首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey IP-ICN共存的安全性和隐私性:综合调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-13 DOI: 10.1109/COMST.2023.3295182
Enkeleda Bardhi;Mauro Conti;Riccardo Lazzeretti;Eleonora Losiouk
Today’s Internet is experiencing a massive number of users with a continuously increasing need for data, which is the leading cause of introduced limitations among security and privacy issues. To overcome these limitations, a shift from host-centric to data-centric is proposed, and in this context, Information-Centric Networking (ICN) represents a promising solution. Nevertheless, unsettling the current Internet’s network layer – i.e., Internet Protocol (IP) – with ICN is a challenging, expensive task since it requires worldwide coordination among Internet Service Providers (ISPs), backbone, and Autonomous Services (AS). Therefore, researchers foresee that the replacement process of the current Internet will transition through the coexistence of IP and ICN. In this perspective, novel architectures combine IP and ICN protocols. However, only a few of the proposed architectures place the security-by-design feature. Therefore, this article provides the first comprehensive Security and Privacy (SP) analysis of the state-of-the-art IP-ICN coexistence architectures by horizontally comparing the SP features among three deployment approaches – i.e., overlay, underlay, and hybrid – and vertically comparing among the ten considered SP features. Lastly, the article sheds light on the open issues and possible future directions for IP-ICN coexistence. Our analysis shows that most architectures fail to provide several SP features, including data and traffic flow confidentiality, availability, and anonymity of communication. Thus, this article shows the secure combination of current and future protocol stacks during the coexistence phase that the Internet will definitely walk across.
今天的互联网用户数量庞大,对数据的需求不断增加,这是安全和隐私问题引入限制的主要原因。为了克服这些限制,建议从以主机为中心转向以数据为中心,在这种情况下,以信息为中心的网络(Information-Centric Networking, ICN)代表了一个很有前途的解决方案。然而,用ICN扰乱当前的互联网网络层——即互联网协议(IP)——是一项具有挑战性和昂贵的任务,因为它需要互联网服务提供商(isp)、骨干网和自治服务(AS)之间的全球协调。因此,研究者预测当前互联网的更替过程将通过IP和ICN的共存进行过渡。从这个角度来看,新的架构结合了IP和ICN协议。然而,只有少数被提议的体系结构提供了基于设计的安全性特性。因此,本文通过横向比较三种部署方法(即覆盖、底层和混合)中的SP特性,以及纵向比较10种考虑的SP特性,首次对最先进的IP-ICN共存架构进行了全面的安全和隐私(SP)分析。最后,文章阐明了IP-ICN共存的开放问题和可能的未来方向。我们的分析表明,大多数架构都不能提供几个SP特性,包括数据和流量的机密性、可用性和通信的匿名性。因此,本文将展示当前和未来协议栈在共存阶段的安全组合,而互联网肯定会走过这一阶段。
{"title":"Security and Privacy of IP-ICN Coexistence: A Comprehensive Survey","authors":"Enkeleda Bardhi;Mauro Conti;Riccardo Lazzeretti;Eleonora Losiouk","doi":"10.1109/COMST.2023.3295182","DOIUrl":"10.1109/COMST.2023.3295182","url":null,"abstract":"Today’s Internet is experiencing a massive number of users with a continuously increasing need for data, which is the leading cause of introduced limitations among security and privacy issues. To overcome these limitations, a shift from host-centric to data-centric is proposed, and in this context, Information-Centric Networking (ICN) represents a promising solution. Nevertheless, unsettling the current Internet’s network layer – i.e., Internet Protocol (IP) – with ICN is a challenging, expensive task since it requires worldwide coordination among Internet Service Providers (ISPs), backbone, and Autonomous Services (AS). Therefore, researchers foresee that the replacement process of the current Internet will transition through the coexistence of IP and ICN. In this perspective, novel architectures combine IP and ICN protocols. However, only a few of the proposed architectures place the security-by-design feature. Therefore, this article provides the first comprehensive Security and Privacy (SP) analysis of the state-of-the-art IP-ICN coexistence architectures by horizontally comparing the SP features among three deployment approaches – i.e., overlay, underlay, and hybrid – and vertically comparing among the ten considered SP features. Lastly, the article sheds light on the open issues and possible future directions for IP-ICN coexistence. Our analysis shows that most architectures fail to provide several SP features, including data and traffic flow confidentiality, availability, and anonymity of communication. Thus, this article shows the secure combination of current and future protocol stacks during the coexistence phase that the Internet will definitely walk across.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2427-2455"},"PeriodicalIF":35.6,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135733696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MIMO Satellite Communication Systems: A Survey From the PHY Layer Perspective MIMO卫星通信系统:从物理层角度的综述
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-12 DOI: 10.1109/COMST.2023.3294873
Jehyun Heo;Seungwoo Sung;Hyunwoo Lee;Incheol Hwang;Daesik Hong
The satellite communications (SatCom) system is a representative technology for global coverage and seamless communications in next-generation communication systems. This paper is a survey of basic studies and recent research trends for multiple input multiple output (MIMO) SatCom. Specifically, we describe and provide the differences between terrestrial networks and SatCom. Furthermore, we categorize the scenarios mainly considered in the MIMO SatCom systems and major research topics in those scenarios. We also summarize the most important technical issues currently being researched in MIMO SatCom systems, and list future works to be studied based on this. This survey is recommended for researchers who are starting research on SatCom systems or those who wish to understand the research trends associated with MIMO SatCom systems.
卫星通信(SatCom)系统是下一代通信系统中全球覆盖和无缝通信的代表性技术。本文综述了多输入多输出卫星通信的基础研究和最新研究趋势。具体而言,我们描述并提供了地面网络和卫星通信之间的差异。此外,我们对MIMO卫星通信系统中主要考虑的场景以及这些场景中的主要研究主题进行了分类。我们还总结了目前MIMO卫星通信系统中最重要的技术问题,并在此基础上列出了未来需要研究的工作。这项调查推荐给正在开始研究卫星通信系统的研究人员或希望了解MIMO卫星通信系统相关研究趋势的研究人员。
{"title":"MIMO Satellite Communication Systems: A Survey From the PHY Layer Perspective","authors":"Jehyun Heo;Seungwoo Sung;Hyunwoo Lee;Incheol Hwang;Daesik Hong","doi":"10.1109/COMST.2023.3294873","DOIUrl":"https://doi.org/10.1109/COMST.2023.3294873","url":null,"abstract":"The satellite communications (SatCom) system is a representative technology for global coverage and seamless communications in next-generation communication systems. This paper is a survey of basic studies and recent research trends for multiple input multiple output (MIMO) SatCom. Specifically, we describe and provide the differences between terrestrial networks and SatCom. Furthermore, we categorize the scenarios mainly considered in the MIMO SatCom systems and major research topics in those scenarios. We also summarize the most important technical issues currently being researched in MIMO SatCom systems, and list future works to be studied based on this. This survey is recommended for researchers who are starting research on SatCom systems or those who wish to understand the research trends associated with MIMO SatCom systems.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1543-1570"},"PeriodicalIF":35.6,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions 纠缠辅助量子网络:力学、使能技术、挑战和研究方向
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-11 DOI: 10.1109/COMST.2023.3294240
Zhonghui Li;Kaiping Xue;Jian Li;Lutong Chen;Ruidong Li;Zhaoying Wang;Nenghai Yu;David S. L. Wei;Qibin Sun;Jun Lu
Over the past few decades, significant progress has been made in quantum information technology, from theoretical studies to experimental demonstrations. Revolutionary quantum applications are now in the limelight, showcasing the advantages of quantum information technology and becoming a research hotspot in academia and industry. To enable quantum applications to have a more profound impact and wider application, the interconnection of multiple quantum nodes through quantum channels becomes essential. Building an entanglement-assisted quantum network, capable of realizing quantum information transmission between these quantum nodes, is the primary goal. However, entanglement-assisted quantum networks are governed by the unique laws of quantum mechanics, such as the superposition principle, the no-cloning theorem, and quantum entanglement, setting them apart from classical networks. Consequently, fundamental efforts are required to establish entanglement-assisted quantum networks. While some insightful surveys have paved the way for entanglement-assisted quantum networks, most of these studies focus on enabling technologies and quantum applications, neglecting critical network issues. In response, this paper presents a comprehensive survey of entanglement-assisted quantum networks. Alongside reviewing fundamental mechanics and enabling technologies, the paper provides a detailed overview of the network structure, working principles, and development stages, highlighting the differences from classical networks. Additionally, the challenges of building wide-area entanglement-assisted quantum networks are addressed. Furthermore, the paper emphasizes open research directions, including architecture design, entanglement-based network issues, and standardization, to facilitate the implementation of future entanglement-assisted quantum networks.
在过去的几十年里,量子信息技术从理论研究到实验演示都取得了重大进展。革命性的量子应用正在成为人们关注的焦点,展示了量子信息技术的优势,成为学术界和工业界的研究热点。为了使量子应用产生更深远的影响和更广泛的应用,通过量子通道实现多个量子节点的互连变得至关重要。构建一个能够在这些量子节点之间实现量子信息传输的纠缠辅助量子网络是主要目标。然而,纠缠辅助量子网络是由独特的量子力学定律,如叠加原理,不可克隆定理,量子纠缠,使它们区别于经典网络。因此,建立纠缠辅助量子网络需要基础的努力。虽然一些有见地的调查为纠缠辅助量子网络铺平了道路,但这些研究大多侧重于使能技术和量子应用,而忽略了关键的网络问题。作为回应,本文对纠缠辅助量子网络进行了全面的综述。除了回顾基本机制和使能技术外,本文还详细概述了网络结构,工作原理和发展阶段,并强调了与经典网络的区别。此外,还解决了构建广域纠缠辅助量子网络的挑战。此外,本文强调开放的研究方向,包括架构设计、基于纠缠的网络问题和标准化,以促进未来纠缠辅助量子网络的实现。
{"title":"Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions","authors":"Zhonghui Li;Kaiping Xue;Jian Li;Lutong Chen;Ruidong Li;Zhaoying Wang;Nenghai Yu;David S. L. Wei;Qibin Sun;Jun Lu","doi":"10.1109/COMST.2023.3294240","DOIUrl":"10.1109/COMST.2023.3294240","url":null,"abstract":"Over the past few decades, significant progress has been made in quantum information technology, from theoretical studies to experimental demonstrations. Revolutionary quantum applications are now in the limelight, showcasing the advantages of quantum information technology and becoming a research hotspot in academia and industry. To enable quantum applications to have a more profound impact and wider application, the interconnection of multiple quantum nodes through quantum channels becomes essential. Building an entanglement-assisted quantum network, capable of realizing quantum information transmission between these quantum nodes, is the primary goal. However, entanglement-assisted quantum networks are governed by the unique laws of quantum mechanics, such as the superposition principle, the no-cloning theorem, and quantum entanglement, setting them apart from classical networks. Consequently, fundamental efforts are required to establish entanglement-assisted quantum networks. While some insightful surveys have paved the way for entanglement-assisted quantum networks, most of these studies focus on enabling technologies and quantum applications, neglecting critical network issues. In response, this paper presents a comprehensive survey of entanglement-assisted quantum networks. Alongside reviewing fundamental mechanics and enabling technologies, the paper provides a detailed overview of the network structure, working principles, and development stages, highlighting the differences from classical networks. Additionally, the challenges of building wide-area entanglement-assisted quantum networks are addressed. Furthermore, the paper emphasizes open research directions, including architecture design, entanglement-based network issues, and standardization, to facilitate the implementation of future entanglement-assisted quantum networks.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 4","pages":"2133-2189"},"PeriodicalIF":35.6,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130073817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Survey on Applications of Cache-Aided NOMA 缓存辅助NOMA的应用综述
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-07 DOI: 10.1109/COMST.2023.3293231
Dipen Bepari;Soumen Mondal;Aniruddha Chandra;Rajeev Shukla;Yuanwei Liu;Mohsen Guizani;Arumugam Nallanathan
Contrary to orthogonal multiple-access (OMA), non-orthogonal multiple-access (NOMA) schemes can serve a pool of users without exploiting the scarce frequency or time domain resources. This is useful in meeting the future network requirements (5G and beyond systems), such as, low latency, massive connectivity, users’ fairness, and high spectral efficiency. On the other hand, content caching restricts duplicate data transmission by storing popular contents in advance at the network edge which reduces data traffic. In this survey, we focus on cache-aided NOMA-based wireless networks which can reap the benefits of both cache and NOMA; switching to NOMA from OMA enables cache-aided networks to push additional files to content servers in parallel and improve the cache hit probability. Beginning with fundamentals of the cache-aided NOMA technology, we summarize the performance goals of cache-aided NOMA systems, present the associated design challenges, and categorize the recent related literature based on their application verticals. Concomitant standardization activities and open research challenges are highlighted as well.
与正交多址(OMA)相反,非正交多址方案可以在不利用稀缺的频域或时域资源的情况下为用户池提供服务。这有助于满足未来的网络需求(5G及其他系统),如低延迟、大规模连接、用户公平性和高频谱效率。另一方面,内容缓存通过在网络边缘预先存储流行内容来限制重复数据传输,从而减少了数据流量。在这项调查中,我们重点关注基于缓存辅助NOMA的无线网络,它可以同时获得缓存和NOMA的好处;从OMA切换到NOMA使得缓存辅助网络能够并行地将附加文件推送到内容服务器,并提高缓存命中概率。从缓存辅助NOMA技术的基本原理开始,我们总结了缓存辅助NOMA系统的性能目标,提出了相关的设计挑战,并根据其垂直应用对最近的相关文献进行了分类。同时也强调了标准化活动和开放研究的挑战。
{"title":"A Survey on Applications of Cache-Aided NOMA","authors":"Dipen Bepari;Soumen Mondal;Aniruddha Chandra;Rajeev Shukla;Yuanwei Liu;Mohsen Guizani;Arumugam Nallanathan","doi":"10.1109/COMST.2023.3293231","DOIUrl":"https://doi.org/10.1109/COMST.2023.3293231","url":null,"abstract":"Contrary to orthogonal multiple-access (OMA), non-orthogonal multiple-access (NOMA) schemes can serve a pool of users without exploiting the scarce frequency or time domain resources. This is useful in meeting the future network requirements (5G and beyond systems), such as, low latency, massive connectivity, users’ fairness, and high spectral efficiency. On the other hand, content caching restricts duplicate data transmission by storing popular contents in advance at the network edge which reduces data traffic. In this survey, we focus on cache-aided NOMA-based wireless networks which can reap the benefits of both cache and NOMA; switching to NOMA from OMA enables cache-aided networks to push additional files to content servers in parallel and improve the cache hit probability. Beginning with fundamentals of the cache-aided NOMA technology, we summarize the performance goals of cache-aided NOMA systems, present the associated design challenges, and categorize the recent related literature based on their application verticals. Concomitant standardization activities and open research challenges are highlighted as well.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1571-1603"},"PeriodicalIF":35.6,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey of Public IoT Datasets for Network Security Research 面向网络安全研究的公共物联网数据集综述
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-23 DOI: 10.1109/COMST.2023.3288942
François De Keersmaeker;Yinan Cao;Gorby Kabasele Ndonda;Ramin Sadre
Publicly available datasets are an indispensable tool for researchers, as they allow testing new algorithms on a wide range of different scenarios and making scientific experiments verifiable and reproducible. Research in IoT security is no exception. In particular, the design of traffic classification and intrusion detection solutions for network security relies on network traces obtained from real networks or realistic testbeds. In this paper, we provide a detailed survey on the existing datasets containing IoT network traffic. We classify them according to several features that help researchers quickly find the datasets that fit their specific needs. In total, we survey 74 datasets that we found by analyzing more than 100 scientific articles. We also discuss the weaknesses of existing datasets, identify challenges, and point to future directions for creating new IoT datasets.
公开可用的数据集是研究人员不可或缺的工具,因为它们允许在广泛的不同场景下测试新算法,并使科学实验可验证和可重复。物联网安全研究也不例外。特别是网络安全的流量分类和入侵检测方案的设计依赖于从真实网络或现实试验台获得的网络轨迹。在本文中,我们对包含物联网网络流量的现有数据集进行了详细调查。我们根据几个特征对它们进行分类,帮助研究人员快速找到符合他们特定需求的数据集。我们总共调查了74个数据集,这些数据集是我们通过分析100多篇科学文章发现的。我们还讨论了现有数据集的弱点,确定了挑战,并指出了创建新的物联网数据集的未来方向。
{"title":"A Survey of Public IoT Datasets for Network Security Research","authors":"François De Keersmaeker;Yinan Cao;Gorby Kabasele Ndonda;Ramin Sadre","doi":"10.1109/COMST.2023.3288942","DOIUrl":"https://doi.org/10.1109/COMST.2023.3288942","url":null,"abstract":"Publicly available datasets are an indispensable tool for researchers, as they allow testing new algorithms on a wide range of different scenarios and making scientific experiments verifiable and reproducible. Research in IoT security is no exception. In particular, the design of traffic classification and intrusion detection solutions for network security relies on network traces obtained from real networks or realistic testbeds. In this paper, we provide a detailed survey on the existing datasets containing IoT network traffic. We classify them according to several features that help researchers quickly find the datasets that fit their specific needs. In total, we survey 74 datasets that we found by analyzing more than 100 scientific articles. We also discuss the weaknesses of existing datasets, identify challenges, and point to future directions for creating new IoT datasets.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1808-1840"},"PeriodicalIF":35.6,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Tutorial on the Tracking, Telemetry, and Command (TT&C) for Space Missions 空间任务的跟踪、遥测和指挥(TT&C)教程
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-19 DOI: 10.1109/COMST.2023.3287431
Andrea Modenini;Barbara Ripani
This paper presents a tutorial on the Tracking, Telemetry, and Command (TT&C) for spacecraft and satellite missions. In particular, it provides a thorough summary of the design of the TT&C, starting from elementary system aspects and going down to the details of the on-board TT&C subsystem design, its units, and the physical layer. The paper is then complemented with a description of emerging TT&C techniques and technologies, the standardization framework, and practical examples of actual spacecraft design of European space missions. The here-presented tutorial is thought for professionals (also in other telecommunication engineering fields) willing to face the challenges and state-of-the-art of the TT&C, and know more about this fundamental function that allows us to control and monitor our spacecraft on a daily basis.
本文介绍了航天器和卫星任务的跟踪、遥测和指挥(TT&C)教程。特别是,它对测控设计进行了全面总结,从基本系统方面开始,一直到机载测控子系统设计、单元和物理层的细节。随后,对新兴的测控技术和技术、标准化框架以及欧洲航天任务实际航天器设计的实例进行了描述。这里提供的教程是为专业人士(也在其他电信工程领域)设计的,他们愿意面对测控的挑战和最先进的技术,并更多地了解这一基本功能,使我们能够每天控制和监测我们的航天器。
{"title":"A Tutorial on the Tracking, Telemetry, and Command (TT&C) for Space Missions","authors":"Andrea Modenini;Barbara Ripani","doi":"10.1109/COMST.2023.3287431","DOIUrl":"https://doi.org/10.1109/COMST.2023.3287431","url":null,"abstract":"This paper presents a tutorial on the Tracking, Telemetry, and Command (TT&C) for spacecraft and satellite missions. In particular, it provides a thorough summary of the design of the TT&C, starting from elementary system aspects and going down to the details of the on-board TT&C subsystem design, its units, and the physical layer. The paper is then complemented with a description of emerging TT&C techniques and technologies, the standardization framework, and practical examples of actual spacecraft design of European space missions. The here-presented tutorial is thought for professionals (also in other telecommunication engineering fields) willing to face the challenges and state-of-the-art of the TT&C, and know more about this fundamental function that allows us to control and monitor our spacecraft on a daily basis.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1510-1542"},"PeriodicalIF":35.6,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tensor-Empowered Federated Learning for Cyber-Physical-Social Computing and Communication Systems 面向网络-物理-社会计算和通信系统的张量授权联邦学习
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-02 DOI: 10.1109/COMST.2023.3282264
Laurence T. Yang;Ruonan Zhao;Debin Liu;Wanli Lu;Xianjun Deng
The deep fusion of human-centered Cyber-Physical-Social Systems (CPSSs) has attracted widespread attention worldwide and big data as the blood of CPSSs could lay a solid data cornerstone for providing more proactive and accurate wisdom services. However, due to concerns about data privacy and security, traditional data centralized learning paradigm is no longer suitable. Federated Learning (FL) as an emerging distributed privacy-preserving machine learning paradigm would have great research significance and application values. Although few survey papers on FL already exist in the literature, the survey about FL from the perspective of human-centered CPSSs and tensor theory is lacking. Toward this end, we first introduce the CPSSs and deeply analyze the correlations among humans, cyber space, physical space and social space, as well as the opportunities brought by it. Afterwards, we present an overview of FL and then review extensive researches on FL in terms of resources management, communication, security and privacy protection, which provides a shortcut for readers to quickly understand and learn FL. Furthermore, the theory about tensor representation, operation and decomposition for handling massive, multi-source heterogeneous big data and corresponding applications are described. By leveraging the advantages of tensor in unified modeling, dimensionality reduction, and feature extraction, a framework and three tensor-empowered solutions are provided to solve these challenges about heterogeneous resource management, communication overhead together with security and privacy. Finally, some future research directions are listed for looking forward to inspiring more readers to devote themselves to researching tensor-empowered FL for human-centered CPSSs in the future.
以人为中心的网络物理社会系统(CPSS)的深度融合引起了全世界的广泛关注,大数据作为CPSS的血液可以为提供更主动、更准确的智慧服务奠定坚实的数据基石。然而,由于对数据隐私和安全的担忧,传统的数据集中学习模式已不再适用。联合学习作为一种新兴的分布式隐私保护机器学习范式,具有重要的研究意义和应用价值。尽管文献中很少有关于外语的调查论文,但缺乏从以人为本的CPSS和张量理论的角度对外语进行调查。为此,我们首先介绍了CPSS,并深入分析了人类、网络空间、物理空间和社会空间之间的相关性及其带来的机遇。然后,我们对FL进行了概述,然后回顾了在资源管理、通信、安全和隐私保护等方面对FL的广泛研究,为读者快速理解和学习FL提供了一条捷径。此外,介绍了处理海量多源异构大数据的张量表示、运算和分解理论及其应用。通过利用张量在统一建模、降维和特征提取方面的优势,提供了一个框架和三个张量授权的解决方案来解决异构资源管理、通信开销以及安全和隐私方面的挑战。最后,列出了一些未来的研究方向,以期激励更多的读者在未来致力于研究以人为中心的CPSS的张量授权FL。
{"title":"Tensor-Empowered Federated Learning for Cyber-Physical-Social Computing and Communication Systems","authors":"Laurence T. Yang;Ruonan Zhao;Debin Liu;Wanli Lu;Xianjun Deng","doi":"10.1109/COMST.2023.3282264","DOIUrl":"https://doi.org/10.1109/COMST.2023.3282264","url":null,"abstract":"The deep fusion of human-centered Cyber-Physical-Social Systems (CPSSs) has attracted widespread attention worldwide and big data as the blood of CPSSs could lay a solid data cornerstone for providing more proactive and accurate wisdom services. However, due to concerns about data privacy and security, traditional data centralized learning paradigm is no longer suitable. Federated Learning (FL) as an emerging distributed privacy-preserving machine learning paradigm would have great research significance and application values. Although few survey papers on FL already exist in the literature, the survey about FL from the perspective of human-centered CPSSs and tensor theory is lacking. Toward this end, we first introduce the CPSSs and deeply analyze the correlations among humans, cyber space, physical space and social space, as well as the opportunities brought by it. Afterwards, we present an overview of FL and then review extensive researches on FL in terms of resources management, communication, security and privacy protection, which provides a shortcut for readers to quickly understand and learn FL. Furthermore, the theory about tensor representation, operation and decomposition for handling massive, multi-source heterogeneous big data and corresponding applications are described. By leveraging the advantages of tensor in unified modeling, dimensionality reduction, and feature extraction, a framework and three tensor-empowered solutions are provided to solve these challenges about heterogeneous resource management, communication overhead together with security and privacy. Finally, some future research directions are listed for looking forward to inspiring more readers to devote themselves to researching tensor-empowered FL for human-centered CPSSs in the future.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1909-1940"},"PeriodicalIF":35.6,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Industrial Control System Digital Forensics: Challenges, Advances and Future Directions 工业控制系统数字取证研究:挑战、进展与未来方向
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-11 DOI: 10.1109/COMST.2023.3264680
Marco Cook;Angelos Marnerides;Chris Johnson;Dimitrios Pezaros
Operational Technology (OT) systems have become increasingly interconnected and automated, consequently resulting in them becoming targets of cyber attacks, with the threat towards a range of critical national infrastructure (CNI) sectors becoming heightened. This is particularly the case for Industrial Control Systems (ICS), which control and operate the physical processes in CNI sectors such as water treatment, electrical generation and manufacturing. Unlike information technology (IT) systems, ICS have unique cyber-physical characteristics and related safety requirements, making them an attractive target for attacks given the physical consequences that can occur. As a result, the requirement to respond and learn from previous and new attacks is also increasing, with digital forensics playing a significant role in this process. The aim of this paper is to discuss the main issues and existing limitations related to ICS digital forensic. The field of ICS digital forensics is relatively under-developed and does not have the same levels of maturity as IT digital forensics. Although the amount of research on cyber security for ICS is increasing, many unique challenges still exist that pose as barriers to the development and deployment of ICS forensic capabilities. We provide an extensive discussion on these challenges, categorising them into technical, socio-technical, and operational and legal themes. Furthermore, the relationship between these challenge themes as well as the inter-challenge dependencies are also examined. Furthermore, this work discusses ICS forensic advances in relation to the digital forensics life chain, specifically forensic readiness and investigations. The areas of digital forensic training and processes models for ICS are given particular focus. Moreover, we assess the technologies and tools that have been either applied to or developed for ICS components and networks, giving special attention to forensic acquisition and analysis methods. An examination into the specific ICS digital forensic data sources and artefacts is also presented, highlighting that until recently, this was limited to descriptions of generic data formats. In addition, this paper provides an overview of several key ICS attacks, summarising the specific techniques used, data artefacts of interest, and proposing lessons learnt. Finally, this paper presents open discussions on future ICS digital forensics research directions and on-going issues, covering both short and long-term areas that can be addressed to improve the ICS digital forensics capability.
作战技术(OT)系统变得越来越互联和自动化,因此成为网络攻击的目标,对一系列关键国家基础设施(CNI)部门的威胁也越来越大。工业控制系统(ICS)尤其如此,它控制和操作CNI部门的物理过程,如水处理、发电和制造。与信息技术(IT)系统不同,ICS具有独特的网络物理特性和相关的安全要求,考虑到可能发生的物理后果,使其成为有吸引力的攻击目标。因此,响应和从以前和新的攻击中学习的要求也在增加,数字取证在这一过程中发挥着重要作用。本文的目的是讨论ICS数字取证的主要问题和存在的局限性。ICS数字取证领域发展相对不足,不具备与IT数字取证相同的成熟度。尽管ICS的网络安全研究数量正在增加,但仍存在许多独特的挑战,这些挑战阻碍了ICS取证能力的开发和部署。我们对这些挑战进行了广泛的讨论,将其分为技术、社会技术、运营和法律主题。此外,还研究了这些挑战主题之间的关系以及挑战之间的依赖关系。此外,这项工作还讨论了ICS在数字取证生命链方面的取证进展,特别是取证准备和调查。特别关注ICS的数字取证培训和流程模型领域。此外,我们评估了已应用于ICS组件和网络或为其开发的技术和工具,特别关注取证获取和分析方法。还介绍了对特定ICS数字取证数据源和人工制品的审查,强调直到最近,这还仅限于对通用数据格式的描述。此外,本文概述了几种关键的ICS攻击,总结了所使用的具体技术、感兴趣的数据伪像,并提出了经验教训。最后,本文对ICS未来的数字取证研究方向和正在进行的问题进行了公开讨论,涵盖了可以提高ICS数字取证能力的短期和长期领域。
{"title":"A Survey on Industrial Control System Digital Forensics: Challenges, Advances and Future Directions","authors":"Marco Cook;Angelos Marnerides;Chris Johnson;Dimitrios Pezaros","doi":"10.1109/COMST.2023.3264680","DOIUrl":"https://doi.org/10.1109/COMST.2023.3264680","url":null,"abstract":"Operational Technology (OT) systems have become increasingly interconnected and automated, consequently resulting in them becoming targets of cyber attacks, with the threat towards a range of critical national infrastructure (CNI) sectors becoming heightened. This is particularly the case for Industrial Control Systems (ICS), which control and operate the physical processes in CNI sectors such as water treatment, electrical generation and manufacturing. Unlike information technology (IT) systems, ICS have unique cyber-physical characteristics and related safety requirements, making them an attractive target for attacks given the physical consequences that can occur. As a result, the requirement to respond and learn from previous and new attacks is also increasing, with digital forensics playing a significant role in this process. The aim of this paper is to discuss the main issues and existing limitations related to ICS digital forensic. The field of ICS digital forensics is relatively under-developed and does not have the same levels of maturity as IT digital forensics. Although the amount of research on cyber security for ICS is increasing, many unique challenges still exist that pose as barriers to the development and deployment of ICS forensic capabilities. We provide an extensive discussion on these challenges, categorising them into technical, socio-technical, and operational and legal themes. Furthermore, the relationship between these challenge themes as well as the inter-challenge dependencies are also examined. Furthermore, this work discusses ICS forensic advances in relation to the digital forensics life chain, specifically forensic readiness and investigations. The areas of digital forensic training and processes models for ICS are given particular focus. Moreover, we assess the technologies and tools that have been either applied to or developed for ICS components and networks, giving special attention to forensic acquisition and analysis methods. An examination into the specific ICS digital forensic data sources and artefacts is also presented, highlighting that until recently, this was limited to descriptions of generic data formats. In addition, this paper provides an overview of several key ICS attacks, summarising the specific techniques used, data artefacts of interest, and proposing lessons learnt. Finally, this paper presents open discussions on future ICS digital forensics research directions and on-going issues, covering both short and long-term areas that can be addressed to improve the ICS digital forensics capability.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1705-1747"},"PeriodicalIF":35.6,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Survey on Low-Power GNSS 低功率GNSS研究进展
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-10 DOI: 10.1109/COMST.2023.3265841
Antoine Grenier;Elena Simona Lohan;Aleksandr Ometov;Jari Nurmi
With the miniaturization of electronics, receivers are getting more and more embedded into devices with harsh energy constraints. This process has led to new signal processing challenges due to the limited processing power on battery-operated devices and to challenging wireless environments, such as deep urban canyons, tunnels and bridges, forest canopies, increased jamming and spoofing. The latter is typically tackled via new GNSS constellations and modernization of the GNSS signals. However, the increase in signal complexity leads to higher computation requirements to recover the signals; thus, the trade-off between precision and energy should be evaluated for each application. This paper dives into low-power GNSS, focusing on the energy consumption of satellite-based positioning receivers used in battery-operated consumer devices and Internet of Things (IoT) sensors. We briefly overview the GNSS basics and the differences between legacy and modernized signals. Factors dominating the energy consumption of GNSS receivers are then reviewed, with special attention given to the complexity of the processing algorithms. Onboard and offloaded (Cloud/Edge) processing strategies are explored and compared. Finally, we highlight the current challenges of today’s research in low-power GNSS.
随着电子设备的小型化,接收器越来越多地嵌入到具有苛刻能量约束的设备中。由于电池供电设备的处理能力有限,以及具有挑战性的无线环境,如城市深处的峡谷、隧道和桥梁、森林树冠、干扰和欺骗的增加,这一过程带来了新的信号处理挑战。后者通常通过新的GNSS星座和GNSS信号的现代化来解决。然而,信号复杂性的增加导致恢复信号的计算要求更高;因此,应该针对每个应用评估精度和能量之间的权衡。本文深入研究了低功耗GNSS,重点研究了电池供电的消费设备和物联网(IoT)传感器中使用的基于卫星的定位接收器的能耗。我们简要概述了全球导航卫星系统的基本知识以及传统信号和现代化信号之间的差异。然后回顾了主导全球导航卫星系统接收器能耗的因素,并特别注意处理算法的复杂性。探讨并比较了机载和卸载(云/边缘)处理策略。最后,我们强调了当今低功耗全球导航卫星系统研究面临的挑战。
{"title":"A Survey on Low-Power GNSS","authors":"Antoine Grenier;Elena Simona Lohan;Aleksandr Ometov;Jari Nurmi","doi":"10.1109/COMST.2023.3265841","DOIUrl":"https://doi.org/10.1109/COMST.2023.3265841","url":null,"abstract":"With the miniaturization of electronics, receivers are getting more and more embedded into devices with harsh energy constraints. This process has led to new signal processing challenges due to the limited processing power on battery-operated devices and to challenging wireless environments, such as deep urban canyons, tunnels and bridges, forest canopies, increased jamming and spoofing. The latter is typically tackled via new GNSS constellations and modernization of the GNSS signals. However, the increase in signal complexity leads to higher computation requirements to recover the signals; thus, the trade-off between precision and energy should be evaluated for each application. This paper dives into low-power GNSS, focusing on the energy consumption of satellite-based positioning receivers used in battery-operated consumer devices and Internet of Things (IoT) sensors. We briefly overview the GNSS basics and the differences between legacy and modernized signals. Factors dominating the energy consumption of GNSS receivers are then reviewed, with special attention given to the complexity of the processing algorithms. Onboard and offloaded (Cloud/Edge) processing strategies are explored and compared. Finally, we highlight the current challenges of today’s research in low-power GNSS.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1482-1509"},"PeriodicalIF":35.6,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10226436/10097786.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Empowering Network Security With Programmable Switches: A Comprehensive Survey 赋予网络安全与可编程交换机:一个全面的调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-10 DOI: 10.1109/COMST.2023.3265984
Xiang Chen;Chunming Wu;Xuan Liu;Qun Huang;Dong Zhang;Haifeng Zhou;Qiang Yang;Muhammad Khurram Khan
With the growth of network applications such as 5G and artificial intelligence, network security techniques, i.e., the techniques that detect various attacks (e.g., well-known denial-of-service (DDoS) attacks) and prevent production networks (e.g., data center networks) from being attacked, become increasingly essential for network management and have gained great popularity in the networking community. Generally, these techniques are built on proprietary hardware appliances, i.e., middleboxes, or the paradigm that combines both software-defined networking (SDN) and network function virtualization (NFV) to implement security functions. However, the techniques built on middleboxes are proven to be hard-to-manage, costly, and inflexible, thereby making them an out-of-date choice in network security. For the techniques built on SDN and NFV, they virtualize and softwarize security functions on commodity servers, leading to non-trivial performance degradation. Fortunately, the recent emergence of programmable switches brings new opportunities of empowering network security techniques with the characteristics of easy-to-manage, low cost, high flexibility, and Tbps-level performance. In this survey, we focus on this promising trend in network security. More precisely, this survey first presents the preliminaries of programmable switches, which are the primary driver of next-generation network security techniques. Next, we comprehensively review existing techniques built on programmable switches, classify these techniques, and discuss their background, motivation, design, implementation, and limitations case-by-case. Finally, we summarize open issues and future research directions in this promising research topic of network security.
随着5G和人工智能等网络应用的发展,网络安全技术,即检测各种攻击(如众所周知的拒绝服务(DDoS)攻击)和防止生产网络(如数据中心网络)受到攻击的技术,变得对网络管理越来越重要,并且在网络社区中获得了极大的流行。通常,这些技术建立在专有硬件设备上,即中间盒,或结合软件定义网络(SDN)和网络功能虚拟化(NFV)来实现安全功能的范例。然而,基于中盒的技术已被证明难以管理、成本高昂且不灵活,从而使其成为网络安全领域的过时选择。对于建立在SDN和NFV上的技术,它们将商品服务器上的安全功能虚拟化和软件化,从而导致非微不足道的性能下降。幸运的是,最近出现的可编程交换机带来了新的机会,使网络安全技术具有易于管理、低成本、高灵活性和Tbps级性能的特点。在这项调查中,我们关注的是网络安全的这一充满希望的趋势。更准确地说,这项调查首先介绍了可编程交换机的初步情况,可编程交换机是下一代网络安全技术的主要驱动因素。接下来,我们将全面回顾基于可编程交换机的现有技术,对这些技术进行分类,并逐一讨论它们的背景、动机、设计、实现和局限性。最后,我们总结了这一有前景的网络安全研究课题中存在的问题和未来的研究方向。
{"title":"Empowering Network Security With Programmable Switches: A Comprehensive Survey","authors":"Xiang Chen;Chunming Wu;Xuan Liu;Qun Huang;Dong Zhang;Haifeng Zhou;Qiang Yang;Muhammad Khurram Khan","doi":"10.1109/COMST.2023.3265984","DOIUrl":"https://doi.org/10.1109/COMST.2023.3265984","url":null,"abstract":"With the growth of network applications such as 5G and artificial intelligence, network security techniques, i.e., the techniques that detect various attacks (e.g., well-known denial-of-service (DDoS) attacks) and prevent production networks (e.g., data center networks) from being attacked, become increasingly essential for network management and have gained great popularity in the networking community. Generally, these techniques are built on proprietary hardware appliances, i.e., middleboxes, or the paradigm that combines both software-defined networking (SDN) and network function virtualization (NFV) to implement security functions. However, the techniques built on middleboxes are proven to be hard-to-manage, costly, and inflexible, thereby making them an out-of-date choice in network security. For the techniques built on SDN and NFV, they virtualize and softwarize security functions on commodity servers, leading to non-trivial performance degradation. Fortunately, the recent emergence of programmable switches brings new opportunities of empowering network security techniques with the characteristics of easy-to-manage, low cost, high flexibility, and Tbps-level performance. In this survey, we focus on this promising trend in network security. More precisely, this survey first presents the preliminaries of programmable switches, which are the primary driver of next-generation network security techniques. Next, we comprehensively review existing techniques built on programmable switches, classify these techniques, and discuss their background, motivation, design, implementation, and limitations case-by-case. Finally, we summarize open issues and future research directions in this promising research topic of network security.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1653-1704"},"PeriodicalIF":35.6,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1