首页 > 最新文献

Computer Networks最新文献

英文 中文
On the impact of Open RAN Fronthaul Control in scenarios with XR Traffic 开放式 RAN 前端控制对 XR 流量场景的影响
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-19 DOI: 10.1016/j.comnet.2024.110722

Through extensive research and standardization efforts, mobile networks have rapidly evolved, offering improved services and allowing the establishment of new use cases, such as autonomous vehicles, smart cities, Industry 4.0, among others. While 5G networks have brought advancements that can support a broad spectrum of such new use cases, the requirements imposed by time-critical services as the eXtended Reality (XR) and Cloud Gaming (CG) applications still remain a challenge. Next generation networks are envisioned to adopt technologies that will allow them to surpass such barriers. Open Radio Access Network (RAN), utilizing the disaggregation paradigm, stands out as a pivotal technology thanks to its potential to endow the network with flexibility, automation, and intelligence. In fact, Open RAN is considered as one of the key enabling technologies for XR and CG applications. However, disaggregation of the RAN may result in bottlenecks in the links connecting the various parts of the network, like the Open Fronthaul link, especially when considering time-critical traffic. In this paper, we perform an analysis of the impact that the Open Fronthaul capacity limitations can have in the XR and CG traffic under 3GPP defined scenarios. Moreover, to address these limitations, we implement and extend a Fronthaul Control mechanism combined with modulation compression, using the open-source ns-3 based 5G-LENA network simulator. Results showcase that the Open Fronthaul capacity limitation can drastically reduce the performance of the XR and CG applications, and demonstrate the necessity for such mechanisms to be employed in order to meet their requirements in terms of latency and throughput.

通过广泛的研究和标准化努力,移动网络迅速发展,提供了更好的服务,并允许建立新的用例,如自动驾驶汽车、智慧城市、工业 4.0 等。虽然 5G 网络带来的进步可以支持这些新用例的广泛应用,但像扩展现实(XR)和云游戏(CG)应用这样的时间关键型服务所提出的要求仍然是一个挑战。根据设想,下一代网络将采用能够超越这些障碍的技术。开放式无线接入网(RAN)采用分解模式,具有赋予网络灵活性、自动化和智能化的潜力,是一项关键技术。事实上,开放式 RAN 被认为是 XR 和 CG 应用的关键使能技术之一。然而,RAN 的分解可能会导致连接网络各部分的链路(如开放式 Fronthaul 链路)出现瓶颈,尤其是在考虑时间关键型流量时。在本文中,我们分析了在 3GPP 规定的场景下,开放式 Fronthaul 容量限制对 XR 和 CG 流量的影响。此外,为了解决这些限制,我们使用基于开源 ns-3 的 5G-LENA 网络模拟器,实施并扩展了一种与调制压缩相结合的 Fronthaul 控制机制。结果表明,开放式前传容量限制会大大降低 XR 和 CG 应用的性能,并证明有必要采用这种机制来满足它们在延迟和吞吐量方面的要求。
{"title":"On the impact of Open RAN Fronthaul Control in scenarios with XR Traffic","authors":"","doi":"10.1016/j.comnet.2024.110722","DOIUrl":"10.1016/j.comnet.2024.110722","url":null,"abstract":"<div><p>Through extensive research and standardization efforts, mobile networks have rapidly evolved, offering improved services and allowing the establishment of new use cases, such as autonomous vehicles, smart cities, Industry 4.0, among others. While 5G networks have brought advancements that can support a broad spectrum of such new use cases, the requirements imposed by time-critical services as the eXtended Reality (XR) and Cloud Gaming (CG) applications still remain a challenge. Next generation networks are envisioned to adopt technologies that will allow them to surpass such barriers. Open Radio Access Network (RAN), utilizing the disaggregation paradigm, stands out as a pivotal technology thanks to its potential to endow the network with flexibility, automation, and intelligence. In fact, Open RAN is considered as one of the key enabling technologies for XR and CG applications. However, disaggregation of the RAN may result in bottlenecks in the links connecting the various parts of the network, like the Open Fronthaul link, especially when considering time-critical traffic. In this paper, we perform an analysis of the impact that the Open Fronthaul capacity limitations can have in the XR and CG traffic under 3GPP defined scenarios. Moreover, to address these limitations, we implement and extend a Fronthaul Control mechanism combined with modulation compression, using the open-source ns-3 based 5G-LENA network simulator. Results showcase that the Open Fronthaul capacity limitation can drastically reduce the performance of the XR and CG applications, and demonstrate the necessity for such mechanisms to be employed in order to meet their requirements in terms of latency and throughput.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142087533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A PUF secured lightweight mutual authentication protocol for multi-UAV networks 用于多无人飞行器网络的 PUF 安全轻量级相互验证协议
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-18 DOI: 10.1016/j.comnet.2024.110717

Unmanned aerial vehicles, initially developed for military use, have evolved to play vital roles in civilian applications including photography, agriculture, disaster management, and delivery services. Their agility, precision, and ad-hoc formation make them indispensable, particularly in time-sensitive tasks such as search-and-rescue missions. However, the widespread use of UAVs has raised security concerns, including unauthorized access, cyberattacks, and physical threats. In addition, the dynamic nature of these networks provides adversaries with opportunities to exploit node failures leading to potential data breaches. To address these risks, implementing robust security measures such as authentication, encryption, physical security, and proactive monitoring is essential even amidst the inherent resource limitations faced by UAVs. This paper proposes a lightweight authentication and key agreement protocol for multi-UAV networks, incorporating physically unclonable technology for securing the data sent over the network. The protocol also addresses security risks during UAV failures and the unauthorized access to data. The scheme has been validated using the Scyther simulation tool, with the PUF implemented on the Xilinx FPGA platform. An informal security analysis is also presented that demonstrates its adherence to security requirements. Additionally, the performance of the proposed scheme is compared with state-of-the-art approaches by evaluating network latency in terms of computational and communication costs, affirming its effectiveness in resource-constrained applications.

无人驾驶飞行器最初是为军事用途开发的,现在已发展到在摄影、农业、灾害管理和递送服务等民用领域发挥重要作用。无人飞行器的灵活性、精确性和临时编队使其成为不可或缺的工具,尤其是在搜救等时间敏感的任务中。然而,无人机的广泛使用也引发了安全问题,包括未经授权的访问、网络攻击和物理威胁。此外,这些网络的动态性质为对手提供了利用节点故障导致潜在数据泄露的机会。为了应对这些风险,即使无人机面临固有的资源限制,实施强大的安全措施(如身份验证、加密、物理安全和主动监控)也是必不可少的。本文为多无人机网络提出了一种轻量级身份验证和密钥协议协议,其中采用了物理不可克隆技术,以确保通过网络发送的数据的安全。该协议还解决了无人机故障和未经授权访问数据时的安全风险问题。使用 Scyther 仿真工具对该方案进行了验证,并在 Xilinx FPGA 平台上实现了 PUF。此外,还进行了非正式的安全分析,证明该方案符合安全要求。此外,通过评估计算和通信成本方面的网络延迟,将拟议方案的性能与最先进的方法进行了比较,从而肯定了其在资源受限应用中的有效性。
{"title":"A PUF secured lightweight mutual authentication protocol for multi-UAV networks","authors":"","doi":"10.1016/j.comnet.2024.110717","DOIUrl":"10.1016/j.comnet.2024.110717","url":null,"abstract":"<div><p>Unmanned aerial vehicles, initially developed for military use, have evolved to play vital roles in civilian applications including photography, agriculture, disaster management, and delivery services. Their agility, precision, and ad-hoc formation make them indispensable, particularly in time-sensitive tasks such as search-and-rescue missions. However, the widespread use of UAVs has raised security concerns, including unauthorized access, cyberattacks, and physical threats. In addition, the dynamic nature of these networks provides adversaries with opportunities to exploit node failures leading to potential data breaches. To address these risks, implementing robust security measures such as authentication, encryption, physical security, and proactive monitoring is essential even amidst the inherent resource limitations faced by UAVs. This paper proposes a lightweight authentication and key agreement protocol for multi-UAV networks, incorporating physically unclonable technology for securing the data sent over the network. The protocol also addresses security risks during UAV failures and the unauthorized access to data. The scheme has been validated using the <em>Scyther</em> simulation tool, with the PUF implemented on the Xilinx FPGA platform. An informal security analysis is also presented that demonstrates its adherence to security requirements. Additionally, the performance of the proposed scheme is compared with state-of-the-art approaches by evaluating network latency in terms of computational and communication costs, affirming its effectiveness in resource-constrained applications.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Establishment of IPsec Security Associations with Diffie–Hellman following a SDN-based framework: Analysis and practical validation 在基于 SDN 的框架下使用 Diffie-Hellman 建立 IPsec 安全关联:分析与实际验证
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-17 DOI: 10.1016/j.comnet.2024.110720

The centralized management of IPsec Security Associations (SAs) by using Software Defined Network (SDN) paradigm has been already explored and standardized. Datacenters are some of the scenarios where the dynamic establishment of IPsec security associations among network nodes has been deemed relevant. In these scenarios, where nodes do not support protocols like IKEv2, applying solutions where the generation and distribution of keys for IPsec are delegated to the SDN controller. However, these scenarios have the issue that the controller itself generates the IPsec keys for the nodes, posing a higher risk to the system’s security in case the controller is compromised. For these scenarios, it would be necessary to define solutions that allow the distribution of this cryptographic material securely, while maintaining the capacity restrictions established by the nodes. To solve this risk, we propose the generation of the IPsec keys using key distribution through the Diffie–Hellman algorithm in such a manner, that the controller will never have access to the IPsec SAs session keys used by the network nodes, mitigating the aforementioned problem. In concrete, our approach makes the nodes responsible for generating their own Diffie–Hellman public and private keypair, while the controller is only in charge of distributing the public keys to the rest of nodes, as well as other parameters needed to install the IPsec SAs. As we will analyze, the distribution of the public keys will be enough to allow the network nodes to generate the session keys. This work presents the design, implementation and validation of this IPsec management solution based on Diffie–Hellman in SDN environments using asymmetric key distribution for negotiating encryption and integrity keys, focusing on the performance in key generation and installation of IPsec SAs.

利用软件定义网络(SDN)范例对 IPsec 安全关联(SA)进行集中管理的方法已经得到探索和标准化。数据中心是网络节点之间动态建立 IPsec 安全关联的一些相关场景。在这些场景中,节点不支持 IKEv2 等协议,因此需要采用将 IPsec 密钥的生成和分配委托给 SDN 控制器的解决方案。但是,这些方案存在一个问题,即控制器本身会为节点生成 IPsec 密钥,一旦控制器受到威胁,系统的安全风险会更高。对于这些应用场景,有必要制定解决方案,允许安全地分发这种加密材料,同时保持节点建立的容量限制。为解决这一风险,我们建议通过 Diffie-Hellman 算法使用密钥分发生成 IPsec 密钥,这样控制器就永远无法访问网络节点使用的 IPsec SA 会话密钥,从而缓解上述问题。具体来说,我们的方法是让节点负责生成自己的 Diffie-Hellman 公钥对和私钥对,而控制器只负责向其他节点分发公钥以及安装 IPsec SA 所需的其他参数。正如我们将要分析的那样,分发公钥就足以让网络节点生成会话密钥。这项工作介绍了基于 Diffie-Hellman 的 IPsec 管理解决方案在 SDN 环境中的设计、实施和验证,该解决方案使用非对称密钥分配来协商加密和完整性密钥,重点关注密钥生成和 IPsec SA 安装的性能。
{"title":"Establishment of IPsec Security Associations with Diffie–Hellman following a SDN-based framework: Analysis and practical validation","authors":"","doi":"10.1016/j.comnet.2024.110720","DOIUrl":"10.1016/j.comnet.2024.110720","url":null,"abstract":"<div><p>The centralized management of IPsec Security Associations (SAs) by using Software Defined Network (SDN) paradigm has been already explored and standardized. Datacenters are some of the scenarios where the dynamic establishment of IPsec security associations among network nodes has been deemed relevant. In these scenarios, where nodes do not support protocols like IKEv2, applying solutions where the generation and distribution of keys for IPsec are delegated to the SDN controller. However, these scenarios have the issue that the controller itself generates the IPsec keys for the nodes, posing a higher risk to the system’s security in case the controller is compromised. For these scenarios, it would be necessary to define solutions that allow the distribution of this cryptographic material securely, while maintaining the capacity restrictions established by the nodes. To solve this risk, we propose the generation of the IPsec keys using key distribution through the Diffie–Hellman algorithm in such a manner, that the controller will never have access to the IPsec SAs session keys used by the network nodes, mitigating the aforementioned problem. In concrete, our approach makes the nodes responsible for generating their own Diffie–Hellman public and private keypair, while the controller is only in charge of distributing the public keys to the rest of nodes, as well as other parameters needed to install the IPsec SAs. As we will analyze, the distribution of the public keys will be enough to allow the network nodes to generate the session keys. This work presents the design, implementation and validation of this IPsec management solution based on Diffie–Hellman in SDN environments using asymmetric key distribution for negotiating encryption and integrity keys, focusing on the performance in key generation and installation of IPsec SAs.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142006842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive and low-cost resource synchronization based on data distribution service in high dynamic networks 高动态网络中基于数据分发服务的自适应低成本资源同步
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-17 DOI: 10.1016/j.comnet.2024.110719

In disaster-stricken areas monitoring, management, search, and rescue operations, unmanned aerial vehicles (UAVs) play a crucial role in disaster management and emergency communication due to their high mobility. To efficiently coordinate and plan UAVs and their carried sensor and base station resources, synchronization is essential to establish consistency, laying the foundation for high-level demands. In such scenarios, synchronization relies on request–response (RR) or publish–subscribe (PS) forms of information exchange. Existing research in the field typically focuses on higher-level applications and selects either RR or PS synchronization, thereby overlooking the potential advantages that could be gained from combining both methods to meet synchronization requirements. We propose a resource synchronization method based on the Data Distribution Service (DDS) and a linear time complexity subscription mechanism tailored to specific query demands, which considers the pros and cons of the above two information exchange forms and the bottom-layer network topology. Experimental results using open-source simulation tools demonstrate that the proposed method adapts to scene requirements and decreases bandwidth by at least 21.2% and packet rate by at least 3.7% compared to different baseline methods across three topologies, while satisfying delay and query success rate requirements. Furthermore, the method maintains robust performance in the face of dynamic changes in network topology, showcasing its robustness.

在受灾地区的监测、管理、搜索和救援行动中,无人飞行器(UAV)因其高机动性在灾害管理和应急通信中发挥着至关重要的作用。为了有效协调和规划无人飞行器及其携带的传感器和基站资源,同步对于建立一致性至关重要,这为高层次需求奠定了基础。在这种情况下,同步依赖于请求-响应(RR)或发布-订阅(PS)形式的信息交换。该领域的现有研究通常侧重于更高层次的应用,并选择 RR 或 PS 同步,从而忽略了将这两种方法结合起来以满足同步要求所能带来的潜在优势。我们提出了一种基于数据分发服务(DDS)的资源同步方法,以及针对特定查询需求量身定制的线性时间复杂度订阅机制,该方法考虑了上述两种信息交换形式和底层网络拓扑结构的利弊。使用开源仿真工具的实验结果表明,与三种拓扑结构的不同基线方法相比,所提出的方法能适应场景需求,在满足延迟和查询成功率要求的同时,带宽至少降低了 21.2%,数据包速率至少降低了 3.7%。此外,面对网络拓扑结构的动态变化,该方法仍能保持稳健的性能,显示了其鲁棒性。
{"title":"Adaptive and low-cost resource synchronization based on data distribution service in high dynamic networks","authors":"","doi":"10.1016/j.comnet.2024.110719","DOIUrl":"10.1016/j.comnet.2024.110719","url":null,"abstract":"<div><p>In disaster-stricken areas monitoring, management, search, and rescue operations, unmanned aerial vehicles (UAVs) play a crucial role in disaster management and emergency communication due to their high mobility. To efficiently coordinate and plan UAVs and their carried sensor and base station resources, synchronization is essential to establish consistency, laying the foundation for high-level demands. In such scenarios, synchronization relies on request–response (RR) or publish–subscribe (PS) forms of information exchange. Existing research in the field typically focuses on higher-level applications and selects either RR or PS synchronization, thereby overlooking the potential advantages that could be gained from combining both methods to meet synchronization requirements. We propose a resource synchronization method based on the Data Distribution Service (DDS) and a linear time complexity subscription mechanism tailored to specific query demands, which considers the pros and cons of the above two information exchange forms and the bottom-layer network topology. Experimental results using open-source simulation tools demonstrate that the proposed method adapts to scene requirements and decreases bandwidth by at least 21.2% and packet rate by at least 3.7% compared to different baseline methods across three topologies, while satisfying delay and query success rate requirements. Furthermore, the method maintains robust performance in the face of dynamic changes in network topology, showcasing its robustness.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142083429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure multi-server coded caching 安全的多服务器编码缓存
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-14 DOI: 10.1016/j.comnet.2024.110715

This paper considers multiple cache-enabled end-users connected to multiple servers through a linear network. We also prevent an external eavesdropper from obtaining any information about the original files in cache-aided networks. The eavesdropper does not exist in the placement phase. He can analyze and capture the multi-cast messages in the content delivery phase. He receives a single linear combination derived from each multi-cast message. Hence, we only consider the security of the delivery phase. Our work generalizes the secure caching problem with one server to a multi-server setup. A secure centralized multi-server coded caching scenario is considered, and closed-form coding delay and secret shared key storage expression are provided. Regarding our security guarantee, we show that the delivery phase does not reveal any information to the eavesdropper in terms of the mutual information metric. We analyze the system’s performance in terms of coding delay and guarantee the security of our scheme using the mutual information metric. Numerical evaluations verify that security incurs a negligible cost in terms of memory usage when the number of files and users increases, i.e., the secure and insecure bounds almost coincide. Also, we numerically show that our proposed scheme outperforms the secure coded caching problem with one server.

本文考虑了通过线性网络连接到多个服务器的多个高速缓存终端用户。在缓存辅助网络中,我们还防止外部窃听者获取有关原始文件的任何信息。窃听者在放置阶段并不存在。他可以在内容传输阶段分析并捕获多播信息。他接收的是从每个多播信息中得出的单个线性组合。因此,我们只考虑传输阶段的安全性。我们的工作将单服务器的安全缓存问题推广到了多服务器设置。我们考虑了一种安全的集中式多服务器编码缓存方案,并提供了闭式编码延迟和秘密共享密钥存储表达式。关于我们的安全保证,我们证明了从互信息度量的角度来看,传输阶段不会向窃听者泄露任何信息。我们分析了系统在编码延迟方面的性能,并使用互信息度量保证了我们方案的安全性。数值评估验证了当文件和用户数量增加时,安全性在内存使用方面产生的成本可以忽略不计,即安全边界和不安全边界几乎重合。此外,我们还从数值上证明,我们提出的方案优于只有一台服务器的安全编码缓存问题。
{"title":"Secure multi-server coded caching","authors":"","doi":"10.1016/j.comnet.2024.110715","DOIUrl":"10.1016/j.comnet.2024.110715","url":null,"abstract":"<div><p>This paper considers multiple cache-enabled end-users connected to multiple servers through a linear network. We also prevent an external eavesdropper from obtaining any information about the original files in cache-aided networks. The eavesdropper does not exist in the placement phase. He can analyze and capture the multi-cast messages in the content delivery phase. He receives a single linear combination derived from each multi-cast message. Hence, we only consider the security of the delivery phase. Our work generalizes the secure caching problem with one server to a multi-server setup. A secure centralized multi-server coded caching scenario is considered, and closed-form coding delay and secret shared key storage expression are provided. Regarding our security guarantee, we show that the delivery phase does not reveal any information to the eavesdropper in terms of the mutual information metric. We analyze the system’s performance in terms of coding delay and guarantee the security of our scheme using the mutual information metric. Numerical evaluations verify that security incurs a negligible cost in terms of memory usage when the number of files and users increases, i.e., the secure and insecure bounds almost coincide. Also, we numerically show that our proposed scheme outperforms the secure coded caching problem with one server.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features TransURL:利用多层变换器编码和多尺度金字塔特征改进恶意 URL 检测
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-13 DOI: 10.1016/j.comnet.2024.110707

While machine learning progress is advancing the detection of malicious URLs, advanced Transformers applied to URLs face difficulties in extracting local information, character-level information, and structural relationships. To address these challenges, we propose a novel approach for malicious URL detection, named TransURL, that is implemented by co-training the character-aware Transformer with three feature modules—Multi-Layer Encoding, Multi-Scale Feature Learning, and Spatial Pyramid Attention. This special Transformer allows TransURL to extract embeddings that contain character-level information from URL token sequences, with three feature modules contributing to the fusion of multi-layer Transformer encodings and the capture of multi-scale local details and structural relationships. The proposed method is evaluated across several challenging scenarios, including class imbalance learning, multi-classification, cross-dataset testing, and adversarial sample attacks. The experimental results demonstrate a significant improvement compared to the best previous methods. For instance, it achieved a peak F1-score improvement of 40% in class-imbalanced scenarios, and exceeded the best baseline result by 14.13% in accuracy in adversarial attack scenarios. Additionally, we conduct a case study where our method accurately identifies all 30 active malicious web pages, whereas two pior SOTA methods miss 4 and 7 malicious web pages respectively. The codes and data are available at: https://github.com/Vul-det/TransURL/.

虽然机器学习的进步推动了恶意 URL 的检测,但应用于 URL 的高级变换器在提取本地信息、字符级信息和结构关系方面面临困难。为了应对这些挑战,我们提出了一种新颖的恶意 URL 检测方法,命名为 TransURL,它是通过将字符感知变换器与三个特征模块(多层编码、多尺度特征学习和空间金字塔注意)共同训练而实现的。这种特殊的变换器允许 TransURL 从 URL 标记序列中提取包含字符级信息的嵌入,三个特征模块有助于融合多层变换器编码和捕捉多尺度局部细节和结构关系。我们在多个具有挑战性的场景中对所提出的方法进行了评估,包括类不平衡学习、多分类、跨数据集测试和对抗性样本攻击。实验结果表明,与之前的最佳方法相比,该方法有了显著改进。例如,在类不平衡场景中,它的 F1 分数峰值提高了 40%,在对抗性攻击场景中,它的准确率比最佳基线结果高出 14.13%。此外,我们还进行了一项案例研究,在这项研究中,我们的方法准确识别了所有 30 个活跃的恶意网页,而之前的两种 SOTA 方法分别漏掉了 4 个和 7 个恶意网页。代码和数据可在以下网址获取:https://github.com/Vul-det/TransURL/。
{"title":"TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features","authors":"","doi":"10.1016/j.comnet.2024.110707","DOIUrl":"10.1016/j.comnet.2024.110707","url":null,"abstract":"<div><p>While machine learning progress is advancing the detection of malicious URLs, advanced Transformers applied to URLs face difficulties in extracting local information, character-level information, and structural relationships. To address these challenges, we propose a novel approach for malicious URL detection, named TransURL, that is implemented by co-training the character-aware Transformer with three feature modules—Multi-Layer Encoding, Multi-Scale Feature Learning, and Spatial Pyramid Attention. This special Transformer allows TransURL to extract embeddings that contain character-level information from URL token sequences, with three feature modules contributing to the fusion of multi-layer Transformer encodings and the capture of multi-scale local details and structural relationships. The proposed method is evaluated across several challenging scenarios, including class imbalance learning, multi-classification, cross-dataset testing, and adversarial sample attacks. The experimental results demonstrate a significant improvement compared to the best previous methods. For instance, it achieved a peak F1-score improvement of 40% in class-imbalanced scenarios, and exceeded the best baseline result by 14.13% in accuracy in adversarial attack scenarios. Additionally, we conduct a case study where our method accurately identifies all 30 active malicious web pages, whereas two pior SOTA methods miss 4 and 7 malicious web pages respectively. The codes and data are available at: <span><span>https://github.com/Vul-det/TransURL/</span><svg><path></path></svg></span>.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141985453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cooperative timestamp-free clock synchronization scheme based on fast unscented Kalman filtering for time-sensitive networking 基于快速无特征卡尔曼滤波的合作式无时间戳时钟同步方案,适用于时间敏感型网络
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-13 DOI: 10.1016/j.comnet.2024.110711

Clock synchronization, built on the classical two-way message exchange scheme, is the key prerequisite for the normal operation of time-sensitive networking (TSN). In practical TSN, the imperfect oscillator caused by environmental changes leads to clock parameters drift. Moreover, synchronization errors accumulate in multi-hop networks, making it difficult for nodes at the edge of the network to achieve precise synchronization performance. Additionally, in some industrial and vehicular scenarios, the energy consumption and complexity of clock synchronization are important factors that need to be considered. To address these problems, this paper proposes a cooperative synchronization clock offset and clock skew joint tracking algorithm based on fast Unscented Kalman filter (FUKF). To further reduce the computation and energy consumption caused by clock synchronization, we introduce randomized singular value decomposition and timestamp-free exchange. The former uses small sub-matrices approximations to replace extremely high-dimensional matrices, reducing computational time in the update stage of the UKF. The latter reduces energy consumption by setting response intervals at the receiving end, eliminating the need for timestamp exchange during the synchronization process. Therefore, this algorithm can achieve long-term synchronization without requiring excessive computational and communication overhead. The results show that the proposed method, while maintaining accuracy unchanged, reduced the running time by 20% to 90% as the number of observations increased, thus verifying the effectiveness of the algorithm.

建立在经典双向信息交换方案基础上的时钟同步是时敏网络(TSN)正常运行的关键前提。在实际的 TSN 中,环境变化引起的振荡器不完善会导致时钟参数漂移。此外,多跳网络中的同步误差会不断累积,使得网络边缘的节点难以实现精确的同步性能。此外,在一些工业和车载场景中,时钟同步的能耗和复杂性也是需要考虑的重要因素。针对这些问题,本文提出了一种基于快速无cented 卡尔曼滤波器(FUKF)的协同同步时钟偏移和时钟偏移联合跟踪算法。为了进一步减少时钟同步带来的计算量和能耗,我们引入了随机奇异值分解和无时间戳交换。前者使用小的子矩阵近似来替代极高维矩阵,从而减少了英国卡尔曼滤波器更新阶段的计算时间。后者通过在接收端设置响应间隔来减少能耗,从而消除了同步过程中的时间戳交换需求。因此,该算法可以实现长期同步,而无需过多的计算和通信开销。结果表明,所提出的方法在保持精度不变的情况下,随着观测次数的增加,运行时间减少了 20% 至 90%,从而验证了该算法的有效性。
{"title":"A cooperative timestamp-free clock synchronization scheme based on fast unscented Kalman filtering for time-sensitive networking","authors":"","doi":"10.1016/j.comnet.2024.110711","DOIUrl":"10.1016/j.comnet.2024.110711","url":null,"abstract":"<div><p>Clock synchronization, built on the classical two-way message exchange scheme, is the key prerequisite for the normal operation of time-sensitive networking (TSN). In practical TSN, the imperfect oscillator caused by environmental changes leads to clock parameters drift. Moreover, synchronization errors accumulate in multi-hop networks, making it difficult for nodes at the edge of the network to achieve precise synchronization performance. Additionally, in some industrial and vehicular scenarios, the energy consumption and complexity of clock synchronization are important factors that need to be considered. To address these problems, this paper proposes a cooperative synchronization clock offset and clock skew joint tracking algorithm based on fast Unscented Kalman filter (FUKF). To further reduce the computation and energy consumption caused by clock synchronization, we introduce randomized singular value decomposition and timestamp-free exchange. The former uses small sub-matrices approximations to replace extremely high-dimensional matrices, reducing computational time in the update stage of the UKF. The latter reduces energy consumption by setting response intervals at the receiving end, eliminating the need for timestamp exchange during the synchronization process. Therefore, this algorithm can achieve long-term synchronization without requiring excessive computational and communication overhead. The results show that the proposed method, while maintaining accuracy unchanged, reduced the running time by 20% to 90% as the number of observations increased, thus verifying the effectiveness of the algorithm.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141978843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video stalling identification for web live streaming under HTTP-FLV HTTP-FLV 下网络直播视频停滞识别
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-13 DOI: 10.1016/j.comnet.2024.110714

Live broadcasts have become one of the most popular forms of entertainment. Quality of user Experience (QoE) is a vital quantitative criterion for evaluating user satisfaction while watching live broadcasts, and it is positively correlated with the increase in the income of Internet Service Providers (ISPs). Video stalling identification plays a crucial role in the evaluation of QoE. However, encrypted live streaming hides video content, which makes identifying video stalling challenging. Existing studies primarily detect video stalling in a fixed time interval and focus on high-dimensional features. However, the capacity of the client byte buffer is dynamic, resulting in the stalling and non-stalling existing in a certain and fixed stalling time. In addition, the handling time of abundant features causes further latency. We propose Truncation of Dynamic Bytes and non-linear Integrated Modification based on Double Buffers (DB2) to identify video stalling under HTTP-FLV protocol in various network conditions and live types. We pull real-time video to get client buffer parameters and build a dynamic mapping based on the double buffer between network packets and the video playing states. This allows a more objective and precise evaluation of video stalling. We design a new network feature by creating a non-linear relationship between network packets and the client buffer. This is achieved by combining non-linear convergent distribution with basic traffic features. The feature is fed into a lightweight machine learning model to train the classifier, achieving low processing latency and high identification accuracy. The experimental results show that DB2 can achieve 98.91% stalling identification accuracy with 1.256 ms operation time in a mixture of live video types, outperforming state-of-the-art techniques.

直播已成为最受欢迎的娱乐形式之一。用户体验质量(QoE)是评价用户观看直播满意度的重要量化标准,它与互联网服务提供商(ISP)收入的增加呈正相关。视频卡顿识别在 QoE 评估中起着至关重要的作用。然而,加密直播流隐藏了视频内容,这使得识别视频停滞具有挑战性。现有研究主要检测固定时间间隔内的视频停滞,并侧重于高维特征。然而,客户端字节缓冲区的容量是动态的,导致停滞和非停滞存在于一定且固定的停滞时间内。此外,大量特征的处理时间也会造成进一步的延迟。我们提出了基于双缓冲区(DB2)的动态字节截断和非线性综合修改,以识别各种网络条件和直播类型下 HTTP-FLV 协议下的视频停滞。我们调取实时视频以获取客户端缓冲区参数,并根据网络数据包和视频播放状态之间的双缓冲区建立动态映射。这样就能更客观、更精确地评估视频停滞。通过在网络数据包和客户端缓冲区之间建立非线性关系,我们设计了一种新的网络功能。这是通过将非线性收敛分布与基本流量特征相结合来实现的。该特征被输入一个轻量级机器学习模型来训练分类器,从而实现了低处理延迟和高识别准确率。实验结果表明,在混合直播视频类型中,DB2 可以在 1.256 毫秒的操作时间内实现 98.91% 的停滞识别准确率,优于最先进的技术。
{"title":"Video stalling identification for web live streaming under HTTP-FLV","authors":"","doi":"10.1016/j.comnet.2024.110714","DOIUrl":"10.1016/j.comnet.2024.110714","url":null,"abstract":"<div><p>Live broadcasts have become one of the most popular forms of entertainment. Quality of user Experience (QoE) is a vital quantitative criterion for evaluating user satisfaction while watching live broadcasts, and it is positively correlated with the increase in the income of Internet Service Providers (ISPs). Video stalling identification plays a crucial role in the evaluation of QoE. However, encrypted live streaming hides video content, which makes identifying video stalling challenging. Existing studies primarily detect video stalling in a fixed time interval and focus on high-dimensional features. However, the capacity of the client byte buffer is dynamic, resulting in the stalling and non-stalling existing in a certain and fixed stalling time. In addition, the handling time of abundant features causes further latency. We propose Truncation of Dynamic Bytes and non-linear Integrated Modification based on Double Buffers (<span><math><mrow><mi>D</mi><mspace></mspace><msup><mrow><mi>B</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></math></span>) to identify video stalling under HTTP-FLV protocol in various network conditions and live types. We pull real-time video to get client buffer parameters and build a dynamic mapping based on the double buffer between network packets and the video playing states. This allows a more objective and precise evaluation of video stalling. We design a new network feature by creating a non-linear relationship between network packets and the client buffer. This is achieved by combining non-linear convergent distribution with basic traffic features. The feature is fed into a lightweight machine learning model to train the classifier, achieving low processing latency and high identification accuracy. The experimental results show that <span><math><mrow><mi>D</mi><mspace></mspace><msup><mrow><mi>B</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></math></span> can achieve 98.91% stalling identification accuracy with 1.256 ms operation time in a mixture of live video types, outperforming state-of-the-art techniques.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142135856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural quantile optimization for edge–cloud networking 边缘云网络的神经量化优化
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-13 DOI: 10.1016/j.comnet.2024.110713

We seek the best traffic allocation scheme for the edge–cloud networking subject to SD-WAN architecture and burstable billing. First, we formulate a family of quantile-based integer programming problems for a fixed network topology with random parameters describing the traffic demands. Then, to overcome the difficulty caused by the discrete feature, we generalize the Gumbel-softmax reparameterization method to induce an unconstrained continuous optimization problem as a regularized continuation of the discrete problem. Finally, we introduce the Gumbel-softmax sampling neural network to solve optimization problems via unsupervised learning. The neural network structure reflects the edge–cloud networking topology and is trained to minimize the expectation of the cost function for unconstrained continuous optimization problems. The trained network works as an efficient traffic allocation scheme sampler, outperforming the random strategy in feasibility and cost value. Besides testing the quality of the output allocation scheme, we examine the generalization property of the network by increasing the time steps and the number of users. We also feed the solution to existing integer optimization solvers as initial conditions and verify the warm-starts can accelerate the short-time iteration process. The framework is general, and the decoupled feature of the random neural networks is adequate for practical implementations.

我们在 SD-WAN 架构和突发计费的前提下,寻求边缘云网络的最佳流量分配方案。首先,我们针对固定网络拓扑结构和描述流量需求的随机参数,提出了一系列基于量化的整数编程问题。然后,为了克服离散特征带来的困难,我们推广了 Gumbel-softmax 重参数化方法,将无约束连续优化问题作为离散问题的正则化延续。最后,我们引入了 Gumbel-softmax 采样神经网络,通过无监督学习来解决优化问题。该神经网络的结构反映了边缘云网络拓扑结构,其训练目的是最小化无约束连续优化问题的成本函数期望值。训练后的网络可作为高效的流量分配方案采样器,在可行性和成本值方面优于随机策略。除了测试输出分配方案的质量,我们还通过增加时间步长和用户数量来检验网络的泛化特性。我们还将解作为初始条件输入现有的整数优化求解器,并验证了热启动可以加速短时迭代过程。该框架具有通用性,随机神经网络的解耦特性也足以满足实际应用的需要。
{"title":"Neural quantile optimization for edge–cloud networking","authors":"","doi":"10.1016/j.comnet.2024.110713","DOIUrl":"10.1016/j.comnet.2024.110713","url":null,"abstract":"<div><p>We seek the best traffic allocation scheme for the edge–cloud networking subject to SD-WAN architecture and burstable billing. First, we formulate a family of quantile-based integer programming problems for a fixed network topology with random parameters describing the traffic demands. Then, to overcome the difficulty caused by the discrete feature, we generalize the Gumbel-softmax reparameterization method to induce an unconstrained continuous optimization problem as a regularized continuation of the discrete problem. Finally, we introduce the Gumbel-softmax sampling neural network to solve optimization problems via unsupervised learning. The neural network structure reflects the edge–cloud networking topology and is trained to minimize the expectation of the cost function for unconstrained continuous optimization problems. The trained network works as an efficient traffic allocation scheme sampler, outperforming the random strategy in feasibility and cost value. Besides testing the quality of the output allocation scheme, we examine the generalization property of the network by increasing the time steps and the number of users. We also feed the solution to existing integer optimization solvers as initial conditions and verify the warm-starts can accelerate the short-time iteration process. The framework is general, and the decoupled feature of the random neural networks is adequate for practical implementations.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005450/pdfft?md5=bc51f233ffa3be19b991a7c28cbeb8fa&pid=1-s2.0-S1389128624005450-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142039723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance measurement dataset for open RAN with user mobility and security threats 具有用户移动性和安全威胁的开放式 RAN 性能测量数据集
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-12 DOI: 10.1016/j.comnet.2024.110710

We present a comprehensive dataset collected from an Open-RAN (O-RAN) deployment in our OpenIreland testbed, aimed at facilitating advanced research in Radio Access Network (RAN). The dataset includes RAN measurements from users engaged in diverse traffic classes such as Web Browsing, Voice over IP (VoIP), Internet of Things (IoT), and Video Streaming, as well as malignant traffic classes including DDoS Ripper, DoS Hulk, and Slow Loris attacks. These measurements encompass various mobility patterns, including Static, Pedestrian, Train, Car, and Bus users. While Wi-Fi datasets, including probe requests, Wi-Fi fingerprints, and signal strengths, are common in the literature, and mobile networks present abundant research opportunities with billions of global subscribers, datasets with RAN Key Performance Indicator (KPI) measurements are relatively rare. This scarcity is particularly notable in the context of O-RAN networks, which have been scrutinized for higher potential vulnerability compared to single-vendor solutions. Our work addresses this gap by collecting and publicly sharing a dataset rich in RAN KPIs from our O-RAN deployment. We utilized this dataset to classify different traffic classes for the detection of service-level attacks. Beyond its immediate use for attack detection, the dataset is versatile, supporting research in intrusion detection, network protection strategies, and numerous other RAN-related challenges. By offering extensive performance metrics, this dataset enables researchers to explore issues like power consumption, Channel Quality Indicator (CQI)/Modulation and Coding Scheme (MCS) optimization, resource management, cell characterization, and more. We believe that this dataset will significantly advance the development of robust, efficient, and secure RAN solutions.

我们展示了从 OpenIreland 测试平台的开放式无线接入网(O-RAN)部署中收集的综合数据集,旨在促进无线接入网(RAN)方面的高级研究。该数据集包括来自从事各种流量类别(如 Web 浏览、IP 语音 (VoIP)、物联网 (IoT) 和视频流)以及恶意流量类别(包括 DDoS Ripper、DoS Hulk 和 Slow Loris 攻击)的用户的 RAN 测量数据。这些测量涵盖各种移动模式,包括静态、行人、火车、汽车和公交车用户。虽然 Wi-Fi 数据集(包括探测请求、Wi-Fi 指纹和信号强度)在文献中很常见,而且移动网络拥有数十亿全球用户,提供了丰富的研究机会,但包含 RAN 关键性能指标 (KPI) 测量的数据集却相对罕见。这种稀缺性在 O-RAN 网络中尤为明显,因为与单一供应商解决方案相比,O-RAN 网络具有更高的潜在脆弱性。我们的工作通过收集和公开共享我们 O-RAN 部署中丰富的 RAN KPI 数据集来填补这一空白。我们利用该数据集对不同的流量类别进行分类,以检测服务级攻击。除了直接用于攻击检测外,该数据集还具有多功能性,可支持入侵检测、网络保护策略和许多其他 RAN 相关挑战方面的研究。通过提供广泛的性能指标,该数据集可帮助研究人员探索功耗、信道质量指标(CQI)/调制和编码方案(MCS)优化、资源管理、小区特性等问题。我们相信,该数据集将极大地推动稳健、高效和安全的 RAN 解决方案的开发。
{"title":"Performance measurement dataset for open RAN with user mobility and security threats","authors":"","doi":"10.1016/j.comnet.2024.110710","DOIUrl":"10.1016/j.comnet.2024.110710","url":null,"abstract":"<div><p>We present a comprehensive dataset collected from an Open-RAN (O-RAN) deployment in our OpenIreland testbed, aimed at facilitating advanced research in Radio Access Network (RAN). The dataset includes RAN measurements from users engaged in diverse traffic classes such as Web Browsing, Voice over IP (VoIP), Internet of Things (IoT), and Video Streaming, as well as malignant traffic classes including DDoS Ripper, DoS Hulk, and Slow Loris attacks. These measurements encompass various mobility patterns, including Static, Pedestrian, Train, Car, and Bus users. While Wi-Fi datasets, including probe requests, Wi-Fi fingerprints, and signal strengths, are common in the literature, and mobile networks present abundant research opportunities with billions of global subscribers, datasets with RAN Key Performance Indicator (KPI) measurements are relatively rare. This scarcity is particularly notable in the context of O-RAN networks, which have been scrutinized for higher potential vulnerability compared to single-vendor solutions. Our work addresses this gap by collecting and publicly sharing a dataset rich in RAN KPIs from our O-RAN deployment. We utilized this dataset to classify different traffic classes for the detection of service-level attacks. Beyond its immediate use for attack detection, the dataset is versatile, supporting research in intrusion detection, network protection strategies, and numerous other RAN-related challenges. By offering extensive performance metrics, this dataset enables researchers to explore issues like power consumption, Channel Quality Indicator (CQI)/Modulation and Coding Scheme (MCS) optimization, resource management, cell characterization, and more. We believe that this dataset will significantly advance the development of robust, efficient, and secure RAN solutions.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1