首页 > 最新文献

Computers & Security最新文献

英文 中文
Reassessing information security perceptions following a data breach announcement: The role of post-breach management in firm-specific risk 数据泄露公告后信息安全观念的重新评估:泄露后管理在公司特定风险中的作用
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-05 DOI: 10.1016/j.cose.2025.104752
Faheem Ahmed Shaikh , Damien Joseph , Eugene Kang
Public announcements of data breaches often lead to short-lived negative stock price reactions, raising questions about firms’ incentives for sustained cybersecurity improvements. This study applies legitimacy theory to examine how investor perceptions of a firm’s security practices—termed information security legitimacy—shape firm-specific risk after such announcements. Analyzing media sentiment following 485 U.S. data breach announcements, we find that firms with stronger information security legitimacy experience significantly lower firm-specific risk over six months. Additionally, shorter delays in public breach announcements strengthen this risk reduction. By linking data breach announcements with post-breach management, this study offers a unified framework showing how proactive security actions and timely communication mitigate long-term financial risk. These findings provide actionable guidance for security managers to prioritize rapid disclosure and strategic legitimacy management, advancing theory on stakeholder perceptions in cybersecurity.
数据泄露的公开公告通常会导致短期的负面股价反应,引发人们对公司持续改进网络安全的动机的质疑。本研究运用合法性理论来检验投资者对公司安全实践(称为信息安全合法性)的看法如何在此类公告后塑造公司特定风险。我们分析了485个美国数据泄露公告后的媒体情绪,发现信息安全合法性较强的公司在六个月内的公司特定风险显著降低。此外,更短的公开违规公告延迟加强了这种风险降低。通过将数据泄露公告与泄露后管理联系起来,本研究提供了一个统一的框架,展示了主动安全行动和及时沟通如何降低长期财务风险。这些发现为安全管理人员优先考虑快速披露和战略合法性管理提供了可操作的指导,推进了利益相关者在网络安全方面的认知理论。
{"title":"Reassessing information security perceptions following a data breach announcement: The role of post-breach management in firm-specific risk","authors":"Faheem Ahmed Shaikh ,&nbsp;Damien Joseph ,&nbsp;Eugene Kang","doi":"10.1016/j.cose.2025.104752","DOIUrl":"10.1016/j.cose.2025.104752","url":null,"abstract":"<div><div>Public announcements of data breaches often lead to short-lived negative stock price reactions, raising questions about firms’ incentives for sustained cybersecurity improvements. This study applies legitimacy theory to examine how investor perceptions of a firm’s security practices—termed information security legitimacy—shape firm-specific risk after such announcements. Analyzing media sentiment following 485 U.S. data breach announcements, we find that firms with stronger information security legitimacy experience significantly lower firm-specific risk over six months. Additionally, shorter delays in public breach announcements strengthen this risk reduction. By linking data breach announcements with post-breach management, this study offers a unified framework showing how proactive security actions and timely communication mitigate long-term financial risk. These findings provide actionable guidance for security managers to prioritize rapid disclosure and strategic legitimacy management, advancing theory on stakeholder perceptions in cybersecurity.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"161 ","pages":"Article 104752"},"PeriodicalIF":5.4,"publicationDate":"2025-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145500194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure multi-cloud collaboration using data leakage free attribute-based access control policies 使用无数据泄漏的基于属性的访问控制策略来保护多云协作
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-04 DOI: 10.1016/j.cose.2025.104736
John C. John , Arobinda Gupta , Shamik Sural
With an increase in the diversity and complexity of requirements from organizations for cloud computing, there is a growing need for integrating the services of multiple cloud providers. In such multi-cloud systems, data leakage is considered to be a major security concern, which is caused by illegitimate actions of malicious users often acting in collusion. The possibility of data leakage in such environments is characterized by the number of interoperations as well as the trustworthiness of users on the collaborating clouds. In this paper, we address the problem of secure multi-cloud collaboration from an Attribute-based Access Control (ABAC) policy management perspective. In particular, we define a problem that aims to formulate ABAC policy rules for establishing a high degree of inter-cloud accesses while eliminating potential paths for data leakage. A data leakage free ABAC policy generation algorithm is proposed that first determines the likelihood of data leakage and then attempts to maximize inter-cloud collaborations. We also pose several variants of the problem by imposing additional meaningful constraints on the nature of accesses. Experimental results on several large data sets show the efficacy of the proposed approach.
随着组织对云计算需求的多样性和复杂性的增加,越来越需要集成多个云提供商的服务。在这种多云系统中,数据泄露被认为是一个主要的安全问题,这是由于恶意用户的非法行为经常相互勾结造成的。在这种环境中,数据泄露的可能性取决于互操作的数量以及协作云上用户的可信度。在本文中,我们从基于属性的访问控制(ABAC)策略管理的角度解决了安全多云协作的问题。特别是,我们定义了一个问题,旨在制定ABAC策略规则,以建立高度的云间访问,同时消除潜在的数据泄漏路径。提出了一种无数据泄漏的ABAC策略生成算法,该算法首先确定数据泄漏的可能性,然后尝试最大化云间协作。通过对访问的性质施加额外的有意义的约束,我们还提出了该问题的几个变体。在多个大型数据集上的实验结果表明了该方法的有效性。
{"title":"Secure multi-cloud collaboration using data leakage free attribute-based access control policies","authors":"John C. John ,&nbsp;Arobinda Gupta ,&nbsp;Shamik Sural","doi":"10.1016/j.cose.2025.104736","DOIUrl":"10.1016/j.cose.2025.104736","url":null,"abstract":"<div><div>With an increase in the diversity and complexity of requirements from organizations for cloud computing, there is a growing need for integrating the services of multiple cloud providers. In such multi-cloud systems, data leakage is considered to be a major security concern, which is caused by illegitimate actions of malicious users often acting in collusion. The possibility of data leakage in such environments is characterized by the number of interoperations as well as the trustworthiness of users on the collaborating clouds. In this paper, we address the problem of secure multi-cloud collaboration from an Attribute-based Access Control (ABAC) policy management perspective. In particular, we define a problem that aims to formulate ABAC policy rules for establishing a high degree of inter-cloud accesses while eliminating potential paths for data leakage. A data leakage free ABAC policy generation algorithm is proposed that first determines the likelihood of data leakage and then attempts to maximize inter-cloud collaborations. We also pose several variants of the problem by imposing additional meaningful constraints on the nature of accesses. Experimental results on several large data sets show the efficacy of the proposed approach.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"161 ","pages":"Article 104736"},"PeriodicalIF":5.4,"publicationDate":"2025-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145529097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FirmUpdate: Automated multi-phase static analysis for detecting firmware update vulnerabilities in IoT Linux-based firmware FirmUpdate:自动多阶段静态分析,用于检测物联网linux固件中的固件更新漏洞
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-31 DOI: 10.1016/j.cose.2025.104735
Jian Zhang, Ping Chen
With the widespread deployment of IoT devices, firmware update process becomes the main target of malicious attack, which could cause large-scale devices bricking, critical information leakage, and vulnerability propagation through supply chain. Due to the complexity of firmware update process and implementation flaws, there are multiple types of firmware update vulnerabilities in each phase of firmware update process. Current studies cannot effectively detect these vulnerabilities through an automatic approach. Therefore, we propose FirmUpdate in this paper, an automated static firmware update vulnerability detection approach, which could recover the entire firmware update process and detect vulnerabilities in each phase of the firmware update process. FirmUpdate first constructs UG (Update Graph) to abstract the firmware update process into flow chat. Then, performs unsafe verification discovery and update-related taint analysis on UG. With these two methods, FirmUpdate could automatically detect firmware update vulnerabilities, including firmware verification, buffer overflow, and command injection vulnerabilities. FirmUpdate performs vulnerability detection in a firmware set that contains 131 firmware images from 7 vendors. The TPR (True Positive Rate) of vulnerability detection is 89.3 %. FirmUpdate detected 12 0-day vulnerabilities that had been assigned CVE ID, covering firmware verification, buffer overflow, and command injection vulnerabilities. Therefore, FirmUpdate provides an automated static approach to detect firmware update vulnerabilities, which could help IoT device vendors identify and fix vulnerabilities.
随着物联网设备的广泛部署,固件更新过程成为恶意攻击的主要目标,可能导致大规模的设备阻塞、关键信息泄露和漏洞在供应链中的传播。由于固件更新过程的复杂性和实现缺陷,固件更新过程的每个阶段都存在多种类型的固件更新漏洞。目前的研究无法通过自动方法有效地检测这些漏洞。因此,我们在本文中提出了一种自动化的静态固件更新漏洞检测方法FirmUpdate,它可以恢复整个固件更新过程,并在固件更新过程的每个阶段检测漏洞。FirmUpdate首先构造UG(更新图)将固件更新过程抽象为流聊天。然后,在UG上执行不安全验证发现和更新相关的污染分析。通过这两种方法,FirmUpdate可以自动检测固件更新漏洞,包括固件验证、缓冲区溢出和命令注入漏洞。FirmUpdate在包含来自7家供应商的131个固件映像的固件集中执行漏洞检测。漏洞检测的真阳性率(TPR)为89.3%。FirmUpdate检测到12个已分配CVE ID的0天漏洞,包括固件验证,缓冲区溢出和命令注入漏洞。因此,FirmUpdate提供了一种自动的静态方法来检测固件更新漏洞,这可以帮助物联网设备供应商识别和修复漏洞。
{"title":"FirmUpdate: Automated multi-phase static analysis for detecting firmware update vulnerabilities in IoT Linux-based firmware","authors":"Jian Zhang,&nbsp;Ping Chen","doi":"10.1016/j.cose.2025.104735","DOIUrl":"10.1016/j.cose.2025.104735","url":null,"abstract":"<div><div>With the widespread deployment of IoT devices, firmware update process becomes the main target of malicious attack, which could cause large-scale devices bricking, critical information leakage, and vulnerability propagation through supply chain. Due to the complexity of firmware update process and implementation flaws, there are multiple types of firmware update vulnerabilities in each phase of firmware update process. Current studies cannot effectively detect these vulnerabilities through an automatic approach. Therefore, we propose FirmUpdate in this paper, an automated static firmware update vulnerability detection approach, which could recover the entire firmware update process and detect vulnerabilities in each phase of the firmware update process. FirmUpdate first constructs UG (Update Graph) to abstract the firmware update process into flow chat. Then, performs unsafe verification discovery and update-related taint analysis on UG. With these two methods, FirmUpdate could automatically detect firmware update vulnerabilities, including firmware verification, buffer overflow, and command injection vulnerabilities. FirmUpdate performs vulnerability detection in a firmware set that contains 131 firmware images from 7 vendors. The TPR (True Positive Rate) of vulnerability detection is 89.3 %. FirmUpdate detected 12 0-day vulnerabilities that had been assigned CVE ID, covering firmware verification, buffer overflow, and command injection vulnerabilities. Therefore, FirmUpdate provides an automated static approach to detect firmware update vulnerabilities, which could help IoT device vendors identify and fix vulnerabilities.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"160 ","pages":"Article 104735"},"PeriodicalIF":5.4,"publicationDate":"2025-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating cyber attacks on central banks – identification of trends in cyber threat landscape 评估对央行的网络攻击——识别网络威胁形势的趋势
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-30 DOI: 10.1016/j.cose.2025.104742
Paweł Smaga
This study identifies main characteristics of cyber attacks on 63 central banks, based on the analysis of 84 case studies of attacks, which occurred from 2010 to 2025. Combining data on attacks from numerous publicly available databases and using the framework of rational choice and routine activity theories, reveals a rise in frequency of attacks over time, often part of broader offensives on financial institutions. In line with political risk theory, politically motivated hacktivists, by launching DDoS, were behind half the attacks (54,8 %), while financially motivated criminals, using diverse attack vectors, were responsible for one-fifth (19 %). Despite the attacks having no systemic consequences, detailed data remains scarce, which hinders research. Results point to actionable policy implications for enhancing central banks’ cyber resilience in form of both preventative and reactive strategies.
本研究通过对2010年至2025年间84起网络攻击案例的分析,确定了针对63家央行的网络攻击的主要特征。结合来自众多公开可用数据库的攻击数据,并使用理性选择和常规活动理论的框架,揭示了攻击频率随着时间的推移而上升,通常是针对金融机构的更广泛攻击的一部分。根据政治风险理论,有一半的攻击是出于政治动机的黑客分子发起的DDoS攻击(54.8%),而有经济动机的犯罪分子使用各种攻击媒介,占五分之一(19%)。尽管这些攻击没有造成系统性后果,但详细的数据仍然稀缺,这阻碍了研究。研究结果指出了以预防性和反应性战略的形式加强央行网络弹性的可操作政策含义。
{"title":"Evaluating cyber attacks on central banks – identification of trends in cyber threat landscape","authors":"Paweł Smaga","doi":"10.1016/j.cose.2025.104742","DOIUrl":"10.1016/j.cose.2025.104742","url":null,"abstract":"<div><div>This study identifies main characteristics of cyber attacks on 63 central banks, based on the analysis of 84 case studies of attacks, which occurred from 2010 to 2025. Combining data on attacks from numerous publicly available databases and using the framework of rational choice and routine activity theories, reveals a rise in frequency of attacks over time, often part of broader offensives on financial institutions. In line with political risk theory, politically motivated hacktivists, by launching DDoS, were behind half the attacks (54,8 %), while financially motivated criminals, using diverse attack vectors, were responsible for one-fifth (19 %). Despite the attacks having no systemic consequences, detailed data remains scarce, which hinders research. Results point to actionable policy implications for enhancing central banks’ cyber resilience in form of both preventative and reactive strategies.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"160 ","pages":"Article 104742"},"PeriodicalIF":5.4,"publicationDate":"2025-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145467669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the transferability of targeted adversarial examples by style-agnostic attack 通过风格不可知攻击提高目标对抗性示例的可转移性
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-30 DOI: 10.1016/j.cose.2025.104744
Wei Zhou , Zimin Mao , Shuijun Yin , Hanwen Zhang , Zhicheng Huang , Heng Li , Tiejun Wu , Wei Yuan
Recently transfer-based black-box adversarial attacks have garnered increasing attention owing to their high practicality. However, targeted attacks suffer low transfer success rates, especially when overfitting to their source model. In this paper, we observe that perturbations with higher generalization across different styles of images tend to have higher targeted transferability. Therefore, we propose a Style-Agnostic Attack (SAA) to enhance the transferability of targeted adversarial examples. Specifically, SAA introduces a content consistency loss that stimulates the learned perturbations to be style-agnostic by aligning the content features of the adversarially perturbed original and stylized images. Accordingly, SAA enhances the generalization of adversarial perturbations across different stylized images, thereby enhancing the transferability of targeted attacks. Our experiments demonstrate that SAA significantly improves the targeted transferability of adversarial examples. Furthermore, SAA is a generalizable approach that can be readily integrated with existing adversarial attacks to further enhance targeted transferability.
近年来,基于传输的黑盒对抗攻击因其高实用性而受到越来越多的关注。然而,目标攻击的传输成功率很低,尤其是在过度拟合其源模型时。在本文中,我们观察到在不同风格的图像上具有较高泛化程度的扰动往往具有较高的目标可转移性。因此,我们提出了一种风格不可知论攻击(SAA)来增强目标对抗示例的可转移性。具体来说,SAA引入了内容一致性损失,通过对齐对抗性扰动的原始图像和风格化图像的内容特征,刺激学习扰动成为风格无关的。因此,SAA增强了不同风格化图像对抗性扰动的泛化,从而增强了目标攻击的可转移性。我们的实验表明,SAA显著提高了对抗性示例的目标可转移性。此外,SAA是一种可推广的方法,可以很容易地与现有的对抗性攻击集成,以进一步增强目标可转移性。
{"title":"Improving the transferability of targeted adversarial examples by style-agnostic attack","authors":"Wei Zhou ,&nbsp;Zimin Mao ,&nbsp;Shuijun Yin ,&nbsp;Hanwen Zhang ,&nbsp;Zhicheng Huang ,&nbsp;Heng Li ,&nbsp;Tiejun Wu ,&nbsp;Wei Yuan","doi":"10.1016/j.cose.2025.104744","DOIUrl":"10.1016/j.cose.2025.104744","url":null,"abstract":"<div><div>Recently transfer-based black-box adversarial attacks have garnered increasing attention owing to their high practicality. However, targeted attacks suffer low transfer success rates, especially when overfitting to their source model. In this paper, we observe that perturbations with higher generalization across different styles of images tend to have higher targeted transferability. Therefore, we propose a Style-Agnostic Attack (SAA) to enhance the transferability of targeted adversarial examples. Specifically, SAA introduces a content consistency loss that stimulates the learned perturbations to be style-agnostic by aligning the content features of the adversarially perturbed original and stylized images. Accordingly, SAA enhances the generalization of adversarial perturbations across different stylized images, thereby enhancing the transferability of targeted attacks. Our experiments demonstrate that SAA significantly improves the targeted transferability of adversarial examples. Furthermore, SAA is a generalizable approach that can be readily integrated with existing adversarial attacks to further enhance targeted transferability.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"160 ","pages":"Article 104744"},"PeriodicalIF":5.4,"publicationDate":"2025-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145467667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Race against time: investigating the factors that influence web race condition exploits 与时间赛跑:调查影响网络竞争状况的因素
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-29 DOI: 10.1016/j.cose.2025.104740
Federico Loi , Lorenzo Pisu , Leonardo Regano , Davide Maiorca , Giorgio Giacinto
Race conditions (RC) pose a critical security threat to web applications by exploiting the non-deterministic behavior of multithreaded request handling. This can lead to unpredictable outcomes such as data corruption, Time of Check to Time of Use (TOCTOU) vulnerabilities, and deadlocks. While previous research has identified poor design practices that contribute to RC vulnerabilities, no existing studies have explored the factors that influence the severity or impact of race conditions. This paper introduces a comprehensive methodology for testing and quantifying how different variables affect the exploitability of race conditions in vulnerable web servers, providing a framework for future research to investigate this issue more thoroughly.
In addition, we present an experimental evaluation of our methodology under various conditions. Specifically, we examine six RC exploitation tools using four different attack techniques across both HTTP/1.1 and HTTP/2 protocols. To provide a complete overview of race conditions across all HTTP versions, we also introduce the first race condition attack tool for HTTP/3, named QUICker. Furthermore, we assess how the choice of database management systems and programming languages used in web application deployment can affect susceptibility to race condition attacks. This study offers key insights into how these factors influence the exploitability of RC vulnerabilities.
竞态条件(RC)利用多线程请求处理的不确定性行为,对web应用程序构成严重的安全威胁。这可能导致不可预测的结果,如数据损坏、检查时间到使用时间漏洞和死锁。虽然以前的研究已经确定了导致RC漏洞的不良设计实践,但没有现有的研究探索影响竞争条件严重性或影响的因素。本文介绍了一种全面的方法,用于测试和量化不同变量如何影响易受攻击的web服务器中竞争条件的利用,为未来的研究提供了一个框架,以更彻底地调查这个问题。此外,我们提出了我们的方法在各种条件下的实验评估。具体来说,我们研究了六种使用HTTP/1.1和HTTP/2协议中四种不同攻击技术的RC利用工具。为了全面了解所有HTTP版本的竞争条件,我们还介绍了HTTP/3的第一个竞争条件攻击工具,名为faster。此外,我们评估了在web应用程序部署中使用的数据库管理系统和编程语言的选择如何影响对竞争条件攻击的易感性。这项研究为这些因素如何影响RC漏洞的可利用性提供了关键见解。
{"title":"Race against time: investigating the factors that influence web race condition exploits","authors":"Federico Loi ,&nbsp;Lorenzo Pisu ,&nbsp;Leonardo Regano ,&nbsp;Davide Maiorca ,&nbsp;Giorgio Giacinto","doi":"10.1016/j.cose.2025.104740","DOIUrl":"10.1016/j.cose.2025.104740","url":null,"abstract":"<div><div>Race conditions (RC) pose a critical security threat to web applications by exploiting the non-deterministic behavior of multithreaded request handling. This can lead to unpredictable outcomes such as data corruption, Time of Check to Time of Use (TOCTOU) vulnerabilities, and deadlocks. While previous research has identified poor design practices that contribute to RC vulnerabilities, no existing studies have explored the factors that influence the severity or impact of race conditions. This paper introduces a comprehensive methodology for testing and quantifying how different variables affect the exploitability of race conditions in vulnerable web servers, providing a framework for future research to investigate this issue more thoroughly.</div><div>In addition, we present an experimental evaluation of our methodology under various conditions. Specifically, we examine six RC exploitation tools using four different attack techniques across both HTTP/1.1 and HTTP/2 protocols. To provide a complete overview of race conditions across all HTTP versions, we also introduce the first race condition attack tool for HTTP/3, named QUICker. Furthermore, we assess how the choice of database management systems and programming languages used in web application deployment can affect susceptibility to race condition attacks. This study offers key insights into how these factors influence the exploitability of RC vulnerabilities.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"160 ","pages":"Article 104740"},"PeriodicalIF":5.4,"publicationDate":"2025-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145467668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing automated insulin delivery systems: A review of security threats and protective strategies 确保自动化胰岛素输送系统的安全:安全威胁和保护策略综述
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-29 DOI: 10.1016/j.cose.2025.104733
Yuchen Niu, Siew-Kei Lam
Automated Insulin Delivery (AID) systems represent a significant advancement in diabetes care and wearable physiological closed-loop control technologies, integrating continuous glucose monitoring, control algorithms, and insulin pumps to improve blood glucose level control and reduce the burden of patient self-management. However, their increasing dependence on wireless communication and automatic control introduces security risks that may compromise patient privacy or result in life-threatening treatment errors. This paper presents a comprehensive survey of the AID system security landscape, covering technical vulnerabilities, regulatory frameworks, and commercial security measures. In addition, we conduct a systematic review of attack vectors and defence mechanisms proposed in the literature, following the PRISMA framework. Our findings highlight critical gaps, including the lack of specific security evaluation frameworks, insufficient protections in real-world deployments, and the need for comprehensive, lightweight, and adaptive defence mechanisms. We further investigate available research resources and outline open research challenges and future directions to guide the development of more secure and reliable AID systems. By focusing on AID systems, this review offers a representative case study for examining and improving the cybersecurity of safety-critical medical wearable systems.
自动化胰岛素输送(AID)系统代表了糖尿病护理和可穿戴生理闭环控制技术的重大进步,集成了连续血糖监测、控制算法和胰岛素泵,以改善血糖水平控制,减轻患者自我管理的负担。然而,它们对无线通信和自动控制的日益依赖带来了安全风险,可能会损害患者隐私或导致危及生命的治疗错误。本文展示了AID系统安全景观的全面调查,涵盖了技术漏洞、监管框架和商业安全措施。此外,根据PRISMA框架,我们对文献中提出的攻击媒介和防御机制进行了系统审查。我们的研究结果突出了关键的差距,包括缺乏具体的安全评估框架,在实际部署中保护不足,以及需要全面、轻量级和自适应的防御机制。我们进一步调查了现有的研究资源,概述了开放的研究挑战和未来的方向,以指导开发更安全可靠的AID系统。通过关注AID系统,本综述为检查和改进安全关键型医疗可穿戴系统的网络安全提供了一个具有代表性的案例研究。
{"title":"Securing automated insulin delivery systems: A review of security threats and protective strategies","authors":"Yuchen Niu,&nbsp;Siew-Kei Lam","doi":"10.1016/j.cose.2025.104733","DOIUrl":"10.1016/j.cose.2025.104733","url":null,"abstract":"<div><div>Automated Insulin Delivery (AID) systems represent a significant advancement in diabetes care and wearable physiological closed-loop control technologies, integrating continuous glucose monitoring, control algorithms, and insulin pumps to improve blood glucose level control and reduce the burden of patient self-management. However, their increasing dependence on wireless communication and automatic control introduces security risks that may compromise patient privacy or result in life-threatening treatment errors. This paper presents a comprehensive survey of the AID system security landscape, covering technical vulnerabilities, regulatory frameworks, and commercial security measures. In addition, we conduct a systematic review of attack vectors and defence mechanisms proposed in the literature, following the PRISMA framework. Our findings highlight critical gaps, including the lack of specific security evaluation frameworks, insufficient protections in real-world deployments, and the need for comprehensive, lightweight, and adaptive defence mechanisms. We further investigate available research resources and outline open research challenges and future directions to guide the development of more secure and reliable AID systems. By focusing on AID systems, this review offers a representative case study for examining and improving the cybersecurity of safety-critical medical wearable systems.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"160 ","pages":"Article 104733"},"PeriodicalIF":5.4,"publicationDate":"2025-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Risk assessment and defense resource allocation optimization for mining cyber-physical systems under coordinated attacks 协同攻击下挖掘网络物理系统风险评估与防御资源配置优化
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-28 DOI: 10.1016/j.cose.2025.104741
Pan Du, Chang Su, Xinping Wang, Tiezhi Li, Taiwen Kong, Zhaoyu He
With the intelligent transformation of the mining industry, mining cyber-physical systems (CPS) face multiple, interacting threats including cyberattacks, equipment failures, and natural disasters. Such interactions can severely undermine system stability and resilience. Existing assessment methods typically address single risk factors in isolation, neglecting both the interplay among multiple threats and the benefits of dynamic emergency response strategies. This paper proposes an integrated risk assessment framework tailored to mining CPS. We develop a multi-risk evaluation model that captures interactions among diverse hazard sources and embed it within a coordinated recovery network to optimize emergency response strategies. Through MATLAB-based simulations across various risk scenarios, we validate the effectiveness of the proposed model. Results demonstrate that the synergy among multiple threats markedly accelerates system performance degradation, whereas a coordinated recovery strategy prioritizing key nodes significantly enhances restoration efficiency and reduces resource consumption. Furthermore, our optimized resource allocation scheme substantially lowers total energy use, improves utilization rates, and bolsters overall system stability. The main contributions of this work are: (1) the introduction of a comprehensive multi-risk assessment framework providing theoretical foundations for intelligent mining; (2) the design of a coordinated recovery network model that refines the system restoration process; and (3) the implementation of a dynamic emergency response mechanism that elevates recovery efficiency and curtails resource expenditure.
随着采矿业的智能化转型,采矿网络物理系统(CPS)面临着网络攻击、设备故障、自然灾害等多种相互影响的威胁。这种相互作用会严重破坏系统的稳定性和弹性。现有的评估方法通常孤立地处理单一风险因素,忽视了多种威胁之间的相互作用和动态应急响应战略的好处。本文提出了一个适合矿业CPS的综合风险评估框架。我们开发了一个多风险评估模型,该模型捕获了不同危险源之间的相互作用,并将其嵌入到协调的恢复网络中,以优化应急响应策略。通过基于matlab的各种风险情景模拟,我们验证了所提出模型的有效性。结果表明,多种威胁之间的协同效应显著加速了系统性能的下降,而优先考虑关键节点的协调恢复策略可显著提高恢复效率并降低资源消耗。此外,我们优化的资源分配方案大大降低了总能源使用,提高了利用率,并增强了整体系统的稳定性。本文的主要贡献有:(1)提出了一个综合的多风险评估框架,为智能采矿提供了理论基础;(2)设计协调恢复网络模型,细化系统恢复流程;(3)实施动态应急机制,提高恢复效率,减少资源支出。
{"title":"Risk assessment and defense resource allocation optimization for mining cyber-physical systems under coordinated attacks","authors":"Pan Du,&nbsp;Chang Su,&nbsp;Xinping Wang,&nbsp;Tiezhi Li,&nbsp;Taiwen Kong,&nbsp;Zhaoyu He","doi":"10.1016/j.cose.2025.104741","DOIUrl":"10.1016/j.cose.2025.104741","url":null,"abstract":"<div><div>With the intelligent transformation of the mining industry, mining cyber-physical systems (CPS) face multiple, interacting threats including cyberattacks, equipment failures, and natural disasters. Such interactions can severely undermine system stability and resilience. Existing assessment methods typically address single risk factors in isolation, neglecting both the interplay among multiple threats and the benefits of dynamic emergency response strategies. This paper proposes an integrated risk assessment framework tailored to mining CPS. We develop a multi-risk evaluation model that captures interactions among diverse hazard sources and embed it within a coordinated recovery network to optimize emergency response strategies. Through MATLAB-based simulations across various risk scenarios, we validate the effectiveness of the proposed model. Results demonstrate that the synergy among multiple threats markedly accelerates system performance degradation, whereas a coordinated recovery strategy prioritizing key nodes significantly enhances restoration efficiency and reduces resource consumption. Furthermore, our optimized resource allocation scheme substantially lowers total energy use, improves utilization rates, and bolsters overall system stability. The main contributions of this work are: (1) the introduction of a comprehensive multi-risk assessment framework providing theoretical foundations for intelligent mining; (2) the design of a coordinated recovery network model that refines the system restoration process; and (3) the implementation of a dynamic emergency response mechanism that elevates recovery efficiency and curtails resource expenditure.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"160 ","pages":"Article 104741"},"PeriodicalIF":5.4,"publicationDate":"2025-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145467666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The privacy cost of fun: A measurement study of user data exposure in tiktok mini-games 乐趣的隐私成本:tiktok小游戏中用户数据暴露的测量研究
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-27 DOI: 10.1016/j.cose.2025.104728
Sideeq Bello, Lamine Noureddine, Babangida Bappah, Aisha Ali-Gombe
TikTok Mini Games represent a growing class of interactive, embedded experiences within social media platforms. Delivered through filters and effects, these games offer high engagement, but raise underexplored privacy concerns. Unlike standalone mobile games, TikTok Mini Games operate entirely within the app’s ecosystem-blurring the lines between entertainment, content creation, and data collection. Despite their popularity, little is known about how these features collect, process, and expose user data. This paper presents the first comprehensive privacy analysis of TikTok Mini Games using a mixed-method framework. We combine documentation review and experimental development, developmental toolkit analysis, interface and behavioral heuristic evaluation, network traffic and code analysis, data synthesis for privacy sensitivity, and comparative analysis to examine how privacy risks are architected, operationalized, and experienced. Our analysis reveals systemic privacy gaps: AR functionalities and motion sensors operate without granular consent mechanisms, UI designs lack transparency, and sensitive data streams (facial landmarks, geolocation, behavioral telemetry) are extensively collected, often without explicit interface-level disclosures. We also identify misalignments between TikTok’s runtime data practices and disclosed privacy policies, raising concerns about informed consent and accountability. A comparative analysis with Facebook Instant Games highlights structural differences in developer access, API use, and data governance. To address these concerns, we recommend platform-level reforms, including per-feature consent and embedded transparency mechanisms for interactive content. Our findings inform both the platform design and the regulatory discourse as gamified content embedded becomes a dominant mode of digital interaction.
抖音小游戏代表了社交媒体平台中不断增长的交互式嵌入式体验。通过过滤器和特效,这些游戏提供了高粘性,但却引发了未被充分开发的隐私问题。与独立的手机游戏不同,抖音小游戏完全在应用程序的生态系统内运行——模糊了娱乐、内容创作和数据收集之间的界限。尽管它们很受欢迎,但人们对这些特性如何收集、处理和公开用户数据知之甚少。本文首次使用混合方法框架对抖音小游戏进行了全面的隐私分析。我们结合文档审查和实验开发、开发工具包分析、界面和行为启发式评估、网络流量和代码分析、隐私敏感性数据综合以及比较分析来研究隐私风险是如何架构、操作和体验的。我们的分析揭示了系统性的隐私漏洞:AR功能和运动传感器在没有粒度同意机制的情况下运行,UI设计缺乏透明度,敏感数据流(面部地标、地理位置、行为遥测)被广泛收集,通常没有明确的界面级披露。我们还发现了TikTok运行时数据实践与披露的隐私政策之间的不一致,引发了对知情同意和问责制的担忧。与Facebook Instant Games的对比分析突出了开发者访问、API使用和数据管理方面的结构性差异。为了解决这些问题,我们建议进行平台级改革,包括每个功能的同意和交互式内容的嵌入式透明度机制。随着嵌入的游戏化内容成为数字交互的主导模式,我们的研究结果为平台设计和监管话语提供了信息。
{"title":"The privacy cost of fun: A measurement study of user data exposure in tiktok mini-games","authors":"Sideeq Bello,&nbsp;Lamine Noureddine,&nbsp;Babangida Bappah,&nbsp;Aisha Ali-Gombe","doi":"10.1016/j.cose.2025.104728","DOIUrl":"10.1016/j.cose.2025.104728","url":null,"abstract":"<div><div>TikTok Mini Games represent a growing class of interactive, embedded experiences within social media platforms. Delivered through filters and effects, these games offer high engagement, but raise underexplored privacy concerns. Unlike standalone mobile games, TikTok Mini Games operate entirely within the app’s ecosystem-blurring the lines between entertainment, content creation, and data collection. Despite their popularity, little is known about how these features collect, process, and expose user data. This paper presents the first comprehensive privacy analysis of TikTok Mini Games using a mixed-method framework. We combine documentation review and experimental development, developmental toolkit analysis, interface and behavioral heuristic evaluation, network traffic and code analysis, data synthesis for privacy sensitivity, and comparative analysis to examine how privacy risks are architected, operationalized, and experienced. Our analysis reveals systemic privacy gaps: AR functionalities and motion sensors operate without granular consent mechanisms, UI designs lack transparency, and sensitive data streams (facial landmarks, geolocation, behavioral telemetry) are extensively collected, often without explicit interface-level disclosures. We also identify misalignments between TikTok’s runtime data practices and disclosed privacy policies, raising concerns about informed consent and accountability. A comparative analysis with Facebook Instant Games highlights structural differences in developer access, API use, and data governance. To address these concerns, we recommend platform-level reforms, including per-feature consent and embedded transparency mechanisms for interactive content. Our findings inform both the platform design and the regulatory discourse as gamified content embedded becomes a dominant mode of digital interaction.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"160 ","pages":"Article 104728"},"PeriodicalIF":5.4,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145520267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A quantitative methodology for systemic impact assessment of cyber threats in connected vehicles 联网车辆网络威胁系统影响评估的定量方法
IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-27 DOI: 10.1016/j.cose.2025.104729
Don Nalin Dharshana Jayaratne , Qian Lu , Abdur Rakib , Muhamad Azfar Ramli , Rakhi Manohar Mepparambath , Siraj Ahmed Shaikh , Hoang Nga Nguyen
The increasing integration of digital technologies in connected vehicles introduces cybersecurity risks that extend beyond individual vehicles, with the potential to disrupt entire transportation systems. Current practice (e.g., ISO/SAE 21434 TARA) focuses on threat identification and qualitative impact ratings at the vehicle boundary, with limited systemic quantification. This study presents a systematic, simulation-based methodology for quantifying the systemic operational and safety impacts of cyber threats on connected vehicles, evaluating cascading effects across the transport network. Three representative scenarios are examined: (I) telematics-induced sudden braking causing a cascading collision, (II) remote disabling on a motorway (M25) segment, and (III) a compromised Roadside Unit (RSU) spoofing Variable Speed Limit (VSL) and phantom lane closure messages to connected and automated vehicles (CAVs). The results highlight the potential for cascading safety incidents and systemic operational degradation, as evidenced by the defined systemic operational and safety vectors, factors that are insufficiently addressed in the current scope of the ISO/SAE 21434 standard, which primarily focuses on individual vehicle-level threats. The findings underscore the need to incorporate systemic evaluation into existing frameworks to enhance cyber resilience across connected vehicle ecosystems. The framework complements ISO/SAE 21434 by supplying quantitative, reproducible evidence for the impact rating step at a systemic scale, reducing assessor subjectivity and supporting policy and operations, enabling more data-driven evaluations of systemic cyber risks.
随着数字技术越来越多地集成到联网车辆中,网络安全风险将超越单个车辆,并有可能破坏整个交通系统。目前的实践(例如ISO/SAE 21434 TARA)侧重于车辆边界的威胁识别和定性影响评级,系统量化有限。本研究提出了一种系统的、基于模拟的方法,用于量化网络威胁对联网车辆的系统运行和安全影响,评估整个交通网络的级联效应。研究了三种典型场景:(I)远程信息处理引起的突然制动导致级联碰撞,(II)在高速公路(M25)路段上远程禁用,以及(III)路边单元(RSU)受到损害,欺骗可变速度限制(VSL)和幻影车道关闭信息,以连接和自动驾驶车辆(cav)。研究结果强调了级联安全事件和系统操作退化的可能性,正如定义的系统操作和安全向量所证明的那样,这些因素在ISO/SAE 21434标准的当前范围内没有得到充分解决,该标准主要侧重于单个车辆级别的威胁。研究结果强调,需要将系统评估纳入现有框架,以增强互联汽车生态系统的网络弹性。该框架补充了ISO/SAE 21434,为系统规模的影响评级步骤提供了定量的、可重复的证据,减少了评估人员的主观性,支持了政策和操作,实现了更多数据驱动的系统网络风险评估。
{"title":"A quantitative methodology for systemic impact assessment of cyber threats in connected vehicles","authors":"Don Nalin Dharshana Jayaratne ,&nbsp;Qian Lu ,&nbsp;Abdur Rakib ,&nbsp;Muhamad Azfar Ramli ,&nbsp;Rakhi Manohar Mepparambath ,&nbsp;Siraj Ahmed Shaikh ,&nbsp;Hoang Nga Nguyen","doi":"10.1016/j.cose.2025.104729","DOIUrl":"10.1016/j.cose.2025.104729","url":null,"abstract":"<div><div>The increasing integration of digital technologies in connected vehicles introduces cybersecurity risks that extend beyond individual vehicles, with the potential to disrupt entire transportation systems. Current practice (e.g., ISO/SAE 21434 TARA) focuses on threat identification and qualitative impact ratings at the vehicle boundary, with limited systemic quantification. This study presents a systematic, simulation-based methodology for quantifying the systemic operational and safety impacts of cyber threats on connected vehicles, evaluating cascading effects across the transport network. Three representative scenarios are examined: (I) telematics-induced sudden braking causing a cascading collision, (II) remote disabling on a motorway (M25) segment, and (III) a compromised Roadside Unit (RSU) spoofing Variable Speed Limit (VSL) and phantom lane closure messages to connected and automated vehicles (CAVs). The results highlight the potential for cascading safety incidents and systemic operational degradation, as evidenced by the defined systemic operational and safety vectors, factors that are insufficiently addressed in the current scope of the ISO/SAE 21434 standard, which primarily focuses on individual vehicle-level threats. The findings underscore the need to incorporate systemic evaluation into existing frameworks to enhance cyber resilience across connected vehicle ecosystems. The framework complements ISO/SAE 21434 by supplying quantitative, reproducible evidence for the impact rating step at a systemic scale, reducing assessor subjectivity and supporting policy and operations, enabling more data-driven evaluations of systemic cyber risks.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"160 ","pages":"Article 104729"},"PeriodicalIF":5.4,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145467664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1