首页 > 最新文献

Computers & Security最新文献

英文 中文
Anomaly detection for multivariate time series in IoT using discrete wavelet decomposition and dual graph attention networks 利用离散小波分解和双图注意网络进行物联网多变量时间序列异常检测
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.cose.2024.104075

Effective anomaly detection in multivariate time series data is critical to ensuring the security of Internet of Things (IoT) devices and systems. However, building a high precision and low false positive rate anomaly detection model for the complex and volatile IoT environment is a challenging task. This is often due to issues such as a lack of anomaly labeling, high data volatility, and the complexity of device mechanisms. Traditional machine learning algorithms and sequence models frequently fail to account for feature correlation and temporal dependency in anomaly detection. Although deep learning-based anomaly detection methods have progressed, there is still room for improvement in precision, recall, and generalization ability. In this paper, we propose an anomaly detection model called Meta-MWDG to address these issues. The model is based on a multi-scale discrete wavelet decomposition and a dual graph attention network, which can effectively extract feature correlation and temporal dependency in multivariate time series data. Additionally, model-agnostic meta-learning (MAML) is introduced to improve the model’s generalization performance, enabling it to perform well on new tasks even with a few samples. A gated recurrent unit (GRU) is combined with a multi-head self-attention network to output both prediction and reconstruction results in a joint optimization strategy, improving the precision of anomaly detection. Extensive experimental studies demonstrate that Meta-MWDG outperforms the state-of-the-art methods in anomaly detection.

在多变量时间序列数据中进行有效的异常检测对于确保物联网(IoT)设备和系统的安全至关重要。然而,为复杂多变的物联网环境建立高精度、低误报率的异常检测模型是一项极具挑战性的任务。这通常是由于缺乏异常标记、数据波动性大以及设备机制复杂等问题造成的。传统的机器学习算法和序列模型经常无法在异常检测中考虑特征相关性和时间依赖性。虽然基于深度学习的异常检测方法取得了进展,但在精度、召回率和泛化能力方面仍有改进空间。本文提出了一种名为 Meta-MWDG 的异常检测模型来解决这些问题。该模型基于多尺度离散小波分解和双图注意力网络,能有效提取多变量时间序列数据中的特征相关性和时间依赖性。此外,为了提高模型的泛化性能,该模型还引入了与模型无关的元学习(MAML),使其即使在样本很少的情况下也能在新任务中表现出色。门控递归单元(GRU)与多头自注意网络相结合,以联合优化策略输出预测和重建结果,提高了异常检测的精度。广泛的实验研究表明,Meta-MWDG 在异常检测方面优于最先进的方法。
{"title":"Anomaly detection for multivariate time series in IoT using discrete wavelet decomposition and dual graph attention networks","authors":"","doi":"10.1016/j.cose.2024.104075","DOIUrl":"10.1016/j.cose.2024.104075","url":null,"abstract":"<div><p>Effective anomaly detection in multivariate time series data is critical to ensuring the security of Internet of Things (IoT) devices and systems. However, building a high precision and low false positive rate anomaly detection model for the complex and volatile IoT environment is a challenging task. This is often due to issues such as a lack of anomaly labeling, high data volatility, and the complexity of device mechanisms. Traditional machine learning algorithms and sequence models frequently fail to account for feature correlation and temporal dependency in anomaly detection. Although deep learning-based anomaly detection methods have progressed, there is still room for improvement in precision, recall, and generalization ability. In this paper, we propose an anomaly detection model called Meta-MWDG to address these issues. The model is based on a multi-scale discrete wavelet decomposition and a dual graph attention network, which can effectively extract feature correlation and temporal dependency in multivariate time series data. Additionally, model-agnostic meta-learning (MAML) is introduced to improve the model’s generalization performance, enabling it to perform well on new tasks even with a few samples. A gated recurrent unit (GRU) is combined with a multi-head self-attention network to output both prediction and reconstruction results in a joint optimization strategy, improving the precision of anomaly detection. Extensive experimental studies demonstrate that Meta-MWDG outperforms the state-of-the-art methods in anomaly detection.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new adversarial malware detection method based on enhanced lightweight neural network 基于增强型轻量级神经网络的新型对抗式恶意软件检测方法
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.cose.2024.104078

With the gradual expansion of Android systems from mobile phones to intelligent devices, a huge amount of malware has been found every year. To improve the malware detection performance and reduce its reliance on expert experience, deep learning technology has been widely used. However, as the complexity of deep learning models continues to increase, it rapidly increases the consumption of hardware resources. At the same time, anti-detection technology such as Generative Adversarial Networks (GANs) are widely used to evade Artificial Intelligence (AI)-based detection methods. In this paper, we propose a new classification model based on an improved lightweight neural network that can effectively improve the execution efficiency and detection performance of malware detection methods against adversarial malware samples. First, our method uses local-information-entropy-based image generation technology to construct effective image feature vectors. Then, the performance of the lightweight neural network model ESPNetV2 is improved from four aspects. Finally, a new adversarial malware generation model called Mal-WGANGP is proposed. It can automatically generate a large number of adversarial samples to robust our model. In order to evaluate our method, we construct several experiments and compare the detection performance of our method with 19 other novel efficient neural network detection models. Experimental results show that our image enhancement method and detection model have the highest detection accuracy of adversarial samples.

随着安卓系统逐渐从手机扩展到智能设备,每年都会发现大量的恶意软件。为了提高恶意软件的检测性能,减少对专家经验的依赖,深度学习技术得到了广泛应用。然而,随着深度学习模型复杂度的不断提高,对硬件资源的消耗也迅速增加。与此同时,生成对抗网络(GANs)等反检测技术被广泛用于规避基于人工智能(AI)的检测方法。在本文中,我们提出了一种基于改进型轻量级神经网络的新分类模型,它能有效提高恶意软件检测方法的执行效率和检测性能,从而对抗恶意软件样本。首先,我们的方法使用基于局部信息熵的图像生成技术来构建有效的图像特征向量。然后,从四个方面改进了轻量级神经网络模型 ESPNetV2 的性能。最后,我们提出了一种名为 Mal-WGANGP 的新型对抗恶意软件生成模型。它可以自动生成大量的对抗样本,以增强我们模型的鲁棒性。为了评估我们的方法,我们构建了多个实验,并将我们的方法与其他 19 种新型高效神经网络检测模型的检测性能进行了比较。实验结果表明,我们的图像增强方法和检测模型对对抗样本的检测精度最高。
{"title":"A new adversarial malware detection method based on enhanced lightweight neural network","authors":"","doi":"10.1016/j.cose.2024.104078","DOIUrl":"10.1016/j.cose.2024.104078","url":null,"abstract":"<div><p>With the gradual expansion of Android systems from mobile phones to intelligent devices, a huge amount of malware has been found every year. To improve the malware detection performance and reduce its reliance on expert experience, deep learning technology has been widely used. However, as the complexity of deep learning models continues to increase, it rapidly increases the consumption of hardware resources. At the same time, anti-detection technology such as Generative Adversarial Networks (GANs) are widely used to evade Artificial Intelligence (AI)-based detection methods. In this paper, we propose a new classification model based on an improved lightweight neural network that can effectively improve the execution efficiency and detection performance of malware detection methods against adversarial malware samples. First, our method uses local-information-entropy-based image generation technology to construct effective image feature vectors. Then, the performance of the lightweight neural network model ESPNetV2 is improved from four aspects. Finally, a new adversarial malware generation model called Mal-WGANGP is proposed. It can automatically generate a large number of adversarial samples to robust our model. In order to evaluate our method, we construct several experiments and compare the detection performance of our method with 19 other novel efficient neural network detection models. Experimental results show that our image enhancement method and detection model have the highest detection accuracy of adversarial samples.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DGIDS: Dynamic graph-based intrusion detection system for CAN DGIDS:基于动态图的 CAN 入侵检测系统
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.cose.2024.104076

The Controller Area Network (CAN) is widely used in automobiles to interconnect safety-critical electronic control units (ECUs). Unfortunately, CAN does not have inherent security mechanisms as originally designed, which has drawn significant attention from the research community. Currently, the mainstream CAN protection strategy is the Intrusion Detection System (IDS). However, many statistics-based IDSs are unable to identify the identifier (ID) of the attacked message; they can only identify anomalies within a specific time window. Moreover, these systems are often tested solely on public datasets, lacking theoretical validation of their effectiveness. To address these shortcomings, we propose a real-time intrusion detection system based on a dynamic graph. The graph is dynamically constructed based on the arrival of messages, and features are extracted concurrently. By utilizing the distribution of features extracted during the offline phase, our system achieves real-time detection of incoming messages and identifies the ID of the attacked message. Additionally, we introduce a method to theoretically validate the detection system through permutation and probabilistic statistical analysis. Experiments and theoretical analysis demonstrate that our proposed IDS can effectively detect a wide range of attacks with reduced detection time and memory usage.

控制器区域网络(CAN)被广泛应用于汽车中,以实现对安全至关重要的电子控制单元(ECU)之间的互联。遗憾的是,CAN 并不具备最初设计的固有安全机制,这引起了研究界的极大关注。目前,主流的 CAN 保护策略是入侵检测系统 (IDS)。然而,许多基于统计的 IDS 无法识别受攻击报文的标识符(ID),只能识别特定时间窗口内的异常情况。此外,这些系统通常只在公共数据集上进行测试,缺乏对其有效性的理论验证。针对这些不足,我们提出了一种基于动态图的实时入侵检测系统。该图根据信息的到达动态构建,并同时提取特征。通过利用离线阶段提取的特征分布,我们的系统实现了对传入信息的实时检测,并识别出受攻击信息的 ID。此外,我们还介绍了一种通过置换和概率统计分析对检测系统进行理论验证的方法。实验和理论分析表明,我们提出的 IDS 可以有效地检测各种攻击,同时减少检测时间和内存占用。
{"title":"DGIDS: Dynamic graph-based intrusion detection system for CAN","authors":"","doi":"10.1016/j.cose.2024.104076","DOIUrl":"10.1016/j.cose.2024.104076","url":null,"abstract":"<div><p>The Controller Area Network (CAN) is widely used in automobiles to interconnect safety-critical electronic control units (ECUs). Unfortunately, CAN does not have inherent security mechanisms as originally designed, which has drawn significant attention from the research community. Currently, the mainstream CAN protection strategy is the Intrusion Detection System (IDS). However, many statistics-based IDSs are unable to identify the identifier (ID) of the attacked message; they can only identify anomalies within a specific time window. Moreover, these systems are often tested solely on public datasets, lacking theoretical validation of their effectiveness. To address these shortcomings, we propose a real-time intrusion detection system based on a dynamic graph. The graph is dynamically constructed based on the arrival of messages, and features are extracted concurrently. By utilizing the distribution of features extracted during the offline phase, our system achieves real-time detection of incoming messages and identifies the ID of the attacked message. Additionally, we introduce a method to theoretically validate the detection system through permutation and probabilistic statistical analysis. Experiments and theoretical analysis demonstrate that our proposed IDS can effectively detect a wide range of attacks with reduced detection time and memory usage.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the factors influencing information security policy compliance and violations: A systematic literature review 探索影响信息安全政策合规和违规的因素:系统文献综述
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-24 DOI: 10.1016/j.cose.2024.104062

Despite advancements in security technology, the prevalence of insider threats has been on the rise in recent years. Organizations implement Information Security Policies (ISPs) that outline the expected security-related behavior and compliance standards for employees. Ensuring and enhancing ISP compliance and reducing violations is crucial for organizations to maintain their security posture. This Systematic Literature Review (SLR) aims to synthesize the existing research on ISP compliance and violations to identify the underlying factors behind employee policy violations and delve into the factors that promote compliance with ISPs. In order to provide a theoretical foundation for understanding these behaviors, this SLR identifies the prominent theories used to explain ISP compliance and violation. A comprehensive search is conducted across different academic databases, applying defined inclusion and exclusion criteria to select the relevant studies between 2012 and 2023. To understand intentional violations, we categorize and analyze studies on ISP violations based on Moral Disengagement, Neutralization and Deterrence, Stress, and Monitoring mechanisms. For ISP compliance, we categorize and analyze studies based on individual-level decision-making and organizational-level factors. We identified forty-seven factors that influence compliance behavior and forty-one factors that determine non-compliance behavior. Fourteen common factors were identified from prior literature, which were determinants of both compliance and violation behaviors, with opposite directions of influence. By considering both compliance and noncompliance simultaneously, organizations can develop more effective strategies for enhancing compliance and mitigating noncompliance.

尽管安全技术在不断进步,但近年来内部威胁的发生率一直在上升。组织实施的信息安全政策(ISP)概述了员工与安全相关的预期行为和合规标准。确保和加强 ISP 合规性,减少违规行为,对企业保持安全态势至关重要。本系统性文献综述(SLR)旨在综合现有关于 ISP 合规性和违规行为的研究,找出员工违反政策背后的潜在因素,并深入研究促进员工遵守 ISP 的因素。为了提供理解这些行为的理论基础,本系统综述确定了用于解释遵守和违反 ISP 行为的著名理论。我们在不同的学术数据库中进行了全面搜索,并采用明确的纳入和排除标准,筛选出 2012 年至 2023 年期间的相关研究。为了解故意违反行为,我们根据道德脱离、中和与威慑、压力和监控机制对违反互联网服务提供商规定的研究进行了分类和分析。对于遵守 ISP 的情况,我们根据个人层面的决策和组织层面的因素对研究进行分类和分析。我们确定了 47 个影响遵守行为的因素和 41 个决定不遵守行为的因素。我们从先前的文献中发现了 14 个共同因素,它们既是合规行为的决定因素,也是违规行为的决定因素,但影响方向相反。通过同时考虑合规和违规行为,组织可以制定更有效的战略来加强合规性和减少违规行为。
{"title":"Exploring the factors influencing information security policy compliance and violations: A systematic literature review","authors":"","doi":"10.1016/j.cose.2024.104062","DOIUrl":"10.1016/j.cose.2024.104062","url":null,"abstract":"<div><p>Despite advancements in security technology, the prevalence of insider threats has been on the rise in recent years. Organizations implement Information Security Policies (ISPs) that outline the expected security-related behavior and compliance standards for employees. Ensuring and enhancing ISP compliance and reducing violations is crucial for organizations to maintain their security posture. This Systematic Literature Review (SLR) aims to synthesize the existing research on ISP compliance and violations to identify the underlying factors behind employee policy violations and delve into the factors that promote compliance with ISPs. In order to provide a theoretical foundation for understanding these behaviors, this SLR identifies the prominent theories used to explain ISP compliance and violation. A comprehensive search is conducted across different academic databases, applying defined inclusion and exclusion criteria to select the relevant studies between 2012 and 2023. To understand intentional violations, we categorize and analyze studies on ISP violations based on Moral Disengagement, Neutralization and Deterrence, Stress, and Monitoring mechanisms. For ISP compliance, we categorize and analyze studies based on individual-level decision-making and organizational-level factors. We identified forty-seven factors that influence compliance behavior and forty-one factors that determine non-compliance behavior. Fourteen common factors were identified from prior literature, which were determinants of both compliance and violation behaviors, with opposite directions of influence. By considering both compliance and noncompliance simultaneously, organizations can develop more effective strategies for enhancing compliance and mitigating noncompliance.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive intrusion detection method for the internet of vehicles based on federated learning architecture 基于联合学习架构的车联网综合入侵检测方法
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.cose.2024.104067

Cybersecurity breaches within the Internet of Vehicles (IoV) have been increasingly reported annually with the proliferation of intelligent connected vehicles. Two primary obstacles are faced by current intrusion detection systems: substantial computational demands and stringent data privacy regulations, complicating both efficient deployment and the safeguarding of data privacy. Consequently, there is a pressing need for intrusion detection solutions that are both efficient and considerate of privacy concerns. This paper introduces FED-IoV, an innovative intrusion detection method tailored for the IoV, leveraging a federated learning architecture. FED-IoV aims to collaboratively perform detection tasks across distributed edge devices, thereby minimizing data privacy risks. Vehicular communication traffic data is transformed into images, and a bespoke, efficient model, MobileNet-Tiny, is employed for feature extraction, rendering FED-IoV capable of achieving high detection accuracy whilst being viable for deployment on devices with limited resources. Through evaluation against the authoritative datasets CAN-Intrusion and CICIDS2017, exceptional accuracy rates of 98.51 % and 97.74 %, respectively, were demonstrated by FED-IoV within a federated learning context, and excellent detection capabilities on imbalanced datasets were also shown. Moreover, a prediction latency of under 10 milliseconds per sample was maintained on devices with limited computational power, such as the Raspberry Pi 4 8GB, showcasing significantly better accuracy and real-time performance relative to existing approaches. The successful deployment of FED-IoV ushers in a novel, privacy-preserving, and efficient intrusion detection solution for IoV security.

随着智能互联汽车的普及,车联网(IoV)中网络安全漏洞的报告每年都在增加。当前的入侵检测系统面临着两个主要障碍:大量的计算需求和严格的数据隐私法规,这使得高效部署和数据隐私保护变得更加复杂。因此,我们迫切需要既高效又考虑隐私问题的入侵检测解决方案。本文介绍了 FED-IoV,这是一种利用联合学习架构为物联网量身定制的创新入侵检测方法。FED-IoV 旨在跨分布式边缘设备协同执行检测任务,从而最大限度地降低数据隐私风险。车载通信流量数据被转换成图像,并采用定制的高效模型 MobileNet-Tiny 进行特征提取,从而使 FED-IoV 能够实现较高的检测精度,同时又能在资源有限的设备上进行部署。通过对权威数据集 CAN-Intrusion 和 CICIDS2017 的评估,FED-IoV 在联合学习环境下的准确率分别达到了 98.51 % 和 97.74 %,在不平衡数据集上也表现出了卓越的检测能力。此外,在计算能力有限的设备(如 Raspberry Pi 4 8GB)上,每个样本的预测延迟时间保持在 10 毫秒以下,与现有方法相比,精度和实时性显著提高。FED-IoV 的成功部署为物联网安全带来了一种新颖、保护隐私且高效的入侵检测解决方案。
{"title":"A comprehensive intrusion detection method for the internet of vehicles based on federated learning architecture","authors":"","doi":"10.1016/j.cose.2024.104067","DOIUrl":"10.1016/j.cose.2024.104067","url":null,"abstract":"<div><p>Cybersecurity breaches within the Internet of Vehicles (IoV) have been increasingly reported annually with the proliferation of intelligent connected vehicles. Two primary obstacles are faced by current intrusion detection systems: substantial computational demands and stringent data privacy regulations, complicating both efficient deployment and the safeguarding of data privacy. Consequently, there is a pressing need for intrusion detection solutions that are both efficient and considerate of privacy concerns. This paper introduces FED-IoV, an innovative intrusion detection method tailored for the IoV, leveraging a federated learning architecture. FED-IoV aims to collaboratively perform detection tasks across distributed edge devices, thereby minimizing data privacy risks. Vehicular communication traffic data is transformed into images, and a bespoke, efficient model, MobileNet-Tiny, is employed for feature extraction, rendering FED-IoV capable of achieving high detection accuracy whilst being viable for deployment on devices with limited resources. Through evaluation against the authoritative datasets CAN-Intrusion and CICIDS2017, exceptional accuracy rates of 98.51 % and 97.74 %, respectively, were demonstrated by FED-IoV within a federated learning context, and excellent detection capabilities on imbalanced datasets were also shown. Moreover, a prediction latency of under 10 milliseconds per sample was maintained on devices with limited computational power, such as the Raspberry Pi 4 8GB, showcasing significantly better accuracy and real-time performance relative to existing approaches. The successful deployment of FED-IoV ushers in a novel, privacy-preserving, and efficient intrusion detection solution for IoV security.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting the play: An integrative review of cybersecurity in and for sports events 保护比赛:体育赛事网络安全综合评述
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.cose.2024.104064

Although sport has become an important topic in management research, academics have not fully examined the area of cybersecurity and its strategic relevance in sports management, in particular in and for sports events. In the present study, we examined the relationship between sports and cybersecurity and conducted an integrative literature review that categorizes the research that has been published to date, based on technology-organisation-environment (TOE) framework. The findings show that the role of cybersecurity in and for sports events is a heavily under-researched area that provides an abundance of scientific opportunities. It is also one that deserves further attention, because cyber-attacks on sports events and associated organisations are increasing. Our integrative literature review offers a more structured understanding of this field of investigation and led to the development of a comprehensive research agenda at the intersection between sports management and information security. As one of the first studies to use a literature review that specifically focuses on cybersecurity in and for sports events, we advance the state-of-the-art scholarship in this critical space, and we take the first step to disseminate best practices in cybersecurity and sports management.

尽管体育已成为管理研究中的一个重要课题,但学术界尚未充分研究网络安全领域及其在体育管理中的战略意义,特别是在体育赛事中和体育赛事方面。在本研究中,我们研究了体育与网络安全之间的关系,并根据技术-组织-环境(TOE)框架对迄今已发表的研究进行了综合文献综述。研究结果表明,网络安全在体育赛事中的作用以及对体育赛事的作用是一个研究严重不足的领域,但却提供了大量的科研机会。这也是一个值得进一步关注的领域,因为针对体育赛事和相关组织的网络攻击日益增多。我们的综合文献综述为这一研究领域提供了更有条理的理解,并在体育管理与信息安全的交叉领域制定了全面的研究议程。作为首批使用专门针对体育赛事网络安全的文献综述的研究之一,我们推进了这一关键领域的最新学术研究,并为传播网络安全和体育管理方面的最佳实践迈出了第一步。
{"title":"Protecting the play: An integrative review of cybersecurity in and for sports events","authors":"","doi":"10.1016/j.cose.2024.104064","DOIUrl":"10.1016/j.cose.2024.104064","url":null,"abstract":"<div><p>Although sport has become an important topic in management research, academics have not fully examined the area of cybersecurity and its strategic relevance in sports management, in particular in and for sports events. In the present study, we examined the relationship between sports and cybersecurity and conducted an integrative literature review that categorizes the research that has been published to date, based on technology-organisation-environment (TOE) framework. The findings show that the role of cybersecurity in and for sports events is a heavily under-researched area that provides an abundance of scientific opportunities. It is also one that deserves further attention, because cyber-attacks on sports events and associated organisations are increasing. Our integrative literature review offers a more structured understanding of this field of investigation and led to the development of a comprehensive research agenda at the intersection between sports management and information security. As one of the first studies to use a literature review that specifically focuses on cybersecurity in and for sports events, we advance the state-of-the-art scholarship in this critical space, and we take the first step to disseminate best practices in cybersecurity and sports management.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824003699/pdfft?md5=eab90756a72f0127c1806bd68897f585&pid=1-s2.0-S0167404824003699-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A compliance assessment system for Incident Management process 事件管理流程合规性评估系统
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.cose.2024.104070

The Incident Management (IM) process is one of the core activities for increasing the overall security level of organizations and better responding to cyber attacks. Different security frameworks (such as ITIL and ISO 27035) provide guidelines for designing and properly implementing an effective IM process. Currently, assessing the compliance of the actual process implemented by an organization with such frameworks is a complex task. The assessment is mainly manually performed and requires much effort in the analysis and evaluation. In this paper, we first propose a taxonomy of compliance deviations to classify and prioritize the impacts of non-compliant causes. We combine trace alignment techniques with a new proposed cost model for the analysis of process deviations rather than process traces to prioritize interventions. We put these contributions into use in a system that automatically assesses the IM process compliance with a reference process model (e.g., the one described in the chosen security framework). It supports the auditor with increased awareness of process issues to make more focused decisions and improve the process’s effectiveness. We propose a benchmark validation for the model, and we show the system’s capability through a usage scenario based on a publicly available dataset of a real IM log. The source code of all components, including the code used for benchmarking, is publicly available as open source on GitHub.

事件管理(IM)流程是提高组织整体安全水平和更好地应对网络攻击的核心活动之一。不同的安全框架(如 ITIL 和 ISO 27035)为设计和正确实施有效的 IM 流程提供了指导。目前,评估组织实施的实际流程是否符合这些框架是一项复杂的任务。评估工作主要由人工完成,需要花费大量精力进行分析和评估。在本文中,我们首先提出了合规偏差分类法,以对不合规原因的影响进行分类和优先排序。我们将跟踪对齐技术与新提出的成本模型相结合,用于分析流程偏差而非流程跟踪,以确定干预措施的优先次序。我们将这些贡献应用到一个系统中,该系统可根据参考流程模型(如所选安全框架中描述的模型)自动评估 IM 流程的合规性。该系统可帮助审计人员提高对流程问题的认识,从而做出更有针对性的决策并提高流程的有效性。我们为该模型提出了一个基准验证,并通过一个基于真实 IM 日志的公开可用数据集的使用场景展示了该系统的能力。所有组件的源代码,包括用于基准测试的代码,都在 GitHub 上以开放源代码的形式公开。
{"title":"A compliance assessment system for Incident Management process","authors":"","doi":"10.1016/j.cose.2024.104070","DOIUrl":"10.1016/j.cose.2024.104070","url":null,"abstract":"<div><p>The Incident Management (IM) process is one of the core activities for increasing the overall security level of organizations and better responding to cyber attacks. Different security frameworks (such as ITIL and ISO 27035) provide guidelines for designing and properly implementing an effective IM process. Currently, assessing the compliance of the actual process implemented by an organization with such frameworks is a complex task. The assessment is mainly manually performed and requires much effort in the analysis and evaluation. In this paper, we first propose a taxonomy of compliance deviations to classify and prioritize the impacts of non-compliant causes. We combine trace alignment techniques with a new proposed cost model for the analysis of process deviations rather than process traces to prioritize interventions. We put these contributions into use in a system that automatically assesses the IM process compliance with a reference process model (e.g., the one described in the chosen security framework). It supports the auditor with increased awareness of process issues to make more focused decisions and improve the process’s effectiveness. We propose a benchmark validation for the model, and we show the system’s capability through a usage scenario based on a publicly available dataset of a real IM log. The source code of all components, including the code used for benchmarking, is publicly available as open source on GitHub.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0167404824003754/pdfft?md5=b3b5304f2a718e77435c1532cd78e1b9&pid=1-s2.0-S0167404824003754-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142048445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GUIDE: GAN-based UAV IDS Enhancement 指南:基于 GAN 的无人机 IDS 增强功能
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.cose.2024.104073

With the development of information technology, many devices are connected and automated by networks. Unmanned Areal Vehicles (UAVs), commonly known as drones, are one of the most popular devices that can perform various tasks. However, the risk of cyberattacks on UAVs is increasing as UAV utilization grows. These cyberattacks can cause serious safety problems, such as crashes. Therefore, it is essential to detect these attacks and take countermeasures. As a countermeasure, intrusion detection system (IDS) is widely adopted. To implement IDS for UAVs, it should be lightweight and be able to detect unknown attacks as a requirement. We propose GAN-based UAV IDS Enhancement (GUIDE) to meet the requirements. The GUIDE employs a generative adversarial network (GAN) for integer-valued sequence data augmentation to enhance an IDS’s performance on known and unknown attacks. We used five GANs: SeqGAN, MaskGAN, RankGAN, StepGAN, and LeakGAN; we used four non-learning augmentation methods for the comparative experiment: oversampling, undersampling, noise addition, and random generation. The experimental results demonstrated that the synthetic data generated by GANs improved the detection of known attacks (up to 37 percentage points) and unknown attacks (up to 30 percentage points) while maintaining stable IDS performance. We also analyzed the synthetic data by employing Jensen–Shannon divergence, synthetic ranking agreement, and visualization; we confirmed that the synthetic data contained the characteristics of real data and could be used for training the IDS.

随着信息技术的发展,许多设备都通过网络实现了连接和自动化。无人飞行器(UAV),俗称无人机,是最受欢迎的设备之一,可以执行各种任务。然而,随着无人飞行器使用率的提高,无人飞行器遭受网络攻击的风险也在增加。这些网络攻击可能导致严重的安全问题,如坠机。因此,检测这些攻击并采取应对措施至关重要。作为一种对策,入侵检测系统(IDS)被广泛采用。要为无人机实施 IDS,要求它必须是轻量级的,并且能够检测到未知攻击。为了满足这些要求,我们提出了基于 GAN 的无人机 IDS 增强系统(GUIDE)。GUIDE 采用生成式对抗网络(GAN)进行整数值序列数据增强,以提高 IDS 对已知和未知攻击的性能。我们使用了五个生成式对抗网络:我们使用了五种 GAN:SeqGAN、MaskGAN、RankGAN、StepGAN 和 LeakGAN;我们在比较实验中使用了四种非学习增强方法:过采样、欠采样、噪声添加和随机生成。实验结果表明,GAN 生成的合成数据提高了已知攻击的检测率(高达 37 个百分点)和未知攻击的检测率(高达 30 个百分点),同时保持了稳定的 IDS 性能。我们还通过詹森-香农发散、合成排序一致和可视化等方法对合成数据进行了分析,证实合成数据包含真实数据的特征,可用于训练 IDS。
{"title":"GUIDE: GAN-based UAV IDS Enhancement","authors":"","doi":"10.1016/j.cose.2024.104073","DOIUrl":"10.1016/j.cose.2024.104073","url":null,"abstract":"<div><p>With the development of information technology, many devices are connected and automated by networks. Unmanned Areal Vehicles (UAVs), commonly known as drones, are one of the most popular devices that can perform various tasks. However, the risk of cyberattacks on UAVs is increasing as UAV utilization grows. These cyberattacks can cause serious safety problems, such as crashes. Therefore, it is essential to detect these attacks and take countermeasures. As a countermeasure, intrusion detection system (IDS) is widely adopted. To implement IDS for UAVs, it should be lightweight and be able to detect unknown attacks as a requirement. We propose GAN-based UAV IDS Enhancement (GUIDE) to meet the requirements. The GUIDE employs a generative adversarial network (GAN) for integer-valued sequence data augmentation to enhance an IDS’s performance on known and unknown attacks. We used five GANs: SeqGAN, MaskGAN, RankGAN, StepGAN, and LeakGAN; we used four non-learning augmentation methods for the comparative experiment: oversampling, undersampling, noise addition, and random generation. The experimental results demonstrated that the synthetic data generated by GANs improved the detection of known attacks (up to 37 percentage points) and unknown attacks (up to 30 percentage points) while maintaining stable IDS performance. We also analyzed the synthetic data by employing Jensen–Shannon divergence, synthetic ranking agreement, and visualization; we confirmed that the synthetic data contained the characteristics of real data and could be used for training the IDS.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data privacy and cybersecurity challenges in the digital transformation of the banking sector 银行业数字化转型中的数据隐私和网络安全挑战
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.cose.2024.104051

In the digital transformation of the banking sector, incorporating advanced technologies such as cloud computing, big data analytics, artificial intelligence, and blockchain has revolutionized financial services. However, this rapid digitalization brings significant data privacy and cybersecurity challenges. This study investigates the challenges banks have maintaining data privacy and cybersecurity while implementing new technologies, how they perceive these challenges, and what steps they take to reduce the risks involved. This qualitative study uses thematic analysis to examine interviews conducted with IT specialists in the banking sector. NVivo 14 software is employed to identify key themes and patterns related to the challenges, perceptions, and strategies regarding data privacy and cybersecurity in technology adoption. The findings reveal that the primary challenges faced by banks include integrating legacy systems, evolving compliance management, managing vendor risks, maintaining customer confidence, and mitigating emerging risks. Banks perceive robust data privacy and cybersecurity as critical for competitive advantage, regulatory compliance, and customer trust. Strategies include robust access controls, continuous threat monitoring, employee training, regulatory compliance with governance frameworks, and data encryption. This study provides original insights into the specific challenges and strategies related to data privacy and cybersecurity faced by banks. It contributes to the existing literature by highlighting the unique context of the banking sector and employing qualitative analysis to uncover nuanced perceptions and practices of IT specialists.

在银行业的数字化转型过程中,云计算、大数据分析、人工智能和区块链等先进技术的应用为金融服务带来了革命性的变化。然而,这种快速数字化带来了数据隐私和网络安全方面的巨大挑战。本研究调查了银行在实施新技术的同时,在维护数据隐私和网络安全方面所面临的挑战,银行如何看待这些挑战,以及银行采取了哪些措施来降低相关风险。本定性研究采用主题分析法对银行业的 IT 专家进行访谈。研究采用了 NVivo 14 软件,以确定与采用技术过程中数据隐私和网络安全方面的挑战、看法和策略有关的关键主题和模式。研究结果表明,银行面临的主要挑战包括整合遗留系统、不断发展的合规管理、管理供应商风险、维护客户信心以及降低新出现的风险。银行认为,强大的数据隐私和网络安全对于竞争优势、合规性和客户信任至关重要。采取的策略包括强大的访问控制、持续的威胁监控、员工培训、监管框架的合规性以及数据加密。本研究对银行面临的与数据隐私和网络安全有关的具体挑战和策略提出了独到见解。它强调了银行业的独特背景,并采用定性分析揭示了 IT 专家的细微看法和做法,为现有文献做出了贡献。
{"title":"Data privacy and cybersecurity challenges in the digital transformation of the banking sector","authors":"","doi":"10.1016/j.cose.2024.104051","DOIUrl":"10.1016/j.cose.2024.104051","url":null,"abstract":"<div><p>In the digital transformation of the banking sector, incorporating advanced technologies such as cloud computing, big data analytics, artificial intelligence, and blockchain has revolutionized financial services. However, this rapid digitalization brings significant data privacy and cybersecurity challenges. This study investigates the challenges banks have maintaining data privacy and cybersecurity while implementing new technologies, how they perceive these challenges, and what steps they take to reduce the risks involved. This qualitative study uses thematic analysis to examine interviews conducted with IT specialists in the banking sector. NVivo 14 software is employed to identify key themes and patterns related to the challenges, perceptions, and strategies regarding data privacy and cybersecurity in technology adoption. The findings reveal that the primary challenges faced by banks include integrating legacy systems, evolving compliance management, managing vendor risks, maintaining customer confidence, and mitigating emerging risks. Banks perceive robust data privacy and cybersecurity as critical for competitive advantage, regulatory compliance, and customer trust. Strategies include robust access controls, continuous threat monitoring, employee training, regulatory compliance with governance frameworks, and data encryption. This study provides original insights into the specific challenges and strategies related to data privacy and cybersecurity faced by banks. It contributes to the existing literature by highlighting the unique context of the banking sector and employing qualitative analysis to uncover nuanced perceptions and practices of IT specialists.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature selection for IoT botnet detection using equilibrium and Battle Royale Optimization 利用均衡和大逃杀优化为物联网僵尸网络检测选择特征
IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1016/j.cose.2024.104060

The Internet of Things (IoT) is rapidly expanding, bringing unprecedented opportunities and significant security risks. Among the most appealing attacks on IoT are botnets, typically utilized for Distributed Denial of Service (DDoS) attacks, identity theft, malware distribution, fraud, and spamming. Early detection and mitigation are crucial considering the nature of IoT devices and botnets. Many of these methods deploy machine learning, such as supervised, unsupervised, and deep learning. As IoT devices generate a massive amount of data of high dimensions, not all data contain valuable information. Feeding data without preprocessing might degrade the quality of the detection model. Thus, optimization methods are needed to determine the subsets of the most relevant features to the detection process. This study utilized the effectiveness of Equilibrium Optimization (EO), Battle Royale Optimization (BRO), and Adaptive Equilibrium Optimization (AEO) for feature selection in detecting IoT botnets using the N-BaIoT dataset. The performance of the selected features is evaluated using three classifiers: K Nearest Neighbor (KNN), Random Forest (RF), and Gaussian Naive Bayes (GNB) considering metrics such as number of features, accuracy, sensitivity, specificity, True Positive Rate (TPR), False Positive Rate (FPR), and time required for feature selection. Our findings indicate the competitive performance of EO and AEO in terms of runtime, number of features selected, and accuracy, compared to recent works on the same dataset.

物联网(IoT)正在迅速扩展,带来了前所未有的机遇和巨大的安全风险。僵尸网络是对物联网最有吸引力的攻击之一,通常用于分布式拒绝服务 (DDoS) 攻击、身份盗用、恶意软件分发、欺诈和垃圾邮件发送。考虑到物联网设备和僵尸网络的性质,早期检测和缓解至关重要。其中许多方法都采用了机器学习,如监督学习、无监督学习和深度学习。由于物联网设备会产生大量高维数据,并非所有数据都包含有价值的信息。未经预处理的数据可能会降低检测模型的质量。因此,需要采用优化方法来确定与检测过程最相关的特征子集。本研究利用均衡优化(EO)、大逃杀优化(BRO)和自适应均衡优化(AEO)的有效性,使用 N-BaIoT 数据集检测物联网僵尸网络的特征选择。使用三种分类器对所选特征的性能进行了评估:考虑到特征数量、准确性、灵敏度、特异性、真阳性率(TPR)、假阳性率(FPR)和特征选择所需的时间等指标,对 K Nearest Neighbor (KNN)、Random Forest (RF) 和 Gaussian Naive Bayes (GNB) 三种分类器的性能进行了评估。我们的研究结果表明,在运行时间、所选特征数量和准确率方面,EO 和 AEO 的性能与最近在相同数据集上的研究结果相比具有竞争力。
{"title":"Feature selection for IoT botnet detection using equilibrium and Battle Royale Optimization","authors":"","doi":"10.1016/j.cose.2024.104060","DOIUrl":"10.1016/j.cose.2024.104060","url":null,"abstract":"<div><p>The Internet of Things (IoT) is rapidly expanding, bringing unprecedented opportunities and significant security risks. Among the most appealing attacks on IoT are botnets, typically utilized for Distributed Denial of Service (DDoS) attacks, identity theft, malware distribution, fraud, and spamming. Early detection and mitigation are crucial considering the nature of IoT devices and botnets. Many of these methods deploy machine learning, such as supervised, unsupervised, and deep learning. As IoT devices generate a massive amount of data of high dimensions, not all data contain valuable information. Feeding data without preprocessing might degrade the quality of the detection model. Thus, optimization methods are needed to determine the subsets of the most relevant features to the detection process. This study utilized the effectiveness of Equilibrium Optimization (EO), Battle Royale Optimization (BRO), and Adaptive Equilibrium Optimization (AEO) for feature selection in detecting IoT botnets using the N-BaIoT dataset. The performance of the selected features is evaluated using three classifiers: K Nearest Neighbor (KNN), Random Forest (RF), and Gaussian Naive Bayes (GNB) considering metrics such as number of features, accuracy, sensitivity, specificity, True Positive Rate (TPR), False Positive Rate (FPR), and time required for feature selection. Our findings indicate the competitive performance of EO and AEO in terms of runtime, number of features selected, and accuracy, compared to recent works on the same dataset.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1