首页 > 最新文献

Computers & Security最新文献

英文 中文
Dapadv: Differentiated adversarial perturbation generation method in problem space for android malware detection 针对android恶意软件检测的问题空间差分对抗摄动生成方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-29 DOI: 10.1016/j.cose.2026.104845
Junwei Tang , Sijie Zhou , Tao Peng , Wenlong Tian
Learning-based methods have been widely applied in the field of Android malware detection. However, adversarial samples pose a serious challenge to such methods, as carefully constructed adversarial samples may evade detection by these detectors. To evaluate the robustness of the mainstream Android malware detection, in this paper, we propose a novel differentiated adversarial perturbation generation method in problem space. We first slice a large number of benign applications to get a set of code slices that preserve context semantics. An improved optimal perturbation screening method based on Hierarchical Attention Network is proposed to effectively select the optimal slice from the code slice set as the perturbation of the target attack model. We perform dynamic adaptive compute based on the target attack model to achieve the optimal adversarial perturbation. After adding perturbation to the target sample, the sample is repackaged and signed to verify the adversarial effect of the detection model. The experimental results on multiple malware datasets show that the adversarial samples generated by our method can significantly reduce the accuracy of the target detectors and achieve better adversarial attack effect compared with the existing methods.
基于学习的方法在Android恶意软件检测领域得到了广泛的应用。然而,对抗性样本对这些方法构成了严重的挑战,因为精心构建的对抗性样本可能会逃避这些检测器的检测。为了评估主流Android恶意软件检测的鲁棒性,本文提出了一种新的问题空间差分对抗摄动生成方法。我们首先对大量良性应用程序进行切片,以获得一组保留上下文语义的代码切片。提出了一种改进的基于层次关注网络的最优摄动筛选方法,从编码片集中有效地选择最优片作为目标攻击模型的摄动。在目标攻击模型的基础上进行动态自适应计算,实现最优的对抗摄动。在对目标样品进行扰动后,对样品进行重新包装和签名,以验证检测模型的对抗效果。在多个恶意软件数据集上的实验结果表明,与现有方法相比,本文方法生成的对抗样本可以显著降低目标检测器的准确率,达到更好的对抗攻击效果。
{"title":"Dapadv: Differentiated adversarial perturbation generation method in problem space for android malware detection","authors":"Junwei Tang ,&nbsp;Sijie Zhou ,&nbsp;Tao Peng ,&nbsp;Wenlong Tian","doi":"10.1016/j.cose.2026.104845","DOIUrl":"10.1016/j.cose.2026.104845","url":null,"abstract":"<div><div>Learning-based methods have been widely applied in the field of Android malware detection. However, adversarial samples pose a serious challenge to such methods, as carefully constructed adversarial samples may evade detection by these detectors. To evaluate the robustness of the mainstream Android malware detection, in this paper, we propose a novel differentiated adversarial perturbation generation method in problem space. We first slice a large number of benign applications to get a set of code slices that preserve context semantics. An improved optimal perturbation screening method based on Hierarchical Attention Network is proposed to effectively select the optimal slice from the code slice set as the perturbation of the target attack model. We perform dynamic adaptive compute based on the target attack model to achieve the optimal adversarial perturbation. After adding perturbation to the target sample, the sample is repackaged and signed to verify the adversarial effect of the detection model. The experimental results on multiple malware datasets show that the adversarial samples generated by our method can significantly reduce the accuracy of the target detectors and achieve better adversarial attack effect compared with the existing methods.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104845"},"PeriodicalIF":5.4,"publicationDate":"2026-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insecure by design? A human-centric security perspective on AI-assisted software development 不安全的设计?人工智能辅助软件开发中以人为中心的安全视角
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-23 DOI: 10.1016/j.cose.2026.104842
Magdalena Glas , Christoph Nirschl , Bar Lanyado , Johan van Niekerk
Generative artificial intelligence (AI) tools are increasingly used in software development, improving the efficiency of software developers. However, this adoption introduces notable security challenges. AI/generated code is not secure by default, as it is often based on large-scale training data that includes open-source code of varying quality and trustworthiness. Developers using these tools may be unaware of the associated risks or may place excessive trust in the security of the output. This briefing paper outlines the key security risks associated with generative AI and offers human-centered strategies for mitigation. Since these risks arise not only from how generative AI models are built but also from how humans interact with them, we adopt a human-centric perspective. To this end, we provide recommendations for individuals, organizations, and educators to help harness the potential of generative AI in software development while effectively managing the associated security risks.
生成式人工智能(AI)工具越来越多地用于软件开发,提高了软件开发人员的效率。然而,这种采用引入了明显的安全挑战。人工智能/生成的代码在默认情况下是不安全的,因为它通常基于大规模的训练数据,其中包括不同质量和可信度的开源代码。使用这些工具的开发人员可能没有意识到相关的风险,或者可能过度信任输出的安全性。本简报概述了与生成式人工智能相关的主要安全风险,并提供了以人为本的缓解策略。由于这些风险不仅来自于生成人工智能模型的构建方式,还来自于人类与它们的互动方式,因此我们采用了以人为中心的观点。为此,我们为个人、组织和教育工作者提供建议,以帮助在有效管理相关安全风险的同时,在软件开发中利用生成人工智能的潜力。
{"title":"Insecure by design? A human-centric security perspective on AI-assisted software development","authors":"Magdalena Glas ,&nbsp;Christoph Nirschl ,&nbsp;Bar Lanyado ,&nbsp;Johan van Niekerk","doi":"10.1016/j.cose.2026.104842","DOIUrl":"10.1016/j.cose.2026.104842","url":null,"abstract":"<div><div>Generative artificial intelligence (AI) tools are increasingly used in software development, improving the efficiency of software developers. However, this adoption introduces notable security challenges. AI/generated code is not secure by default, as it is often based on large-scale training data that includes open-source code of varying quality and trustworthiness. Developers using these tools may be unaware of the associated risks or may place excessive trust in the security of the output. This briefing paper outlines the key security risks associated with generative AI and offers human-centered strategies for mitigation. Since these risks arise not only from how generative AI models are built but also from how humans interact with them, we adopt a human-centric perspective. To this end, we provide recommendations for individuals, organizations, and educators to help harness the potential of generative AI in software development while effectively managing the associated security risks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104842"},"PeriodicalIF":5.4,"publicationDate":"2026-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defending against BLE-based covert channels in crowdsourced location networks 在众包定位网络中防御基于ble的隐蔽通道
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-22 DOI: 10.1016/j.cose.2026.104835
Hosam Alamleh , Alessandro Cantelli-Forti
Crowdsourced location networks turn billions of consumer devices into a global sensor grid for locating lost items, but the same reach enables two systemic abuses: (i) location tracking via beacons that masquerade as “lost tags,” and (ii) data exfiltration by embedding short secrets in Bluetooth Low Energy (BLE) advertisements that are relayed forward without inspection. Using Apple’s Find My as a case study, we show that covert beacons reliably reach the cloud and then the attacker within minutes due to relay density. We also find that basic single-layer countermeasures such as packet dropping, TCP ACK/RST injection, fixed-delay insertion, or traffic flooding fail under realistic operational conditions. We contribute the first end-to-end experimental evaluation of deployable mitigations that require no vendor changes. Our defense-in-depth design combines: endpoint controls that correlate OS location-service access with immediate BLE advertising and enforce per-process advertising limits; a hybrid perimeter detector that correlates on-host BLE advertisement counts with outbound traffic to crowd-location backends; and physical controls for high-security areas, including exclusion zones of 35 m indoors and 200 m outdoors (line of sight), optionally supported by selective, low-duty RF jamming. For the longer term, we outline protocol changes that vendors can adopt, such as basic beacon admission control and authentication, shorter helper-retention timers, and helper-side quotas. While evaluated on Find My, these findings generalize to crowdsourced location systems built under similar design assumptions.
众包定位网络将数十亿消费者设备变成了一个全球传感器网格,用于定位丢失的物品,但同样的范围也导致了两种系统性的滥用:(1)通过伪装成“丢失标签”的信标进行位置跟踪;(2)通过在低功耗蓝牙(BLE)广告中嵌入短秘密而未经检查转发的数据泄露。以苹果的Find My为例,我们发现隐蔽的信标可以可靠地到达云端,然后在几分钟内到达攻击者,因为中继密度。我们还发现,基本的单层对策,如丢包、TCP ACK/RST注入、固定延迟插入或流量泛滥,在实际操作条件下都是失败的。我们提供了第一个端到端可部署缓解的实验性评估,不需要更改供应商。我们的深度防御设计结合了:端点控制,将操作系统位置服务访问与即时BLE广告相关联,并强制执行每个进程的广告限制;将主机上BLE广告计数与人群位置后端的出站流量相关联的混合周界检测器;高安全区域的物理控制,包括35 米的室内禁区和200 米的室外禁区(视线),可选地支持选择性低占空射频干扰。从长远来看,我们概述了供应商可以采用的协议更改,例如基本的信标准入控制和身份验证、更短的helper-retention计时器和helper-side配额。虽然在Find My上进行了评估,但这些发现可以推广到在类似设计假设下建立的众包定位系统。
{"title":"Defending against BLE-based covert channels in crowdsourced location networks","authors":"Hosam Alamleh ,&nbsp;Alessandro Cantelli-Forti","doi":"10.1016/j.cose.2026.104835","DOIUrl":"10.1016/j.cose.2026.104835","url":null,"abstract":"<div><div>Crowdsourced location networks turn billions of consumer devices into a global sensor grid for locating lost items, but the same reach enables two systemic abuses: (i) location tracking via beacons that masquerade as “lost tags,” and (ii) data exfiltration by embedding short secrets in Bluetooth Low Energy (BLE) advertisements that are relayed forward without inspection. Using Apple’s <em>Find My</em> as a case study, we show that covert beacons reliably reach the cloud and then the attacker within minutes due to relay density. We also find that basic single-layer countermeasures such as packet dropping, TCP ACK/RST injection, fixed-delay insertion, or traffic flooding fail under realistic operational conditions. We contribute the first end-to-end experimental evaluation of deployable mitigations that require no vendor changes. Our defense-in-depth design combines: endpoint controls that correlate OS location-service access with immediate BLE advertising and enforce per-process advertising limits; a hybrid perimeter detector that correlates on-host BLE advertisement counts with outbound traffic to crowd-location backends; and physical controls for high-security areas, including exclusion zones of 35 m indoors and 200 m outdoors (line of sight), optionally supported by selective, low-duty RF jamming. For the longer term, we outline protocol changes that vendors can adopt, such as basic beacon admission control and authentication, shorter helper-retention timers, and helper-side quotas. While evaluated on <em>Find My</em>, these findings generalize to crowdsourced location systems built under similar design assumptions.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104835"},"PeriodicalIF":5.4,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From attack trees to timed stochastic games: A novel intrusion response approach 从攻击树到定时随机对策:一种新的入侵响应方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-22 DOI: 10.1016/j.cose.2026.104834
Tommaso Caiazzi, Stefano Iannucci, Valerio Marini, Matteo Foschi, Riccardo Torlone
Most dynamic Intrusion Response Systems (IRSs) use models to characterize the attack patterns and the dynamics of the protected system. They are typically based on some mathematical framework and require a low-level modeling activity that is often difficult and error-prone, even for the experienced end-user. Furthermore, most of the model-based approaches proposed so far do not structurally include the notion of time, which is necessary to model non-instantaneous defense and attack actions. In this paper, we introduce a novel methodology for the automatic generation of IRSs based on Timed Competitive Stochastic Games from augmented Attack-Defense Trees (ADT), a formalism that is commonly used to represent attack patterns and to build IRSs based on a static mapping between attack and response. We formally and empirically prove that: (i) using a static mapping between attack and response or selecting the action with the immediate minimum cost to counter the attack without long-term planning leads to an underestimation of the defense cost; (ii) the total defense cost of a defense policy obtained with an IRS based on the proposed methodology is lower than or equal to the defense cost that can be obtained with an IRS based on static mapping; (iii) not considering time leads to an underestimation of the defense cost. We then perform experiments showing the scalability of the proposed approach in terms of planning time and memory usage.
大多数动态入侵响应系统(IRSs)使用模型来描述攻击模式和受保护系统的动态特性。它们通常基于一些数学框架,并且需要低级的建模活动,即使对于有经验的最终用户,这种建模活动通常也很困难且容易出错。此外,目前提出的大多数基于模型的方法在结构上不包括时间的概念,而时间是建模非瞬时防御和攻击行动所必需的。在本文中,我们介绍了一种基于增强攻击防御树(ADT)的定时竞争随机博弈自动生成irs的新方法,这是一种通常用于表示攻击模式并基于攻击和响应之间的静态映射构建irs的形式化方法。我们正式地和经验地证明:(1)在没有长期规划的情况下,使用攻击和响应之间的静态映射或选择具有最小即时成本的行动来对抗攻击,会导致对防御成本的低估;(ii)基于建议方法的IRS获得的国防政策的总防御成本低于或等于基于静态映射的IRS可以获得的防御成本;(三)不考虑时间因素导致低估辩护费用的。然后,我们执行实验,在规划时间和内存使用方面展示了所提出方法的可扩展性。
{"title":"From attack trees to timed stochastic games: A novel intrusion response approach","authors":"Tommaso Caiazzi,&nbsp;Stefano Iannucci,&nbsp;Valerio Marini,&nbsp;Matteo Foschi,&nbsp;Riccardo Torlone","doi":"10.1016/j.cose.2026.104834","DOIUrl":"10.1016/j.cose.2026.104834","url":null,"abstract":"<div><div>Most dynamic Intrusion Response Systems (IRSs) use models to characterize the attack patterns and the dynamics of the protected system. They are typically based on some mathematical framework and require a low-level modeling activity that is often difficult and error-prone, even for the experienced end-user. Furthermore, most of the model-based approaches proposed so far do not structurally include the notion of time, which is necessary to model non-instantaneous defense and attack actions. In this paper, we introduce a novel methodology for the automatic generation of IRSs based on Timed Competitive Stochastic Games from augmented Attack-Defense Trees (ADT), a formalism that is commonly used to represent attack patterns and to build IRSs based on a static mapping between attack and response. We formally and empirically prove that: (i) using a static mapping between attack and response or selecting the action with the immediate minimum cost to counter the attack without long-term planning leads to an underestimation of the defense cost; (ii) the total defense cost of a defense policy obtained with an IRS based on the proposed methodology is lower than or equal to the defense cost that can be obtained with an IRS based on static mapping; (iii) not considering time leads to an underestimation of the defense cost. We then perform experiments showing the scalability of the proposed approach in terms of planning time and memory usage.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104834"},"PeriodicalIF":5.4,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SHAPE: An APT detection framework fusing semantic understanding and heterogeneous modeling SHAPE:融合语义理解和异构建模的APT检测框架
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-22 DOI: 10.1016/j.cose.2026.104841
Xiaodan Huang , Guosheng Zhao , Jian Wang , Kaiwen Lou , Zixuan Wan
With the increasing complexity of threats in cyberspace, Advanced Persistent Threats (APT) in Industrial Internet of Things (IIoT) environments exhibit stronger, hidden, and persistent characteristics. Existing APT detection methods underutilize node semantic attribute information and lack adaptive modeling capabilities for heterogeneous data, limiting the effectiveness of malicious intent detection. To address this, a framework for detecting APT attacks based on Semantic Heterogeneous Autoencoders with Pre-trained language model Embeddings (SHAPE) is proposed. SHAPE integrates the deep semantic features of nodes extracted by large language models with heterogeneous autoencoders tailored to specific node types, enabling the effective modeling of normal behavior patterns across various node types. Significant deviations of nodes from the semantic-level normal baseline are captured by quantifying the reconstruction error, thereby facilitating the detection of APT attacks. Experimental evaluation on the CICAPT-IIoT (2024) dataset demonstrates that SHAPE significantly outperforms all baseline models, improving the overall node AUC by approximately 5.8% relative to the best baseline; notably, for key node types, the AUC improves by 48.2%. These results validate the effectiveness of the semantic-heterogeneous joint analysis framework. This framework innovatively integrates deep semantic understanding of nodes with adaptive modeling of heterogeneous data, providing a novel paradigm for advanced threat hunting in complex network environments.
随着网络空间威胁的日益复杂,工业物联网环境中的高级持续性威胁(APT)表现出更强、隐蔽性和持久性的特征。现有APT检测方法未充分利用节点语义属性信息,缺乏对异构数据的自适应建模能力,限制了恶意意图检测的有效性。为了解决这个问题,提出了一种基于语义异构自编码器的APT攻击检测框架,该框架具有预训练的语言模型嵌入(SHAPE)。SHAPE将大型语言模型提取的节点的深层语义特征与针对特定节点类型定制的异构自编码器集成在一起,实现了跨各种节点类型的正常行为模式的有效建模。通过量化重构误差,捕获节点与语义级正常基线的显著偏差,便于APT攻击检测。在CICAPT-IIoT(2024)数据集上的实验评估表明,SHAPE显著优于所有基线模型,相对于最佳基线,整体节点AUC提高了约5.8%;值得注意的是,对于关键节点类型,AUC提高了48.2%。这些结果验证了语义异构联合分析框架的有效性。该框架创新性地将节点的深度语义理解与异构数据的自适应建模相结合,为复杂网络环境中的高级威胁搜索提供了一种新的范式。
{"title":"SHAPE: An APT detection framework fusing semantic understanding and heterogeneous modeling","authors":"Xiaodan Huang ,&nbsp;Guosheng Zhao ,&nbsp;Jian Wang ,&nbsp;Kaiwen Lou ,&nbsp;Zixuan Wan","doi":"10.1016/j.cose.2026.104841","DOIUrl":"10.1016/j.cose.2026.104841","url":null,"abstract":"<div><div>With the increasing complexity of threats in cyberspace, Advanced Persistent Threats (APT) in Industrial Internet of Things (IIoT) environments exhibit stronger, hidden, and persistent characteristics. Existing APT detection methods underutilize node semantic attribute information and lack adaptive modeling capabilities for heterogeneous data, limiting the effectiveness of malicious intent detection. To address this, a framework for detecting APT attacks based on Semantic Heterogeneous Autoencoders with Pre-trained language model Embeddings (SHAPE) is proposed. SHAPE integrates the deep semantic features of nodes extracted by large language models with heterogeneous autoencoders tailored to specific node types, enabling the effective modeling of normal behavior patterns across various node types. Significant deviations of nodes from the semantic-level normal baseline are captured by quantifying the reconstruction error, thereby facilitating the detection of APT attacks. Experimental evaluation on the CICAPT-IIoT (2024) dataset demonstrates that SHAPE significantly outperforms all baseline models, improving the overall node AUC by approximately 5.8% relative to the best baseline; notably, for key node types, the AUC improves by 48.2%. These results validate the effectiveness of the semantic-heterogeneous joint analysis framework. This framework innovatively integrates deep semantic understanding of nodes with adaptive modeling of heterogeneous data, providing a novel paradigm for advanced threat hunting in complex network environments.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104841"},"PeriodicalIF":5.4,"publicationDate":"2026-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TI-NERmergerV2: Automating the integration of threat intelligence NER datasets via STIX standard TI-NERmergerV2:通过STIX标准自动集成威胁情报NER数据集
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-18 DOI: 10.1016/j.cose.2026.104838
Inoussa Mouiche, Sherif Saad
Quality-labeled data are essential for developing accurate AI models in cybersecurity, particularly for threat intelligence named entity recognition (TI-NER), which automates the extraction of threat indicators and entities from unstructured reports. While several annotated datasets exist, their isolated use hinders scalability due to inconsistent tagging schemes, label names, and non-standard entity categories. This paper introduces TI-NERmergerV2, a robust, semi-automated framework for integrating heterogeneous TI-NER datasets into a unified, high-quality corpus aligned with the structured threat information expression (STIX) standard (e.g, STIX 2.1). Building upon its predecessor, TI-NERmerger, which is limited by its reliance on strict string matching and a narrow cyber lookup space, TI-NERmergerV2 incorporates string normalization, fuzzy fallback matching, and alias expansion using the MITRE ATT&CK knowledge base to resolve lexical variation and annotation inconsistencies. We validate its effectiveness by comparing it with a manual integration of two public datasets (DNRTI and APTNER), producing a unified dataset called AAPTNER. TI-NERmergerV2 achieves over 94% alignment with the manual process, reducing months of expert effort to minutes. Evaluations using a RoBERTa-based NER model further confirm that TI-NERmergerV2 enhances annotation quality and effectively disambiguates key entity types in the resulting DNRTI-STIX2.1 and AAPTNER datasets. The framework generalizes across datasets that adopt STIX domain and observable objects, providing a scalable and reproducible foundation for cyber threat intelligence research. Both the framework and resulting datasets are publicly released to support broader efforts in standardizing and enriching TI-NER resources.
质量标记数据对于在网络安全中开发准确的人工智能模型至关重要,特别是对于威胁情报命名实体识别(TI-NER),它可以自动从非结构化报告中提取威胁指标和实体。虽然存在几个带注释的数据集,但由于不一致的标记方案、标签名称和非标准实体类别,它们的独立使用阻碍了可伸缩性。本文介绍了TI-NERmergerV2,这是一个鲁棒的半自动化框架,用于将异构TI-NER数据集集成到一个统一的高质量语料库中,该语料库与结构化威胁信息表达(STIX)标准(例如STIX 2.1)保持一致。TI-NERmergerV2依赖于严格的字符串匹配和狭窄的网络查找空间,在其前身ti - nermerge的基础上,TI-NERmergerV2结合了字符串规范化、模糊回退匹配和别名扩展,使用MITRE att&ck知识库来解决词汇变化和注释不一致。我们通过将其与人工集成两个公共数据集(DNRTI和APTNER)进行比较来验证其有效性,从而生成一个称为AAPTNER的统一数据集。TI-NERmergerV2与手动过程的一致性超过94%,将专家数月的工作减少到几分钟。使用基于roberta的NER模型的评估进一步证实,TI-NERmergerV2提高了注释质量,并有效地消除了生成的DNRTI-STIX2.1和AAPTNER数据集中的关键实体类型的歧义。该框架在采用STIX域和可观察对象的数据集上进行了推广,为网络威胁情报研究提供了可扩展和可复制的基础。框架和结果数据集都公开发布,以支持在标准化和丰富TI-NER资源方面的更广泛努力。
{"title":"TI-NERmergerV2: Automating the integration of threat intelligence NER datasets via STIX standard","authors":"Inoussa Mouiche,&nbsp;Sherif Saad","doi":"10.1016/j.cose.2026.104838","DOIUrl":"10.1016/j.cose.2026.104838","url":null,"abstract":"<div><div>Quality-labeled data are essential for developing accurate AI models in cybersecurity, particularly for threat intelligence named entity recognition (TI-NER), which automates the extraction of threat indicators and entities from unstructured reports. While several annotated datasets exist, their isolated use hinders scalability due to inconsistent tagging schemes, label names, and non-standard entity categories. This paper introduces TI-NERmergerV2, a robust, semi-automated framework for integrating heterogeneous TI-NER datasets into a unified, high-quality corpus aligned with the structured threat information expression (STIX) standard (e.g, STIX 2.1). Building upon its predecessor, TI-NERmerger, which is limited by its reliance on strict string matching and a narrow cyber lookup space, TI-NERmergerV2 incorporates string normalization, fuzzy fallback matching, and alias expansion using the MITRE ATT&amp;CK knowledge base to resolve lexical variation and annotation inconsistencies. We validate its effectiveness by comparing it with a manual integration of two public datasets (DNRTI and APTNER), producing a unified dataset called AAPTNER. TI-NERmergerV2 achieves over 94% alignment with the manual process, reducing months of expert effort to minutes. Evaluations using a RoBERTa-based NER model further confirm that TI-NERmergerV2 enhances annotation quality and effectively disambiguates key entity types in the resulting DNRTI-STIX2.1 and AAPTNER datasets. The framework generalizes across datasets that adopt STIX domain and observable objects, providing a scalable and reproducible foundation for cyber threat intelligence research. Both the framework and resulting datasets are publicly released to support broader efforts in standardizing and enriching TI-NER resources.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104838"},"PeriodicalIF":5.4,"publicationDate":"2026-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146038263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond self-reporting: Uncovering the operational realities of SME cybersecurity through expert assessment 超越自我报告:通过专家评估揭示中小企业网络安全的运营现实
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-15 DOI: 10.1016/j.cose.2026.104839
ALLADEAN CHIDUKWANI, SEBASTIAN ZANDER, POLYCHRONIS KOUTSAKIS
This study builds upon the foundational research of Chidukwani et al. (2022, 2024) to critically examine and validate cybersecurity assertions made by small and medium-sized enterprises (SMEs). Through a mixed-method multiple case study design, the research employed a comprehensive methodology to gain firsthand insights into SME cybersecurity postures. Central to this study is the introduction of the Validated Cybersecurity Posture Assessment Framework (VCPAF), a novel multi-layered methodology tailored to the SME context. VCPAF integrates self-reported assessments, expert-led interviews, technical vulnerability scanning, artifact and documentation review, and a triangulated scoring and gap analysis. This holistic and iterative approach enables a more accurate and context-sensitive validation of cybersecurity practices, bridging the gap between perceived and actual security postures.
Fieldwork included site visits, inspections, direct observations, and in-depth interviews with key personnel to validate initial survey responses from Chidukwani et al. (2024). Benchmarking against the NIST Cybersecurity Framework (CSF), the study revealed significant disparities between SMEs’ self-reported cybersecurity practices and evidence from expert assessments. SMEs consistently overstated their cybersecurity maturity, often conflating IT support with cybersecurity services. Overestimations were particularly notable across the NIST CSF’s five core functions: Identify, Protect, Detect, Respond, and Recover with critical weaknesses identified in asset management, patch management, network security, access control, monitoring, and incident response. Additionally, misunderstandings regarding IT provider responsibilities and regulatory obligations were found to exacerbate vulnerabilities.
We conclude that self-reporting alone is insufficient for accurately assessing SME cybersecurity posture. To close the gap between perceived and actual security practices, independent validation and tailored frameworks are critical. We advocate for sector-specific adaptations of established standards, transparent service provider agreements, and mandatory employee training. Additionally, introducing an industry standardised terminology and taxonomy similar to those used in healthcare insurance would simplify service offerings, and improve SME understanding of cybersecurity responsibilities.
本研究以Chidukwani等人(2022,2024)的基础研究为基础,批判性地检验和验证中小企业(SMEs)的网络安全主张。通过混合方法的多案例研究设计,本研究采用了一种综合的方法来获得中小企业网络安全状况的第一手见解。本研究的核心是引入验证网络安全态势评估框架(VCPAF),这是一种针对中小企业环境量身定制的新型多层方法。VCPAF集成了自我报告评估、专家领导的访谈、技术漏洞扫描、工件和文档审查,以及三角评分和差距分析。这种整体和迭代的方法使网络安全实践的验证更加准确和上下文敏感,弥合了感知和实际安全状态之间的差距。实地工作包括实地考察、视察、直接观察和对关键人员的深入访谈,以验证Chidukwani等人(2024)的初步调查结果。该研究以NIST网络安全框架(CSF)为基准,揭示了中小企业自我报告的网络安全实践与专家评估证据之间的显著差异。中小企业一贯夸大其网络安全成熟度,经常将IT支持与网络安全服务混为一谈。在NIST CSF的五个核心功能:识别、保护、检测、响应和恢复中,对资产管理、补丁管理、网络安全、访问控制、监控和事件响应中的关键弱点进行了高估。此外,发现对IT提供者责任和监管义务的误解加剧了漏洞。我们的结论是,仅仅自我报告不足以准确评估中小企业的网络安全态势。为了缩小感知到的和实际的安全实践之间的差距,独立的验证和定制的框架至关重要。我们提倡针对特定行业调整已建立的标准、透明的服务提供商协议和强制性的员工培训。此外,引入类似于医疗保险中使用的行业标准化术语和分类法将简化服务提供,并提高中小企业对网络安全责任的理解。
{"title":"Beyond self-reporting: Uncovering the operational realities of SME cybersecurity through expert assessment","authors":"ALLADEAN CHIDUKWANI,&nbsp;SEBASTIAN ZANDER,&nbsp;POLYCHRONIS KOUTSAKIS","doi":"10.1016/j.cose.2026.104839","DOIUrl":"10.1016/j.cose.2026.104839","url":null,"abstract":"<div><div>This study builds upon the foundational research of Chidukwani et al. (2022, 2024) to critically examine and validate cybersecurity assertions made by small and medium-sized enterprises (SMEs). Through a mixed-method multiple case study design, the research employed a comprehensive methodology to gain firsthand insights into SME cybersecurity postures. Central to this study is the introduction of the Validated Cybersecurity Posture Assessment Framework (VCPAF), a novel multi-layered methodology tailored to the SME context. VCPAF integrates self-reported assessments, expert-led interviews, technical vulnerability scanning, artifact and documentation review, and a triangulated scoring and gap analysis. This holistic and iterative approach enables a more accurate and context-sensitive validation of cybersecurity practices, bridging the gap between perceived and actual security postures.</div><div>Fieldwork included site visits, inspections, direct observations, and in-depth interviews with key personnel to validate initial survey responses from Chidukwani et al. (2024). Benchmarking against the NIST Cybersecurity Framework (CSF), the study revealed significant disparities between SMEs’ self-reported cybersecurity practices and evidence from expert assessments. SMEs consistently overstated their cybersecurity maturity, often conflating IT support with cybersecurity services. Overestimations were particularly notable across the NIST CSF’s five core functions: Identify, Protect, Detect, Respond, and Recover with critical weaknesses identified in asset management, patch management, network security, access control, monitoring, and incident response. Additionally, misunderstandings regarding IT provider responsibilities and regulatory obligations were found to exacerbate vulnerabilities.</div><div>We conclude that self-reporting alone is insufficient for accurately assessing SME cybersecurity posture. To close the gap between perceived and actual security practices, independent validation and tailored frameworks are critical. We advocate for sector-specific adaptations of established standards, transparent service provider agreements, and mandatory employee training. Additionally, introducing an industry standardised terminology and taxonomy similar to those used in healthcare insurance would simplify service offerings, and improve SME understanding of cybersecurity responsibilities.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"164 ","pages":"Article 104839"},"PeriodicalIF":5.4,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146081600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient application monitoring and replication without kernel patches 安全高效的应用程序监控和复制,无需内核补丁
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-15 DOI: 10.1016/j.cose.2026.104833
Bert Abrath, Lennert Franssens , Bjorn De Sutter, Bart Coppens
While multi-variant execution (MVX) has been demonstrated to provide precise and secretless mitigation against many classes of memory exploits at a low performance cost, achieving that low cost has so far always come at the price of a larger trusted computing base. For example, the ReMon MVX engine combines an in-process monitor with a cross-process monitor, and relies on a kernel-space broker to isolate the in-process monitor. This requires applying a special-purpose patch to the Linux kernel, which can be a significant hurdle for its use in practice.
In this paper, we present two alternative designs for that in-process monitor and its isolation. These designs build on security capabilities of modern processors and the mainline Linux kernel, without requiring any adaptation. A security analysis reveals that the novel designs are as secure as the existing ReMon design, and a performance evaluation reveals that no performance price needs to be paid.
虽然多变量执行(MVX)已被证明能够以较低的性能成本提供针对许多类型的内存利用的精确且无秘密的缓解,但到目前为止,实现这种低成本的代价始终是更大的可信计算基础。例如,ReMon MVX引擎结合了进程内监视器和跨进程监视器,并依赖于内核空间代理来隔离进程内监视器。这需要对Linux内核应用一个特殊用途的补丁,这可能是在实践中使用它的一个重大障碍。在本文中,我们提出了两种可选的进程内监控及其隔离设计。这些设计建立在现代处理器和主流Linux内核的安全功能之上,不需要任何调整。安全性分析表明,新设计与现有的ReMon设计一样安全,性能评估表明不需要付出性能代价。
{"title":"Secure and efficient application monitoring and replication without kernel patches","authors":"Bert Abrath,&nbsp;Lennert Franssens ,&nbsp;Bjorn De Sutter,&nbsp;Bart Coppens","doi":"10.1016/j.cose.2026.104833","DOIUrl":"10.1016/j.cose.2026.104833","url":null,"abstract":"<div><div>While multi-variant execution (MVX) has been demonstrated to provide precise and secretless mitigation against many classes of memory exploits at a low performance cost, achieving that low cost has so far always come at the price of a larger trusted computing base. For example, the ReMon MVX engine combines an in-process monitor with a cross-process monitor, and relies on a kernel-space broker to isolate the in-process monitor. This requires applying a special-purpose patch to the Linux kernel, which can be a significant hurdle for its use in practice.</div><div>In this paper, we present two alternative designs for that in-process monitor and its isolation. These designs build on security capabilities of modern processors and the mainline Linux kernel, without requiring any adaptation. A security analysis reveals that the novel designs are as secure as the existing ReMon design, and a performance evaluation reveals that no performance price needs to be paid.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104833"},"PeriodicalIF":5.4,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146038264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public auditing with semantic secure data privacy for low-entropy files in cloud storage 云存储中低熵文件的语义安全数据隐私公共审计
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-08 DOI: 10.1016/j.cose.2026.104826
Xiao Tan , Qi Xie , Lidong Han , Shengbao Wang
Public auditing enables a third-party auditor delegated by the data owner to efficiently verify the integrity of data outsourced to a remote server, and thus suits for numerous applications in cloud storage. By a comprehensive survey on the literature, we found that none of existing public auditing schemes provide semantic security of data privacy, namely low-entropy data cannot preserve indistinguishability against the auditor. To capture this security weakness, we define the notion public auditing with semantic secure data privacy (PA-SSDP) by a formal adversarial model to guarantee that it is impossible for the auditor to learn any non-trivial information about the data, even if the audited file has only two possible versions. Then we propose a concrete PA-SSDP scheme with two variants of provable security under the new model, which offer improved data privacy and the same level of efficiency as most of related works. Besides, our schemes support some other useful features, such as server-side deduplication, dynamic data update, and batch auditing.
公共审计使数据所有者委托的第三方审计员能够有效地验证外包给远程服务器的数据的完整性,因此适用于云存储中的许多应用程序。通过对文献的全面调查,我们发现现有的公共审计方案都没有提供数据隐私的语义安全,即低熵数据不能对审计员保持不可区分性。为了抓住这个安全弱点,我们通过正式的对抗性模型定义了带有语义安全数据隐私(PA-SSDP)的公共审计概念,以保证审计人员不可能了解有关数据的任何重要信息,即使被审计的文件只有两个可能的版本。然后,我们提出了一个具体的PA-SSDP方案,该方案在新模型下具有两个可证明安全性的变体,该方案提供了改进的数据隐私性和与大多数相关工作相同的效率水平。此外,我们的方案还支持其他一些有用的特性,如服务器端重复数据删除、动态数据更新和批处理审计。
{"title":"Public auditing with semantic secure data privacy for low-entropy files in cloud storage","authors":"Xiao Tan ,&nbsp;Qi Xie ,&nbsp;Lidong Han ,&nbsp;Shengbao Wang","doi":"10.1016/j.cose.2026.104826","DOIUrl":"10.1016/j.cose.2026.104826","url":null,"abstract":"<div><div>Public auditing enables a third-party auditor delegated by the data owner to efficiently verify the integrity of data outsourced to a remote server, and thus suits for numerous applications in cloud storage. By a comprehensive survey on the literature, we found that none of existing public auditing schemes provide semantic security of data privacy, namely low-entropy data cannot preserve indistinguishability against the auditor. To capture this security weakness, we define the notion <em>public auditing with semantic secure data privacy</em> (PA-SSDP) by a formal adversarial model to guarantee that it is impossible for the auditor to learn any non-trivial information about the data, even if the audited file has only two possible versions. Then we propose a concrete PA-SSDP scheme with two variants of provable security under the new model, which offer improved data privacy and the same level of efficiency as most of related works. Besides, our schemes support some other useful features, such as server-side deduplication, dynamic data update, and batch auditing.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104826"},"PeriodicalIF":5.4,"publicationDate":"2026-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145979825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond address spaces: In-process memory isolation for RISC-V 超越地址空间:RISC-V的进程内内存隔离
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-08 DOI: 10.1016/j.cose.2025.104812
Seonghwan Park , Hayoung Kang , Donghyun Kwon
In-process memory isolation is a fundamental building block for modern security solutions, enabling the protection of sensitive data within a single process. To achieve in-process memory isolation, prior work has proposed either instruction-level or domain-based schemes. Instruction-level schemes offer fine-grained access control but struggle to scale, whereas domain-based schemes scale to multiple compartments yet lack fine-grained access control. This characteristic leads to restricted applications for each scheme.
In this paper, we present Dom-V, a fine-grained and scalable in-process memory isolation technique that simultaneously supports instruction-level and domain-based schemes without requiring hardware modifications on RISC-V. Dom-V achieves this by leveraging the RISC-V Hypervisor extension, a ratified ISA extension. To demonstrate its effectiveness, we evaluate Dom-V across three representative use cases: shadow stack, encryption key protection, and JIT code page protection. Our experimental results indicate that Dom-V achieves secure and scalable in-process isolation with minimal performance overhead.
进程内内存隔离是现代安全解决方案的基本组成部分,可以保护单个进程内的敏感数据。为了实现进程内内存隔离,先前的工作提出了指令级或基于域的方案。指令级方案提供细粒度访问控制,但难以扩展,而基于域的方案可扩展到多个隔间,但缺乏细粒度访问控制。这一特性导致每种方案的应用受到限制。在本文中,我们提出了Dom-V,一种细粒度和可扩展的进程内内存隔离技术,它同时支持指令级和基于域的方案,而无需在RISC-V上进行硬件修改。Dom-V通过利用RISC-V Hypervisor扩展(一个已批准的ISA扩展)来实现这一点。为了证明它的有效性,我们跨三个代表性用例评估了Dom-V:影子堆栈、加密密钥保护和JIT代码页保护。我们的实验结果表明,Dom-V以最小的性能开销实现了安全和可扩展的进程内隔离。
{"title":"Beyond address spaces: In-process memory isolation for RISC-V","authors":"Seonghwan Park ,&nbsp;Hayoung Kang ,&nbsp;Donghyun Kwon","doi":"10.1016/j.cose.2025.104812","DOIUrl":"10.1016/j.cose.2025.104812","url":null,"abstract":"<div><div>In-process memory isolation is a fundamental building block for modern security solutions, enabling the protection of sensitive data within a single process. To achieve in-process memory isolation, prior work has proposed either instruction-level or domain-based schemes. Instruction-level schemes offer fine-grained access control but struggle to scale, whereas domain-based schemes scale to multiple compartments yet lack fine-grained access control. This characteristic leads to restricted applications for each scheme.</div><div>In this paper, we present <span>Dom-V</span>, a fine-grained and scalable in-process memory isolation technique that simultaneously supports instruction-level and domain-based schemes without requiring hardware modifications on RISC-V. <span>Dom-V</span> achieves this by leveraging the RISC-V Hypervisor extension, a ratified ISA extension. To demonstrate its effectiveness, we evaluate <span>Dom-V</span> across three representative use cases: shadow stack, encryption key protection, and JIT code page protection. Our experimental results indicate that <span>Dom-V</span> achieves secure and scalable in-process isolation with minimal performance overhead.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104812"},"PeriodicalIF":5.4,"publicationDate":"2026-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145979895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1