首页 > 最新文献

Computer Networks最新文献

英文 中文
eXO: A commons-based community network Internet Service Provider, description and subscribers usage patterns eXO:基于公共资源的社区网络 互联网服务提供商、说明和用户使用模式
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-03 DOI: 10.1016/j.comnet.2024.110765

The advent of Wi-Fi in the 1990s stimulated the creation of Community networks (CNs), a new networking paradigm deployed and maintained by their users. The non-profit and grassroots self-organization of CNs has shown significant potential in enhancing communication technologies grounded in ethical values, transcending mere Internet expansion to contribute to broader social impacts. Since its conception, hundreds of CNs have been deployed worldwide. However, many have faltered, primarily due to a lack of solid economic models and legal setup. This paper presents Expansió Xarxa Oberta (eXO) association, a commons Internet Service Provider (ISP). In contrast to commercial ISPs, eXO follows the same grassroots principles of CNs. Establishing a commons-based ISP is challenging, yet it is a key component for the sustainability and success of CNs. Therefore, our paper aims to dissect the complexity of a commons ISP by explaining eXO, a pioneering example that has already been in production for more than 14 years. To the best of our knowledge, this is the first time that a commons ISP is described in all its components.

To describe eXO, we have proceeded in two parts. In the first one, we delineate the organizational structure, economics, funding mechanisms, activities, legal framework, and infrastructure. To gain more insight on eXO, in the second part, we conduct a technical analysis of traffic data collected from eXO’s core router, elucidating subscriber usage patterns. Our study encompasses various subscriber categories, including regular and financially subsidized users, Wi-Fi and optical fiber access, and traffic characteristics such as volume, TCP/UDP usage, services accessed, and traffic distribution across countries.

20 世纪 90 年代,Wi-Fi 的出现刺激了社区网络(CN)的创建,这是一种由用户部署和维护的新网络范式。社区网络的非营利性和草根自组织在加强以道德价值观为基础的通信技术方面显示出巨大潜力,超越了单纯的互联网扩展,有助于产生更广泛的社会影响。自诞生以来,全球已部署了数百个 CN。然而,许多项目都夭折了,主要原因是缺乏可靠的经济模式和法律框架。本文介绍的 Expansió Xarxa Oberta(eXO)协会是一个公共互联网服务提供商(ISP)。与商业互联网服务提供商不同,eXO 遵循与 CN 相同的草根原则。建立一个基于公共资源的互联网服务提供商极具挑战性,但它却是 CNs 可持续发展和取得成功的关键要素。因此,我们的论文旨在通过解释 eXO 这一已运营超过 14 年的先驱范例,剖析公有互联网服务提供商的复杂性。据我们所知,这是第一次对公共互联网服务提供商的所有组成部分进行描述。在第一部分中,我们描述了组织结构、经济学、筹资机制、活动、法律框架和基础设施。为了更深入地了解 eXO,在第二部分中,我们对从 eXO 核心路由器收集到的流量数据进行了技术分析,以阐明用户的使用模式。我们的研究涵盖各种用户类别,包括普通用户和财政补贴用户、Wi-Fi 和光纤接入,以及流量特征,如流量、TCP/UDP 使用情况、访问的服务和流量在不同国家的分布。
{"title":"eXO: A commons-based community network Internet Service Provider, description and subscribers usage patterns","authors":"","doi":"10.1016/j.comnet.2024.110765","DOIUrl":"10.1016/j.comnet.2024.110765","url":null,"abstract":"<div><p>The advent of Wi-Fi in the 1990s stimulated the creation of Community networks (CNs), a new networking paradigm deployed and maintained by their users. The non-profit and grassroots self-organization of CNs has shown significant potential in enhancing communication technologies grounded in ethical values, transcending mere Internet expansion to contribute to broader social impacts. Since its conception, hundreds of CNs have been deployed worldwide. However, many have faltered, primarily due to a lack of solid economic models and legal setup. This paper presents <em>Expansió Xarxa Oberta (eXO)</em> association, a commons Internet Service Provider (ISP). In contrast to commercial ISPs, eXO follows the same grassroots principles of CNs. Establishing a commons-based ISP is challenging, yet it is a key component for the sustainability and success of CNs. Therefore, our paper aims to dissect the complexity of a commons ISP by explaining eXO, a pioneering example that has already been in production for more than 14 years. To the best of our knowledge, this is the first time that a commons ISP is described in all its components.</p><p>To describe eXO, we have proceeded in two parts. In the first one, we delineate the organizational structure, economics, funding mechanisms, activities, legal framework, and infrastructure. To gain more insight on eXO, in the second part, we conduct a technical analysis of traffic data collected from eXO’s core router, elucidating subscriber usage patterns. Our study encompasses various subscriber categories, including regular and financially subsidized users, Wi-Fi and optical fiber access, and traffic characteristics such as volume, TCP/UDP usage, services accessed, and traffic distribution across countries.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005978/pdfft?md5=d3b1e3beea5ac07595517347e441e0cb&pid=1-s2.0-S1389128624005978-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance enhancement of NOMA multi-user networks with aerial reconfigurable intelligent surfaces and aerial relay 利用空中可重构智能表面和空中中继提高 NOMA 多用户网络的性能
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-03 DOI: 10.1016/j.comnet.2024.110767

In this article, we propose a combination of multiple aerial reconfigurable intelligent surfaces (ARISs) with an aerial relay (AR) for improving the performance of multiple users adopting the non-orthogonal multiple access (NOMA) scheme. In particular, two groups of ARIS are utilized, one for aiding ground-to-air (G2A) communication and another one for aiding air-to-ground (A2G) communication. Mathematical formulas of outage probability (OP), throughput, and achievable capacity (AC) of every user in the proposed ARISs-AR-NOMA network are derived over the Nakagami-m channel. The propagation environment recommended for the fifth generation and beyond (5G/B5G) is applied to enhance the practical behavior of the proposed network. To confirm the performance enhancement, we compare the OP, throughput, and AC of the proposed system with the conventional AR-NOMA network (i.e., without ARISs). Numerical illustrations demonstrate the great benefits of the proposed ARISs-AR-NOMA network, its transmit power is dramatically lower than that of the conventional network. Moreover, the throughput and AC of the proposed network are considerably higher than the conventional network’s. Based on the effect of key parameters and network behaviors, various effective solutions are recommended to enhance the performance of the proposed ARISs-AR-NOMA network.

本文提出了一种将多个空中可重构智能表面(ARIS)与空中中继(AR)相结合的方法,以提高采用非正交多址(NOMA)方案的多用户的性能。特别是利用两组 ARIS,一组用于辅助地对空(G2A)通信,另一组用于辅助空对地(A2G)通信。在 Nakagami-m 信道上,推导出了拟议的 ARIS-AR-NOMA 网络中每个用户的中断概率 (OP)、吞吐量和可实现容量 (AC) 的数学公式。我们采用了为第五代及以后(5G/B5G)推荐的传播环境,以增强拟议网络的实际性能。为了证实性能的提升,我们将拟议系统的 OP、吞吐量和 AC 与传统 AR-NOMA 网络(即不含 ARIS)进行了比较。数值说明证明了所提出的 ARIS-AR-NOMA 网络的巨大优势,其发射功率大大低于传统网络。此外,拟议网络的吞吐量和交流功率也大大高于传统网络。根据关键参数和网络行为的影响,提出了各种有效的解决方案,以提高拟议 ARIS-AR-NOMA 网络的性能。
{"title":"Performance enhancement of NOMA multi-user networks with aerial reconfigurable intelligent surfaces and aerial relay","authors":"","doi":"10.1016/j.comnet.2024.110767","DOIUrl":"10.1016/j.comnet.2024.110767","url":null,"abstract":"<div><p>In this article, we propose a combination of multiple aerial reconfigurable intelligent surfaces (ARISs) with an aerial relay (AR) for improving the performance of multiple users adopting the non-orthogonal multiple access (NOMA) scheme. In particular, two groups of ARIS are utilized, one for aiding ground-to-air (G2A) communication and another one for aiding air-to-ground (A2G) communication. Mathematical formulas of outage probability (OP), throughput, and achievable capacity (AC) of every user in the proposed ARISs-AR-NOMA network are derived over the Nakagami-<span><math><mi>m</mi></math></span> channel. The propagation environment recommended for the fifth generation and beyond (5G/B5G) is applied to enhance the practical behavior of the proposed network. To confirm the performance enhancement, we compare the OP, throughput, and AC of the proposed system with the conventional AR-NOMA network (i.e., without ARISs). Numerical illustrations demonstrate the great benefits of the proposed ARISs-AR-NOMA network, its transmit power is dramatically lower than that of the conventional network. Moreover, the throughput and AC of the proposed network are considerably higher than the conventional network’s. Based on the effect of key parameters and network behaviors, various effective solutions are recommended to enhance the performance of the proposed ARISs-AR-NOMA network.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142147582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network LFGurad:防御车载网络联合学习中的标签翻转攻击
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-03 DOI: 10.1016/j.comnet.2024.110768

The explosive growth of the interconnected vehicle network creates vast amounts of data within individual vehicles, offering exciting opportunities to develop advanced applications. FL (Federated Learning) is a game-changer for vehicular networks, enabling powerful distributed data processing across vehicles to build intelligent applications while promoting collaborative training and safeguarding data privacy. However, recent research has exposed a critical vulnerability in FL: poisoning attacks, where malicious actors can manipulate data, labels, or models to subvert the system. Despite its advantages, deploying FL in dynamic vehicular environments with a multitude of distributed vehicles presents unique challenges. One such challenge is the potential for a significant number of malicious actors to tamper with data. We propose a hierarchical FL framework for vehicular networks to address these challenges, promising lower latency and coverage. We also present a defense mechanism, LFGuard, which employs a detection system to pinpoint malicious vehicles. It then excludes their local models from the aggregation stage, significantly reducing their influence on the final outcome. We evaluate LFGuard against state-of-the-art techniques using the three popular benchmark datasets in a heterogeneous environment. Results illustrate LFGuard outperforms prior studies in thwarting targeted label-flipping attacks with more than 5% improvement in the global model accuracy, 12% in the source class recall, and a 6% reduction in the attack success rate while maintaining high model utility.

互联车辆网络的爆炸式增长在单个车辆内产生了大量数据,为开发高级应用提供了令人兴奋的机会。FL(联合学习)改变了车载网络的游戏规则,使强大的跨车辆分布式数据处理成为可能,从而在促进协作训练和保护数据隐私的同时构建智能应用。然而,最近的研究暴露了 FL 的一个关键漏洞:中毒攻击,即恶意行为者可以操纵数据、标签或模型来颠覆系统。尽管 FL 具有诸多优势,但在有大量分布式车辆的动态车辆环境中部署 FL 也面临着独特的挑战。其中一个挑战就是大量恶意行为者有可能篡改数据。我们为车载网络提出了分层 FL 框架来应对这些挑战,有望降低延迟和覆盖范围。我们还提出了一种防御机制--LFGuard,它采用检测系统来定位恶意车辆。然后,它将恶意车辆的本地模型排除在聚合阶段之外,从而大大降低了它们对最终结果的影响。我们在异构环境中使用三个流行的基准数据集对 LFGuard 和最先进的技术进行了评估。结果表明,在挫败有针对性的标签翻转攻击方面,LFGuard 的表现优于之前的研究,全局模型准确率提高了 5%,源类召回率提高了 12%,攻击成功率降低了 6%,同时保持了较高的模型效用。
{"title":"LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network","authors":"","doi":"10.1016/j.comnet.2024.110768","DOIUrl":"10.1016/j.comnet.2024.110768","url":null,"abstract":"<div><p>The explosive growth of the interconnected vehicle network creates vast amounts of data within individual vehicles, offering exciting opportunities to develop advanced applications. FL (Federated Learning) is a game-changer for vehicular networks, enabling powerful distributed data processing across vehicles to build intelligent applications while promoting collaborative training and safeguarding data privacy. However, recent research has exposed a critical vulnerability in FL: poisoning attacks, where malicious actors can manipulate data, labels, or models to subvert the system. Despite its advantages, deploying FL in dynamic vehicular environments with a multitude of distributed vehicles presents unique challenges. One such challenge is the potential for a significant number of malicious actors to tamper with data. We propose a hierarchical FL framework for vehicular networks to address these challenges, promising lower latency and coverage. We also present a defense mechanism, LFGuard, which employs a detection system to pinpoint malicious vehicles. It then excludes their local models from the aggregation stage, significantly reducing their influence on the final outcome. We evaluate LFGuard against state-of-the-art techniques using the three popular benchmark datasets in a heterogeneous environment. Results illustrate LFGuard outperforms prior studies in thwarting targeted label-flipping attacks with more than 5% improvement in the global model accuracy, 12% in the source class recall, and a 6% reduction in the attack success rate while maintaining high model utility.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative last-hop scheduling strategy for large-scale LEO constellation routing 大规模低地轨道星座路由的末跳协作调度策略
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-03 DOI: 10.1016/j.comnet.2024.110760

The transmission of data packets from satellites to Earth Stations (ESs) is the last hop of satellite network routing. As the final stage of packet transmission, the use of different scheduling strategies directly affects the throughput of the satellite network. Traditionally, researchers have attempted to enhance network performance by investigating inter-satellite routing protocols or inter-satellite data offloading strategies. However, these approaches have failed to address scheduling issues in the last hop of large-scale Low Earth Orbit (LEO) constellations. In this paper, we present the first Cooperative Last-Hop Scheduling (CLHS) strategy for routing in large-scale LEO constellations based on a bidirectional communication domain. In this strategy, we first utilize the bidirectional communication domain to determine the communication ranges of satellites and ESs. Subsequently, an information flow is established to interact with ESs and satellites. The ESs receive and reconstruct the Information Matrix (IM) from the information flow. Moreover, we propose the Maximum Decision Value Priority (MDVP) algorithm, which takes the reconstructed IM as input and computes the scheduling commands for satellites within the communication range of the ESs. To address the issue of multiple ESs simultaneously scheduling the same satellite, we introduce the Collision Avoidance Algorithm (CAA). Finally, to enhance the data packet transmission efficiency of the scheduled satellites, we propose the Weighted First-In-First-Out (WFIFO) algorithm, which is specifically designed for satellite packet dequeuing. We validate the CLHS through simulations on two satellite constellations: the first-generation Starlink constellation with 4409 satellites and the GW-2 constellation with 6912 satellites. The results show that CLHS can achieve better network throughput than traditional strategies. CLHS provides a novel method of scheduling the last hop in large-scale satellite constellations.

从卫星向地面站(ES)传输数据包是卫星网络路由的最后一跳。作为数据包传输的最后阶段,不同调度策略的使用会直接影响卫星网络的吞吐量。传统上,研究人员试图通过研究卫星间路由协议或卫星间数据卸载策略来提高网络性能。然而,这些方法都未能解决大规模低地轨道(LEO)星座最后一跳的调度问题。在本文中,我们首次提出了基于双向通信域的大规模低地轨道星座路由合作最后一跳调度(CLHS)策略。在该策略中,我们首先利用双向通信域确定卫星和 ES 的通信范围。随后,建立信息流,与 ES 和卫星进行交互。ES 从信息流中接收并重建信息矩阵 (IM)。此外,我们还提出了最大决策值优先(MDVP)算法,该算法以重建的信息矩阵为输入,计算 ES 通信范围内卫星的调度指令。为解决多个 ES 同时调度同一卫星的问题,我们引入了碰撞避免算法(CAA)。最后,为了提高已调度卫星的数据包传输效率,我们提出了加权先进先出算法(WFIFO),该算法专门用于卫星数据包的排序。我们在两个卫星星座上模拟验证了 CLHS:第一代 Starlink 卫星星座(有 4409 颗卫星)和 GW-2 卫星星座(有 6912 颗卫星)。结果表明,与传统策略相比,CLHS 可以实现更好的网络吞吐量。CLHS为大规模卫星星座的最后一跳调度提供了一种新方法。
{"title":"Collaborative last-hop scheduling strategy for large-scale LEO constellation routing","authors":"","doi":"10.1016/j.comnet.2024.110760","DOIUrl":"10.1016/j.comnet.2024.110760","url":null,"abstract":"<div><p>The transmission of data packets from satellites to Earth Stations (ESs) is the last hop of satellite network routing. As the final stage of packet transmission, the use of different scheduling strategies directly affects the throughput of the satellite network. Traditionally, researchers have attempted to enhance network performance by investigating inter-satellite routing protocols or inter-satellite data offloading strategies. However, these approaches have failed to address scheduling issues in the last hop of large-scale Low Earth Orbit (LEO) constellations. In this paper, we present the first Cooperative Last-Hop Scheduling (CLHS) strategy for routing in large-scale LEO constellations based on a bidirectional communication domain. In this strategy, we first utilize the bidirectional communication domain to determine the communication ranges of satellites and ESs. Subsequently, an information flow is established to interact with ESs and satellites. The ESs receive and reconstruct the Information Matrix (IM) from the information flow. Moreover, we propose the Maximum Decision Value Priority (MDVP) algorithm, which takes the reconstructed IM as input and computes the scheduling commands for satellites within the communication range of the ESs. To address the issue of multiple ESs simultaneously scheduling the same satellite, we introduce the Collision Avoidance Algorithm (CAA). Finally, to enhance the data packet transmission efficiency of the scheduled satellites, we propose the Weighted First-In-First-Out (WFIFO) algorithm, which is specifically designed for satellite packet dequeuing. We validate the CLHS through simulations on two satellite constellations: the first-generation Starlink constellation with 4409 satellites and the GW-2 constellation with 6912 satellites. The results show that CLHS can achieve better network throughput than traditional strategies. CLHS provides a novel method of scheduling the last hop in large-scale satellite constellations.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142135857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MpScope: Enabling multi-pipeline monitoring inside a switch MpScope:在交换机内部实现多管道监控
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-03 DOI: 10.1016/j.comnet.2024.110764

The core of programmable switches is the flexible data plane, composed of multiple programmable pipelines in existing programmable switches. These pipelines are isolated from each other and cannot share state and data. However, most of network monitoring systems ignore this condition and implicitly assume that the switch has only a single pipeline. This results in an inaccurate measurement and high communication overhead with the practical switch. To tackle this problem, we propose MpScope, a general multi-pipeline monitoring framework, which centers around the control plane, supporting accurate and efficient network monitoring. Specifically, MpScope combines the switch’s data plane and control plane to achieve comprehensive network monitoring of the whole switch scope. The control plane aggregates the statistical results from multiple pipelines and tunes the monitoring module residing in the different pipelines in the data plane dynamically. The data plane is responsible for real-time traffic measurement and statistic reports. Its behaviors can be adjusted periodically with the instructions from the control plane. Two typical monitoring applications, i.e., heavy hitter detection and distinct counting, are developed with MpScope to validate the effectiveness of multi-pipeline monitoring. Experiments show that MpScope significantly reduces communication overhead compared to the static threshold scheme while maintaining high detection accuracy over time.

可编程交换机的核心是灵活的数据平面,由现有可编程交换机中的多个可编程管道组成。这些管道相互隔离,不能共享状态和数据。然而,大多数网络监控系统都忽略了这一条件,默认交换机只有一条管道。这就导致了测量不准确,以及与实际交换机的通信开销过高。为了解决这个问题,我们提出了 MpScope,一个以控制平面为中心的通用多管道监控框架,支持精确高效的网络监控。具体来说,MpScope 结合了交换机的数据平面和控制平面,实现了对整个交换机范围的全面网络监控。控制平面汇总来自多个管道的统计结果,并动态调整数据平面不同管道中的监控模块。数据平面负责实时流量测量和统计报告。其行为可根据控制平面的指令定期调整。为了验证多管道监控的有效性,我们使用 MpScope 开发了两个典型的监控应用,即重击检测和独特计数。实验表明,与静态阈值方案相比,MpScope 能显著减少通信开销,同时在一段时间内保持较高的检测精度。
{"title":"MpScope: Enabling multi-pipeline monitoring inside a switch","authors":"","doi":"10.1016/j.comnet.2024.110764","DOIUrl":"10.1016/j.comnet.2024.110764","url":null,"abstract":"<div><p>The core of programmable switches is the flexible data plane, composed of multiple programmable pipelines in existing programmable switches. These pipelines are isolated from each other and cannot share state and data. However, most of network monitoring systems ignore this condition and implicitly assume that the switch has only a single pipeline. This results in an inaccurate measurement and high communication overhead with the practical switch. To tackle this problem, we propose <em>MpScope</em>, a general multi-pipeline monitoring framework, which centers around the control plane, supporting accurate and efficient network monitoring. Specifically, <em>MpScope</em> combines the switch’s data plane and control plane to achieve comprehensive network monitoring of the whole switch scope. The control plane aggregates the statistical results from multiple pipelines and tunes the monitoring module residing in the different pipelines in the data plane dynamically. The data plane is responsible for real-time traffic measurement and statistic reports. Its behaviors can be adjusted periodically with the instructions from the control plane. Two typical monitoring applications, <em>i.e.</em>, heavy hitter detection and distinct counting, are developed with <em>MpScope</em> to validate the effectiveness of multi-pipeline monitoring. Experiments show that <em>MpScope</em> significantly reduces communication overhead compared to the static threshold scheme while maintaining high detection accuracy over time.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-latency intelligent service combination caching strategy with density peak clustering algorithm in vehicle edge computing 车辆边缘计算中采用密度峰值聚类算法的低延迟智能服务组合缓存策略
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-02 DOI: 10.1016/j.comnet.2024.110761

In the dynamic field of Vehicle Edge Computing (VEC), the demand for intelligent vehicular systems to process vast amounts of data is escalating, driven by advancements in autonomous driving and real-time navigation technologies. Optimizing service latency and minimizing transmission costs are crucial for enhancing the performance of vehicular networks. Traditional service caching strategies, which largely rely on the popularity of individual services, often fail to account for the intricate interdependencies between services. The oversight can result in redundant data transfers and inefficient use of storage resources. In response, our paper introduces a novel approach to service combination caching within a heterogeneous computational framework comprising vehicles, edge servers, and the cloud. Our strategy focuses on minimizing user wait times and data transmission costs during task execution, while adhering to the caching budget constraints of service providers. Key contributions include the development of an Improved Density Peak Clustering (IDPC) algorithm to facilitate cooperative clustering among edge servers and the design of a Service Combination Caching Strategy (SCCS). The SCCS approach reduces caching costs by categorizing servers, forming efficient clusters, and strategically allocating storage. Simulation results demonstrate that the method outperforms existing strategies by significantly decreasing task execution delays and transmission costs, thereby greatly enhancing the quality of service in vehicular applications.

在充满活力的车载边缘计算(VEC)领域,受自动驾驶和实时导航技术发展的推动,对智能车载系统处理海量数据的需求不断升级。优化服务延迟和降低传输成本是提高车载网络性能的关键。传统的服务缓存策略主要依赖于单个服务的受欢迎程度,往往无法考虑到服务之间错综复杂的相互依赖关系。这种疏忽会导致冗余数据传输和存储资源的低效利用。为此,我们的论文介绍了一种在由车辆、边缘服务器和云组成的异构计算框架内进行服务组合缓存的新方法。我们的策略侧重于最大限度地减少任务执行过程中的用户等待时间和数据传输成本,同时遵守服务提供商的缓存预算限制。我们的主要贡献包括开发了一种改进的密度峰聚类(IDPC)算法,以促进边缘服务器之间的合作聚类,并设计了一种服务组合缓存策略(SCCS)。SCCS 方法通过对服务器进行分类、形成高效集群以及战略性地分配存储空间来降低缓存成本。仿真结果表明,该方法大大减少了任务执行延迟和传输成本,从而大大提高了车辆应用的服务质量,优于现有策略。
{"title":"Low-latency intelligent service combination caching strategy with density peak clustering algorithm in vehicle edge computing","authors":"","doi":"10.1016/j.comnet.2024.110761","DOIUrl":"10.1016/j.comnet.2024.110761","url":null,"abstract":"<div><p>In the dynamic field of Vehicle Edge Computing (VEC), the demand for intelligent vehicular systems to process vast amounts of data is escalating, driven by advancements in autonomous driving and real-time navigation technologies. Optimizing service latency and minimizing transmission costs are crucial for enhancing the performance of vehicular networks. Traditional service caching strategies, which largely rely on the popularity of individual services, often fail to account for the intricate interdependencies between services. The oversight can result in redundant data transfers and inefficient use of storage resources. In response, our paper introduces a novel approach to service combination caching within a heterogeneous computational framework comprising vehicles, edge servers, and the cloud. Our strategy focuses on minimizing user wait times and data transmission costs during task execution, while adhering to the caching budget constraints of service providers. Key contributions include the development of an Improved Density Peak Clustering (IDPC) algorithm to facilitate cooperative clustering among edge servers and the design of a Service Combination Caching Strategy (SCCS). The SCCS approach reduces caching costs by categorizing servers, forming efficient clusters, and strategically allocating storage. Simulation results demonstrate that the method outperforms existing strategies by significantly decreasing task execution delays and transmission costs, thereby greatly enhancing the quality of service in vehicular applications.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent resource allocation in wireless networks: Predictive models for efficient access point management 无线网络中的智能资源分配:高效接入点管理的预测模型
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-02 DOI: 10.1016/j.comnet.2024.110762

With the significant increase in mobile users connected to the wireless network, coupled with the escalating energy consumption and the risk of network saturation, the search for resource management has become paramount. Managing several access points throughout a whole region is hugely relevant in this context. Moreover, a wireless network must keep its Service Level Agreement, regardless of the number of connected users. With that in mind, in this work, we propose four prediction models that allow one to predict the number of connected users on a wireless network. Once the number of users has been predicted, the network resources can be properly allocated, minimizing the number of active access points. We investigate the use of Particle Swarm Optimization and Genetic Algorithms to hyper-parameterize a Multilayer Perceptron neural network and a Decision Tree. We evaluate our proposal using a campus-based wireless network dataset with more than 20,000 connected users. As a result, our model can considerably improve network performance by intelligently allocating the number of access points, thereby addressing concerns related to energy consumption and network saturation. The results have shown an average accuracy of 95.18%, managing to save network resources effectively.

随着连接到无线网络的移动用户大幅增加,加上能源消耗不断攀升和网络饱和的风险,对资源管理的探索变得至关重要。在这种情况下,管理整个区域内的多个接入点就显得尤为重要。此外,无论连接的用户数量有多少,无线网络都必须遵守服务水平协议。有鉴于此,在这项工作中,我们提出了四种预测模型,可用于预测无线网络的连接用户数量。一旦预测出用户数量,就可以合理分配网络资源,最大限度地减少活动接入点的数量。我们研究了如何使用粒子群优化和遗传算法对多层感知器神经网络和决策树进行超参数化。我们使用一个包含 20,000 多个连接用户的校园无线网络数据集对我们的建议进行了评估。结果表明,我们的模型可以通过智能分配接入点数量来显著提高网络性能,从而解决能耗和网络饱和等相关问题。结果显示,平均准确率达到 95.18%,有效地节约了网络资源。
{"title":"Intelligent resource allocation in wireless networks: Predictive models for efficient access point management","authors":"","doi":"10.1016/j.comnet.2024.110762","DOIUrl":"10.1016/j.comnet.2024.110762","url":null,"abstract":"<div><p>With the significant increase in mobile users connected to the wireless network, coupled with the escalating energy consumption and the risk of network saturation, the search for resource management has become paramount. Managing several access points throughout a whole region is hugely relevant in this context. Moreover, a wireless network must keep its Service Level Agreement, regardless of the number of connected users. With that in mind, in this work, we propose four prediction models that allow one to predict the number of connected users on a wireless network. Once the number of users has been predicted, the network resources can be properly allocated, minimizing the number of active access points. We investigate the use of Particle Swarm Optimization and Genetic Algorithms to hyper-parameterize a Multilayer Perceptron neural network and a Decision Tree. We evaluate our proposal using a campus-based wireless network dataset with more than 20,000 connected users. As a result, our model can considerably improve network performance by intelligently allocating the number of access points, thereby addressing concerns related to energy consumption and network saturation. The results have shown an average accuracy of 95.18%, managing to save network resources effectively.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005942/pdfft?md5=8db2023c48b0819947efcc292aa13c43&pid=1-s2.0-S1389128624005942-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Full duplex based collision detection to enhance the V2X sidelink autonomous mode 基于全双工的碰撞检测,增强 V2X 侧向链路自主模式
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-02 DOI: 10.1016/j.comnet.2024.110763

The Third Generation Partnership Project (3GPP) recently introduced the fifth-generation (5G) new radio (NR) sidelink to enable vehicle-to-everything (V2X) communications supporting advanced safety services. Nevertheless, improvements over the previous generation still pose challenges to meet the reliability and latency requirements of V2X communications, particularly in the allocation of distributed resources, i.e., Mode 2. In Mode 2, vehicles autonomously select radio resources for their message transmissions and can maintain the selected resources for a given reservation period to efficiently handle periodic data traffic. However, potential collisions during this period may remain undetected due to half-duplex communications and unacknowledged broadcast transmissions, resulting in persistent message losses and posing a threat to road safety. This paper aims to improve the 5G NR-V2X sidelink for systems beyond 5G-Advanced by exploiting full-duplex transceivers. We propose a novel medium access control (MAC) scheme where vehicles can detect collisions while transmitting, dynamically adapt the collision detection threshold according to the measured channel load, and react to detected collisions through appropriate resource reselection and retransmission procedures. Extensive simulations conducted under various settings show that this MAC scheme brings substantial performance gains in terms of reliability and latency, compared to the current legacy Mode 2 procedure and a benchmark full-duplex scheme from the literature.

第三代合作伙伴计划(3GPP)最近推出了第五代(5G)新无线电(NR)侧链路,以实现支持高级安全服务的车对物(V2X)通信。然而,与上一代产品相比,5G 在可靠性和延迟方面的改进仍对满足 V2X 通信的要求提出了挑战,特别是在分布式资源分配(即模式 2)方面。在模式 2 中,车辆自主选择用于信息传输的无线电资源,并在给定的保留期内保持所选资源,以有效处理周期性数据流量。然而,由于半双工通信和未确认的广播传输,在此期间潜在的碰撞可能仍未被发现,从而导致持续的信息丢失,对道路安全构成威胁。本文旨在利用全双工收发器改进 5G NR-V2X 侧向链路,使其适用于 5G-Advanced 以上的系统。我们提出了一种新型介质访问控制(MAC)方案,车辆可以在传输过程中检测碰撞,根据测量的信道负载动态调整碰撞检测阈值,并通过适当的资源重选和重传程序对检测到的碰撞做出反应。在各种设置下进行的大量仿真表明,与当前的传统模式 2 程序和文献中的基准全双工方案相比,这种 MAC 方案在可靠性和延迟方面带来了显著的性能提升。
{"title":"Full duplex based collision detection to enhance the V2X sidelink autonomous mode","authors":"","doi":"10.1016/j.comnet.2024.110763","DOIUrl":"10.1016/j.comnet.2024.110763","url":null,"abstract":"<div><p>The Third Generation Partnership Project (3GPP) recently introduced the fifth-generation (5G) new radio (NR) sidelink to enable vehicle-to-everything (V2X) communications supporting advanced safety services. Nevertheless, improvements over the previous generation still pose challenges to meet the reliability and latency requirements of V2X communications, particularly in the allocation of distributed resources, i.e., Mode 2. In Mode 2, vehicles autonomously select radio resources for their message transmissions and can maintain the selected resources for a given reservation period to efficiently handle periodic data traffic. However, potential collisions during this period may remain undetected due to half-duplex communications and unacknowledged broadcast transmissions, resulting in persistent message losses and posing a threat to road safety. This paper aims to improve the 5G NR-V2X sidelink for systems beyond 5G-Advanced by exploiting full-duplex transceivers. We propose a novel medium access control (MAC) scheme where vehicles can detect collisions while transmitting, dynamically adapt the collision detection threshold according to the measured channel load, and react to detected collisions through appropriate resource reselection and retransmission procedures. Extensive simulations conducted under various settings show that this MAC scheme brings substantial performance gains in terms of reliability and latency, compared to the current legacy Mode 2 procedure and a benchmark full-duplex scheme from the literature.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005954/pdfft?md5=085f21c51de1dac32769fcfbac7e84ff&pid=1-s2.0-S1389128624005954-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach for application classification with encrypted traffic using BERT and packet headers 利用 BERT 和数据包标题对加密流量进行应用分类的新方法
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-01 DOI: 10.1016/j.comnet.2024.110747

Recent years have seen substantial advancements in Internet technology along with environmental changes, which have led to the emergence of various security issues. There is also a trend of explosive growth in applications that encrypt network traffic for various types of services. Therefore, the classification of applications within encrypted traffic represents an important research issue for both secure network management and efficient bandwidth management. In such encrypted traffic, the payload itself is encrypted, and it is no longer viable to classify applications based on signatures extracted from plaintext. Most applications in public datasets for encrypted traffic classification are collected with the same IP address and port number, which makes the 5-tuple information a strong identifier. However, this 5-tuple contains many characteristics related to both the traffic collection environment and user-specific traits, rather than intrinsic features of the applications themselves. Therefore, when addressing the problem of encrypted traffic application classification, it is advisable to utilize header information excluding the 5-tuple and payload. Therefore, this paper proposes a novel service type and application classification system based on the Bidirectional Encoding Representation Transformer (BERT), which utilizes packet header information from encrypted traffic. The proposed system ensures the accuracy and generalization performance of the classification model by using only the header information from traffic packets, excluding the 5-tuple and payload. Further, to preserve the characteristics and semantic meaning of an encrypted traffic packet, sentences embedded with 2-byte tokens were used as input for BERT. The proposed system was designed to exclude labeling information from all sentences during the pre-training phase before proceeding with training. Fine-tuning was then conducted to align the system with the objectives of the service type and application classification. This experiment utilized the publicly available ISCX VPN-nonVPN dataset, and the proposed model achieved remarkable accuracy in the key performance measure, i.e., F1-scores, with values of 99.24 % in service type classification and 98.74 % in application classification. This capability can be used in maintaining the confidentiality of encrypted traffic, network security monitoring, Quality of Service (QoS), and traffic management in complex IT environments.

近年来,随着环境的变化,互联网技术也取得了长足的进步,从而导致了各种安全问题的出现。为各类服务加密网络流量的应用也呈爆炸式增长趋势。因此,加密流量中的应用分类是安全网络管理和高效带宽管理的一个重要研究课题。在这类加密流量中,有效载荷本身已被加密,根据从明文中提取的签名对应用程序进行分类已不再可行。用于加密流量分类的公共数据集中收集的大多数应用程序都具有相同的 IP 地址和端口号,这使得 5 元组信息成为一个强有力的标识符。然而,这个 5 元组包含许多与流量收集环境和用户特定特征有关的特征,而不是应用程序本身的内在特征。因此,在解决加密流量应用分类问题时,最好利用不包括 5 元组和有效载荷的头信息。因此,本文提出了一种基于双向编码表示变换器(BERT)的新型服务类型和应用分类系统,该系统利用了加密流量的数据包头信息。该系统只使用流量包的包头信息,不包括 5 元组和有效载荷,从而确保了分类模型的准确性和泛化性能。此外,为了保留加密流量包的特征和语义,BERT 使用了嵌入 2 字节标记的句子作为输入。在预训练阶段,拟议系统的设计是在进行训练之前排除所有句子中的标签信息。然后进行微调,使系统符合服务类型和应用分类的目标。该实验使用了公开的 ISCX VPN-nonVPN 数据集,所提出的模型在关键性能指标(即 F1 分数)上取得了显著的准确性,在服务类型分类中达到 99.24 %,在应用分类中达到 98.74 %。这种能力可用于维护加密流量的机密性、网络安全监控、服务质量(QoS)以及复杂 IT 环境中的流量管理。
{"title":"A novel approach for application classification with encrypted traffic using BERT and packet headers","authors":"","doi":"10.1016/j.comnet.2024.110747","DOIUrl":"10.1016/j.comnet.2024.110747","url":null,"abstract":"<div><p>Recent years have seen substantial advancements in Internet technology along with environmental changes, which have led to the emergence of various security issues. There is also a trend of explosive growth in applications that encrypt network traffic for various types of services. Therefore, the classification of applications within encrypted traffic represents an important research issue for both secure network management and efficient bandwidth management. In such encrypted traffic, the payload itself is encrypted, and it is no longer viable to classify applications based on signatures extracted from plaintext. Most applications in public datasets for encrypted traffic classification are collected with the same IP address and port number, which makes the 5-tuple information a strong identifier. However, this 5-tuple contains many characteristics related to both the traffic collection environment and user-specific traits, rather than intrinsic features of the applications themselves. Therefore, when addressing the problem of encrypted traffic application classification, it is advisable to utilize header information excluding the 5-tuple and payload. Therefore, this paper proposes a novel service type and application classification system based on the Bidirectional Encoding Representation Transformer (BERT), which utilizes packet header information from encrypted traffic. The proposed system ensures the accuracy and generalization performance of the classification model by using only the header information from traffic packets, excluding the 5-tuple and payload. Further, to preserve the characteristics and semantic meaning of an encrypted traffic packet, sentences embedded with 2-byte tokens were used as input for BERT. The proposed system was designed to exclude labeling information from all sentences during the pre-training phase before proceeding with training. Fine-tuning was then conducted to align the system with the objectives of the service type and application classification. This experiment utilized the publicly available ISCX VPN-nonVPN dataset, and the proposed model achieved remarkable accuracy in the key performance measure, i.e., F1-scores, with values of 99.24 % in service type classification and 98.74 % in application classification. This capability can be used in maintaining the confidentiality of encrypted traffic, network security monitoring, Quality of Service (QoS), and traffic management in complex IT environments.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005796/pdfft?md5=cb87abf0c95322289a1157af054f1a23&pid=1-s2.0-S1389128624005796-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph-based insider threat detection: A survey 基于图形的内部威胁检测:一项调查
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-31 DOI: 10.1016/j.comnet.2024.110757

Insider threat detection has been a significant topic in recent years. However, as network technology develops, the intranet becomes more complex. Therefore, simply matching attack patterns or using traditional machine learning methods (Logistic Regression, Gaussian-NB, Random Forest, etc.) does not work well. On the other hand, the graph structure can better adapt to intranet data, thus graph-based insider threat detection methods have become mainstream. In order to study the design and effectiveness of graph-based insider threat detection, in this paper, we conduct a systematic and comprehensive survey of existing related research. Specifically, we provide a framework and a taxonomy based on the detection process, classifying existing work from three aspects: data collection, graph construction, and graph anomaly detection. We conduct a quantitative analysis of existing representative graph methods and find that the models with more information have better performance. In particular, we discuss the scalability of existing methods to large-scale networks and their feasibility in real environments. Based on the survey results, we propose 7 pain points in this field and provide specific future research directions. Our survey will provide future researchers with a complete solution.

内部威胁检测是近年来的一个重要话题。然而,随着网络技术的发展,内网变得越来越复杂。因此,简单地匹配攻击模式或使用传统的机器学习方法(逻辑回归、高斯-NB、随机森林等)效果并不好。另一方面,图结构能更好地适应内网数据,因此基于图的内部威胁检测方法已成为主流。为了研究基于图的内部威胁检测的设计和有效性,本文对现有的相关研究进行了系统而全面的调查。具体来说,我们提供了一个基于检测过程的框架和分类法,从数据收集、图构建和图异常检测三个方面对现有工作进行了分类。我们对现有的代表性图方法进行了定量分析,发现信息越多的模型性能越好。我们特别讨论了现有方法在大规模网络中的可扩展性及其在真实环境中的可行性。基于调查结果,我们提出了该领域的 7 个痛点,并提供了具体的未来研究方向。我们的调查将为未来的研究人员提供完整的解决方案。
{"title":"Graph-based insider threat detection: A survey","authors":"","doi":"10.1016/j.comnet.2024.110757","DOIUrl":"10.1016/j.comnet.2024.110757","url":null,"abstract":"<div><p>Insider threat detection has been a significant topic in recent years. However, as network technology develops, the intranet becomes more complex. Therefore, simply matching attack patterns or using traditional machine learning methods (Logistic Regression, Gaussian-NB, Random Forest, etc.) does not work well. On the other hand, the graph structure can better adapt to intranet data, thus graph-based insider threat detection methods have become mainstream. In order to study the design and effectiveness of graph-based insider threat detection, in this paper, we conduct a systematic and comprehensive survey of existing related research. Specifically, we provide a framework and a taxonomy based on the detection process, classifying existing work from three aspects: data collection, graph construction, and graph anomaly detection. We conduct a quantitative analysis of existing representative graph methods and find that the models with more information have better performance. In particular, we discuss the scalability of existing methods to large-scale networks and their feasibility in real environments. Based on the survey results, we propose 7 pain points in this field and provide specific future research directions. Our survey will provide future researchers with a complete solution.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1