首页 > 最新文献

International Journal of Information Security最新文献

英文 中文
Selfish mining attack in blockchain: a systematic literature review 区块链中的自私挖矿攻击:系统性文献综述
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-10 DOI: 10.1007/s10207-024-00849-5
Nadisha Madhushanie, Sugandima Vidanagamachchi, Nalin Arachchilage

Selfish mining is a sneaky way that some people cheat in blockchain networks or distributed digital ledger systems. They do it by mining a block in secret and keeping it hidden. Then, when the secret chain of these miners’ are longer than the real one, they show it to everyone, and the blockchain system selects the longest chain as the valid chain. This leads to the network adopting the longest chain as the valid one, resulting in the effort put into mining by other miners becoming futile. By doing this, selfish miners in the blockchain network have a high potential to get more rewards. This behavior goes against the rules of blockchain networks, where everyone is supposed to play by the same rules and have an equal chance of getting rewards. This prejudiced action of selfish miners have motivated us to investigate systematically the existing methods that are being used to address the selfish mining attacks. Therefore, we conducted a SLR (systematic literature review) of 29 papers using the Kitchenham methodology and put that into PRISMA framework. This study aims to investigate methods for detecting and mitigating selfish mining attacks, their limitations, and future directions.

自私挖矿是一些人在区块链网络或分布式数字分类账系统中作弊的一种偷偷摸摸的方式。他们通过秘密挖掘一个区块并将其隐藏起来。然后,当这些矿工的秘密链比真实链长时,他们就会向所有人展示,区块链系统就会选择最长的链作为有效链。这就导致网络将最长的链作为有效链,从而使其他矿工的挖矿努力成为徒劳。通过这种方式,区块链网络中自私的矿工极有可能获得更多奖励。这种行为违背了区块链网络的规则,因为在区块链网络中,每个人都应该遵守相同的规则,获得奖励的机会也是均等的。自私矿工的这种偏见行为促使我们系统地研究用于解决自私挖矿攻击的现有方法。因此,我们采用 Kitchenham 方法对 29 篇论文进行了 SLR(系统文献综述),并将其纳入 PRISMA 框架。本研究旨在探讨检测和缓解自私挖掘攻击的方法、其局限性和未来发展方向。
{"title":"Selfish mining attack in blockchain: a systematic literature review","authors":"Nadisha Madhushanie, Sugandima Vidanagamachchi, Nalin Arachchilage","doi":"10.1007/s10207-024-00849-5","DOIUrl":"https://doi.org/10.1007/s10207-024-00849-5","url":null,"abstract":"<p>Selfish mining is a sneaky way that some people cheat in blockchain networks or distributed digital ledger systems. They do it by mining a block in secret and keeping it hidden. Then, when the secret chain of these miners’ are longer than the real one, they show it to everyone, and the blockchain system selects the longest chain as the valid chain. This leads to the network adopting the longest chain as the valid one, resulting in the effort put into mining by other miners becoming futile. By doing this, selfish miners in the blockchain network have a high potential to get more rewards. This behavior goes against the rules of blockchain networks, where everyone is supposed to play by the same rules and have an equal chance of getting rewards. This prejudiced action of selfish miners have motivated us to investigate systematically the existing methods that are being used to address the selfish mining attacks. Therefore, we conducted a SLR (systematic literature review) of 29 papers using the Kitchenham methodology and put that into PRISMA framework. This study aims to investigate methods for detecting and mitigating selfish mining attacks, their limitations, and future directions.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"94 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack 网络攻击后西班牙研究中心对网络安全的看法和困境
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-04 DOI: 10.1007/s10207-024-00847-7
Joaquín Navajas-Adán, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, Mª Jesús Marijuán-Martín, Rafael Mayo-García

Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research, development and innovation centers (R&D&I). Cyber-security is crucial for the progress of the research activities developed in these centers, especially given the exponential growth of cyber-attacks and incidents. The present study aims to assess from a socio-technical approach, how a serious cyber-attack on a Spanish research center has affected staff’s perceptions of information and communication systems (ICT) security. This study employed a mixed-methods research strategy, combining quantitative and qualitative methods to provide a comprehensive and nuanced understanding of ICT security perceptions among employees. First a quantitative scale was administered to 1,321 employees 3 years before the cyber-attack and 4 months afterward, to measure ICT security perceptions. Then, qualitative techniques (semi-structured interviews, focus groups, and micro-ethnography) were applied to gain a deeper understanding of the arguments underpinning cyber-security at the center after the attack. The results show that the event had an impact on employees’ perceptions, increasing the perceived importance of ICT security, with positive behavioral changes noted, but with doubts about their sustainability over time. Also, the need for cyber-security governance was critically contrasted with organizational reality. Finally, the compatibility of science and cyber-security was a central dilemma, which seems to confront antagonistic poles (research and security ICT) and justify the non-compliance with security protocols by part of the staff.

信息和通信技术以及互联网网络存在于社会现实的方方面面,也是研究、开发和创新中心(R&D&I)的基本要素。网络安全对这些中心开展的研究活动的进展至关重要,特别是考虑到网络攻击和网络事件呈指数级增长。本研究旨在从社会技术角度评估西班牙研究中心遭受的严重网络攻击如何影响工作人员对信息和通信系统(ICT)安全的看法。本研究采用了混合方法研究策略,结合定量和定性方法,以全面、细致地了解员工对信息和通信技术安全的看法。首先,在网络攻击发生前 3 年和发生后 4 个月,对 1,321 名员工进行了定量测量,以衡量他们对 ICT 安全的看法。然后,采用定性技术(半结构式访谈、焦点小组和微观人种学)深入了解攻击发生后中心网络安全的基本论点。结果表明,该事件对员工的观念产生了影响,提高了他们对信息和通信技术安全重要性的认识,并带来了积极的行为变化,但这些变化能否长期持续还存在疑问。此外,网络安全治理的必要性也与组织的现实情况形成了鲜明对比。最后,科学与网络安全的兼容性是一个核心难题,这似乎是对立的两极(研究和安全信息与传播技术),也是部分工作人员不遵守安全协议的理由。
{"title":"Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack","authors":"Joaquín Navajas-Adán, Eulàlia Badia-Gelabert, Laura Jiménez-Saurina, Mª Jesús Marijuán-Martín, Rafael Mayo-García","doi":"10.1007/s10207-024-00847-7","DOIUrl":"https://doi.org/10.1007/s10207-024-00847-7","url":null,"abstract":"<p>Information and Communication Technologies and Internet networks are present in all aspects of social reality and are essential elements in research, development and innovation centers (R&amp;D&amp;I). Cyber-security is crucial for the progress of the research activities developed in these centers, especially given the exponential growth of cyber-attacks and incidents. The present study aims to assess from a socio-technical approach, how a serious cyber-attack on a Spanish research center has affected staff’s perceptions of information and communication systems (ICT) security. This study employed a mixed-methods research strategy, combining quantitative and qualitative methods to provide a comprehensive and nuanced understanding of ICT security perceptions among employees. First a quantitative scale was administered to 1,321 employees 3 years before the cyber-attack and 4 months afterward, to measure ICT security perceptions. Then, qualitative techniques (semi-structured interviews, focus groups, and micro-ethnography) were applied to gain a deeper understanding of the arguments underpinning cyber-security at the center after the attack. The results show that the event had an impact on employees’ perceptions, increasing the perceived importance of ICT security, with positive behavioral changes noted, but with doubts about their sustainability over time. Also, the need for cyber-security governance was critically contrasted with organizational reality. Finally, the compatibility of science and cyber-security was a central dilemma, which seems to confront antagonistic poles (research and security ICT) and justify the non-compliance with security protocols by part of the staff.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"42 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trustworthy machine learning in the context of security and privacy 安全与隐私背景下值得信赖的机器学习
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-03 DOI: 10.1007/s10207-024-00813-3
Ramesh Upreti, Pedro G. Lind, Ahmed Elmokashfi, Anis Yazidi

Artificial intelligence-based algorithms are widely adopted in critical applications such as healthcare and autonomous vehicles. Mitigating the security and privacy issues of AI models, and enhancing their trustworthiness have become of paramount importance. We present a detailed investigation of existing security, privacy, and defense techniques and strategies to make machine learning more secure and trustworthy. We focus on the new paradigm of machine learning called federated learning, where one aims to develop machine learning models involving different partners (data sources) that do not need to share data and information with each other. In particular, we discuss how federated learning bridges security and privacy, how it guarantees privacy requirements of AI applications, and then highlight challenges that need to be addressed in the future. Finally, after having surveyed the high-level concepts of trustworthy AI and its different components and identifying present research trends addressing security, privacy, and trustworthiness separately, we discuss possible interconnections and dependencies between these three fields. All in all, we provide some insight to explain how AI researchers should focus on building a unified solution combining security, privacy, and trustworthy AI in the future.

基于人工智能的算法被广泛应用于医疗保健和自动驾驶汽车等关键领域。缓解人工智能模型的安全和隐私问题并提高其可信度已变得至关重要。我们对现有的安全、隐私和防御技术及策略进行了详细研究,以提高机器学习的安全性和可信度。我们将重点放在被称为联合学习的机器学习新模式上,即开发涉及不同合作伙伴(数据源)的机器学习模型,而这些合作伙伴无需相互共享数据和信息。我们将特别讨论联合学习如何在安全和隐私之间架起桥梁,如何保证人工智能应用的隐私要求,然后强调未来需要应对的挑战。最后,在考察了可信人工智能的高层次概念及其不同组成部分,并确定了目前分别针对安全性、隐私性和可信性的研究趋势之后,我们讨论了这三个领域之间可能存在的相互联系和依赖关系。总之,我们提供了一些见解,以解释人工智能研究人员未来应如何专注于构建一个将安全、隐私和可信人工智能结合在一起的统一解决方案。
{"title":"Trustworthy machine learning in the context of security and privacy","authors":"Ramesh Upreti, Pedro G. Lind, Ahmed Elmokashfi, Anis Yazidi","doi":"10.1007/s10207-024-00813-3","DOIUrl":"https://doi.org/10.1007/s10207-024-00813-3","url":null,"abstract":"<p>Artificial intelligence-based algorithms are widely adopted in critical applications such as healthcare and autonomous vehicles. Mitigating the security and privacy issues of AI models, and enhancing their trustworthiness have become of paramount importance. We present a detailed investigation of existing security, privacy, and defense techniques and strategies to make machine learning more secure and trustworthy. We focus on the new paradigm of machine learning called federated learning, where one aims to develop machine learning models involving different partners (data sources) that do not need to share data and information with each other. In particular, we discuss how federated learning bridges security and privacy, how it guarantees privacy requirements of AI applications, and then highlight challenges that need to be addressed in the future. Finally, after having surveyed the high-level concepts of trustworthy AI and its different components and identifying present research trends addressing security, privacy, and trustworthiness separately, we discuss possible interconnections and dependencies between these three fields. All in all, we provide some insight to explain how AI researchers should focus on building a unified solution combining security, privacy, and trustworthy AI in the future.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"18 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140579756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute inference privacy protection for pre-trained models 预训练模型的属性推理隐私保护
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-02 DOI: 10.1007/s10207-024-00839-7
Hossein Abedi Khorasgani, Noman Mohammed, Yang Wang

With the increasing popularity of machine learning (ML) in image processing, privacy concerns have emerged as a significant issue in deploying and using ML services. However, current privacy protection approaches often require computationally expensive training from scratch or extensive fine-tuning of models, posing significant barriers to the development of privacy-conscious models, particularly for smaller organizations seeking to comply with data privacy laws. In this paper, we address the privacy challenges in computer vision by investigating the effectiveness of two recent fine-tuning methods, Model Reprogramming and Low-Rank Adaptation. We adapt these techniques to provide attribute protection for pre-trained models, minimizing computational overhead and training time. Specifically, we modify the models to produce privacy-preserving latent representations of images that cannot be used to identify unintended attributes. We integrate these methods into an adversarial min–max framework, allowing us to conceal sensitive information from feature outputs without extensive modifications to the pre-trained model, but rather focusing on a small set of new parameters. We demonstrate the effectiveness of our methods by conducting experiments on the CelebA dataset, achieving state-of-the-art performance while significantly reducing computational complexity and cost. Our research provides a valuable contribution to the field of computer vision and privacy, offering practical solutions to enhance the privacy of machine learning services without compromising efficiency.

随着机器学习(ML)在图像处理领域的日益普及,隐私问题已成为部署和使用 ML 服务的一个重要问题。然而,当前的隐私保护方法往往需要从头开始进行计算成本高昂的训练,或者对模型进行大量微调,这对开发具有隐私意识的模型造成了巨大障碍,尤其是对那些寻求遵守数据隐私法的小型组织而言。在本文中,我们通过研究最近推出的两种微调方法--模型重编程(Model Reprogramming)和低级别自适应(Low-Rank Adaptation)的有效性,来应对计算机视觉领域的隐私挑战。我们调整这些技术,为预先训练好的模型提供属性保护,最大限度地减少计算开销和训练时间。具体来说,我们对模型进行了修改,以生成保护隐私的图像潜在表征,这些表征不能用于识别非预期属性。我们将这些方法整合到对抗性最小最大框架中,这样就可以在不对预先训练的模型进行大量修改的情况下,从特征输出中隐藏敏感信息,而只需关注一小部分新参数。我们在 CelebA 数据集上进行了实验,证明了我们方法的有效性,在大幅降低计算复杂度和成本的同时,实现了最先进的性能。我们的研究为计算机视觉和隐私领域做出了有价值的贡献,为在不影响效率的情况下增强机器学习服务的隐私性提供了实用的解决方案。
{"title":"Attribute inference privacy protection for pre-trained models","authors":"Hossein Abedi Khorasgani, Noman Mohammed, Yang Wang","doi":"10.1007/s10207-024-00839-7","DOIUrl":"https://doi.org/10.1007/s10207-024-00839-7","url":null,"abstract":"<p>With the increasing popularity of machine learning (ML) in image processing, privacy concerns have emerged as a significant issue in deploying and using ML services. However, current privacy protection approaches often require computationally expensive training from scratch or extensive fine-tuning of models, posing significant barriers to the development of privacy-conscious models, particularly for smaller organizations seeking to comply with data privacy laws. In this paper, we address the privacy challenges in computer vision by investigating the effectiveness of two recent fine-tuning methods, Model Reprogramming and Low-Rank Adaptation. We adapt these techniques to provide attribute protection for pre-trained models, minimizing computational overhead and training time. Specifically, we modify the models to produce privacy-preserving latent representations of images that cannot be used to identify unintended attributes. We integrate these methods into an adversarial min–max framework, allowing us to conceal sensitive information from feature outputs without extensive modifications to the pre-trained model, but rather focusing on a small set of new parameters. We demonstrate the effectiveness of our methods by conducting experiments on the CelebA dataset, achieving state-of-the-art performance while significantly reducing computational complexity and cost. Our research provides a valuable contribution to the field of computer vision and privacy, offering practical solutions to enhance the privacy of machine learning services without compromising efficiency.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"44 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140580160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
International journal of information security: a bibliometric study, 2007–2023 国际信息安全期刊:文献计量研究,2007-2023 年
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-25 DOI: 10.1007/s10207-024-00840-0
Rahul Dwivedi

This study employs various bibliometric analysis techniques to examine the intellectual structure of the International Journal of Information Security from 2007 to 2023. The aim is to identify the most cited journals, underlying research themes within the article corpus, and gradual changes in the research themes over time. “Lecture Notes on Computer Science” is the most referenced knowledge source. Underlying research themes were identified based on mapping the bibliographically coupled articles on to the knowledge areas from the Cyber Security Body of Knowledge using template analysis. Applied Cryptography is the most prominent knowledge area, followed by Privacy, and Network Security. Additionally, research on distributed systems security and Web & Mobile Security were emerging topics of interest. Qualitative and quantitative comparisons between open-access and regular articles suggested a few notable differences in author keywords but no differences in the number of citations received. Furthermore, regression analysis found a negative correlation between citation counts with the length of the article abstract and article title and a positive correlation with page count, being published in a special issue, and if at least the affiliation of one of the authors is different from others. Finally, prominent authors, articles, institutions, and countries published in this journal were also identified.

本研究采用各种文献计量分析技术,研究 2007 年至 2023 年《国际信息安全学报》的知识结构。目的是确定被引用次数最多的期刊、文章语料库中的基本研究主题以及研究主题随时间的渐变。"计算机科学讲义》是被引用最多的知识源。在使用模板分析法将书目关联文章映射到《网络安全知识体系》的知识领域的基础上,确定了基本研究主题。应用密码学是最突出的知识领域,其次是隐私和网络安全。此外,分布式系统安全研究和网络及移动安全研究也是新出现的热门话题。对开放获取文章和普通文章进行定性和定量比较后发现,两者在作者关键词上有一些明显的不同,但在引用次数上没有差异。此外,回归分析还发现,引用次数与文章摘要和文章标题的长度呈负相关,而与页数、是否发表在特刊上以及是否至少有一位作者的所属单位与其他作者不同呈正相关。最后,还确定了在该期刊上发表文章的著名作者、文章、机构和国家。
{"title":"International journal of information security: a bibliometric study, 2007–2023","authors":"Rahul Dwivedi","doi":"10.1007/s10207-024-00840-0","DOIUrl":"https://doi.org/10.1007/s10207-024-00840-0","url":null,"abstract":"<p>This study employs various bibliometric analysis techniques to examine the intellectual structure of the International Journal of Information Security from 2007 to 2023. The aim is to identify the most cited journals, underlying research themes within the article corpus, and gradual changes in the research themes over time. “Lecture Notes on Computer Science” is the most referenced knowledge source. Underlying research themes were identified based on mapping the bibliographically coupled articles on to the knowledge areas from the Cyber Security Body of Knowledge using template analysis. Applied Cryptography is the most prominent knowledge area, followed by Privacy, and Network Security. Additionally, research on distributed systems security and Web &amp; Mobile Security were emerging topics of interest. Qualitative and quantitative comparisons between open-access and regular articles suggested a few notable differences in author keywords but no differences in the number of citations received. Furthermore, regression analysis found a negative correlation between citation counts with the length of the article abstract and article title and a positive correlation with page count, being published in a special issue, and if at least the affiliation of one of the authors is different from others. Finally, prominent authors, articles, institutions, and countries published in this journal were also identified.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"28 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140301315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs MLSTL-WSN:在 WSN 中使用 SMOTETomek 进行基于机器学习的入侵检测
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-19 DOI: 10.1007/s10207-024-00833-z
Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal

In the domain of cyber-physical systems, wireless sensor networks (WSNs) play a pivotal role as infrastructures, encompassing both stationary and mobile sensors. These sensors self-organize and establish multi-hop connections for communication, collectively sensing, gathering, processing, and transmitting data about their surroundings. Despite their significance, WSNs face rapid and detrimental attacks that can disrupt functionality. Existing intrusion detection methods for WSNs encounter challenges such as low detection rates, computational overhead, and false alarms. These issues stem from sensor node resource constraints, data redundancy, and high correlation within the network. To address these challenges, we propose an innovative intrusion detection approach that integrates machine learning (ML) techniques with the Synthetic Minority Oversampling Technique Tomek Link (SMOTE-TomekLink) algorithm. This blend synthesizes minority instances and eliminates Tomek links, resulting in a balanced dataset that significantly enhances detection accuracy in WSNs. Additionally, we incorporate feature scaling through standardization to render input features consistent and scalable, facilitating more precise training and detection. To counteract imbalanced WSN datasets, we employ the SMOTE-Tomek resampling technique, mitigating overfitting and underfitting issues. Our comprehensive evaluation, using the wireless sensor network dataset (WSN-DS) containing 374,661 records, identifies the optimal model for intrusion detection in WSNs. The standout outcome of our research is the remarkable performance of our model. In binary classification scenarios, it achieves an accuracy rate of 99.78%, and in multiclass classification scenarios, it attains an exceptional accuracy rate of 99.92%. These findings underscore the efficiency and superiority of our proposal in the context of WSN intrusion detection, showcasing its effectiveness in detecting and mitigating intrusions in WSNs.

在网络物理系统领域,无线传感器网络(WSN)作为基础设施发挥着举足轻重的作用,其中既包括固定传感器,也包括移动传感器。这些传感器自组织并建立多跳连接进行通信,共同感知、收集、处理和传输有关其周围环境的数据。尽管 WSN 非常重要,但它也面临着可能破坏其功能的快速和有害攻击。现有的 WSN 入侵检测方法面临着低检测率、计算开销和误报等挑战。这些问题源于传感器节点的资源限制、数据冗余和网络内的高度相关性。为了应对这些挑战,我们提出了一种创新的入侵检测方法,它将机器学习(ML)技术与合成少数群体过度采样技术 Tomek Link(SMOTE-TomekLink)算法相结合。这种混合算法可合成少数实例并消除 Tomek 链接,从而产生一个平衡的数据集,显著提高 WSN 的检测准确性。此外,我们还通过标准化将特征扩展纳入其中,使输入特征具有一致性和可扩展性,从而促进更精确的训练和检测。为了应对不平衡的 WSN 数据集,我们采用了 SMOTE-Tomek 重采样技术,以缓解过拟合和欠拟合问题。我们利用包含 374,661 条记录的无线传感器网络数据集(WSN-DS)进行了综合评估,确定了 WSN 入侵检测的最佳模型。我们研究的突出成果是我们的模型性能卓越。在二元分类场景中,它的准确率达到了 99.78%,而在多类分类场景中,它的准确率更是高达 99.92%。这些发现强调了我们的建议在 WSN 入侵检测方面的效率和优越性,展示了它在检测和缓解 WSN 入侵方面的有效性。
{"title":"MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs","authors":"Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal","doi":"10.1007/s10207-024-00833-z","DOIUrl":"https://doi.org/10.1007/s10207-024-00833-z","url":null,"abstract":"<p>In the domain of cyber-physical systems, wireless sensor networks (WSNs) play a pivotal role as infrastructures, encompassing both stationary and mobile sensors. These sensors self-organize and establish multi-hop connections for communication, collectively sensing, gathering, processing, and transmitting data about their surroundings. Despite their significance, WSNs face rapid and detrimental attacks that can disrupt functionality. Existing intrusion detection methods for WSNs encounter challenges such as low detection rates, computational overhead, and false alarms. These issues stem from sensor node resource constraints, data redundancy, and high correlation within the network. To address these challenges, we propose an innovative intrusion detection approach that integrates machine learning (ML) techniques with the Synthetic Minority Oversampling Technique Tomek Link (SMOTE-TomekLink) algorithm. This blend synthesizes minority instances and eliminates Tomek links, resulting in a balanced dataset that significantly enhances detection accuracy in WSNs. Additionally, we incorporate feature scaling through standardization to render input features consistent and scalable, facilitating more precise training and detection. To counteract imbalanced WSN datasets, we employ the SMOTE-Tomek resampling technique, mitigating overfitting and underfitting issues. Our comprehensive evaluation, using the wireless sensor network dataset (WSN-DS) containing 374,661 records, identifies the optimal model for intrusion detection in WSNs. The standout outcome of our research is the remarkable performance of our model. In binary classification scenarios, it achieves an accuracy rate of 99.78%, and in multiclass classification scenarios, it attains an exceptional accuracy rate of 99.92%. These findings underscore the efficiency and superiority of our proposal in the context of WSN intrusion detection, showcasing its effectiveness in detecting and mitigating intrusions in WSNs.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"30 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140168587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things 在基于云计算的物联网中保护数据的智能网络安全方法
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-19 DOI: 10.1007/s10207-024-00832-0
Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, Shadi Alzubi, Mohammad Sh. Daoud, Hazem Migdady

Users of computer networks may benefit from cloud computing, which is a fairly new abstraction that offers features like processing as well as the sharing and storing of data. As a result of the services it provides, cloud computing is drawing significant investments from across the world. Despite this, Cloud Computing Security continues to be one of the most important issues for businesses and consumers that use cloud computing systems. A few of the security flaws that are associated with cloud computing were passed down from earlier computer systems. In contrast, the other flaws were brought about by the distinctive qualities and design of cloud computing. The newly developed platform has measures that restrict data access to just those users who are authorized to do so. Using the user’s identification and authentication/authorization information, a third-party service is responsible for managing access to the data. This service checks on all requests. Sensitive information and facts pertaining to users are encrypted both while in transit and while being stored. The platform was put into operation, analysed, and compared to other cloud platforms that were already in existence in terms of how effective it was in comparison to other platforms. When compared to the other security platforms, the findings demonstrated that this platform performed as anticipated in a relatively short amount of time and offered robust protection against the acts of an intruder.

云计算是一种相当新的抽象概念,可提供处理以及共享和存储数据等功能。由于其提供的服务,云计算正吸引着世界各地的大量投资。尽管如此,对于使用云计算系统的企业和消费者来说,云计算安全仍然是最重要的问题之一。与云计算相关的一些安全漏洞是由早期的计算机系统遗留下来的。相比之下,其他缺陷则是由云计算的独特品质和设计造成的。新开发的平台采取措施,限制只有获得授权的用户才能访问数据。第三方服务利用用户的身份和认证/授权信息,负责管理数据访问。该服务对所有请求进行检查。与用户有关的敏感信息和事实在传输和存储过程中都经过加密。该平台投入运行后,我们对其进行了分析,并将其与现有的其他云平台进行了比较,看其效果如何。与其他安全平台相比,研究结果表明,该平台在相对较短的时间内就达到了预期的性能,并提供了针对入侵者行为的强大保护。
{"title":"Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things","authors":"Ala Mughaid, Ibrahim Obeidat, Laith Abualigah, Shadi Alzubi, Mohammad Sh. Daoud, Hazem Migdady","doi":"10.1007/s10207-024-00832-0","DOIUrl":"https://doi.org/10.1007/s10207-024-00832-0","url":null,"abstract":"<p>Users of computer networks may benefit from cloud computing, which is a fairly new abstraction that offers features like processing as well as the sharing and storing of data. As a result of the services it provides, cloud computing is drawing significant investments from across the world. Despite this, Cloud Computing Security continues to be one of the most important issues for businesses and consumers that use cloud computing systems. A few of the security flaws that are associated with cloud computing were passed down from earlier computer systems. In contrast, the other flaws were brought about by the distinctive qualities and design of cloud computing. The newly developed platform has measures that restrict data access to just those users who are authorized to do so. Using the user’s identification and authentication/authorization information, a third-party service is responsible for managing access to the data. This service checks on all requests. Sensitive information and facts pertaining to users are encrypted both while in transit and while being stored. The platform was put into operation, analysed, and compared to other cloud platforms that were already in existence in terms of how effective it was in comparison to other platforms. When compared to the other security platforms, the findings demonstrated that this platform performed as anticipated in a relatively short amount of time and offered robust protection against the acts of an intruder.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"153 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140168445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new approach for detecting process injection attacks using memory analysis 利用内存分析检测进程注入攻击的新方法
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-16 DOI: 10.1007/s10207-024-00836-w
Mohammed Nasereddin, Raad Al-Qassas

This paper introduces a new approach for examining and analyzing fileless malware artifacts in computer memory. The proposed approach offers the distinct advantage of conducting a comprehensive live analysis of memory without the need for periodic memory dumping. Once a new process arrives, log files are collected by monitoring the Event Tracing for Windows facility as well as listing the executables of the active process for violation detection. The proposed approach significantly reduces detection time and minimizes resource consumption by adopting parallel computing (programming), where the main software (Master) divides the work, organizes the process of searching for artifacts, and distributes tasks to several agents. A dataset of 17411 malware samples is used in the assessment of the new approach. It provided satisfactory and reliable results in dealing with at least six different process injection techniques including classic DLL injection, reflective DLL injection, process hollowing, hook injection, registry modifications, and .NET DLL injection. The detection accuracy rate has reached (99.93%) with a false-positive rate of (0.068%). Moreover, the accuracy was monitored in the case of launching several malwares using different process injection techniques simultaneously, and the detector was able to detect them efficiently. Also, it achieved a detection time with an average of 0.052 msec per detected malware.

本文介绍了一种用于检查和分析计算机内存中无文件恶意软件工件的新方法。该方法具有无需定期转储内存即可对内存进行全面实时分析的显著优势。一旦出现新进程,就会通过监控 Windows 的事件跟踪设施收集日志文件,并列出活动进程的可执行文件,以便进行违规检测。所提出的方法通过采用并行计算(编程),由主软件(Master)进行分工,组织搜索人工制品的过程,并将任务分配给多个代理,从而大大缩短了检测时间,并最大限度地减少了资源消耗。新方法的评估使用了一个包含 17411 个恶意软件样本的数据集。在处理至少六种不同的进程注入技术(包括经典 DLL 注入、反射式 DLL 注入、进程空洞化、钩子注入、注册表修改和 .NET DLL 注入)时,它提供了令人满意的可靠结果。检测准确率达到了 99.93%,假阳性率为 0.068%。此外,在使用不同的进程注入技术同时启动多个恶意软件的情况下,检测器也能有效地检测到它们。同时,它的检测时间达到了平均每个被检测恶意软件 0.052 毫秒。
{"title":"A new approach for detecting process injection attacks using memory analysis","authors":"Mohammed Nasereddin, Raad Al-Qassas","doi":"10.1007/s10207-024-00836-w","DOIUrl":"https://doi.org/10.1007/s10207-024-00836-w","url":null,"abstract":"<p>This paper introduces a new approach for examining and analyzing fileless malware artifacts in computer memory. The proposed approach offers the distinct advantage of conducting a comprehensive live analysis of memory without the need for periodic memory dumping. Once a new process arrives, log files are collected by monitoring the Event Tracing for Windows facility as well as listing the executables of the active process for violation detection. The proposed approach significantly reduces detection time and minimizes resource consumption by adopting parallel computing (programming), where the main software (Master) divides the work, organizes the process of searching for artifacts, and distributes tasks to several agents. A dataset of 17411 malware samples is used in the assessment of the new approach. It provided satisfactory and reliable results in dealing with at least six different process injection techniques including classic DLL injection, reflective DLL injection, process hollowing, hook injection, registry modifications, and .NET DLL injection. The detection accuracy rate has reached <span>(99.93%)</span> with a false-positive rate of <span>(0.068%)</span>. Moreover, the accuracy was monitored in the case of launching several malwares using different process injection techniques simultaneously, and the detector was able to detect them efficiently. Also, it achieved a detection time with an average of 0.052 msec per detected malware.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"1 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI for pentesting: the good, the bad, the ugly 用于五项测试的生成式人工智能:好、坏、丑
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-15 DOI: 10.1007/s10207-024-00835-x
Eric Hilario, Sami Azam, Jawahar Sundaram, Khwaja Imran Mohammed, Bharanidharan Shanmugam

This paper examines the role of Generative AI (GenAI) and Large Language Models (LLMs) in penetration testing exploring the benefits, challenges, and risks associated with cyber security applications. Through the use of generative artificial intelligence, penetration testing becomes more creative, test environments are customised, and continuous learning and adaptation is achieved. We examined how GenAI (ChatGPT 3.5) helps penetration testers with options and suggestions during the five stages of penetration testing. The effectiveness of the GenAI tool was tested using a publicly available vulnerable machine from VulnHub. It was amazing how quickly they responded at each stage and provided better pentesting report. In this article, we discuss potential risks, unintended consequences, and uncontrolled AI development associated with pentesting.

本文探讨了生成式人工智能(GenAI)和大型语言模型(LLM)在渗透测试中的作用,探索了与网络安全应用相关的益处、挑战和风险。通过使用生成式人工智能,渗透测试变得更具创造性,测试环境可定制,并可实现持续学习和适应。我们研究了 GenAI(ChatGPT 3.5)如何在渗透测试的五个阶段帮助渗透测试人员提供选项和建议。我们使用 VulnHub 提供的公开易受攻击机器测试了 GenAI 工具的有效性。令人惊奇的是,他们在每个阶段都能迅速做出响应,并提供更好的渗透测试报告。在本文中,我们将讨论与五重测试相关的潜在风险、意外后果和不受控制的人工智能开发。
{"title":"Generative AI for pentesting: the good, the bad, the ugly","authors":"Eric Hilario, Sami Azam, Jawahar Sundaram, Khwaja Imran Mohammed, Bharanidharan Shanmugam","doi":"10.1007/s10207-024-00835-x","DOIUrl":"https://doi.org/10.1007/s10207-024-00835-x","url":null,"abstract":"<p>This paper examines the role of Generative AI (GenAI) and Large Language Models (LLMs) in penetration testing exploring the benefits, challenges, and risks associated with cyber security applications. Through the use of generative artificial intelligence, penetration testing becomes more creative, test environments are customised, and continuous learning and adaptation is achieved. We examined how GenAI (ChatGPT 3.5) helps penetration testers with options and suggestions during the five stages of penetration testing. The effectiveness of the GenAI tool was tested using a publicly available vulnerable machine from VulnHub. It was amazing how quickly they responded at each stage and provided better pentesting report. In this article, we discuss potential risks, unintended consequences, and uncontrolled AI development associated with pentesting.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"12 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning 利用对抗性深度学习消除无线信道生成密钥的空间相关性
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-15 DOI: 10.1007/s10207-024-00831-1

Abstract

Physical-layer Key Generation (PKG) is the major candidate for use in secure wireless communications and Internet of Things (IoT) systems. Using Deep Learning (DL) and the Band Feature Mapping (BFM) method leads to reciprocal features, which is an essential requirement for the key generation in Orthogonal Frequency-Division Multiplexing Frequency Division Duplexing systems. Additionally, randomness and spatial de-correlation are two other essential requirements of secure PKG schemes. When the distance of an eavesdropper from a legal user is short, the eavesdropper can experience a correlated fading and generate the secret key.Other works assume that the adversary is far away from legitimate users, whereas the proposed scheme allows the adversary to approach the legitimate users without sacrificing the security Conventional DL-based BFM includes an offline training stage using a pre-collected dataset. To solve the spatial correlation problem, this paper simultaneously uses the concepts of physical layer security and adversarial training. Moreover, a DL-based adversary in the PKG model is considered which has not been studied yet. Simulation results confirm the effectiveness of the proposed Adversarial DL (ADL) key generation scheme in terms of Key Error Rate and Key Generation Rate. Our results show that using the proposed training strategy the illegal user can only generate a random key with an error rate of about 0.5. In the meantime, this method maintains the performance of the generated key by the legal users under a certain level. The mentioned features make ADL key generation scheme an appealing candidate for applications, such as secure cloud-based communications, low-size networks, and resource-constrained IoT.

摘要 物理层密钥生成(PKG)是安全无线通信和物联网(IoT)系统的主要候选技术。使用深度学习(DL)和频带特征映射(BFM)方法可生成互易特征,这是正交频分复用(Orthogonal Frequency-Division Multiplexing)频分复用系统密钥生成的基本要求。此外,随机性和空间去相关性也是安全 PKG 方案的两个基本要求。当窃听者与合法用户的距离很短时,窃听者可以经历相关性衰减并生成密钥。其他作品假定对手远离合法用户,而所提出的方案允许对手接近合法用户而不影响安全性。为了解决空间相关性问题,本文同时使用了物理层安全和对抗训练的概念。此外,本文还考虑了 PKG 模型中基于 DL 的对手,这一点目前还没有研究。仿真结果证实了所提出的对抗式 DL(ADL)密钥生成方案在密钥错误率和密钥生成率方面的有效性。我们的结果表明,使用所提出的训练策略,非法用户只能生成错误率约为 0.5 的随机密钥。同时,这种方法还能将合法用户生成密钥的性能保持在一定水平之下。上述特点使 ADL 密钥生成方案成为基于云的安全通信、低规模网络和资源受限的物联网等应用的理想候选方案。
{"title":"Spatial de-correlation of generated keys from wireless channels using adversarial deep learning","authors":"","doi":"10.1007/s10207-024-00831-1","DOIUrl":"https://doi.org/10.1007/s10207-024-00831-1","url":null,"abstract":"<h3>Abstract</h3> <p>Physical-layer Key Generation (PKG) is the major candidate for use in secure wireless communications and Internet of Things (IoT) systems. Using Deep Learning (DL) and the Band Feature Mapping (BFM) method leads to reciprocal features, which is an essential requirement for the key generation in Orthogonal Frequency-Division Multiplexing Frequency Division Duplexing systems. Additionally, randomness and spatial de-correlation are two other essential requirements of secure PKG schemes. When the distance of an eavesdropper from a legal user is short, the eavesdropper can experience a correlated fading and generate the secret key.Other works assume that the adversary is far away from legitimate users, whereas the proposed scheme allows the adversary to approach the legitimate users without sacrificing the security Conventional DL-based BFM includes an offline training stage using a pre-collected dataset. To solve the spatial correlation problem, this paper simultaneously uses the concepts of physical layer security and adversarial training. Moreover, a DL-based adversary in the PKG model is considered which has not been studied yet. Simulation results confirm the effectiveness of the proposed Adversarial DL (ADL) key generation scheme in terms of Key Error Rate and Key Generation Rate. Our results show that using the proposed training strategy the illegal user can only generate a random key with an error rate of about 0.5. In the meantime, this method maintains the performance of the generated key by the legal users under a certain level. The mentioned features make ADL key generation scheme an appealing candidate for applications, such as secure cloud-based communications, low-size networks, and resource-constrained IoT.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"57 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1