首页 > 最新文献

Computers & Security最新文献

英文 中文
Cybersecurity optimization in supply chains under propagated cyberattacks 传播性网络攻击下供应链的网络安全优化
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-05 DOI: 10.1016/j.cose.2025.104820
Tadeusz Sawik
A novel mixed integer nonlinear programming model is developed for cybersecurity optimization in the supply chain exposed to combined direct and propagated cyberattacks. Given a limited budget for cybersecurity investments and a set of available security controls, the problem objective is to select for each node a subset of controls to minimize the breach probability of the most vulnerable attack path to a target node. Using a network transformation, Taylor series approximation of natural logarithm and applying duality theory, a nonlinear model is replaced by a mixed integer linear program. The results of computational experiments are provided, and approximated and exact solutions are compared. This study’s contribution and novelty lie in the explicit equalization of cybersecurity vulnerabilities in supply chains under combined cyberattacks, using the developed linearization techniques. The findings indicate that for the minimax objective function, cybersecurity vulnerabilities of all nodes can be significantly reduced and equalized and that the Taylor approximation of the nonlinear formula for the combined direct and propagated breach probability is very accurate. The proposed approach proves to be computationally efficient for cybersecurity optimization in large-scale multi-tier supply chain networks.
提出了一种新的混合整数非线性规划模型,用于直接和传播网络攻击下供应链的网络安全优化。给定有限的网络安全投资预算和一组可用的安全控制,问题的目标是为每个节点选择控制的子集,以最小化最脆弱的攻击路径对目标节点的破坏概率。利用网络变换、自然对数的泰勒级数逼近和对偶理论,将非线性模型转化为混合整数线性规划。给出了计算实验结果,并对近似解和精确解进行了比较。本研究的贡献和新颖之处在于,使用已开发的线性化技术,在联合网络攻击下明确均衡供应链中的网络安全漏洞。研究结果表明,对于极大极小目标函数,所有节点的网络安全漏洞都可以被显著地减少和均衡,并且直接和传播联合入侵概率的非线性公式的泰勒近似是非常准确的。该方法对于大规模多层供应链网络的网络安全优化具有较高的计算效率。
{"title":"Cybersecurity optimization in supply chains under propagated cyberattacks","authors":"Tadeusz Sawik","doi":"10.1016/j.cose.2025.104820","DOIUrl":"10.1016/j.cose.2025.104820","url":null,"abstract":"<div><div>A novel mixed integer nonlinear programming model is developed for cybersecurity optimization in the supply chain exposed to combined direct and propagated cyberattacks. Given a limited budget for cybersecurity investments and a set of available security controls, the problem objective is to select for each node a subset of controls to minimize the breach probability of the most vulnerable attack path to a target node. Using a network transformation, Taylor series approximation of natural logarithm and applying duality theory, a nonlinear model is replaced by a mixed integer linear program. The results of computational experiments are provided, and approximated and exact solutions are compared. This study’s contribution and novelty lie in the explicit equalization of cybersecurity vulnerabilities in supply chains under combined cyberattacks, using the developed linearization techniques. The findings indicate that for the minimax objective function, cybersecurity vulnerabilities of all nodes can be significantly reduced and equalized and that the Taylor approximation of the nonlinear formula for the combined direct and propagated breach probability is very accurate. The proposed approach proves to be computationally efficient for cybersecurity optimization in large-scale multi-tier supply chain networks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104820"},"PeriodicalIF":5.4,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certificate revocation – search for a way forward 证书撤销-寻找前进的道路
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-03 DOI: 10.1016/j.cose.2025.104814
Takahito Yoshizawa , Himanshu Agarwal , Dave Singelée , Bart Preneel
Revocation of digital certificates represents a series of improvements by IETF in order to standardize a complete and effective solution. This applies to the context of Internet web sites in which web servers and browsers use digital certificates to establish Transport Layer Security (TLS). Despite IETF’s effort over the years to establish a reliable revocation mechanism, including Certificate Revocation List (CRL), Online Certificate Status Protocol (OCSP) and its variants, various technical issues hinder complete resolution of the revocation problem. At the same time, all major browser vendors implement their own proprietary solutions to address the revocation problem. As a result, revocation solutions are fragmented, incomplete, and ineffective, and the level of real-world acceptance of standardized solutions is limited. To address this situation, in 2020, IETF has introduced short-term certificate concept to avoid revocation altogether. It is called Support for Short-Term, Automatically Renewed (STAR) which recommends a validity period of 4 days. To measure the level of adoption of this new approach in the Internet, we collected and analyzed web server certificates from 1 million websites; the result of our extensive analysis indicates that this scheme has not gained traction in reality. In fact, we found no implementation of a 4-day validity period out of more than 1.5 million server certificates that we collected. This situation indicates that the latest IETF effort to promote short-term certificates has not materialized, with no clear alternative solution in sight to resolve the revocation issue. We present our insights into the reasons for this absence of traction in reality and present our view of a possible way forward.
数字证书的撤销代表了IETF为了标准化一个完整有效的解决方案而进行的一系列改进。这适用于网络服务器和浏览器使用数字证书建立传输层安全性(TLS)的Internet网站环境。尽管IETF多年来一直在努力建立可靠的吊销机制,包括证书吊销列表(CRL)、在线证书状态协议(OCSP)及其变体,但各种技术问题阻碍了吊销问题的彻底解决。与此同时,所有主要的浏览器供应商都实现了自己的专有解决方案来解决吊销问题。因此,撤销解决方案是碎片化的、不完整的和无效的,并且标准化解决方案的实际接受程度是有限的。为了解决这种情况,IETF在2020年引入了短期证书概念,以避免完全撤销。它被称为支持短期自动更新(STAR),建议有效期为4天。为了衡量这种新方法在互联网上的采用程度,我们收集并分析了100万个网站的web服务器证书;我们广泛分析的结果表明,这个方案在现实中没有得到支持。事实上,在我们收集的150多万个服务器证书中,我们没有发现4天有效期的实现。这种情况表明,IETF推动短期证书的最新努力尚未实现,目前还没有明确的替代解决方案来解决吊销问题。我们对现实中缺乏吸引力的原因提出了我们的见解,并提出了我们对可能的前进方向的看法。
{"title":"Certificate revocation – search for a way forward","authors":"Takahito Yoshizawa ,&nbsp;Himanshu Agarwal ,&nbsp;Dave Singelée ,&nbsp;Bart Preneel","doi":"10.1016/j.cose.2025.104814","DOIUrl":"10.1016/j.cose.2025.104814","url":null,"abstract":"<div><div>Revocation of digital certificates represents a series of improvements by IETF in order to standardize a complete and effective solution. This applies to the context of Internet web sites in which web servers and browsers use digital certificates to establish Transport Layer Security (TLS). Despite IETF’s effort over the years to establish a reliable revocation mechanism, including Certificate Revocation List (CRL), Online Certificate Status Protocol (OCSP) and its variants, various technical issues hinder complete resolution of the revocation problem. At the same time, all major browser vendors implement their own proprietary solutions to address the revocation problem. As a result, revocation solutions are fragmented, incomplete, and ineffective, and the level of real-world acceptance of standardized solutions is limited. To address this situation, in 2020, IETF has introduced <em>short-term certificate</em> concept to avoid revocation altogether. It is called Support for Short-Term, Automatically Renewed (STAR) which recommends a validity period of 4 days. To measure the level of adoption of this new approach in the Internet, we collected and analyzed web server certificates from 1 million websites; the result of our extensive analysis indicates that this scheme has not gained traction in reality. In fact, we found no implementation of a 4-day validity period out of more than 1.5 million server certificates that we collected. This situation indicates that the latest IETF effort to promote short-term certificates has not materialized, with no clear alternative solution in sight to resolve the revocation issue. We present our insights into the reasons for this absence of traction in reality and present our view of a possible way forward.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104814"},"PeriodicalIF":5.4,"publicationDate":"2026-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145979826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SemTaint: A scalable taint analysis approach for JavaWeb frameworks and composite containers SemTaint:用于JavaWeb框架和复合容器的可伸缩的污点分析方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-03 DOI: 10.1016/j.cose.2025.104821
Haotian Huang , Ruibin Yan , Jian Gao
Static taint analysis serves as a fundamental technique for detecting security vulnerabilities in JavaWeb applications. However, existing approaches suffer from two critical limitations. First, incomplete modeling of framework mechanisms results in unsound call graphs and value flows. Second, element-insensitive analysis of composite containers leads to imprecise data flows and over-taint. To address these limitations, we propose SemTaint, a unified scalable taint analysis approach based on pointer analysis systems. SemTaint enhances Anderson-style analysis through two key innovations. First, we design rule-based framework modeling that captures implicit data and control flows introduced by JavaWeb mechanisms including dependency injection, dynamic proxy, and data persistence frameworks. Second, we develop the on-demand and element-sensitive container modeling based on the access pattern, which integrates the semantic model, access pattern abstraction and sparse tracking model. It efficiently maintains precision against dynamic state changes, thereby balancing scalability and accuracy. Our evaluation on 20 real-world JavaWeb applications demonstrates that SemTaint achieves higher coverage of intra-app reachable methods, while reducing analysis time by an average of 56.4 % compared to state-of-the-art approach. In precision testing on composite containers, SemTaint achieves 96.7 % accuracy and 100 % recall, substantially outperforming FlowDroid (67.6 % accuracy, 82.8 % recall) and Tai-e (65.7 % accuracy, 79.3 % recall). On security benchmarks, SemTaint attains perfect vulnerability detection recall while maintaining superior efficiency. Case studies on real-world vulnerabilities further confirm SemTaint’s effectiveness in detecting taint flows.
静态污染分析是检测JavaWeb应用程序中的安全漏洞的基本技术。然而,现有的方法有两个关键的局限性。首先,不完整的框架机制建模导致不健全的调用图和价值流。其次,复合容器的元素不敏感分析导致数据流不精确和过度污染。为了解决这些限制,我们提出了SemTaint,一个基于指针分析系统的统一的可扩展的污染分析方法。SemTaint通过两个关键创新增强了anderson风格的分析。首先,我们设计基于规则的框架建模,捕获由JavaWeb机制引入的隐式数据和控制流,这些机制包括依赖注入、动态代理和数据持久性框架。其次,开发了基于访问模式的按需、元素敏感的容器模型,该模型集成了语义模型、访问模式抽象模型和稀疏跟踪模型;它有效地保持了对动态状态变化的精度,从而平衡了可伸缩性和准确性。我们对20个真实的JavaWeb应用程序的评估表明,SemTaint实现了应用程序内部可访问方法的更高覆盖率,同时与最先进的方法相比,平均减少了56.4% %的分析时间。在复合容器的精度测试中,SemTaint达到了96.7 %的准确率和100 %的召回率,大大优于FlowDroid(67.6% %的准确率,82.8 %的召回率)和Tai-e(65.7 %的准确率,79.3% %的召回率)。在安全基准测试中,SemTaint实现了完美的漏洞检测召回,同时保持了优越的效率。对真实世界漏洞的案例研究进一步证实了SemTaint在检测污染流方面的有效性。
{"title":"SemTaint: A scalable taint analysis approach for JavaWeb frameworks and composite containers","authors":"Haotian Huang ,&nbsp;Ruibin Yan ,&nbsp;Jian Gao","doi":"10.1016/j.cose.2025.104821","DOIUrl":"10.1016/j.cose.2025.104821","url":null,"abstract":"<div><div>Static taint analysis serves as a fundamental technique for detecting security vulnerabilities in JavaWeb applications. However, existing approaches suffer from two critical limitations. First, incomplete modeling of framework mechanisms results in unsound call graphs and value flows. Second, element-insensitive analysis of composite containers leads to imprecise data flows and over-taint. To address these limitations, we propose SemTaint, a unified scalable taint analysis approach based on pointer analysis systems. SemTaint enhances Anderson-style analysis through two key innovations. First, we design rule-based framework modeling that captures implicit data and control flows introduced by JavaWeb mechanisms including dependency injection, dynamic proxy, and data persistence frameworks. Second, we develop the on-demand and element-sensitive container modeling based on the access pattern, which integrates the semantic model, access pattern abstraction and sparse tracking model. It efficiently maintains precision against dynamic state changes, thereby balancing scalability and accuracy. Our evaluation on 20 real-world JavaWeb applications demonstrates that SemTaint achieves higher coverage of intra-app reachable methods, while reducing analysis time by an average of 56.4 % compared to state-of-the-art approach. In precision testing on composite containers, SemTaint achieves 96.7 % accuracy and 100 % recall, substantially outperforming FlowDroid (67.6 % accuracy, 82.8 % recall) and Tai-e (65.7 % accuracy, 79.3 % recall). On security benchmarks, SemTaint attains perfect vulnerability detection recall while maintaining superior efficiency. Case studies on real-world vulnerabilities further confirm SemTaint’s effectiveness in detecting taint flows.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104821"},"PeriodicalIF":5.4,"publicationDate":"2026-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The modern cybersecurity analyst: An international position analysis 现代网络安全分析师:国际地位分析
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-02 DOI: 10.1016/j.cose.2026.104825
Christopher A Ramezan, Mohammad J. Ahmad, Ludwig Christian Schaupp, Frank W. Hatten, Michael A. Starling
<div><div>The cybersecurity analyst is one of the most common positions within the cybersecurity domain and forms the backbone of many organization’s cybersecurity operations. Despite its importance, the position remains broad in scope, and inconsistently defined across industry, with variability in titles, qualifications, and responsibilities. To provide a better understanding of the role, this study provides a global, position-level examination of the cybersecurity analyst through an empirical analysis of 725 job postings from 47 nations. Using a mixed-method approach, including manual coding, descriptive statistics, term frequency inverse document frequency (TF-IDF) analysis, named entity recognition (NER), and latent Dirichlet allocation (LDA), we explore the required qualifications, technical competencies, and operational responsibilities associated with the role. Results show that over 83% of positions required prior professional experience, while a higher education degree and possession of an industry certification were also highly desired, and were listed on 71% and 61% of positions, respectively. Surprisingly, soft communication skills and knowledge of industry standards and frameworks were highly desired and were a more frequent requirement than programming skills and knowledge of networking protocols, indicating a balanced demand for both technical proficiency and non-technical skills. Over 350 individual software tools and 123 different standards/frameworks were mentioned by employers, highlighting the diverse range of security tools and platforms used within industry. Job duties crossed several NICE Cybersecurity Workforce Framework categories, such as protection and defense, governance, incident response, and vulnerability management, highlighting the heterogeneous nature of the position. We also found several positions with unrealistic or mismatched requirements, including entry-level job postings requiring senior-level certifications, which can impede successful recruitment. Synthesizing these results, we further identify five recurring cybersecurity analyst job profiles that represent empirically derived types of analyst roles, offering a structured and actionable representation of how analyst responsibilities are configured in practice. Recommendations include aligning academic programs to industry certifications, combining technical and soft skill development, and increasing experiential learning opportunities to assist graduates with meeting position experience requirements. Employers are encouraged to ensure that position responsibilities are not overly broad, align position descriptions with operational requirements, and balance requirements with position expectations. Given the current wide diversity of the role, academia, industry, and professional organizations should focus on greater standardization of the role, which could streamline hiring, reduce barriers to entry, narrow the cyber skills gap, and better align educati
网络安全分析师是网络安全领域中最常见的职位之一,是许多组织网络安全运营的支柱。尽管这个职位很重要,但它的范围仍然很广,并且在整个行业中定义不一致,在头衔、资格和职责上都存在差异。为了更好地理解这一角色,本研究通过对来自47个国家的725个招聘信息的实证分析,对网络安全分析师进行了全球性的、职位层面的考察。使用混合方法,包括手动编码、描述性统计、术语频率逆文档频率(TF-IDF)分析、命名实体识别(NER)和潜在狄利克雷分配(LDA),我们探索了与角色相关的所需资格、技术能力和操作责任。结果显示,超过83%的职位要求之前的专业经验,而更高的教育程度和拥有行业认证也是非常重要的,分别为71%和61%的职位。令人惊讶的是,软沟通技能和行业标准和框架知识是非常需要的,并且比编程技能和网络协议知识更常见,这表明对技术熟练程度和非技术技能的平衡需求。雇主们提到了超过350个单独的软件工具和123个不同的标准/框架,突出了工业中使用的安全工具和平台的多样性。工作职责跨越NICE网络安全劳动力框架的几个类别,如保护和防御、治理、事件响应和漏洞管理,突出了该职位的异构性。我们还发现一些职位的要求不现实或不匹配,包括要求高级证书的入门级职位,这可能会阻碍成功招聘。综合这些结果,我们进一步确定了五种反复出现的网络安全分析师工作简介,它们代表了经验派生的分析师角色类型,为分析师职责在实践中如何配置提供了结构化和可操作的表示。建议包括将学术课程与行业认证相结合,将技术和软技能发展相结合,以及增加经验学习机会,以帮助毕业生满足职位经验要求。鼓励雇主确保职位职责不要过于宽泛,使职位描述与业务要求保持一致,并平衡要求与职位期望。鉴于目前这一角色的广泛多样性,学术界、工业界和专业组织应将重点放在提高这一角色的标准化上,这可以简化招聘,减少进入壁垒,缩小网络技能差距,并更好地将教育和培训计划与雇主要求的实际资格和责任相结合。
{"title":"The modern cybersecurity analyst: An international position analysis","authors":"Christopher A Ramezan,&nbsp;Mohammad J. Ahmad,&nbsp;Ludwig Christian Schaupp,&nbsp;Frank W. Hatten,&nbsp;Michael A. Starling","doi":"10.1016/j.cose.2026.104825","DOIUrl":"10.1016/j.cose.2026.104825","url":null,"abstract":"&lt;div&gt;&lt;div&gt;The cybersecurity analyst is one of the most common positions within the cybersecurity domain and forms the backbone of many organization’s cybersecurity operations. Despite its importance, the position remains broad in scope, and inconsistently defined across industry, with variability in titles, qualifications, and responsibilities. To provide a better understanding of the role, this study provides a global, position-level examination of the cybersecurity analyst through an empirical analysis of 725 job postings from 47 nations. Using a mixed-method approach, including manual coding, descriptive statistics, term frequency inverse document frequency (TF-IDF) analysis, named entity recognition (NER), and latent Dirichlet allocation (LDA), we explore the required qualifications, technical competencies, and operational responsibilities associated with the role. Results show that over 83% of positions required prior professional experience, while a higher education degree and possession of an industry certification were also highly desired, and were listed on 71% and 61% of positions, respectively. Surprisingly, soft communication skills and knowledge of industry standards and frameworks were highly desired and were a more frequent requirement than programming skills and knowledge of networking protocols, indicating a balanced demand for both technical proficiency and non-technical skills. Over 350 individual software tools and 123 different standards/frameworks were mentioned by employers, highlighting the diverse range of security tools and platforms used within industry. Job duties crossed several NICE Cybersecurity Workforce Framework categories, such as protection and defense, governance, incident response, and vulnerability management, highlighting the heterogeneous nature of the position. We also found several positions with unrealistic or mismatched requirements, including entry-level job postings requiring senior-level certifications, which can impede successful recruitment. Synthesizing these results, we further identify five recurring cybersecurity analyst job profiles that represent empirically derived types of analyst roles, offering a structured and actionable representation of how analyst responsibilities are configured in practice. Recommendations include aligning academic programs to industry certifications, combining technical and soft skill development, and increasing experiential learning opportunities to assist graduates with meeting position experience requirements. Employers are encouraged to ensure that position responsibilities are not overly broad, align position descriptions with operational requirements, and balance requirements with position expectations. Given the current wide diversity of the role, academia, industry, and professional organizations should focus on greater standardization of the role, which could streamline hiring, reduce barriers to entry, narrow the cyber skills gap, and better align educati","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104825"},"PeriodicalIF":5.4,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145898212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive view of software vulnerability risks through enterprise knowledge graphs 通过企业知识图谱全面了解软件漏洞风险
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-02 DOI: 10.1016/j.cose.2025.104815
Mikel Egaña Aranguren , Jesualdo Tomás Fernández-Breis , Bidane Leon Balentzia , Markus Rompe , Alexander García Castro
Cybersecurity has emerged as a critical concern for modern enterprises due to the increasing complexity and diversity of threats. These risks exploit multiple attack vectors, such as phishing, unpatched vulnerabilities, and malware distribution, necessitating a comprehensive and unified approach to threat modeling. However, cybersecurity data is often siloed across disparate sources–ranging from JSON vulnerability reports (e.g., Amazon Inspector, CycloneDX) and dependency files (e.g., NPM) to relational databases and manual assessments–making integration a significant challenge. Knowledge Graphs offer the technological framework to successfully integrate disparate data. This work presents a KG-based solution for software vulnerability data integration at Siemens Energy, leveraging Enterprise Knowledge Graphs to unify heterogeneous datasets under a shared semantic model. Our approach consists of: (1) a Cybersecurity Ontology Network defining core entities and relationships, (2) an automated pipeline converting diverse data sources into a (3) scalable EKG that enables advanced threat analysis, and (4) competency questions and data quality rules validating the system’s effectiveness. By adopting a Data-Centric Architecture, EKGs provide a flexible, future-proof framework for cybersecurity intelligence, overcoming the limitations of traditional Application-Centric systems, and ultimately providing FAIR data (Findable, Accessible, Interoperable, Reusable). This work offers actionable insights for organizations seeking to enhance cyber threat visibility while managing complex, evolving data landscapes.
由于威胁的复杂性和多样性日益增加,网络安全已成为现代企业的一个关键问题。这些风险利用多种攻击向量,例如网络钓鱼、未修补的漏洞和恶意软件分发,因此需要一种全面而统一的威胁建模方法。然而,网络安全数据通常分散在不同的数据源中,从JSON漏洞报告(例如Amazon Inspector, CycloneDX)和依赖文件(例如NPM)到关系数据库和手动评估,这使得集成成为一个重大挑战。知识图谱提供了成功集成不同数据的技术框架。这项工作提出了一种基于kg的解决方案,用于西门子能源公司的软件漏洞数据集成,利用企业知识图在共享语义模型下统一异构数据集。我们的方法包括:(1)定义核心实体和关系的网络安全本体网络,(2)将不同数据源转换为(3)可扩展的EKG(支持高级威胁分析)的自动化管道,以及(4)验证系统有效性的能力问题和数据质量规则。通过采用以数据为中心的架构,EKGs为网络安全智能提供了一个灵活的、面向未来的框架,克服了传统以应用为中心的系统的局限性,并最终提供FAIR数据(可查找、可访问、可互操作、可重用)。这项工作为寻求在管理复杂、不断发展的数据环境的同时提高网络威胁可见性的组织提供了可操作的见解。
{"title":"A comprehensive view of software vulnerability risks through enterprise knowledge graphs","authors":"Mikel Egaña Aranguren ,&nbsp;Jesualdo Tomás Fernández-Breis ,&nbsp;Bidane Leon Balentzia ,&nbsp;Markus Rompe ,&nbsp;Alexander García Castro","doi":"10.1016/j.cose.2025.104815","DOIUrl":"10.1016/j.cose.2025.104815","url":null,"abstract":"<div><div>Cybersecurity has emerged as a critical concern for modern enterprises due to the increasing complexity and diversity of threats. These risks exploit multiple attack vectors, such as phishing, unpatched vulnerabilities, and malware distribution, necessitating a comprehensive and unified approach to threat modeling. However, cybersecurity data is often siloed across disparate sources–ranging from JSON vulnerability reports (e.g., Amazon Inspector, CycloneDX) and dependency files (e.g., NPM) to relational databases and manual assessments–making integration a significant challenge. Knowledge Graphs offer the technological framework to successfully integrate disparate data. This work presents a KG-based solution for software vulnerability data integration at Siemens Energy, leveraging Enterprise Knowledge Graphs to unify heterogeneous datasets under a shared semantic model. Our approach consists of: (1) a Cybersecurity Ontology Network defining core entities and relationships, (2) an automated pipeline converting diverse data sources into a (3) scalable EKG that enables advanced threat analysis, and (4) competency questions and data quality rules validating the system’s effectiveness. By adopting a Data-Centric Architecture, EKGs provide a flexible, future-proof framework for cybersecurity intelligence, overcoming the limitations of traditional Application-Centric systems, and ultimately providing FAIR data (Findable, Accessible, Interoperable, Reusable). This work offers actionable insights for organizations seeking to enhance cyber threat visibility while managing complex, evolving data landscapes.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104815"},"PeriodicalIF":5.4,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks, defenses and perspectives for the runtime security of RISC-V IoT devices: A review RISC-V物联网设备运行时安全的攻击、防御和展望:综述
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-02 DOI: 10.1016/j.cose.2025.104817
Wei Wang , Weike Wang , Jiameng Liu , Lin Li , Bingzheng Li , Zirui Liu , Xiang Wang
With the extensive application of embedded devices in daily life, the security issues have gained escalating significance. There are numerous researches and countermeasures dealing with the security problems of mainstream processor architectures. As an emerging Instruction Set Architecture (ISA), RISC-V has drawn widespread attention owing to its openness, flexibility, and extensibility. With its popularization in diverse fields, ensuring the security becomes crucially important. Aiming at the runtime security of RISC-V IoT devices, this paper reviews all the published papers in RISC-V security, and investigates three mainstream attack approaches and corresponding defense solutions. We analyze five common side-channel attacks with distinct attack focuses, categorize defense schemes into three types based on different levels and strategies of defense technology, and summarize several existing defense schemes on RISC-V platforms. Then, in the context of program vulnerability exploitation attacks, we present the attack process and offer a comprehensive overview and comparison of hardware-assisted defense mechanisms that have been implemented on RISC-V platforms in the recent years. This analysis is carried out from four key strategies, namely Code Integrity, Control Flow Integrity, Data Flow Integrity, and Information Confidentiality. For higher-level network attacks that are less correlated with the underlying ISA, we provide a brief statement and introduce two mainstream mechanisms, namely Intrusion Detection System and Data Encryption. Besides, this paper offers the critical perspectives and future development directions for the defense strategies corresponding to each type of attack. It is convinced that this review will act as a valuable resource for fellow researchers in RISC-V security.
随着嵌入式设备在日常生活中的广泛应用,其安全问题日益凸显。针对主流处理器体系结构的安全问题,已有大量的研究和对策。RISC-V作为一种新兴的指令集架构(ISA),因其开放性、灵活性和可扩展性而受到广泛关注。随着其在各个领域的普及,确保安全变得至关重要。针对RISC-V物联网设备的运行时安全问题,本文回顾了所有已发表的RISC-V安全方面的论文,研究了三种主流的攻击方式和相应的防御方案。分析了五种常见的侧边信道攻击,各有不同的攻击重点,根据防御技术的不同层次和策略,将防御方案分为三种类型,并总结了RISC-V平台上现有的几种防御方案。然后,在程序漏洞利用攻击的背景下,给出了攻击过程,并对近年来在RISC-V平台上实现的硬件辅助防御机制进行了全面的概述和比较。该分析从四个关键策略进行,即代码完整性、控制流完整性、数据流完整性和信息保密性。对于与底层ISA相关性较小的高级网络攻击,我们简要介绍了两种主流机制,即入侵检测系统和数据加密。并针对每种攻击类型提出了相应的防御策略的关键视角和未来发展方向。相信本综述将为RISC-V安全领域的研究人员提供宝贵的资源。
{"title":"Attacks, defenses and perspectives for the runtime security of RISC-V IoT devices: A review","authors":"Wei Wang ,&nbsp;Weike Wang ,&nbsp;Jiameng Liu ,&nbsp;Lin Li ,&nbsp;Bingzheng Li ,&nbsp;Zirui Liu ,&nbsp;Xiang Wang","doi":"10.1016/j.cose.2025.104817","DOIUrl":"10.1016/j.cose.2025.104817","url":null,"abstract":"<div><div>With the extensive application of embedded devices in daily life, the security issues have gained escalating significance. There are numerous researches and countermeasures dealing with the security problems of mainstream processor architectures. As an emerging Instruction Set Architecture (ISA), RISC-V has drawn widespread attention owing to its openness, flexibility, and extensibility. With its popularization in diverse fields, ensuring the security becomes crucially important. Aiming at the runtime security of RISC-V IoT devices, this paper reviews all the published papers in RISC-V security, and investigates three mainstream attack approaches and corresponding defense solutions. We analyze five common side-channel attacks with distinct attack focuses, categorize defense schemes into three types based on different levels and strategies of defense technology, and summarize several existing defense schemes on RISC-V platforms. Then, in the context of program vulnerability exploitation attacks, we present the attack process and offer a comprehensive overview and comparison of hardware-assisted defense mechanisms that have been implemented on RISC-V platforms in the recent years. This analysis is carried out from four key strategies, namely Code Integrity, Control Flow Integrity, Data Flow Integrity, and Information Confidentiality. For higher-level network attacks that are less correlated with the underlying ISA, we provide a brief statement and introduce two mainstream mechanisms, namely Intrusion Detection System and Data Encryption. Besides, this paper offers the critical perspectives and future development directions for the defense strategies corresponding to each type of attack. It is convinced that this review will act as a valuable resource for fellow researchers in RISC-V security.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104817"},"PeriodicalIF":5.4,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Into the future 展望未来
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-31 DOI: 10.1016/j.cose.2025.104824
Steven Furnell
{"title":"Into the future","authors":"Steven Furnell","doi":"10.1016/j.cose.2025.104824","DOIUrl":"10.1016/j.cose.2025.104824","url":null,"abstract":"","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"162 ","pages":"Article 104824"},"PeriodicalIF":5.4,"publicationDate":"2025-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146077602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Folded-tag: Enhancing memory safety with efficient hardware-supported memory tagging 折叠标签:通过有效的硬件支持的内存标签增强内存安全性
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-31 DOI: 10.1016/j.cose.2025.104822
Sumin Yang, Hongjoo Jin, Wonsuk Choi, Dong Hoon Lee
Memory corruption vulnerabilities, such as out-of-bound memory access, are widely exploited by attackers to compromise system security. Numerous software-based techniques have been developed to prevent such vulnerabilities, but they often require a trade-off between security and performance. In response, Memory Tagging Extension (MTE) is one hardware-based technology that has been introduced to improve memory safety on the ARM architecture efficiently. However, ARM MTE suffers from low entropy and side-channel attacks. Consequently, additional techniques are urgent to enhance protection against pointer misuse arising from memory corruption.
In this paper, we present Folded-Tag, a technique designed to efficiently safeguard pointers against unauthorized out-of-bounds access. Our method addresses the issue of low entropy 4-bit tag in ARM MTE, which makes the system vulnerable, by introducing folding and unfolding mechanisms for pointers. These mechanisms mitigate both speculative execution attacks and pointer guessing attacks. We implemented Folded-Tag in the LLVM compiler framework without requiring kernel modifications, making it suitable for deployment in systems supporting ARM MTE and Pointer Authentication (PA). To assess its effectiveness, we evaluated Folded-Tag on SPEC CPU2017 and NBench-byte benchmarks on an ARM-based Apple Silicon platform. We also applied Folded-Tag to real-world applications, including the NginX web server and ProFTPD FTP server, to demonstrate its compatibility and efficiency. Our experimental results show that Folded-Tag effectively mitigates attacks against existing hardware-assisted security features with a geometric mean performance overhead of less than 1%.
内存损坏漏洞,如超出边界的内存访问,被攻击者广泛利用来危害系统安全性。已经开发了许多基于软件的技术来防止此类漏洞,但它们通常需要在安全性和性能之间进行权衡。因此,内存标记扩展(Memory Tagging Extension, MTE)是一种基于硬件的技术,可以有效地提高ARM架构上的内存安全性。然而,ARM MTE存在低熵和侧信道攻击的问题。因此,迫切需要额外的技术来增强对内存损坏引起的指针误用的保护。在本文中,我们提出了一种折叠标签技术,旨在有效地保护指针免受未经授权的越界访问。我们的方法通过引入指针的折叠和展开机制,解决了ARM MTE中低熵4位标签的问题,这使得系统容易受到攻击。这些机制减轻了推测性执行攻击和指针猜测攻击。我们在LLVM编译器框架中实现了fold - tag,而不需要修改内核,使其适合部署在支持ARM MTE和指针身份验证(Pointer Authentication, PA)的系统中。为了评估其有效性,我们在SPEC CPU2017和基于arm的Apple Silicon平台上的nbench字节基准测试中评估了fold - tag。我们还将fold - tag应用于实际应用程序,包括NginX web服务器和ProFTPD FTP服务器,以展示其兼容性和效率。我们的实验结果表明,折叠标签有效地减轻了针对现有硬件辅助安全特征的攻击,几何平均性能开销小于1%。
{"title":"Folded-tag: Enhancing memory safety with efficient hardware-supported memory tagging","authors":"Sumin Yang,&nbsp;Hongjoo Jin,&nbsp;Wonsuk Choi,&nbsp;Dong Hoon Lee","doi":"10.1016/j.cose.2025.104822","DOIUrl":"10.1016/j.cose.2025.104822","url":null,"abstract":"<div><div>Memory corruption vulnerabilities, such as out-of-bound memory access, are widely exploited by attackers to compromise system security. Numerous software-based techniques have been developed to prevent such vulnerabilities, but they often require a trade-off between security and performance. In response, Memory Tagging Extension (MTE) is one hardware-based technology that has been introduced to improve memory safety on the ARM architecture efficiently. However, ARM MTE suffers from low entropy and side-channel attacks. Consequently, additional techniques are urgent to enhance protection against pointer misuse arising from memory corruption.</div><div>In this paper, we present Folded-Tag, a technique designed to efficiently safeguard pointers against unauthorized out-of-bounds access. Our method addresses the issue of low entropy 4-bit tag in ARM MTE, which makes the system vulnerable, by introducing <span>folding</span> and <span>unfolding</span> mechanisms for pointers. These mechanisms mitigate both speculative execution attacks and pointer guessing attacks. We implemented Folded-Tag in the LLVM compiler framework without requiring kernel modifications, making it suitable for deployment in systems supporting ARM MTE and Pointer Authentication (PA). To assess its effectiveness, we evaluated Folded-Tag on SPEC CPU2017 and NBench-byte benchmarks on an ARM-based Apple Silicon platform. We also applied Folded-Tag to real-world applications, including the NginX web server and ProFTPD FTP server, to demonstrate its compatibility and efficiency. Our experimental results show that Folded-Tag effectively mitigates attacks against existing hardware-assisted security features with a geometric mean performance overhead of less than 1%.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104822"},"PeriodicalIF":5.4,"publicationDate":"2025-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on network flow watermarking: A problem-oriented perspective 基于问题导向的网络流水印研究综述
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-31 DOI: 10.1016/j.cose.2025.104813
Tengyao Li , Kaiyue Liu , Shaoyong Du
Network flow watermarking is an active tracing approach by embedding the source node identity information into network flows invisibly. The embedded watermarks coexist with the original network traffic, which are designed with robustness against network noises and active interferences. In recent years, network flow watermarking enters a phase of profound development in face of various challenges on practical applications (e.g. deanonymization, data leakage tracing, malicious behavior monitoring) in Internet. However, to our best knowledge, there are very few surveys for the network flow watermarking methods after 2018, for which the systematic survey covering the entire developments is absent. Meanwhile, current surveys classify and analyze network flow watermarking based on embedding patterns, which ignore different methods correlations on critical problems for watermarking. To this end, the paper reviews and analyzes the papers from 2001 to 2025 on network flow watermarking in perspective of problem-orientations. The threat model and theoretical framework are established to model the watermarking embedding and detecting procedures, which offer a consistent model for watermarking design. From three core problems on robustness, invisibility and adaptation, network flow watermarking methods are classified into different solutions to these problems, which depict an explicit network flow watermarking development roadmap. For sake of facilitating practical applications, five open problems as the critical challenges are discussed, providing references for the future work on network flow watermarking.
网络流水印是一种将源节点身份信息不可见地嵌入到网络流中的主动跟踪方法。嵌入的水印与原始网络流量共存,具有抗网络噪声和有源干扰的鲁棒性。近年来,网络流量水印技术在互联网的实际应用中面临着去匿名化、数据泄露跟踪、恶意行为监控等诸多挑战,进入了一个深刻发展的阶段。然而,据我们所知,2018年以后针对网络流量水印方法的调查很少,缺乏涵盖整个发展的系统调查。同时,现有的研究基于嵌入模式对网络流水印进行分类和分析,忽略了不同方法在水印关键问题上的相关性。为此,本文从问题导向的角度对2001 - 2025年有关网络流量水印的论文进行了综述和分析。建立了对水印嵌入和检测过程进行建模的威胁模型和理论框架,为水印设计提供了统一的模型。从鲁棒性、不可见性和自适应三个核心问题出发,对网络流水印方法进行了分类,给出了不同的解决方案,描绘了网络流水印的发展路线图。为了便于实际应用,本文讨论了五个开放性问题作为关键挑战,为今后网络流水印的研究提供参考。
{"title":"A survey on network flow watermarking: A problem-oriented perspective","authors":"Tengyao Li ,&nbsp;Kaiyue Liu ,&nbsp;Shaoyong Du","doi":"10.1016/j.cose.2025.104813","DOIUrl":"10.1016/j.cose.2025.104813","url":null,"abstract":"<div><div>Network flow watermarking is an active tracing approach by embedding the source node identity information into network flows invisibly. The embedded watermarks coexist with the original network traffic, which are designed with robustness against network noises and active interferences. In recent years, network flow watermarking enters a phase of profound development in face of various challenges on practical applications (e.g. deanonymization, data leakage tracing, malicious behavior monitoring) in Internet. However, to our best knowledge, there are very few surveys for the network flow watermarking methods after 2018, for which the systematic survey covering the entire developments is absent. Meanwhile, current surveys classify and analyze network flow watermarking based on embedding patterns, which ignore different methods correlations on critical problems for watermarking. To this end, the paper reviews and analyzes the papers from 2001 to 2025 on network flow watermarking in perspective of problem-orientations. The threat model and theoretical framework are established to model the watermarking embedding and detecting procedures, which offer a consistent model for watermarking design. From three core problems on robustness, invisibility and adaptation, network flow watermarking methods are classified into different solutions to these problems, which depict an explicit network flow watermarking development roadmap. For sake of facilitating practical applications, five open problems as the critical challenges are discussed, providing references for the future work on network flow watermarking.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"163 ","pages":"Article 104813"},"PeriodicalIF":5.4,"publicationDate":"2025-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145897840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usable authentication: Are we there yet? 可用的身份验证:我们做到了吗?
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-30 DOI: 10.1016/j.cose.2025.104823
Nathan Clarke , Steven Furnell
With technology increasingly embedded in everyday life, the demand for secure and usable authentication methods has never been greater. Traditional password-based systems continue to dominate, despite well-known usability and security challenges. This paper explores the evolution of user authentication technologies, from secret knowledge and tokens to biometrics and emerging approaches such as Passkeys. It critically evaluates the extent to which usability has been achieved, identifying both successes—such as biometrics integrated into smartphones—and persistent issues, including inconsistent guidance, ecosystem dependence, and accessibility barriers. Drawing on academic and commercial developments, the discussion highlights the growing burden on users who must authenticate across multiple devices and services daily. Future directions including transparent, continuous, and user-choice-driven authentication are discussed as potential solutions to mitigate this burden. Ultimately, it argues that while progress has been made, current solutions remain fragmented and often exclude key user groups. A more inclusive, consistent, and user-centred approach is essential to ensure authentication systems are both secure and truly usable in practice.
随着技术越来越多地嵌入到日常生活中,对安全和可用的身份验证方法的需求从未像现在这样大。尽管存在众所周知的可用性和安全性挑战,传统的基于密码的系统仍然占据主导地位。本文探讨了用户认证技术的演变,从秘密知识和令牌到生物识别技术和新兴方法,如Passkeys。它批判性地评估了可用性实现的程度,确定了成功的方面(如生物识别技术集成到智能手机中)和持续存在的问题(包括不一致的指导、生态系统依赖和可访问性障碍)。根据学术和商业发展,讨论强调了每天必须跨多个设备和服务进行身份验证的用户的负担日益增加。未来的发展方向包括透明、连续和用户选择驱动的身份验证,作为减轻这种负担的潜在解决方案进行了讨论。最后,报告认为,虽然取得了进展,但目前的解决方案仍然支离破碎,而且往往排除了关键用户群体。一种更具包容性、一致性和以用户为中心的方法对于确保身份验证系统在实践中既安全又真正可用至关重要。
{"title":"Usable authentication: Are we there yet?","authors":"Nathan Clarke ,&nbsp;Steven Furnell","doi":"10.1016/j.cose.2025.104823","DOIUrl":"10.1016/j.cose.2025.104823","url":null,"abstract":"<div><div>With technology increasingly embedded in everyday life, the demand for secure and usable authentication methods has never been greater. Traditional password-based systems continue to dominate, despite well-known usability and security challenges. This paper explores the evolution of user authentication technologies, from secret knowledge and tokens to biometrics and emerging approaches such as Passkeys. It critically evaluates the extent to which usability has been achieved, identifying both successes—such as biometrics integrated into smartphones—and persistent issues, including inconsistent guidance, ecosystem dependence, and accessibility barriers. Drawing on academic and commercial developments, the discussion highlights the growing burden on users who must authenticate across multiple devices and services daily. Future directions including transparent, continuous, and user-choice-driven authentication are discussed as potential solutions to mitigate this burden. Ultimately, it argues that while progress has been made, current solutions remain fragmented and often exclude key user groups. A more inclusive, consistent, and user-centred approach is essential to ensure authentication systems are both secure and truly usable in practice.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"162 ","pages":"Article 104823"},"PeriodicalIF":5.4,"publicationDate":"2025-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1