首页 > 最新文献

IET Communications最新文献

英文 中文
Knowledge graph reasoning for cyber attack detection 用于网络攻击检测的知识图谱推理
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-02-26 DOI: 10.1049/cmu2.12736
Ezekia Gilliard, Jinshuo Liu, Ahmed Abubakar Aliyu

In today's digital landscape, cybercriminals are constantly evolving their tactics, making it challenging for traditional cybersecurity methods to keep up. To address this issue, this study explores the potential of knowledge graph reasoning as a more adaptable and sophisticated approach to identify and counter network attacks. By leveraging graph structures imbued with human-like thinking, this method enhances the resilience of cybersecurity systems. The study focuses on three critical aspects: data preparation, semantic foundations, and knowledge graph inference techniques. Through an in-depth analysis of these components, the research aims to reveal how knowledge graph reasoning can improve cyberattack detection and enhance the overall efficacy of cybersecurity measures, including intrusion detection systems. The proposed approach has undergone extensive experimentation to validate its effectiveness compared to existing methods. The results of the experiment have shown a remarkable advancement in accuracy, speed, and recall for recognition, surpassing current methods. This achievement is a notable contribution in the realm of managing big data in cybersecurity. The study establishes a foundation for the automation of network attack detection, ultimately enhancing overall network security.

在当今的数字环境中,网络犯罪分子的战术不断演变,传统的网络安全方法难以跟上。为解决这一问题,本研究探讨了知识图推理作为一种适应性更强、更复杂的方法来识别和反击网络攻击的潜力。通过利用具有类人思维的图结构,这种方法可以增强网络安全系统的复原力。研究重点关注三个关键方面:数据准备、语义基础和知识图推理技术。通过对这些部分的深入分析,研究旨在揭示知识图谱推理如何改进网络攻击检测,并提高网络安全措施(包括入侵检测系统)的整体功效。所提出的方法经过了广泛的实验,以验证其与现有方法相比的有效性。实验结果表明,该方法在识别的准确性、速度和召回率方面都有显著提高,超越了现有方法。这一成果是对网络安全大数据管理领域的显著贡献。这项研究为网络攻击检测的自动化奠定了基础,最终提高了整体网络安全。
{"title":"Knowledge graph reasoning for cyber attack detection","authors":"Ezekia Gilliard,&nbsp;Jinshuo Liu,&nbsp;Ahmed Abubakar Aliyu","doi":"10.1049/cmu2.12736","DOIUrl":"https://doi.org/10.1049/cmu2.12736","url":null,"abstract":"<p>In today's digital landscape, cybercriminals are constantly evolving their tactics, making it challenging for traditional cybersecurity methods to keep up. To address this issue, this study explores the potential of knowledge graph reasoning as a more adaptable and sophisticated approach to identify and counter network attacks. By leveraging graph structures imbued with human-like thinking, this method enhances the resilience of cybersecurity systems. The study focuses on three critical aspects: data preparation, semantic foundations, and knowledge graph inference techniques. Through an in-depth analysis of these components, the research aims to reveal how knowledge graph reasoning can improve cyberattack detection and enhance the overall efficacy of cybersecurity measures, including intrusion detection systems. The proposed approach has undergone extensive experimentation to validate its effectiveness compared to existing methods. The results of the experiment have shown a remarkable advancement in accuracy, speed, and recall for recognition, surpassing current methods. This achievement is a notable contribution in the realm of managing big data in cybersecurity. The study establishes a foundation for the automation of network attack detection, ultimately enhancing overall network security.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12736","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140063859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data transmission path planning method for wireless sensor network in grounding grid area based on MM-DPS hybrid algorithm 基于 MM-DPS 混合算法的接地网格区域无线传感器网络数据传输路径规划方法
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-02-06 DOI: 10.1049/cmu2.12729
Xianghui Xiao, Longsheng Huang, Zhenshan Zhang, Mingxian Huang, Luchang Guan, Yunhao Song

At present, in order to conduct non-destructive testing on the grounding grid of substations under the condition of continuous power supply and no excavation, researchers have applied wireless technology based on electrochemical methods to remotely monitor the corrosion state of grounding conductors online. Nevertheless, wireless signals are affected by the environment when they are transmitted underground. In the field of grounding gird wireless monitoring, how to plan the information transmission path of wireless sensor network (WSN) with high accuracy of data transfer and low energy consumption earns growing research attention. To address the problem of WSN path planning in grounding grid area, a path planning method for WSN based on the hybrid algorithm of map-matching algorithm and double-pole search algorithm (MM-DPS) is proposed in this paper. The map-matching algorithm is employed to calculate the optimal sampling node number of the data transmission path. On the basis of the optimal sampling node number, the double-pole search algorithm is employed in seeking out each sensor node of the path, and two groups of path plans are obtained. In the simulation experiment, compared with the A-star algorithm, the MM-DPS algorithm shortens the data transmission path length by about 39% and reduces the energy consumption by about 57%. The research work brings a method to alleviate the problem of data transmission underground of WSN in grounding grid area. The method not only ensures the accuracy of data transmission, but also shorts the transmission distance and reduces energy consumption.

目前,为了在连续供电和不开挖的条件下对变电站的接地网进行无损检测,研究人员应用了基于电化学方法的无线技术,对接地导线的腐蚀状态进行在线远程监测。然而,无线信号在地下传输时会受到环境影响。在接地导线无线监测领域,如何规划无线传感器网络(WSN)的信息传输路径,实现高精度的数据传输和低能耗,越来越受到研究人员的关注。针对接地网区域 WSN 路径规划问题,本文提出了一种基于地图匹配算法和双极搜索算法(MM-DPS)混合算法的 WSN 路径规划方法。采用地图匹配算法计算数据传输路径的最优采样节点数。在最优采样节点数的基础上,采用双极搜索算法寻找路径上的每个传感器节点,得到两组路径方案。在仿真实验中,与 A-star 算法相比,MM-DPS 算法的数据传输路径长度缩短了约 39%,能耗降低了约 57%。该研究工作带来了一种缓解接地网区域 WSN 地下数据传输问题的方法。该方法不仅保证了数据传输的准确性,还缩短了传输距离,降低了能耗。
{"title":"Data transmission path planning method for wireless sensor network in grounding grid area based on MM-DPS hybrid algorithm","authors":"Xianghui Xiao,&nbsp;Longsheng Huang,&nbsp;Zhenshan Zhang,&nbsp;Mingxian Huang,&nbsp;Luchang Guan,&nbsp;Yunhao Song","doi":"10.1049/cmu2.12729","DOIUrl":"10.1049/cmu2.12729","url":null,"abstract":"<p>At present, in order to conduct non-destructive testing on the grounding grid of substations under the condition of continuous power supply and no excavation, researchers have applied wireless technology based on electrochemical methods to remotely monitor the corrosion state of grounding conductors online. Nevertheless, wireless signals are affected by the environment when they are transmitted underground. In the field of grounding gird wireless monitoring, how to plan the information transmission path of wireless sensor network (WSN) with high accuracy of data transfer and low energy consumption earns growing research attention. To address the problem of WSN path planning in grounding grid area, a path planning method for WSN based on the hybrid algorithm of map-matching algorithm and double-pole search algorithm (MM-DPS) is proposed in this paper. The map-matching algorithm is employed to calculate the optimal sampling node number of the data transmission path. On the basis of the optimal sampling node number, the double-pole search algorithm is employed in seeking out each sensor node of the path, and two groups of path plans are obtained. In the simulation experiment, compared with the A-star algorithm, the MM-DPS algorithm shortens the data transmission path length by about 39% and reduces the energy consumption by about 57%. The research work brings a method to alleviate the problem of data transmission underground of WSN in grounding grid area. The method not only ensures the accuracy of data transmission, but also shorts the transmission distance and reduces energy consumption.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12729","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139802391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data transmission path planning method for wireless sensor network in grounding grid area based on MM‐DPS hybrid algorithm 基于 MM-DPS 混合算法的接地网格区域无线传感器网络数据传输路径规划方法
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-02-06 DOI: 10.1049/cmu2.12729
Xianghui Xiao, Longsheng Huang, Zhenshan Zhang, Mingxian Huang, Luchang Guan, Yunhao Song
At present, in order to conduct non‐destructive testing on the grounding grid of substations under the condition of continuous power supply and no excavation, researchers have applied wireless technology based on electrochemical methods to remotely monitor the corrosion state of grounding conductors online. Nevertheless, wireless signals are affected by the environment when they are transmitted underground. In the field of grounding gird wireless monitoring, how to plan the information transmission path of wireless sensor network (WSN) with high accuracy of data transfer and low energy consumption earns growing research attention. To address the problem of WSN path planning in grounding grid area, a path planning method for WSN based on the hybrid algorithm of map‐matching algorithm and double‐pole search algorithm (MM‐DPS) is proposed in this paper. The map‐matching algorithm is employed to calculate the optimal sampling node number of the data transmission path. On the basis of the optimal sampling node number, the double‐pole search algorithm is employed in seeking out each sensor node of the path, and two groups of path plans are obtained. In the simulation experiment, compared with the A‐star algorithm, the MM‐DPS algorithm shortens the data transmission path length by about 39% and reduces the energy consumption by about 57%. The research work brings a method to alleviate the problem of data transmission underground of WSN in grounding grid area. The method not only ensures the accuracy of data transmission, but also shorts the transmission distance and reduces energy consumption.
目前,为了在连续供电和不开挖的条件下对变电站的接地网进行无损检测,研究人员应用了基于电化学方法的无线技术,对接地导线的腐蚀状态进行在线远程监测。然而,无线信号在地下传输时会受到环境影响。在接地导线无线监测领域,如何规划无线传感器网络(WSN)的信息传输路径,实现高精度的数据传输和低能耗,越来越受到研究人员的关注。针对接地网区域 WSN 路径规划问题,本文提出了一种基于地图匹配算法和双极搜索算法(MM-DPS)混合算法的 WSN 路径规划方法。采用地图匹配算法计算数据传输路径的最优采样节点数。在最优采样节点数的基础上,采用双极搜索算法寻找路径上的每个传感器节点,得到两组路径方案。在仿真实验中,与 A-star 算法相比,MM-DPS 算法的数据传输路径长度缩短了约 39%,能耗降低了约 57%。该研究工作带来了一种缓解接地网区域 WSN 地下数据传输问题的方法。该方法不仅保证了数据传输的准确性,还缩短了传输距离,降低了能耗。
{"title":"Data transmission path planning method for wireless sensor network in grounding grid area based on MM‐DPS hybrid algorithm","authors":"Xianghui Xiao, Longsheng Huang, Zhenshan Zhang, Mingxian Huang, Luchang Guan, Yunhao Song","doi":"10.1049/cmu2.12729","DOIUrl":"https://doi.org/10.1049/cmu2.12729","url":null,"abstract":"At present, in order to conduct non‐destructive testing on the grounding grid of substations under the condition of continuous power supply and no excavation, researchers have applied wireless technology based on electrochemical methods to remotely monitor the corrosion state of grounding conductors online. Nevertheless, wireless signals are affected by the environment when they are transmitted underground. In the field of grounding gird wireless monitoring, how to plan the information transmission path of wireless sensor network (WSN) with high accuracy of data transfer and low energy consumption earns growing research attention. To address the problem of WSN path planning in grounding grid area, a path planning method for WSN based on the hybrid algorithm of map‐matching algorithm and double‐pole search algorithm (MM‐DPS) is proposed in this paper. The map‐matching algorithm is employed to calculate the optimal sampling node number of the data transmission path. On the basis of the optimal sampling node number, the double‐pole search algorithm is employed in seeking out each sensor node of the path, and two groups of path plans are obtained. In the simulation experiment, compared with the A‐star algorithm, the MM‐DPS algorithm shortens the data transmission path length by about 39% and reduces the energy consumption by about 57%. The research work brings a method to alleviate the problem of data transmission underground of WSN in grounding grid area. The method not only ensures the accuracy of data transmission, but also shorts the transmission distance and reduces energy consumption.","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139862033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On multiple handoff blocking‐then‐reaccess for opportunistic spectrum access 关于机会主义频谱接入的多重交接阻塞-再接入
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-02-03 DOI: 10.1049/cmu2.12733
Jing Zhang, Chu‐Long Liang, Hong‐Xu Gao, Yan He, Hong‐Bo Zhu
Opportunistic spectrum access (OSA), a promising technology to resolve radio spectrum scarcity, is still faced with some challenges, of which one is potentially frequent channel handoff (CH) even handoff blocking (HB) for secondary user (SU) to avoid primary user (PU). Reaccess is a direct way to resolve HB. However, multiple handoff blocking‐then‐reaccess (H‐BTR) are time consuming. Whether it is worthwhile to make multiple H‐BTR, is an interesting but hardly mentioned issue. To this end, the multiple H‐BTR‐based OSA are focused on here. Three key indices, the average transmission probability, handoff delay, and average reaccess times of SU in the H‐BTR‐based OSA, are deduced as close form first. Then, the effects of H‐BTR frequency and service traffic rate of SU on OSA are discussed. Finally, the H‐BTR‐based OSA is compared to two other schemes, the handoff without BTR (HWBTR)‐based OSA and the stop‐and‐waiting (SW)‐based OSA. Theoretical and simulated results show that the H‐BTR‐based OSA performs best among three schemes. Making H‐BTR in moderate frequency according to service traffic rate can increase transmission opportunity while additional delay of SU is tolerable, thus the performance of OSA can be well improved.
机会性频谱接入(OSA)是解决无线电频谱稀缺问题的一项前景广阔的技术,但它仍然面临着一些挑战,其中之一就是次级用户(SU)为避开主用户(PU)而可能频繁进行信道切换(CH)甚至切换阻塞(HB)。重新接入是解决 HB 的直接方法。然而,多次切换阻塞-重接入(H-BTR)非常耗时。是否值得进行多次 H-BTR 是一个有趣但很少被提及的问题。为此,本文重点讨论了基于多重 H-BTR 的 OSA。首先推导出基于 H-BTR 的 OSA 中 SU 的平均传输概率、切换延迟和平均再访问时间这三个关键指标的近似形式。然后,讨论了 H-BTR 频率和 SU 的服务流量率对 OSA 的影响。最后,比较了基于 H-BTR 的 OSA 和其他两种方案,即基于无 BTR 移交(HWBTR)的 OSA 和基于停止等待(SW)的 OSA。理论和模拟结果表明,基于 H-BTR 的 OSA 在三种方案中表现最佳。根据服务流量速率以适度频率进行 H-BTR 可以增加传输机会,同时 SU 的额外延迟是可容忍的,因此 OSA 的性能可以得到很好的改善。
{"title":"On multiple handoff blocking‐then‐reaccess for opportunistic spectrum access","authors":"Jing Zhang, Chu‐Long Liang, Hong‐Xu Gao, Yan He, Hong‐Bo Zhu","doi":"10.1049/cmu2.12733","DOIUrl":"https://doi.org/10.1049/cmu2.12733","url":null,"abstract":"Opportunistic spectrum access (OSA), a promising technology to resolve radio spectrum scarcity, is still faced with some challenges, of which one is potentially frequent channel handoff (CH) even handoff blocking (HB) for secondary user (SU) to avoid primary user (PU). Reaccess is a direct way to resolve HB. However, multiple handoff blocking‐then‐reaccess (H‐BTR) are time consuming. Whether it is worthwhile to make multiple H‐BTR, is an interesting but hardly mentioned issue. To this end, the multiple H‐BTR‐based OSA are focused on here. Three key indices, the average transmission probability, handoff delay, and average reaccess times of SU in the H‐BTR‐based OSA, are deduced as close form first. Then, the effects of H‐BTR frequency and service traffic rate of SU on OSA are discussed. Finally, the H‐BTR‐based OSA is compared to two other schemes, the handoff without BTR (HWBTR)‐based OSA and the stop‐and‐waiting (SW)‐based OSA. Theoretical and simulated results show that the H‐BTR‐based OSA performs best among three schemes. Making H‐BTR in moderate frequency according to service traffic rate can increase transmission opportunity while additional delay of SU is tolerable, thus the performance of OSA can be well improved.","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139868072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On multiple handoff blocking-then-reaccess for opportunistic spectrum access 关于机会主义频谱接入的多重交接阻塞-再接入
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-02-03 DOI: 10.1049/cmu2.12733
Jing Zhang, Chu-Long Liang, Hong-Xu Gao, Yan He, Hong-Bo Zhu

Opportunistic spectrum access (OSA), a promising technology to resolve radio spectrum scarcity, is still faced with some challenges, of which one is potentially frequent channel handoff (CH) even handoff blocking (HB) for secondary user (SU) to avoid primary user (PU). Reaccess is a direct way to resolve HB. However, multiple handoff blocking-then-reaccess (H-BTR) are time consuming. Whether it is worthwhile to make multiple H-BTR, is an interesting but hardly mentioned issue. To this end, the multiple H-BTR-based OSA are focused on here. Three key indices, the average transmission probability, handoff delay, and average reaccess times of SU in the H-BTR-based OSA, are deduced as close form first. Then, the effects of H-BTR frequency and service traffic rate of SU on OSA are discussed. Finally, the H-BTR-based OSA is compared to two other schemes, the handoff without BTR (HWBTR)-based OSA and the stop-and-waiting (SW)-based OSA. Theoretical and simulated results show that the H-BTR-based OSA performs best among three schemes. Making H-BTR in moderate frequency according to service traffic rate can increase transmission opportunity while additional delay of SU is tolerable, thus the performance of OSA can be well improved.

机会性频谱接入(OSA)是解决无线电频谱稀缺问题的一项前景广阔的技术,但它仍然面临着一些挑战,其中之一就是次级用户(SU)为避开主用户(PU)而可能频繁进行信道切换(CH)甚至切换阻塞(HB)。重新接入是解决 HB 的直接方法。然而,多次切换阻塞-重接入(H-BTR)非常耗时。是否值得进行多次 H-BTR 是一个有趣但很少被提及的问题。为此,本文重点讨论了基于多重 H-BTR 的 OSA。首先推导出基于 H-BTR 的 OSA 中 SU 的平均传输概率、切换延迟和平均再访问时间这三个关键指标的近似形式。然后,讨论了 H-BTR 频率和 SU 的服务流量率对 OSA 的影响。最后,比较了基于 H-BTR 的 OSA 和其他两种方案,即基于无 BTR 移交(HWBTR)的 OSA 和基于停止等待(SW)的 OSA。理论和模拟结果表明,基于 H-BTR 的 OSA 在三种方案中表现最佳。根据服务流量速率以适度频率进行 H-BTR 可以增加传输机会,同时 SU 的额外延迟是可容忍的,因此 OSA 的性能可以得到很好的改善。
{"title":"On multiple handoff blocking-then-reaccess for opportunistic spectrum access","authors":"Jing Zhang,&nbsp;Chu-Long Liang,&nbsp;Hong-Xu Gao,&nbsp;Yan He,&nbsp;Hong-Bo Zhu","doi":"10.1049/cmu2.12733","DOIUrl":"10.1049/cmu2.12733","url":null,"abstract":"<p>Opportunistic spectrum access (OSA), a promising technology to resolve radio spectrum scarcity, is still faced with some challenges, of which one is potentially frequent channel handoff (CH) even handoff blocking (HB) for secondary user (SU) to avoid primary user (PU). Reaccess is a direct way to resolve HB. However, multiple handoff blocking-then-reaccess (H-BTR) are time consuming. Whether it is worthwhile to make multiple H-BTR, is an interesting but hardly mentioned issue. To this end, the multiple H-BTR-based OSA are focused on here. Three key indices, the average transmission probability, handoff delay, and average reaccess times of SU in the H-BTR-based OSA, are deduced as close form first. Then, the effects of H-BTR frequency and service traffic rate of SU on OSA are discussed. Finally, the H-BTR-based OSA is compared to two other schemes, the handoff without BTR (HWBTR)-based OSA and the stop-and-waiting (SW)-based OSA. Theoretical and simulated results show that the H-BTR-based OSA performs best among three schemes. Making H-BTR in moderate frequency according to service traffic rate can increase transmission opportunity while additional delay of SU is tolerable, thus the performance of OSA can be well improved.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12733","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139808165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract SybilPSIoT:基于信任网络和智能合约,防止签名社交物联网中的假冒攻击
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-01-31 DOI: 10.1049/cmu2.12734
Aboulfazl Dayyani, Maghsoud Abbaspour

Sybil attacks are a very serious challenge in social networks including, the Social Internet of Things (SIoT). This paper introduces the SybilPSIoT method, in which a hybrid prevention and detection decentralized approach is proposed in SIoT based on smart contracts. The owner adds his objects to the smart contract. However, hostile owners can create Sybil things. This paper formally presents a model that uses a signed SIoT network with objects and identifiers as network nodes and information about the type of nodes (acknowledgers). Assuming the relationship between the edge marks between nodes and the node type, the proposed method uses trust paths between verification and desired nodes using a Bayesian inference model and structural balance patterns to judge the target node in these paths. It also uses game theory to control access owners to prevent Sybil from creating new things based on a cost-benefit function. Based on the analysis method, a validating effect proportional to the path length on the target object was presented. This method was compared with the most novel available methods; the results from this comparison depict the scalability and effectiveness of the proposed method for large networks.

在包括社交物联网(SIoT)在内的社交网络中,Sybil 攻击是一个非常严峻的挑战。本文介绍了 SybilPSIoT 方法,其中提出了一种基于智能合约的 SIoT 混合预防和检测分散方法。所有者将其对象添加到智能合约中。然而,有敌意的所有者可以创建 Sybil 物件。本文正式提出了一个模型,该模型使用一个签名的 SIoT 网络,将对象和标识符作为网络节点,并提供节点类型的信息(确认器)。假定节点之间的边缘标记与节点类型之间存在关系,所提出的方法利用贝叶斯推理模型和结构平衡模式,使用验证与期望节点之间的信任路径来判断这些路径中的目标节点。它还利用博弈论控制访问所有者,以防止 Sybil 基于成本效益函数创造新事物。根据分析方法,提出了与目标对象路径长度成正比的验证效果。该方法与现有的最新颖方法进行了比较;比较结果表明了所提方法在大型网络中的可扩展性和有效性。
{"title":"SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract","authors":"Aboulfazl Dayyani,&nbsp;Maghsoud Abbaspour","doi":"10.1049/cmu2.12734","DOIUrl":"https://doi.org/10.1049/cmu2.12734","url":null,"abstract":"<p>Sybil attacks are a very serious challenge in social networks including, the Social Internet of Things (SIoT). This paper introduces the SybilPSIoT method, in which a hybrid prevention and detection decentralized approach is proposed in SIoT based on smart contracts. The owner adds his objects to the smart contract. However, hostile owners can create Sybil things. This paper formally presents a model that uses a signed SIoT network with objects and identifiers as network nodes and information about the type of nodes (acknowledgers). Assuming the relationship between the edge marks between nodes and the node type, the proposed method uses trust paths between verification and desired nodes using a Bayesian inference model and structural balance patterns to judge the target node in these paths. It also uses game theory to control access owners to prevent Sybil from creating new things based on a cost-benefit function. Based on the analysis method, a validating effect proportional to the path length on the target object was presented. This method was compared with the most novel available methods; the results from this comparison depict the scalability and effectiveness of the proposed method for large networks.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12734","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139732270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impairment-aware resource allocation scheme for elastic optical networks with different service priorities 针对具有不同服务优先级的弹性光网络的损伤感知资源分配方案
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-01-29 DOI: 10.1049/cmu2.12702
Kusala Munasinghe, Nishan Dharmaweera, Chamitha de Alwis, Uditha Wijewardhana, Rajendran Parthiban

Today, elastic optical networks (EONs) are required to accommodate traffic with different service priorities. For example, mission-critical applications such as industrial internet, smart grids, and remote surgery require an ultra-reliable low-latency communication system. The novel impairment-aware resource allocation scheme proposed here prioritises traffic. It satisfies the quality and latency requirements of mission-critical traffic while causing minimum disruptions to other forms of low-priority traffic connections. The results obtained for 6-node and 14-node networks under various traffic distribution environments indicate that the proposed algorithm achieves higher spectral efficiency, reduces spectrum fragmentation, and causes minimal disruptions over the benchmark algorithm.

如今,弹性光网络(EON)需要适应不同服务优先级的流量。例如,工业互联网、智能电网和远程手术等关键任务应用需要超可靠的低延迟通信系统。本文提出的新型损伤感知资源分配方案可确定流量的优先级。它既能满足关键任务流量的质量和延迟要求,又能对其他形式的低优先级流量连接造成最小的干扰。在不同流量分配环境下对 6 节点和 14 节点网络的研究结果表明,与基准算法相比,所提出的算法能实现更高的频谱效率,减少频谱碎片,并将干扰降至最低。
{"title":"Impairment-aware resource allocation scheme for elastic optical networks with different service priorities","authors":"Kusala Munasinghe,&nbsp;Nishan Dharmaweera,&nbsp;Chamitha de Alwis,&nbsp;Uditha Wijewardhana,&nbsp;Rajendran Parthiban","doi":"10.1049/cmu2.12702","DOIUrl":"https://doi.org/10.1049/cmu2.12702","url":null,"abstract":"<p>Today, elastic optical networks (EONs) are required to accommodate traffic with different service priorities. For example, mission-critical applications such as industrial internet, smart grids, and remote surgery require an ultra-reliable low-latency communication system. The novel impairment-aware resource allocation scheme proposed here prioritises traffic. It satisfies the quality and latency requirements of mission-critical traffic while causing minimum disruptions to other forms of low-priority traffic connections. The results obtained for 6-node and 14-node networks under various traffic distribution environments indicate that the proposed algorithm achieves higher spectral efficiency, reduces spectrum fragmentation, and causes minimal disruptions over the benchmark algorithm.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12702","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139732404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization of sampling point and sensing threshold for spectrum sensing 联合优化频谱传感的采样点和传感阈值
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-01-29 DOI: 10.1049/cmu2.12730
Yuebo Li, Wenjiang Ouyang, Jiawu Miao, Junsheng Mu, Xiaojun Jing

With the continuous evolution and in-depth integration between wireless communication and emerging technology such as internet of things (IoT), artificial intelligence (AI) etc., wireless terminals are growing exponentially, thus bringing great challenges to available spectrum resources. The contradiction between unlimited frequency needs and limited spectrum resources has become a bottleneck restricting the development of wireless communication technology. As an efficient way to improve spectrum efficiency, cognitive radio (CR) continues to be the focus of wireless communication within decades. To conduct CR, the main procedure is the discovery of available spectral holes by periodically monitoring the target authorized band, namely spectrum sensing (SS). Energy detector (ED) is widely accepted for SS due to its low complexity and high convenience. The essence of traditional ED based SS schemes consist in the adaptive variation of sensing threshold/sampling point with environmental signal-to-noise ratio (SNR) at the receiver of CR terminal, namely adaptive sensing threshold/sampling point based SS. However, the performance of both adaptive sensing threshold and adaptive sampling point based SS schemes are always at the expense of computation complexity due to the excessive sampling point. In addition, these two schemes are both about the optimization issue of a single variable under constraints. Actually, both detection probability and false alarm probability of ED are a two-dimensional function of sensing threshold and sampling point for a given SNR. The optimal solution of sensing performance can not be obtained by optimizing sensing threshold or sampling point alone. Motivated by these, the joint optimization of sampling point and sensing threshold is considered for SS in this paper, where sampling point and sensing threshold are jointly adaptive with the variation of environmental SNR. In addition, Q-learning is considered in this paper to obtain the sub-optimal solution due to the non-convexity of the considered optimization problem. Finally, the simulation experiments are made and the results validate the effectiveness of the proposed scheme.

随着无线通信与物联网、人工智能等新兴技术的不断演进和深度融合,无线终端呈指数级增长,给可用频谱资源带来巨大挑战。无限的频率需求与有限的频谱资源之间的矛盾已成为制约无线通信技术发展的瓶颈。作为提高频谱效率的有效途径,认知无线电(CR)在几十年内仍是无线通信领域的焦点。开展认知无线电通信的主要程序是通过定期监测目标授权频段来发现可用的频谱空洞,即频谱感知(SS)。能量探测器(ED)因其低复杂性和高便利性而被广泛用于频谱感测。传统的基于 ED 的频谱感知方案的精髓在于随着 CR 终端接收器的环境信噪比(SNR)而自适应地改变感知阈值/采样点,即基于自适应感知阈值/采样点的频谱感知。然而,基于自适应感应阈值和自适应采样点的 SS 方案的性能总是以采样点过多导致的计算复杂度为代价。此外,这两种方案都涉及约束条件下单一变量的优化问题。实际上,在给定信噪比下,ED 的检测概率和误报概率都是感测阈值和采样点的二维函数。仅优化感测阈值或采样点无法获得感测性能的最优解。受此启发,本文考虑对 SS 进行采样点和传感阈值的联合优化,其中采样点和传感阈值随环境 SNR 的变化而联合自适应。此外,由于所考虑的优化问题具有非凸性,本文还考虑了 Q-learning 来获得次优解。最后,本文进行了仿真实验,结果验证了所提方案的有效性。
{"title":"Joint optimization of sampling point and sensing threshold for spectrum sensing","authors":"Yuebo Li,&nbsp;Wenjiang Ouyang,&nbsp;Jiawu Miao,&nbsp;Junsheng Mu,&nbsp;Xiaojun Jing","doi":"10.1049/cmu2.12730","DOIUrl":"https://doi.org/10.1049/cmu2.12730","url":null,"abstract":"<p>With the continuous evolution and in-depth integration between wireless communication and emerging technology such as internet of things (IoT), artificial intelligence (AI) etc., wireless terminals are growing exponentially, thus bringing great challenges to available spectrum resources. The contradiction between unlimited frequency needs and limited spectrum resources has become a bottleneck restricting the development of wireless communication technology. As an efficient way to improve spectrum efficiency, cognitive radio (CR) continues to be the focus of wireless communication within decades. To conduct CR, the main procedure is the discovery of available spectral holes by periodically monitoring the target authorized band, namely spectrum sensing (SS). Energy detector (ED) is widely accepted for SS due to its low complexity and high convenience. The essence of traditional ED based SS schemes consist in the adaptive variation of sensing threshold/sampling point with environmental signal-to-noise ratio (SNR) at the receiver of CR terminal, namely adaptive sensing threshold/sampling point based SS. However, the performance of both adaptive sensing threshold and adaptive sampling point based SS schemes are always at the expense of computation complexity due to the excessive sampling point. In addition, these two schemes are both about the optimization issue of a single variable under constraints. Actually, both detection probability and false alarm probability of ED are a two-dimensional function of sensing threshold and sampling point for a given SNR. The optimal solution of sensing performance can not be obtained by optimizing sensing threshold or sampling point alone. Motivated by these, the joint optimization of sampling point and sensing threshold is considered for SS in this paper, where sampling point and sensing threshold are jointly adaptive with the variation of environmental SNR. In addition, Q-learning is considered in this paper to obtain the sub-optimal solution due to the non-convexity of the considered optimization problem. Finally, the simulation experiments are made and the results validate the effectiveness of the proposed scheme.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12730","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139732405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards practical implementation of molecular communication: A cost-effective experimental platform based on the human circulatory system 实现分子通讯的实际应用:基于人体循环系统的低成本高效益实验平台
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-01-24 DOI: 10.1049/cmu2.12731
Mohammad Bayat, Mohammad Mostafavi, Abazar Arabameri

Recently, there have been numerous studies exploring the field of molecular communication (MC) systems. However, due to the high cost and limited availability of advanced micro/nano-scale equipment, most of these works remain purely theoretical, with only a few being examined through experimental platforms. Additionally, the absence of a suitable model for flow-assisted MC-based systems poses another significant challenge. This research focuses on the potential applications of MC technology within the human body. To address the limitations mentioned above, a closed-loop experimental platform based on the human circulatory system is proposed. This platform offers a cost-effective and accessible solution for studying MC systems. The implementation process involves a brief discussion about the circulatory system model. By varying flow rates and the quantity of released information particles, channel impulse responses are obtained. Based on the observed experimental data, the authors have successfully developed a new theoretical model that accurately fits the experimental data. The model demonstrates a strong level of agreement with the observed results. This model demonstrates its suitability for flow-assisted MC-based systems.

近来,分子通讯(MC)系统领域的探索研究层出不穷。然而,由于先进的微米/纳米级设备成本高昂且可用性有限,这些研究大多停留在纯理论层面,只有少数通过实验平台进行了研究。此外,缺乏适合基于流动辅助 MC 系统的模型也是另一个重大挑战。本研究侧重于 MC 技术在人体中的潜在应用。针对上述局限性,我们提出了一个基于人体循环系统的闭环实验平台。该平台为研究 MC 系统提供了一个成本效益高且易于使用的解决方案。实施过程包括对循环系统模型的简要讨论。通过改变流速和释放的信息粒子数量,获得通道脉冲响应。根据观察到的实验数据,作者成功地建立了一个能准确拟合实验数据的新理论模型。该模型与观测结果高度吻合。该模型证明了它适用于基于流量辅助的 MC 系统。
{"title":"Towards practical implementation of molecular communication: A cost-effective experimental platform based on the human circulatory system","authors":"Mohammad Bayat,&nbsp;Mohammad Mostafavi,&nbsp;Abazar Arabameri","doi":"10.1049/cmu2.12731","DOIUrl":"10.1049/cmu2.12731","url":null,"abstract":"<p>Recently, there have been numerous studies exploring the field of molecular communication (MC) systems. However, due to the high cost and limited availability of advanced micro/nano-scale equipment, most of these works remain purely theoretical, with only a few being examined through experimental platforms. Additionally, the absence of a suitable model for flow-assisted MC-based systems poses another significant challenge. This research focuses on the potential applications of MC technology within the human body. To address the limitations mentioned above, a closed-loop experimental platform based on the human circulatory system is proposed. This platform offers a cost-effective and accessible solution for studying MC systems. The implementation process involves a brief discussion about the circulatory system model. By varying flow rates and the quantity of released information particles, channel impulse responses are obtained. Based on the observed experimental data, the authors have successfully developed a new theoretical model that accurately fits the experimental data. The model demonstrates a strong level of agreement with the observed results. This model demonstrates its suitability for flow-assisted MC-based systems.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12731","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139599470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent reflecting surface-assisted UAV inspection system based on transfer learning 基于迁移学习的智能反射面辅助无人机检测系统
IF 1.6 4区 计算机科学 Q2 Computer Science Pub Date : 2024-01-23 DOI: 10.1049/cmu2.12718
Yifan Du, Nan Qi, Kewei Wang, Ming Xiao, Wenjing Wang

Intelligent reflective surface (IRS) provides an effective solution for reconfiguring air-to-ground wireless channels, and intelligent agents based on reinforcement learning can dynamically adjust the reflection coefficient of IRS to adapt to changing channels. However, most exiting IRS configuration schemes based on reinforcement learning require long training time and are difficult to be industrially deployed. This paper, proposes a model-free IRS control scheme based on reinforcement learning and adopts transfer learning to accelerate the training process. A knowledge base of the source tasks has been constructed for transfer learning, allowing accumulation of experience from different source tasks. To mitigate potential negative effects of transfer learning, quantitative analysis of task similarity through unmanned aerial vehicle (UAV) flight path is conducted. After identifying the most similar source task to the target task, parameters of the source task model are used as the initial values for the target task model to accelerate the convergence process of reinforcement learning. Simulation results demonstrate that the proposed method can increase the convergence speed of the traditional DDQN algorithm by up to 60%.

智能反射面(IRS)为空对地无线信道的重新配置提供了有效的解决方案,基于强化学习的智能代理可以动态调整 IRS 的反射系数,以适应不断变化的信道。然而,现有的基于强化学习的 IRS 配置方案大多需要较长的训练时间,难以实现工业化部署。本文提出了一种基于强化学习的无模型 IRS 控制方案,并采用迁移学习来加速训练过程。为迁移学习构建了源任务知识库,允许从不同的源任务中积累经验。为减轻迁移学习可能带来的负面影响,通过无人飞行器(UAV)的飞行路径对任务相似性进行了定量分析。在确定与目标任务最相似的源任务后,将源任务模型的参数作为目标任务模型的初始值,以加速强化学习的收敛过程。仿真结果表明,所提出的方法可将传统 DDQN 算法的收敛速度提高 60%。
{"title":"Intelligent reflecting surface-assisted UAV inspection system based on transfer learning","authors":"Yifan Du,&nbsp;Nan Qi,&nbsp;Kewei Wang,&nbsp;Ming Xiao,&nbsp;Wenjing Wang","doi":"10.1049/cmu2.12718","DOIUrl":"10.1049/cmu2.12718","url":null,"abstract":"<p>Intelligent reflective surface (IRS) provides an effective solution for reconfiguring air-to-ground wireless channels, and intelligent agents based on reinforcement learning can dynamically adjust the reflection coefficient of IRS to adapt to changing channels. However, most exiting IRS configuration schemes based on reinforcement learning require long training time and are difficult to be industrially deployed. This paper, proposes a model-free IRS control scheme based on reinforcement learning and adopts transfer learning to accelerate the training process. A knowledge base of the source tasks has been constructed for transfer learning, allowing accumulation of experience from different source tasks. To mitigate potential negative effects of transfer learning, quantitative analysis of task similarity through unmanned aerial vehicle (UAV) flight path is conducted. After identifying the most similar source task to the target task, parameters of the source task model are used as the initial values for the target task model to accelerate the convergence process of reinforcement learning. Simulation results demonstrate that the proposed method can increase the convergence speed of the traditional DDQN algorithm by up to 60%.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12718","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139604981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1