首页 > 最新文献

Computer systems and network最新文献

英文 中文
OVERVIEW OF THE CIS BENCHMARKS USAGE FOR FULFILLING THE REQUIREMENTS FROM INTERNATIONAL STANDARD ISO/IEC 27001:2022 为满足国际标准 ISO/IEC 27001:2022 的要求而使用的 CIS 基准概述
Pub Date : 2024-06-01 DOI: 10.23939/csn2024.01.089
Y. Kurii, I. Opirskyy
The problem of developing new methods and vectors of attacks on critical infrastructure and responding to emerging threats through the implementation of recognized standards in the field of information security such as ISO 27001 was considered. The updated edition of the international standard ISO/IEC 27001 of 2022 and in particular the main changes in the structure of controls were analyzed. A detailed analysis of the new security control from Appendix A - A.8.9 - Configuration Management was conducted. The study focuses on the Center for Internet Security (CIS) benchmarks as a resource to guide organizations in meeting the stringent requirements of ISO 27001:2022. Through the study of the CIS benchmarks this article shows how organizations can leverage these guidelines to achieve compliance improve their security posture and protect critical infrastructure from evolving threats. Key words: ISO/IEC 27001:2022 CIS benchmarks information security critical infrastructure security controls configuration management.
通过实施信息安全领域的公认标准(如 ISO 27001),审议了开发攻击关键基础设施的新方法和新载体以及应对新威胁的问题。分析了 2022 年国际标准 ISO/IEC 27001 的更新版本,特别是控制结构的主要变化。对附录 A - A.8.9 - 配置管理中的新安全控制进行了详细分析。研究重点是将互联网安全中心(CIS)基准作为指导组织满足 ISO 27001:2022 严格要求的资源。通过对 CIS 基准的研究,本文展示了组织如何利用这些准则来实现合规性,改善其安全态势并保护关键基础设施免受不断变化的威胁。关键字ISO/IEC 27001:2022 CIS 基准 信息安全 关键基础设施 安全控制 配置管理。
{"title":"OVERVIEW OF THE CIS BENCHMARKS USAGE FOR FULFILLING THE REQUIREMENTS FROM INTERNATIONAL STANDARD ISO/IEC 27001:2022","authors":"Y. Kurii, I. Opirskyy","doi":"10.23939/csn2024.01.089","DOIUrl":"https://doi.org/10.23939/csn2024.01.089","url":null,"abstract":"The problem of developing new methods and vectors of attacks on critical infrastructure and responding to emerging threats through the implementation of recognized standards in the field of information security such as ISO 27001 was considered. The updated edition of the international standard ISO/IEC 27001 of 2022 and in particular the main changes in the structure of controls were analyzed. A detailed analysis of the new security control from Appendix A - A.8.9 - Configuration Management was conducted. The study focuses on the Center for Internet Security (CIS) benchmarks as a resource to guide organizations in meeting the stringent requirements of ISO 27001:2022. Through the study of the CIS benchmarks this article shows how organizations can leverage these guidelines to achieve compliance improve their security posture and protect critical infrastructure from evolving threats. Key words: ISO/IEC 27001:2022 CIS benchmarks information security critical infrastructure security controls configuration management.","PeriodicalId":504130,"journal":{"name":"Computer systems and network","volume":"41 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141395913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESEARCH ON THE IMPACT OF ELECTROMAGNETIC INTERFERENCE ON THE FUNCTIONING OF COMMUNICATION AND RADAR SYSTEMS 研究电磁干扰对通信和雷达系统功能的影响
Pub Date : 2024-06-01 DOI: 10.23939/csn2024.01.001
R.T. Bybyk, Y.M. Nakonechnyi
The impact of electromagnetic interference on the operation of communication and radar systems is discussed. In modern military conflicts the effectiveness of communication and reconnaissance is crucial for success. Through precise research and experiments conducted in this article the fundamental aspects of how electromagnetic interference affects the ability of communication and radar systems to operate in combat conditions are revealed. Various types of interference their effects and interaction with communication systems as well as methods of management and mitigation of interference effects are also examined. The results obtained serve as a valuable addition to understanding the issues of the radio frequency spectrum and ensuring the reliability of communication and radar systems in the electromagnetic environment of contemporary theaters of war. The article aims to investigate and systematize knowledge regarding the impact of electromagnetic interference on communication and radar systems and provide readers with information that can serve as a basis for further research and development in this area. A wide range of literature and articles providing information on the impact of electromagnetic interference on radar systems were analyzed to support the research. Key words: Electromagnetic Interference (EMI) Electronic Warfare (EW) Electronic Support (ES) Electronic Suppression (ES) Electronic Protection (EP) Jamming Radar.
讨论了电磁干扰对通信和雷达系统运行的影响。在现代军事冲突中,通信和侦察的有效性是成功的关键。本文通过精确的研究和实验,揭示了电磁干扰如何影响通信和雷达系统在作战条件下运行能力的基本方面。文章还研究了各种干扰的影响、与通信系统的相互作用以及管理和减轻干扰影响的方法。所获得的结果对了解无线电频谱问题以及确保通信和雷达系统在当代战区电磁环境中的可靠性是一个宝贵的补充。文章旨在调查和系统整理有关电磁干扰对通信和雷达系统影响的知识,并为读者提供可作为该领域进一步研究和开发基础的信息。为支持这项研究,对提供电磁干扰对雷达系统影响相关信息的大量文献和文章进行了分析。关键词电磁干扰(EMI) 电子战(EW) 电子支持(ES) 电子抑制(ES) 电子防护(EP) 干扰雷达。
{"title":"RESEARCH ON THE IMPACT OF ELECTROMAGNETIC INTERFERENCE ON THE FUNCTIONING OF COMMUNICATION AND RADAR SYSTEMS","authors":"R.T. Bybyk, Y.M. Nakonechnyi","doi":"10.23939/csn2024.01.001","DOIUrl":"https://doi.org/10.23939/csn2024.01.001","url":null,"abstract":"The impact of electromagnetic interference on the operation of communication and radar systems is discussed. In modern military conflicts the effectiveness of communication and reconnaissance is crucial for success. Through precise research and experiments conducted in this article the fundamental aspects of how electromagnetic interference affects the ability of communication and radar systems to operate in combat conditions are revealed. Various types of interference their effects and interaction with communication systems as well as methods of management and mitigation of interference effects are also examined. The results obtained serve as a valuable addition to understanding the issues of the radio frequency spectrum and ensuring the reliability of communication and radar systems in the electromagnetic environment of contemporary theaters of war. The article aims to investigate and systematize knowledge regarding the impact of electromagnetic interference on communication and radar systems and provide readers with information that can serve as a basis for further research and development in this area. A wide range of literature and articles providing information on the impact of electromagnetic interference on radar systems were analyzed to support the research. Key words: Electromagnetic Interference (EMI) Electronic Warfare (EW) Electronic Support (ES) Electronic Suppression (ES) Electronic Protection (EP) Jamming Radar.","PeriodicalId":504130,"journal":{"name":"Computer systems and network","volume":"18 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141403271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESEARCH AND IMPROVEMENT OF COMPUTING ALGORITHMS FOR CALCULATING THE TRIGONOMETRICAL COEFFICIENTS OF THE HASHING ALGORITHM MD5 研究和改进哈希算法 md5 三角系数的计算算法
Pub Date : 2024-06-01 DOI: 10.23939/csn2024.01.026
A. Horpenyuk, N. Luzhetska, M. Horpenyuk
The paper examines the problems of ensuring the authenticity of messages as well as analyzes the modern requirements for hash functions and the problems of designing algorithms for calculating hash functions. The common MD5 hashing algorithm was investigated. These days its level of security is considered insufficient for protecting high-level data confidentiality. However it is an effective and fast algorithm for hashing messages and is successfully used to protect commercial information. The paper examines the main computational transformations of the MD5 hashing algorithm. It is shown that variable constants are used in the MD5 algorithm to improve stability. A sweep of the sine function is used to calculate these variable constants. The paper examines the feasibility of using number-pulse computing structures for the calculation of variable trigonometric constants of the MD5 hashing algorithm. It is shown that the use of classical number-pulse computing structures is impractical due to the insufficient range of reproduction of the necessary trigonometric functions. Advanced wide-band digital-pulse structures provide the necessary conversion function range and accuracy. However the speed of such calculators is critically insufficient to calculate all the trigonometric coefficients of the MD5 hashing algorithm. The paper developed a mathematical and software model of the structure of the sine function expansion for the MD5 algorithm. The mathematical model is based on the relations for the sine and cosine of the sum of the arguments which are adapted for the MD5 hashing algorithm. The use of the developed differential computing structure allows saving memory when implementing the algorithm on devices with limited memory resources. Key words: cryptography message authenticity hash function.
本文探讨了确保信息真实性的问题,并分析了散列函数的现代要求以及设计散列函数计算算法的问题。本文研究了常用的 MD5 哈希算法。如今,人们认为它的安全级别不足以保护高级数据的机密性。不过,它是一种有效、快速的信息散列算法,并成功地用于保护商业信息。本文研究了 MD5 哈希算法的主要计算转换。研究表明,MD5 算法中使用了可变常数来提高稳定性。正弦函数的扫频用于计算这些可变常数。论文研究了使用数脉冲计算结构计算 MD5 哈希算法的可变三角常数的可行性。结果表明,由于必要三角函数的再现范围不足,使用经典数字脉冲计算结构是不切实际的。先进的宽带数字脉冲结构提供了必要的转换函数范围和精度。然而,这种计算器的速度远远不足以计算 MD5 哈希算法的所有三角函数系数。本文开发了 MD5 算法正弦函数展开结构的数学和软件模型。该数学模型基于参数之和的正弦和余弦关系,适用于 MD5 哈希算法。在内存资源有限的设备上实施该算法时,使用所开发的差分计算结构可以节省内存。关键词:密码学信息真实性散列函数。
{"title":"RESEARCH AND IMPROVEMENT OF COMPUTING ALGORITHMS FOR CALCULATING THE TRIGONOMETRICAL COEFFICIENTS OF THE HASHING ALGORITHM MD5","authors":"A. Horpenyuk, N. Luzhetska, M. Horpenyuk","doi":"10.23939/csn2024.01.026","DOIUrl":"https://doi.org/10.23939/csn2024.01.026","url":null,"abstract":"The paper examines the problems of ensuring the authenticity of messages as well as analyzes the modern requirements for hash functions and the problems of designing algorithms for calculating hash functions. The common MD5 hashing algorithm was investigated. These days its level of security is considered insufficient for protecting high-level data confidentiality. However it is an effective and fast algorithm for hashing messages and is successfully used to protect commercial information. The paper examines the main computational transformations of the MD5 hashing algorithm. It is shown that variable constants are used in the MD5 algorithm to improve stability. A sweep of the sine function is used to calculate these variable constants. The paper examines the feasibility of using number-pulse computing structures for the calculation of variable trigonometric constants of the MD5 hashing algorithm. It is shown that the use of classical number-pulse computing structures is impractical due to the insufficient range of reproduction of the necessary trigonometric functions. Advanced wide-band digital-pulse structures provide the necessary conversion function range and accuracy. However the speed of such calculators is critically insufficient to calculate all the trigonometric coefficients of the MD5 hashing algorithm. The paper developed a mathematical and software model of the structure of the sine function expansion for the MD5 algorithm. The mathematical model is based on the relations for the sine and cosine of the sum of the arguments which are adapted for the MD5 hashing algorithm. The use of the developed differential computing structure allows saving memory when implementing the algorithm on devices with limited memory resources. Key words: cryptography message authenticity hash function.","PeriodicalId":504130,"journal":{"name":"Computer systems and network","volume":"10 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141393928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARTIFICIAL INTELLIGENCE TECHNIQUES APPLICATION IN THE MOBILE DEVICE DATA ANALYSIS TO IDENTIFY PERSON-OF-INTEREST 人工智能技术在移动设备数据分析中的应用,以识别感兴趣的人
Pub Date : 2024-06-01 DOI: 10.23939/csn2024.01.165
T. Fedynyshyn, O. Mykhaylova
The methods for identifying persons of interest (POI) based on mobile device data has been considered. The problem is relevant and unresolved in the activities of law enforcement intelligence and other agencies involved in operational search activities due to the large amount of data stored on mobile devices. Given the complexity and volume of mobile data traditional analysis methods are often insufficiently effective. The authors propose use of artificial intelligence (AI) including machine learning and natural language processing to improve the efficiency and speed of mobile device data analysis. This approach aims to overcome the limitations of manual data analysis and enhance the process of identifying POIs while adhering to the principles of forensic integrity. The research specifically demonstrates how machine learning can be utilized to search for persons of interest in WhatsApp messenger data. A method has been developed for decentralized control of adaptive data collection processes using the principle of equilibrium and reinforcement learning using the normalized exponential function method. The developed method allows for efficient operation of autonomous distributed systems in conditions of dynamic changes in the number of data collection processes and limited information interaction between them. The results of the experiment indicate that using artificial intelligence for facial recognition may result in false positive outcomes implying that humans cannot be entirely replaced at the current stage of AI evolution. However the application of deep learning showed an 88% success rate in facial recognition. These findings underscore the transformative potential of artificial intelligence in mobile forensics highlighting its capacity to enhance the accuracy and efficiency of data analysis in mobile devices. Key words: artificial intelligence mobile forensics data analysis ios whatsapp
研究考虑了基于移动设备数据识别感兴趣的人(POI)的方法。由于移动设备上存储了大量数据,在执法情报机构和其他参与业务搜索活动的机构的活动中,这个问题既相关又悬而未决。鉴于移动数据的复杂性和数量,传统的分析方法往往不够有效。作者建议使用人工智能(AI),包括机器学习和自然语言处理,来提高移动设备数据分析的效率和速度。这种方法旨在克服人工数据分析的局限性,并在遵守取证完整性原则的同时加强 POI 的识别过程。该研究具体展示了如何利用机器学习在 WhatsApp 信使数据中搜索感兴趣的人。利用平衡原理和归一化指数函数强化学习方法,开发了一种分散控制自适应数据收集过程的方法。在数据收集过程数量动态变化和它们之间信息交互有限的条件下,所开发的方法可使自主分布式系统高效运行。实验结果表明,使用人工智能进行人脸识别可能会产生假阳性结果,这意味着在目前的人工智能发展阶段,人类还不能完全被取代。然而,深度学习的应用却显示出 88% 的面部识别成功率。这些发现强调了人工智能在移动取证方面的变革潜力,突出了其提高移动设备数据分析的准确性和效率的能力。关键词: 人工智能 移动取证 数据分析 ios whatsapp
{"title":"ARTIFICIAL INTELLIGENCE TECHNIQUES APPLICATION IN THE MOBILE DEVICE DATA ANALYSIS TO IDENTIFY PERSON-OF-INTEREST","authors":"T. Fedynyshyn, O. Mykhaylova","doi":"10.23939/csn2024.01.165","DOIUrl":"https://doi.org/10.23939/csn2024.01.165","url":null,"abstract":"The methods for identifying persons of interest (POI) based on mobile device data has been considered. The problem is relevant and unresolved in the activities of law enforcement intelligence and other agencies involved in operational search activities due to the large amount of data stored on mobile devices. Given the complexity and volume of mobile data traditional analysis methods are often insufficiently effective. The authors propose use of artificial intelligence (AI) including machine learning and natural language processing to improve the efficiency and speed of mobile device data analysis. This approach aims to overcome the limitations of manual data analysis and enhance the process of identifying POIs while adhering to the principles of forensic integrity. The research specifically demonstrates how machine learning can be utilized to search for persons of interest in WhatsApp messenger data. A method has been developed for decentralized control of adaptive data collection processes using the principle of equilibrium and reinforcement learning using the normalized exponential function method. The developed method allows for efficient operation of autonomous distributed systems in conditions of dynamic changes in the number of data collection processes and limited information interaction between them. The results of the experiment indicate that using artificial intelligence for facial recognition may result in false positive outcomes implying that humans cannot be entirely replaced at the current stage of AI evolution. However the application of deep learning showed an 88% success rate in facial recognition. These findings underscore the transformative potential of artificial intelligence in mobile forensics highlighting its capacity to enhance the accuracy and efficiency of data analysis in mobile devices. Key words: artificial intelligence mobile forensics data analysis ios whatsapp","PeriodicalId":504130,"journal":{"name":"Computer systems and network","volume":"18 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141405314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APPROACHES TO THREAT MODELING IN THE CREATION OF A COMPREHENSIVE INFORMATION SECURITY SYSTEM FOR A MULTI-LEVEL INTELLIGENT CONTROL SYSTEMS 为多级智能控制系统创建综合信息安全系统的威胁建模方法
Pub Date : 2024-06-01 DOI: 10.23939/csn2024.01.081
T. Kret
The problem of modeling threats in the creation of a comprehensive information security system in multi-level intelligent control systems is considered. Existing approaches to creating a threat model are described. It is proposed to consider a multi-level intelligent control system as a type of automated system according to the classification of Ukrainian normative documentation. The process of creating threat models for automated systems is analyzed. To select the optimal methodology for threat modeling the main criteria are determined which are taken into account when developing threat models. The proposed approach allows for the development of effective and reliable threat models for multi-level intelligent control systems providing a high level of information security. Keywords: threat modeling information security system intelligent control systems multi-level systems.
本文探讨了在多级智能控制系统中创建综合信息安全系统时的威胁建模问题。介绍了创建威胁模型的现有方法。建议根据乌克兰规范性文件的分类,将多级智能控制系统视为一种自动化系统。分析了为自动化系统创建威胁模型的过程。为选择最佳的威胁建模方法,确定了开发威胁模型时应考虑的主要标准。所提出的方法可为多级智能控制系统开发有效、可靠的威胁模型,从而提供高水平的信息安全。关键词: 威胁建模信息安全系统智能控制系统多级系统。
{"title":"APPROACHES TO THREAT MODELING IN THE CREATION OF A COMPREHENSIVE INFORMATION SECURITY SYSTEM FOR A MULTI-LEVEL INTELLIGENT CONTROL SYSTEMS","authors":"T. Kret","doi":"10.23939/csn2024.01.081","DOIUrl":"https://doi.org/10.23939/csn2024.01.081","url":null,"abstract":"The problem of modeling threats in the creation of a comprehensive information security system in multi-level intelligent control systems is considered. Existing approaches to creating a threat model are described. It is proposed to consider a multi-level intelligent control system as a type of automated system according to the classification of Ukrainian normative documentation. The process of creating threat models for automated systems is analyzed. To select the optimal methodology for threat modeling the main criteria are determined which are taken into account when developing threat models. The proposed approach allows for the development of effective and reliable threat models for multi-level intelligent control systems providing a high level of information security. Keywords: threat modeling information security system intelligent control systems multi-level systems.","PeriodicalId":504130,"journal":{"name":"Computer systems and network","volume":"35 25","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141410448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHODS AND MEANS OF ENSURING STABILITY AND PROTECTION OF RADIO COMMUNICATIONS IN A COMPLEX ELECTROMAGNETIC ENVIRONMENT 确保复杂电磁环境中无线电通信的稳定性和保护的方法和手段
Pub Date : 2024-06-01 DOI: 10.23939/csn2024.01.099
R. Kuten, O. Syniavskyi
The article contains a review of a wide range of methods and means to ensure the stability of communication and protection of radio transmissions including encryption frequency hopping the use of directional antennas masking and interference-resistant coding. Based on the conducted review and analysis conclusions were made about the possibility of applying these methods and means of protection in popular unmanned devices today. Aspects of protection that were not covered by classical methods are also considered. The results of the study highlight the importance of continuous improvement in the field of radio communication security and protection to keep pace with evolving threats in a complex electromagnetic environment. Key words: radio communications stability protection electromagnetic environment encryption frequency hopping.
文章回顾了确保通信稳定性和保护无线电传输的各种方法和手段,包括加密跳频、使用定向天线屏蔽和抗干扰编码。根据所进行的审查和分析,得出了在当今流行的无人驾驶设备中应用这些保护方法和手段的可能性的结论。此外,还考虑了传统方法未涵盖的保护问题。研究结果强调了在无线电通信安全和保护领域不断改进的重要性,以跟上复杂电磁环境中不断演变的威胁。关键词:无线电通信稳定性保护电磁环境加密跳频。
{"title":"METHODS AND MEANS OF ENSURING STABILITY AND PROTECTION OF RADIO COMMUNICATIONS IN A COMPLEX ELECTROMAGNETIC ENVIRONMENT","authors":"R. Kuten, O. Syniavskyi","doi":"10.23939/csn2024.01.099","DOIUrl":"https://doi.org/10.23939/csn2024.01.099","url":null,"abstract":"The article contains a review of a wide range of methods and means to ensure the stability of communication and protection of radio transmissions including encryption frequency hopping the use of directional antennas masking and interference-resistant coding. Based on the conducted review and analysis conclusions were made about the possibility of applying these methods and means of protection in popular unmanned devices today. Aspects of protection that were not covered by classical methods are also considered. The results of the study highlight the importance of continuous improvement in the field of radio communication security and protection to keep pace with evolving threats in a complex electromagnetic environment. Key words: radio communications stability protection electromagnetic environment encryption frequency hopping.","PeriodicalId":504130,"journal":{"name":"Computer systems and network","volume":"75 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141389509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer systems and network
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1