed environments, various operations are carried out considering different contextual factors to support the automation of connected devices and systems. These devices often perform long-lived operations or tasks (referred to as activities) to fulfill larger goals in the connected environment. These activities are usually mutable (change states) and interdependent. They can influence the execution of other activities in the ecosystem, requiring <i>active</i> and real-time monitoring of the entire connected environment. Traditional access control models are designed to take authorization decisions at the time of access request and do not fit well in dynamic and connected environments, which require continuous active checks on dependent and mutable activities. Recently, a vision for activity-centric access control (ACAC) was proposed to enable security modeling and enforcement from the perspective and abstraction of interdependent activities. The proposed ACAC incorporates four decision parameters: Authorizations (A), oBligations (B), Conditions (C), and activity Dependencies (D) for an <i>object agnostic</i> continuous access control in smart systems. In this paper, we take a step further towards maturing ACAC by focusing on the mutability of activities (the ability of changing states of activities), activity dependencies (D) and developing a family of formal mathematically grounded models, referred to as <span>(mathrm {ACAC_{D}})</span>. We propose six practically suitable sub-models for <span>(mathrm {ACAC_{D}})</span> to support the state transition of a mutable activity incorporating the dependent activities’ state-check and state-update procedures. These formal models consider the real-time mutability of activities as a critical factor in resolving <i>active</i> dependencies among various activities in the ecosystem. Activity dependencies can form a chain where it is possible to have dependencies of dependencies. In ACAC, we also consider the chain of dependencies while handling the mutability of an activity. We highlight the challenges (such as multiple dependency paths, race conditions, circular dependencies, and deadlocks) while dealing with a chain of dependencies, and provide solutions to resolve these challenges. We also present a proof of concept implementation of our proposed <span>(mathrm {ACAC_{D}})</span> models with performance analysis for a smart farming use case. This paper addresses the formal models’ intended behavior while supporting activities’ dependencies. Specifically, it focuses on developing and categorizing mathematically grounded activity dependencies into various ACAC sub-models without formal policy specification and analysis of theoretical complexities, which are intentionally kept
随着物联网驱动的网络物理系统中互联设备、人工智能和异构网络的集成,我们的社会正在演变成一个智能、自动化和互联的社区。在这种动态的分布式环境中,为了支持互联设备和系统的自动化,需要考虑不同的环境因素来执行各种操作。这些设备通常会执行长期的操作或任务(称为活动),以实现互联环境中的更大目标。这些活动通常是可变的(状态可变),并且相互依存。它们会影响生态系统中其他活动的执行,因此需要对整个互联环境进行主动和实时监控。传统的访问控制模型设计用于在提出访问请求时做出授权决定,不能很好地适应动态互联环境,因为这种环境需要对依赖性和易变性活动进行持续的主动检查。最近,有人提出了一种以活动为中心的访问控制(ACAC)设想,以便从相互依存活动的角度和抽象角度进行安全建模和执行。拟议的 ACAC 包含四个决策参数:授权 (A)、义务 (B)、条件 (C) 和活动依赖 (D),从而在智能系统中实现与对象无关的持续访问控制。在本文中,我们将重点放在活动的可变性(改变活动状态的能力)、活动依赖性(D)上,并开发了一系列正式的数学模型,称为 (mathrm {ACAC_{D}}) ,从而进一步推动 ACAC 的成熟。我们为 (mathrm {ACAC_{D}}) 提出了六个实际适用的子模型,以支持包含依赖活动的状态检查和状态更新程序的可变活动的状态转换。这些形式化模型将活动的实时可变性视为解决生态系统中各种活动间主动依赖关系的关键因素。活动依赖关系可以形成一个链条,在这个链条上有可能存在依赖关系的依赖关系。在 ACAC 中,我们在处理活动的可变性时也考虑了依赖链。我们强调了在处理依赖链时所面临的挑战(如多重依赖路径、竞赛条件、循环依赖和死锁),并提供了解决这些挑战的方案。我们还介绍了我们所提出的 (mathrm {ACAC_{D}}) 模型的概念验证实现,并对智能农业用例进行了性能分析。本文讨论了正式模型的预期行为,同时支持活动的依赖性。具体来说,本文重点关注将数学基础上的活动依赖关系开发和分类到各种 ACAC 子模型中,而不涉及正式的策略规范和理论复杂性分析,这些都有意地超出了本文的研究范围。
{"title":"The $$mathrm {ACAC_{D}}$$ model for mutable activity control and chain of dependencies in smart and connected systems","authors":"Tanjila Mawla, Maanak Gupta, Safwa Ameer, Ravi Sandhu","doi":"10.1007/s10207-024-00881-5","DOIUrl":"https://doi.org/10.1007/s10207-024-00881-5","url":null,"abstract":"&lt;p&gt;With the integration of connected devices, artificial intelligence, and heterogeneous networks in IoT-driven cyber-physical systems, our society is evolving as a smart, automated, and connected community. In such dynamic and distributed environments, various operations are carried out considering different contextual factors to support the automation of connected devices and systems. These devices often perform long-lived operations or tasks (referred to as activities) to fulfill larger goals in the connected environment. These activities are usually mutable (change states) and interdependent. They can influence the execution of other activities in the ecosystem, requiring &lt;i&gt;active&lt;/i&gt; and real-time monitoring of the entire connected environment. Traditional access control models are designed to take authorization decisions at the time of access request and do not fit well in dynamic and connected environments, which require continuous active checks on dependent and mutable activities. Recently, a vision for activity-centric access control (ACAC) was proposed to enable security modeling and enforcement from the perspective and abstraction of interdependent activities. The proposed ACAC incorporates four decision parameters: Authorizations (A), oBligations (B), Conditions (C), and activity Dependencies (D) for an &lt;i&gt;object agnostic&lt;/i&gt; continuous access control in smart systems. In this paper, we take a step further towards maturing ACAC by focusing on the mutability of activities (the ability of changing states of activities), activity dependencies (D) and developing a family of formal mathematically grounded models, referred to as &lt;span&gt;(mathrm {ACAC_{D}})&lt;/span&gt;. We propose six practically suitable sub-models for &lt;span&gt;(mathrm {ACAC_{D}})&lt;/span&gt; to support the state transition of a mutable activity incorporating the dependent activities’ state-check and state-update procedures. These formal models consider the real-time mutability of activities as a critical factor in resolving &lt;i&gt;active&lt;/i&gt; dependencies among various activities in the ecosystem. Activity dependencies can form a chain where it is possible to have dependencies of dependencies. In ACAC, we also consider the chain of dependencies while handling the mutability of an activity. We highlight the challenges (such as multiple dependency paths, race conditions, circular dependencies, and deadlocks) while dealing with a chain of dependencies, and provide solutions to resolve these challenges. We also present a proof of concept implementation of our proposed &lt;span&gt;(mathrm {ACAC_{D}})&lt;/span&gt; models with performance analysis for a smart farming use case. This paper addresses the formal models’ intended behavior while supporting activities’ dependencies. Specifically, it focuses on developing and categorizing mathematically grounded activity dependencies into various ACAC sub-models without formal policy specification and analysis of theoretical complexities, which are intentionally kept ","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"70 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141741056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure 操作员的意识:关键基础设施 SOC 中的目标任务分析
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-19 DOI: 10.1007/s10207-024-00872-6
Håvard Jakobsen Ofte

Security operation centers (SOCs) are increasingly established to meet the growing threat against cyber security. The operators of SOCs respond to complex incidents under time constraints. Within critical infrastructure, the consequences of human error or low performance in SOCs may be detrimental. In other domains, situation awareness (SA) has proven useful to understand and measure how operators use information and decide the correct actions. Until now, SA research in SOCs has been restricted by a lack of in-depth studies of SA mechanisms. Therefore, this study is the first to conduct a goal-directed task analysis in a SOC for critical infrastructure. The study was conducted through a targeted series of unstructured and semi-structured interviews with SOC operators and their leaders complemented by a review of documents, incident reports, and in situ observation of work within the SOC and real incidents. Among the presented findings is a goal hierarchy alongside a complete overview of the decisions the operators make during escalated incidents. How the operators gain and use SA in these decisions is presented as a complete set of SA requirements. The findings are accompanied by an analysis of contextual differences in how the operators prioritize goals and use information in network incidents and security incidents. This enables a discussion of what SA processes might be automated and which would benefit from different SA models. The study provides a unique insight into the SA of SOC operators and is thus a steppingstone for bridging the knowledge gap of Cyber SA.

为应对日益严重的网络安全威胁,越来越多地建立了安全运行中心(SOC)。SOC 的操作人员在时间紧迫的情况下应对复杂的事件。在关键基础设施中,人为失误或 SOC 性能低下可能会造成严重后果。在其他领域,态势感知(SA)已被证明有助于了解和衡量操作员如何使用信息并决定采取正确行动。迄今为止,由于缺乏对 SA 机制的深入研究,SOC 中的 SA 研究一直受到限制。因此,本研究首次在关键基础设施 SOC 中进行了目标导向任务分析。研究通过一系列有针对性的非结构化和半结构化访谈进行,访谈对象包括 SOC 操作员及其领导,并辅以对文件、事件报告的审查,以及对 SOC 内部工作和真实事件的现场观察。研究结果包括一个目标层次结构,以及操作员在事件升级期间所做决策的完整概述。操作员如何在这些决策中获得和使用 SA,将作为一套完整的 SA 要求进行介绍。研究结果还分析了运营商在网络事件和安全事件中优先考虑目标和使用信息的背景差异。这样就可以讨论哪些 SA 流程可以实现自动化,哪些可以从不同的 SA 模型中受益。这项研究为 SOC 运营商的 SA 提供了独特的见解,因此是缩小网络 SA 知识差距的垫脚石。
{"title":"The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure","authors":"Håvard Jakobsen Ofte","doi":"10.1007/s10207-024-00872-6","DOIUrl":"https://doi.org/10.1007/s10207-024-00872-6","url":null,"abstract":"<p>Security operation centers (SOCs) are increasingly established to meet the growing threat against cyber security. The operators of SOCs respond to complex incidents under time constraints. Within critical infrastructure, the consequences of human error or low performance in SOCs may be detrimental. In other domains, situation awareness (SA) has proven useful to understand and measure how operators use information and decide the correct actions. Until now, SA research in SOCs has been restricted by a lack of in-depth studies of SA mechanisms. Therefore, this study is the first to conduct a goal-directed task analysis in a SOC for critical infrastructure. The study was conducted through a targeted series of unstructured and semi-structured interviews with SOC operators and their leaders complemented by a review of documents, incident reports, and in situ observation of work within the SOC and real incidents. Among the presented findings is a goal hierarchy alongside a complete overview of the decisions the operators make during escalated incidents. How the operators gain and use SA in these decisions is presented as a complete set of SA requirements. The findings are accompanied by an analysis of contextual differences in how the operators prioritize goals and use information in network incidents and security incidents. This enables a discussion of what SA processes might be automated and which would benefit from different SA models. The study provides a unique insight into the SA of SOC operators and is thus a steppingstone for bridging the knowledge gap of Cyber SA.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"62 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141740996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on privacy and security aspects of personalised apps 个性化应用程序的隐私和安全问题研究
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-18 DOI: 10.1007/s10207-024-00887-z
Stylianos Gerasimou, Konstantinos Limniotis

This paper studies personalised smart apps, from a data protection and security point of view. More precisely, having as a reference model the provisions stemming from the General Data Protection Regulation, we investigate whether such apps, whose philosophy is based on the provision of personalised services, adopt appropriate data protection techniques, focusing especially on aspects from the data protection by design and by default principles, as well as on their security features. Our analysis over ten popular such Android apps illustrates the existence of several privacy concerns, including the facts that several data processes are by default enabled without requesting users’ consent, as well as that several data processes are not well justified or sufficiently transparent to the users. Moreover, interestingly enough, the apps studied are not free of known security weaknesses.

本文从数据保护和安全的角度研究个性化智能应用程序。更确切地说,以《通用数据保护条例》的规定为参考模型,我们研究了以提供个性化服务为理念的此类应用程序是否采用了适当的数据保护技术,尤其侧重于数据保护设计和默认原则的各个方面,以及它们的安全功能。我们对十款流行的此类安卓应用程序进行的分析表明,这些应用程序存在一些隐私问题,包括一些数据处理程序在未征得用户同意的情况下被默认启用,以及一些数据处理程序对用户而言理由不充分或不够透明。此外,有趣的是,所研究的应用程序并非没有已知的安全漏洞。
{"title":"A study on privacy and security aspects of personalised apps","authors":"Stylianos Gerasimou, Konstantinos Limniotis","doi":"10.1007/s10207-024-00887-z","DOIUrl":"https://doi.org/10.1007/s10207-024-00887-z","url":null,"abstract":"<p>This paper studies personalised smart apps, from a data protection and security point of view. More precisely, having as a reference model the provisions stemming from the General Data Protection Regulation, we investigate whether such apps, whose philosophy is based on the provision of personalised services, adopt appropriate data protection techniques, focusing especially on aspects from the data protection by design and by default principles, as well as on their security features. Our analysis over ten popular such Android apps illustrates the existence of several privacy concerns, including the facts that several data processes are by default enabled without requesting users’ consent, as well as that several data processes are not well justified or sufficiently transparent to the users. Moreover, interestingly enough, the apps studied are not free of known security weaknesses.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"37 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141740997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A few-shot learning based method for industrial internet intrusion detection 基于少量学习的工业互联网入侵检测方法
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-18 DOI: 10.1007/s10207-024-00889-x
Yahui Wang, Zhiyong Zhang, Kejing Zhao, Peng Wang, Ruirui Wu

In response to the issue of insufficient model detection capability caused by the lack of labeled samples and the existence of new types of attacks in the industrial internet, a few-shot learning-based intrusion detection method is proposed.The method constructs the encoder of the prototypical network using a one-dimensional convolutional neural network (1D-CNN) and an attention mechanism, and employs the squared Euclidean distance function as the metric function to improve the prototypical network. This approach aims to enhance the accuracy of intrusion detection in scenarios with scarce labeled samples and the presence of new types of attacks.inally, simulation experiments are conducted on the few-shot learning-based intrusion detection system. The results demonstrate that the method achieves accuracy rates of 86.35% and 91.25% on the CIC-IDS 2017 and GasPipline datasets, respectively, while also exhibiting significant advantages in detecting new types of attacks.

该方法利用一维卷积神经网络(1D-CNN)和注意力机制构建原型网络的编码器,并采用欧氏距离平方函数作为度量函数来改进原型网络。该方法旨在提高入侵检测的准确性,以应对标注样本稀缺和新型攻击的情况。结果表明,该方法在 CIC-IDS 2017 和 GasPipline 数据集上的准确率分别达到 86.35% 和 91.25%,同时在检测新型攻击方面也表现出显著优势。
{"title":"A few-shot learning based method for industrial internet intrusion detection","authors":"Yahui Wang, Zhiyong Zhang, Kejing Zhao, Peng Wang, Ruirui Wu","doi":"10.1007/s10207-024-00889-x","DOIUrl":"https://doi.org/10.1007/s10207-024-00889-x","url":null,"abstract":"<p>In response to the issue of insufficient model detection capability caused by the lack of labeled samples and the existence of new types of attacks in the industrial internet, a few-shot learning-based intrusion detection method is proposed.The method constructs the encoder of the prototypical network using a one-dimensional convolutional neural network (1D-CNN) and an attention mechanism, and employs the squared Euclidean distance function as the metric function to improve the prototypical network. This approach aims to enhance the accuracy of intrusion detection in scenarios with scarce labeled samples and the presence of new types of attacks.inally, simulation experiments are conducted on the few-shot learning-based intrusion detection system. The results demonstrate that the method achieves accuracy rates of 86.35% and 91.25% on the CIC-IDS 2017 and GasPipline datasets, respectively, while also exhibiting significant advantages in detecting new types of attacks.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"1 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141740998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information flow control for comparative privacy analyses 用于隐私比较分析的信息流控制
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-14 DOI: 10.1007/s10207-024-00886-0
Zubair Ahmad, Stefano Calzavara, Samuele Casarin, Ben Stock

The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web measurements. Most such measurements however are limited to the choice of a specific client used for data collection, which is insufficient to characterize the relative privacy guarantees offered by the adoption of different clients to access the Web. Recent work on comparative privacy analyses involving multiple clients is still preliminary and relies on relatively simple heuristics to detect web tracking based on the inspection of HTTP requests, cookies and API usage. In this paper, we propose a more sophisticated methodology based on information flow tracking, which is better suited for the complexity of comparing tracking behavior observed in different clients. After clarifying the key challenges of comparative privacy analyses, we apply our methodology to investigate web tracking practices on the top 10k websites from Tranco as observed by different clients, i.e., Firefox and Brave, under different configuration settings. Our analysis estimates information flow reduction to quantify the privacy benefits offered by the filter lists implemented in Firefox and Brave, as well as the effectiveness of their partitioned storage mechanism against cross-site tracking.

研究界通过大规模网络测量,对网络跟踪的普遍性及其主要特征进行了广泛研究。然而,大多数此类测量仅限于选择用于数据收集的特定客户端,不足以描述采用不同客户端访问网络所提供的相对隐私保证。最近关于涉及多个客户端的隐私比较分析的工作仍处于初步阶段,并且依赖于相对简单的启发式方法,根据对 HTTP 请求、cookie 和 API 使用情况的检查来检测网络跟踪。在本文中,我们提出了一种基于信息流跟踪的更复杂的方法,这种方法更适合比较在不同客户端观察到的跟踪行为的复杂性。在阐明了隐私比较分析的关键挑战之后,我们应用我们的方法调查了不同客户端(即 Firefox 和 Brave)在不同配置设置下对 Tranco 的前 10k 个网站的网络跟踪行为。我们的分析估计了信息流的减少,以量化 Firefox 和 Brave 中实施的过滤列表所提供的隐私优势,以及它们的分区存储机制对跨站跟踪的有效性。
{"title":"Information flow control for comparative privacy analyses","authors":"Zubair Ahmad, Stefano Calzavara, Samuele Casarin, Ben Stock","doi":"10.1007/s10207-024-00886-0","DOIUrl":"https://doi.org/10.1007/s10207-024-00886-0","url":null,"abstract":"<p>The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web measurements. Most such measurements however are limited to the choice of a specific client used for data collection, which is insufficient to characterize the relative privacy guarantees offered by the adoption of different clients to access the Web. Recent work on <i>comparative</i> privacy analyses involving multiple clients is still preliminary and relies on relatively simple heuristics to detect web tracking based on the inspection of HTTP requests, cookies and API usage. In this paper, we propose a more sophisticated methodology based on information flow tracking, which is better suited for the complexity of comparing tracking behavior observed in different clients. After clarifying the key challenges of comparative privacy analyses, we apply our methodology to investigate web tracking practices on the top 10k websites from Tranco as observed by different clients, i.e., Firefox and Brave, under different configuration settings. Our analysis estimates information flow reduction to quantify the privacy benefits offered by the filter lists implemented in Firefox and Brave, as well as the effectiveness of their partitioned storage mechanism against cross-site tracking.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"23 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141614272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust attack prevention based on Spark-blockchain in social IoT: a survey 社交物联网中基于星火区块链的信任攻击防范:一项调查
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-13 DOI: 10.1007/s10207-024-00885-1
Mariam Masmoudi, Ikram Amous, Corinne Amel Zayani, Florence Sèdes

Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects to establish social relationships. Nonetheless, trust issues such as attacks have emerged. These attacks can influence service discovery results. A trust management mechanism has become a major challenge in the Social IoT to prevent these attacks and ensure qualified services. A few studies have addressed trust management issues, especially those that prevent trust attacks in Social IoT environments. However, most studies have been dedicated to detect offline attacks with or without specifying the type of attack performed. These works will not be able to prevent attacks by aborting transactions between users because their primary purpose is to detect an offline attack. In addition, they do not consider security properties. This research paper aims to provide a detailed survey on trust management mechanism to handle trust attacks in Social IoT. In this research paper, we compared the techniques and technologies whose common point is attack prevention and demonstrated that blockchain technology can play a key role in developing a trust management mechanism that can prevent trust attacks while maintaining security properties. Then, we proposed combining the Apache Spark Framework with blockchain technology to provide real-time attack prevention. This combination can assist in creating upgraded trust management mechanisms in Social IoT environments. These mechanisms aim to prevent attacks in real-time through considering the security properties. Lack of survey papers in the area of trust attack prevention in real-time stands for an important motivational factor for writing this paper. The current research paper highlights the potential of the blockchain technology and Apache Spark in terms of developing an upgraded trust management able to prevent trust attacks in real-time.This paper provides a comprehensive survey on trust management mechanisms and approaches to handle trust attacks in Social IoT. Lack of such papers increases the significance of this paper. It also offers potential future research directions in terms of real-time trust attack prevention.

物联网(IoT)与社交网络(SN)的结合催生了一种新的模式--社交物联网,它允许用户和物体建立社交关系。然而,信任问题(如攻击)已经出现。这些攻击会影响服务发现结果。信任管理机制已成为社交物联网的一大挑战,以防止这些攻击并确保提供合格的服务。有一些研究探讨了信任管理问题,特别是在社交物联网环境中防止信任攻击的问题。然而,大多数研究都致力于检测离线攻击,或不指定攻击类型。这些研究无法通过中止用户之间的交易来防止攻击,因为它们的主要目的是检测离线攻击。此外,它们也没有考虑安全属性。本研究论文旨在对信任管理机制进行详细调查,以处理社交物联网中的信任攻击。在本研究论文中,我们比较了以预防攻击为共同点的技术和工艺,并证明区块链技术在开发既能预防信任攻击又能保持安全属性的信任管理机制中可以发挥关键作用。然后,我们提出将 Apache Spark 框架与区块链技术相结合,以提供实时攻击防范。这种结合有助于在社交物联网环境中创建升级版信任管理机制。这些机制旨在通过考虑安全属性来实时防止攻击。在实时防止信任攻击领域缺乏调查论文是撰写本文的一个重要动因。本研究论文强调了区块链技术和 Apache Spark 在开发能够实时防止信任攻击的升级版信任管理方面的潜力。本论文全面调查了社交物联网中处理信任攻击的信任管理机制和方法。此类论文的缺乏增加了本文的重要性。本文对社交物联网中的信任管理机制和处理信任攻击的方法进行了全面调查,增加了本文的意义,同时也为实时防范信任攻击提供了潜在的未来研究方向。
{"title":"Trust attack prevention based on Spark-blockchain in social IoT: a survey","authors":"Mariam Masmoudi, Ikram Amous, Corinne Amel Zayani, Florence Sèdes","doi":"10.1007/s10207-024-00885-1","DOIUrl":"https://doi.org/10.1007/s10207-024-00885-1","url":null,"abstract":"<p>Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects to establish social relationships. Nonetheless, trust issues such as attacks have emerged. These attacks can influence service discovery results. A trust management mechanism has become a major challenge in the Social IoT to prevent these attacks and ensure qualified services. A few studies have addressed trust management issues, especially those that prevent trust attacks in Social IoT environments. However, most studies have been dedicated to detect offline attacks with or without specifying the type of attack performed. These works will not be able to prevent attacks by aborting transactions between users because their primary purpose is to detect an offline attack. In addition, they do not consider security properties. This research paper aims to provide a detailed survey on trust management mechanism to handle trust attacks in Social IoT. In this research paper, we compared the techniques and technologies whose common point is attack prevention and demonstrated that blockchain technology can play a key role in developing a trust management mechanism that can prevent trust attacks while maintaining security properties. Then, we proposed combining the Apache Spark Framework with blockchain technology to provide real-time attack prevention. This combination can assist in creating upgraded trust management mechanisms in Social IoT environments. These mechanisms aim to prevent attacks in real-time through considering the security properties. Lack of survey papers in the area of trust attack prevention in real-time stands for an important motivational factor for writing this paper. The current research paper highlights the potential of the blockchain technology and Apache Spark in terms of developing an upgraded trust management able to prevent trust attacks in real-time.This paper provides a comprehensive survey on trust management mechanisms and approaches to handle trust attacks in Social IoT. Lack of such papers increases the significance of this paper. It also offers potential future research directions in terms of real-time trust attack prevention.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"36 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141614269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey-based analysis of cybersecurity awareness of Turkish seafarers 基于调查的土耳其海员网络安全意识分析
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-10 DOI: 10.1007/s10207-024-00884-2
Ivar Moen, Aybars Oruc, Ahmed Amro, Vasileios Gkioulos, Georgios Kavallieratos

In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an attractive target for cyber threat actors. Despite the limited cybersecurity training seafarers receive, they are expected to operate within technologically advanced environments. The importance of cybersecurity awareness is evident, but the extent of seafarers’ knowledge in this area remains uncertain. This article investigates three primary aspects: (1) the current state of cybersecurity onboard cargo vessels, (2) seafarers’ cybersecurity awareness, and (3) potential improvements in seafarers’ cybersecurity awareness. To accomplish this, a literature review is conducted to collect and analyze current research, supplemented by a questionnaire survey targeting Turkish seafarers. Our findings support increased investment in awareness and training programs, including organizational-wide cybersecurity awareness efforts, more frequent training, mandatory training for all seafarers through the Standards of Training Certification and Watchkeeping (STCW), and the appointment of a cybersecurity Officer (CySO) to ensure satisfactory cybersecurity levels onboard. Since this article focuses on high-level topics by assessing the general state of maritime cybersecurity and seafarers’ cybersecurity awareness, it does not delve into detailed considerations of awareness and training programs. Nevertheless, it lays the foundation for future research in this area.

近年来,船舶日益数字化,反映了更广泛的社会趋势。因此,海上作业已成为网络威胁行为者的一个有吸引力的目标。尽管海员接受的网络安全培训有限,但他们却要在技术先进的环境中作业。网络安全意识的重要性不言而喻,但海员在这一领域的知识水平仍不确定。本文主要研究三个方面:(1) 货船上网络安全的现状,(2) 海员的网络安全意识,(3) 海员网络安全意识的潜在改进。为此,我们进行了文献综述以收集和分析当前的研究,并针对土耳其海员进行了问卷调查。我们的研究结果支持增加对意识和培训计划的投资,包括全组织范围内的网络安全意识努力、更频繁的培训、通过培训认证和值班标准 (STCW) 对所有海员进行强制培训,以及任命一名网络安全官 (CySO) 以确保船上网络安全水平令人满意。由于本文通过评估海事网络安全和海员网络安全意识的总体状况来关注高层次的主题,因此不会深入探讨意识和培训计划的细节问题。不过,本文为这一领域的未来研究奠定了基础。
{"title":"Survey-based analysis of cybersecurity awareness of Turkish seafarers","authors":"Ivar Moen, Aybars Oruc, Ahmed Amro, Vasileios Gkioulos, Georgios Kavallieratos","doi":"10.1007/s10207-024-00884-2","DOIUrl":"https://doi.org/10.1007/s10207-024-00884-2","url":null,"abstract":"<p>In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an attractive target for cyber threat actors. Despite the limited cybersecurity training seafarers receive, they are expected to operate within technologically advanced environments. The importance of cybersecurity awareness is evident, but the extent of seafarers’ knowledge in this area remains uncertain. This article investigates three primary aspects: (1) the current state of cybersecurity onboard cargo vessels, (2) seafarers’ cybersecurity awareness, and (3) potential improvements in seafarers’ cybersecurity awareness. To accomplish this, a literature review is conducted to collect and analyze current research, supplemented by a questionnaire survey targeting Turkish seafarers. Our findings support increased investment in awareness and training programs, including organizational-wide cybersecurity awareness efforts, more frequent training, mandatory training for all seafarers through the Standards of Training Certification and Watchkeeping (STCW), and the appointment of a cybersecurity Officer (CySO) to ensure satisfactory cybersecurity levels onboard. Since this article focuses on high-level topics by assessing the general state of maritime cybersecurity and seafarers’ cybersecurity awareness, it does not delve into detailed considerations of awareness and training programs. Nevertheless, it lays the foundation for future research in this area.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"2018 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141585566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using the ACE framework to enforce access and usage control with notifications of revoked access rights 使用 ACE 框架执行访问和使用控制,并通知撤销访问权限
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-08 DOI: 10.1007/s10207-024-00877-1
Marco Rasori, Andrea Saracino, Paolo Mori, Marco Tiloca

The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is intended for use in Internet-of-Things environments. In particular, ACE relies on OAuth 2.0, CoAP, CBOR, and COSE as its core building blocks. In ACE, a non-constrained entity called Authorization Server issues Access Tokens to Clients according to some access control and policy evaluation mechanism. An Access Token is then consumed by a Resource Server, which verifies the Access Token and lets the Client accordingly access a protected resource it hosts. Access Tokens have a validity which is limited over time, but they can also be revoked by the Authorization Server before they expire. In this work, we propose the Usage Control framework as an underlying access control means for the ACE Authorization Server, and we assess its performance in terms of time required to issue and revoke Access Tokens. Moreover, we implement and evaluate a method relying on the Observe extension for CoAP, which allows to notify Clients and Resource Servers about revoked Access Tokens. Through results obtained in a real testbed, we show how this method reduces the duration of illegitimate access to protected resources following the revocation of an Access Token, as well as the time spent by Clients and Resource Servers to learn about their Access Tokens being revoked.

标准 ACE 框架提供与标准 OAuth 2.0 框架类似的验证和授权机制,但它是为在物联网环境中使用而设计的。特别是,ACE 依赖 OAuth 2.0、CoAP、CBOR 和 COSE 作为其核心构建模块。在 ACE 中,一个名为授权服务器(Authorization Server)的非约束实体会根据一些访问控制和策略评估机制向客户端发放访问令牌。然后,资源服务器使用访问令牌,对访问令牌进行验证,并允许客户端访问其托管的受保护资源。访问令牌的有效期有时间限制,但也可以在过期前由授权服务器撤销。在这项工作中,我们提出了 "使用控制 "框架,作为 ACE 授权服务器的底层访问控制手段,并从签发和撤销访问令牌所需的时间方面对其性能进行了评估。此外,我们还实施并评估了一种依赖于 CoAP 的 Observe 扩展的方法,该方法允许将已撤销的访问令牌通知客户端和资源服务器。通过在真实测试平台上获得的结果,我们展示了这种方法如何缩短了访问令牌撤销后非法访问受保护资源的持续时间,以及客户端和资源服务器了解其访问令牌被撤销所花费的时间。
{"title":"Using the ACE framework to enforce access and usage control with notifications of revoked access rights","authors":"Marco Rasori, Andrea Saracino, Paolo Mori, Marco Tiloca","doi":"10.1007/s10207-024-00877-1","DOIUrl":"https://doi.org/10.1007/s10207-024-00877-1","url":null,"abstract":"<p>The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is intended for use in Internet-of-Things environments. In particular, ACE relies on OAuth 2.0, CoAP, CBOR, and COSE as its core building blocks. In ACE, a non-constrained entity called Authorization Server issues Access Tokens to Clients according to some access control and policy evaluation mechanism. An Access Token is then consumed by a Resource Server, which verifies the Access Token and lets the Client accordingly access a protected resource it hosts. Access Tokens have a validity which is limited over time, but they can also be revoked by the Authorization Server before they expire. In this work, we propose the Usage Control framework as an underlying access control means for the ACE Authorization Server, and we assess its performance in terms of time required to issue and revoke Access Tokens. Moreover, we implement and evaluate a method relying on the Observe extension for CoAP, which allows to notify Clients and Resource Servers about revoked Access Tokens. Through results obtained in a real testbed, we show how this method reduces the duration of illegitimate access to protected resources following the revocation of an Access Token, as well as the time spent by Clients and Resource Servers to learn about their Access Tokens being revoked.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"39 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141571849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system 针对封闭源代码软件漏洞自动生成可共享的网络威胁情报:基于深度学习的检测系统
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-08 DOI: 10.1007/s10207-024-00882-4
Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan

Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires significant effort, experience, and many manual steps. The objective of this study is to automate the process of producing cyber threat intelligence, focusing on closed source software vulnerabilities. To achieve our goal, we have developed a system called cti-for-css. Deep learning algorithms were used for detection. To simplify data representation and reduce pre-processing workload, the study proposes the function-as-sentence approach. The MLP, OneDNN, LSTM, and Bi-LSTM algorithms were trained using this approach with the SOSP and NDSS18 binary datasets, and their results were compared. The aforementioned datasets contain buffer error vulnerabilities (CWE-119) and resource management error vulnerabilities (CWE-399). Our results are as successful as the studies in the literature. The system achieved the best performance using Bi-LSTM, with F1 score of 82.4%. Additionally, AUC score of 93.0% was acquired, which is the best in the literature. The study concluded by producing cyber threat intelligence using closed source software. Shareable intelligence was produced in an average of 0.1 s, excluding the detection process. Each record, which was represented using our approach, was classified in under 0.32 s on average.

软件容易受到各种干扰。为封闭源代码软件制作网络威胁情报需要大量精力、经验和许多手工步骤。本研究的目标是实现网络威胁情报制作过程的自动化,重点关注封闭源代码软件的漏洞。为实现这一目标,我们开发了一个名为 cti-for-css 的系统。深度学习算法用于检测。为了简化数据表示并减少预处理工作量,本研究提出了函数即句子的方法。利用这种方法,在 SOSP 和 NDSS18 二进制数据集上训练了 MLP、OneDNN、LSTM 和 Bi-LSTM 算法,并比较了它们的结果。上述数据集包含缓冲区错误漏洞(CWE-119)和资源管理错误漏洞(CWE-399)。我们的结果与文献中的研究结果一样成功。系统使用 Bi-LSTM 取得了最佳性能,F1 得分为 82.4%。此外,AUC 得分为 93.0%,是文献中最好的。研究最后使用闭源软件生成了网络威胁情报。除检测过程外,平均 0.1 秒即可生成可共享情报。使用我们的方法表示的每条记录平均在 0.32 秒内完成分类。
{"title":"Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system","authors":"Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan","doi":"10.1007/s10207-024-00882-4","DOIUrl":"https://doi.org/10.1007/s10207-024-00882-4","url":null,"abstract":"<p>Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires significant effort, experience, and many manual steps. The objective of this study is to automate the process of producing cyber threat intelligence, focusing on closed source software vulnerabilities. To achieve our goal, we have developed a system called cti-for-css. Deep learning algorithms were used for detection. To simplify data representation and reduce pre-processing workload, the study proposes the function-as-sentence approach. The MLP, OneDNN, LSTM, and Bi-LSTM algorithms were trained using this approach with the SOSP and NDSS18 binary datasets, and their results were compared. The aforementioned datasets contain buffer error vulnerabilities (CWE-119) and resource management error vulnerabilities (CWE-399). Our results are as successful as the studies in the literature. The system achieved the best performance using Bi-LSTM, with F1 score of 82.4%. Additionally, AUC score of 93.0% was acquired, which is the best in the literature. The study concluded by producing cyber threat intelligence using closed source software. Shareable intelligence was produced in an average of 0.1 s, excluding the detection process. Each record, which was represented using our approach, was classified in under 0.32 s on average.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"19 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141571956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1