首页 > 最新文献

IEEE Communications Surveys and Tutorials最新文献

英文 中文
Artificial Intelligence of Things for Smarter Healthcare: A Survey of Advancements, Challenges, and Opportunities 面向更智能医疗的物联网人工智能:进展、挑战和机遇调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-13 DOI: 10.1109/COMST.2023.3256323
Stephanie Baker;Wei Xiang
Healthcare systems are under increasing strain due to a myriad of factors, from a steadily ageing global population to the current COVID-19 pandemic. In a world where we have needed to be connected but apart, the need for enhanced remote and at-home healthcare has become clear. The Internet of Things (IoT) offers a promising solution. The IoT has created a highly connected world, with billions of devices collecting and communicating data from a range of applications, including healthcare. Due to these high volumes of data, a natural synergy with Artificial Intelligence (AI) has become apparent - big data both enables and requires AI to interpret, understand, and make decisions that provide optimal outcomes. In this extensive survey, we thoroughly explore this synergy through an examination of the field of the Artificial Intelligence of Things (AIoT) for healthcare. This work begins by briefly establishing a unified architecture of AIoT in a healthcare context, including sensors and devices, novel communication technologies, and cross-layer AI. We then examine recent research pertaining to each component of the AIoT architecture from several key perspectives, identifying promising technologies, challenges, and opportunities that are unique to healthcare. Several examples of real-world AIoT healthcare use cases are then presented to illustrate the potential of these technologies. Lastly, this work outlines promising directions for future research in AIoT for healthcare.
从全球人口稳步老龄化到当前的新冠肺炎大流行,由于多种因素,医疗保健系统正面临越来越大的压力。在一个我们需要联系但又需要分开的世界里,对增强远程和家庭医疗保健的需求已经变得显而易见。物联网(IoT)提供了一个很有前景的解决方案。物联网创造了一个高度互联的世界,数十亿台设备从包括医疗保健在内的一系列应用程序中收集和通信数据。由于这些大量的数据,与人工智能(AI)的自然协同作用已经变得明显——大数据使人工智能能够并需要人工智能来解释、理解和做出提供最佳结果的决策。在这项广泛的调查中,我们通过对医疗保健人工智能(AIoT)领域的研究,深入探讨了这种协同作用。这项工作首先简要建立了医疗保健背景下AIoT的统一架构,包括传感器和设备、新型通信技术和跨层人工智能。然后,我们从几个关键角度审视了与AIoT架构的每个组件相关的最新研究,确定了医疗保健特有的有前景的技术、挑战和机遇。然后介绍了几个真实世界AIoT医疗保健用例的例子,以说明这些技术的潜力。最后,这项工作概述了未来医疗保健AIoT研究的有希望的方向。
{"title":"Artificial Intelligence of Things for Smarter Healthcare: A Survey of Advancements, Challenges, and Opportunities","authors":"Stephanie Baker;Wei Xiang","doi":"10.1109/COMST.2023.3256323","DOIUrl":"https://doi.org/10.1109/COMST.2023.3256323","url":null,"abstract":"Healthcare systems are under increasing strain due to a myriad of factors, from a steadily ageing global population to the current COVID-19 pandemic. In a world where we have needed to be connected but apart, the need for enhanced remote and at-home healthcare has become clear. The Internet of Things (IoT) offers a promising solution. The IoT has created a highly connected world, with billions of devices collecting and communicating data from a range of applications, including healthcare. Due to these high volumes of data, a natural synergy with Artificial Intelligence (AI) has become apparent - big data both enables and requires AI to interpret, understand, and make decisions that provide optimal outcomes. In this extensive survey, we thoroughly explore this synergy through an examination of the field of the Artificial Intelligence of Things (AIoT) for healthcare. This work begins by briefly establishing a unified architecture of AIoT in a healthcare context, including sensors and devices, novel communication technologies, and cross-layer AI. We then examine recent research pertaining to each component of the AIoT architecture from several key perspectives, identifying promising technologies, challenges, and opportunities that are unique to healthcare. Several examples of real-world AIoT healthcare use cases are then presented to illustrate the potential of these technologies. Lastly, this work outlines promising directions for future research in AIoT for healthcare.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1261-1293"},"PeriodicalIF":35.6,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10130694/10066875.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges 大规模物联网可扩展LoRaWAN调查:最新进展、潜力和挑战
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-10 DOI: 10.1109/COMST.2023.3274934
Mohammed Jouhari;Nasir Saeed;Mohamed-Slim Alouini;El Mehdi Amhoud
Long-range (LoRa) technology is most widely used for enabling low-power wide area networks (WANs) on unlicensed frequency bands. Despite its modest data rates, it provides extensive coverage for low-power devices, making it an ideal communication system for many Internet of Things (IoT) applications. In general, LoRa is considered as the physical layer, whereas LoRaWAN is the medium access control (MAC) layer of the LoRa stack that adopts a star topology to enable communication between multiple end devices (EDs) and the network gateway. The chirp spread spectrum modulation deals with LoRa signal interference and ensures long-range communication. At the same time, the adaptive data rate mechanism allows EDs to dynamically alter some LoRa features, such as the spreading factor (SF), code rate, and carrier frequency to address the time variance of communication conditions in dense networks. Despite the high LoRa connectivity demand, LoRa signals interference and concurrent transmission collisions are major limitations. Therefore, to enhance LoRaWAN capacity, the LoRa Alliance released many LoRaWAN versions, and the research community has provided numerous solutions to develop scalable LoRaWAN technology. Hence, we thoroughly examine LoRaWAN scalability challenges and state-of-the-art solutions in both the physical and MAC layers. These solutions primarily rely on SF, logical, and frequency channel assignment, whereas others propose new network topologies or implement signal processing schemes to cancel the interference and allow LoRaWAN to connect more EDs efficiently. A summary of the existing solutions in the literature is provided at the end of the paper, describing the advantages and disadvantages of each solution and suggesting possible enhancements as future research directions.
远程(LoRa)技术最广泛地用于在未经许可的频段上实现低功耗广域网(wan)。尽管数据速率适中,但它为低功耗设备提供了广泛的覆盖范围,使其成为许多物联网(IoT)应用的理想通信系统。通常将LoRa视为物理层,而LoRaWAN则是LoRa堆栈的MAC层,采用星型拓扑结构,实现多个终端设备与网络网关之间的通信。啁啾扩频调制处理LoRa信号干扰,保证远程通信。同时,自适应的数据速率机制允许ed动态改变一些LoRa特性,如扩频因子(SF)、码率和载波频率,以解决密集网络中通信条件的时变问题。尽管LoRa连接需求很高,但LoRa信号干扰和并发传输冲突是主要的限制因素。因此,为了增强LoRaWAN的能力,LoRa联盟发布了许多版本的LoRaWAN,研究团体也提供了许多解决方案来开发可扩展的LoRaWAN技术。因此,我们将全面研究LoRaWAN在物理层和MAC层的可伸缩性挑战和最先进的解决方案。这些解决方案主要依赖于SF、逻辑和频率通道分配,而其他解决方案则提出新的网络拓扑结构或实施信号处理方案来消除干扰,并允许LoRaWAN有效地连接更多的ed。在论文的最后,对文献中现有的解决方案进行了总结,描述了每种解决方案的优缺点,并提出了可能的改进作为未来的研究方向。
{"title":"A Survey on Scalable LoRaWAN for Massive IoT: Recent Advances, Potentials, and Challenges","authors":"Mohammed Jouhari;Nasir Saeed;Mohamed-Slim Alouini;El Mehdi Amhoud","doi":"10.1109/COMST.2023.3274934","DOIUrl":"https://doi.org/10.1109/COMST.2023.3274934","url":null,"abstract":"Long-range (LoRa) technology is most widely used for enabling low-power wide area networks (WANs) on unlicensed frequency bands. Despite its modest data rates, it provides extensive coverage for low-power devices, making it an ideal communication system for many Internet of Things (IoT) applications. In general, LoRa is considered as the physical layer, whereas LoRaWAN is the medium access control (MAC) layer of the LoRa stack that adopts a star topology to enable communication between multiple end devices (EDs) and the network gateway. The chirp spread spectrum modulation deals with LoRa signal interference and ensures long-range communication. At the same time, the adaptive data rate mechanism allows EDs to dynamically alter some LoRa features, such as the spreading factor (SF), code rate, and carrier frequency to address the time variance of communication conditions in dense networks. Despite the high LoRa connectivity demand, LoRa signals interference and concurrent transmission collisions are major limitations. Therefore, to enhance LoRaWAN capacity, the LoRa Alliance released many LoRaWAN versions, and the research community has provided numerous solutions to develop scalable LoRaWAN technology. Hence, we thoroughly examine LoRaWAN scalability challenges and state-of-the-art solutions in both the physical and MAC layers. These solutions primarily rely on SF, logical, and frequency channel assignment, whereas others propose new network topologies or implement signal processing schemes to cancel the interference and allow LoRaWAN to connect more EDs efficiently. A summary of the existing solutions in the literature is provided at the end of the paper, describing the advantages and disadvantages of each solution and suggesting possible enhancements as future research directions.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1841-1876"},"PeriodicalIF":35.6,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A Concise Tutorial on Traffic Shaping and Scheduling in Time-Sensitive Networks 时间敏感网络中流量整形和调度的简明教程
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-10 DOI: 10.1109/COMST.2023.3275038
Yeongjae Kim
Over the last two decades, IEEE has been defining standards for Time-Sensitive Networking (TSN). These standards combine traffic shaping and scheduling mechanisms to guarantee bounded delays across an Ethernet network. Time-Sensitive Networks are designed for applications where delays are critical, such as process control, networks for vehicles and aircraft, and virtual reality applications. Many industrial companies are currently actively implementing TSN standards. The goal of this paper is to provide a concise and self-contained description of the TSN mechanisms and how they affect the network performance metrics. The paper is intended for practicing engineers wanting to improve their understanding of TSN and for students curious about these mechanisms.
在过去的二十年里,IEEE一直在为时间敏感网络(TSN)定义标准。这些标准结合了流量整形和调度机制,以保证以太网中的有界延迟。时间敏感网络是为延迟至关重要的应用而设计的,如过程控制、车辆和飞机网络以及虚拟现实应用。许多工业公司目前正在积极实施TSN标准。本文的目标是对TSN机制及其如何影响网络性能指标进行简洁而独立的描述。本文旨在为希望提高对TSN理解的实习工程师和对这些机制好奇的学生提供帮助。
{"title":"A Concise Tutorial on Traffic Shaping and Scheduling in Time-Sensitive Networks","authors":"Yeongjae Kim","doi":"10.1109/COMST.2023.3275038","DOIUrl":"https://doi.org/10.1109/COMST.2023.3275038","url":null,"abstract":"Over the last two decades, IEEE has been defining standards for Time-Sensitive Networking (TSN). These standards combine traffic shaping and scheduling mechanisms to guarantee bounded delays across an Ethernet network. Time-Sensitive Networks are designed for applications where delays are critical, such as process control, networks for vehicles and aircraft, and virtual reality applications. Many industrial companies are currently actively implementing TSN standards. The goal of this paper is to provide a concise and self-contained description of the TSN mechanisms and how they affect the network performance metrics. The paper is intended for practicing engineers wanting to improve their understanding of TSN and for students curious about these mechanisms.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1941-1953"},"PeriodicalIF":35.6,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of Important Issues in Quantum Computing and Communications 量子计算与通信中的重要问题综述
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-08 DOI: 10.1109/COMST.2023.3254481
Zebo Yang;Maede Zolanvari;Raj Jain
Driven by the rapid progress in quantum hardware, recent years have witnessed a furious race for quantum technologies in both academia and industry. Universal quantum computers have supported up to hundreds of qubits, while the scale of quantum annealers has reached three orders of magnitude (i.e., thousands of qubits). Quantum computing power keeps climbing. Race has consequently generated an overwhelming number of research papers and documents. This article provides an entry point for interested readers to learn the key aspects of quantum computing and communications from a computer science perspective. It begins with a pedagogical introduction and then reviews the key milestones and recent advances in quantum computing. In this article, the key elements of a quantum Internet are categorized into four important issues, which are investigated in detail: a) quantum computers, b) quantum networks, c) quantum cryptography, and d) quantum machine learning. Finally, the article identifies and discusses the main barriers, the major research directions, and trends.
在量子硬件快速发展的推动下,近年来学术界和工业界对量子技术展开了激烈的竞争。通用量子计算机已经支持了多达数百个量子位,而量子退火器的规模已经达到了三个数量级(即数千个量子位数)。量子计算能力不断攀升。种族因此产生了大量的研究论文和文件。本文为感兴趣的读者提供了一个切入点,让他们从计算机科学的角度学习量子计算和通信的关键方面。它从教学介绍开始,然后回顾了量子计算的关键里程碑和最新进展。在本文中,量子互联网的关键元素分为四个重要问题,并对其进行了详细研究:a)量子计算机,b)量子网络,c)量子密码学和d)量子机器学习。最后,文章确定并讨论了主要障碍、主要研究方向和趋势。
{"title":"A Survey of Important Issues in Quantum Computing and Communications","authors":"Zebo Yang;Maede Zolanvari;Raj Jain","doi":"10.1109/COMST.2023.3254481","DOIUrl":"https://doi.org/10.1109/COMST.2023.3254481","url":null,"abstract":"Driven by the rapid progress in quantum hardware, recent years have witnessed a furious race for quantum technologies in both academia and industry. Universal quantum computers have supported up to hundreds of qubits, while the scale of quantum annealers has reached three orders of magnitude (i.e., thousands of qubits). Quantum computing power keeps climbing. Race has consequently generated an overwhelming number of research papers and documents. This article provides an entry point for interested readers to learn the key aspects of quantum computing and communications from a computer science perspective. It begins with a pedagogical introduction and then reviews the key milestones and recent advances in quantum computing. In this article, the key elements of a quantum Internet are categorized into four important issues, which are investigated in detail: a) quantum computers, b) quantum networks, c) quantum cryptography, and d) quantum machine learning. Finally, the article identifies and discusses the main barriers, the major research directions, and trends.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1059-1094"},"PeriodicalIF":35.6,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10130694/10064036.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Machine Learning for Service Migration: A Survey 服务迁移的机器学习:一项调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-08 DOI: 10.1109/COMST.2023.3273121
Nassima Toumi;Miloud Bagaa;Adlen Ksentini
Future communication networks are envisioned to satisfy increasingly granular and dynamic requirements to accommodate the application and user demands. Indeed, novel immersive and mission-critical services necessitate increased computing and network resources, reduced communication latency, and guaranteed reliability. Thus, efficient and adaptive resource management schemes are required to provide and maintain sufficient levels of Quality of Experience (QoE) during the service life-cycle. Service migration is considered a key enabler of dynamic service orchestration. Indeed, moving services on demand is an efficient mechanism for user mobility support, load balancing in case of fluctuations in service demands, and hardware failure mitigation. However, service migration requires planning, as multiple parameters must be optimized to reduce service disruption to a minimum. Recent breakthroughs in computational capabilities allowed the emergence of Machine Learning as a tool for decision making that is expected to enable seamless automation of network resource management by predicting events and learning optimal decision policies. This paper surveys contributions applying Machine Learning (ML) methods to optimize service migration, providing a detailed literature review on recent advances in the field and establishing a classification of current research efforts with an analysis of their strengths and limitations. Finally, the paper provides insights on the main directions for future research.
未来的通信网络被设想为满足越来越精细和动态的需求,以适应应用和用户需求。事实上,新颖的沉浸式和任务关键型服务需要增加计算和网络资源,减少通信延迟,并保证可靠性。因此,需要高效和自适应的资源管理方案来在服务生命周期期间提供和保持足够水平的体验质量(QoE)。服务迁移被认为是动态服务编排的关键促成因素。事实上,按需移动服务是一种有效的机制,用于支持用户移动、在服务需求波动的情况下进行负载平衡以及减轻硬件故障。但是,服务迁移需要进行规划,因为必须优化多个参数以将服务中断降至最低。最近在计算能力方面的突破使机器学习成为一种决策工具,有望通过预测事件和学习最佳决策策略来实现网络资源管理的无缝自动化。本文调查了应用机器学习(ML)方法优化服务迁移的贡献,对该领域的最新进展进行了详细的文献综述,并对当前的研究工作进行了分类,分析了其优势和局限性。最后,本文对未来研究的主要方向提供了见解。
{"title":"Machine Learning for Service Migration: A Survey","authors":"Nassima Toumi;Miloud Bagaa;Adlen Ksentini","doi":"10.1109/COMST.2023.3273121","DOIUrl":"https://doi.org/10.1109/COMST.2023.3273121","url":null,"abstract":"Future communication networks are envisioned to satisfy increasingly granular and dynamic requirements to accommodate the application and user demands. Indeed, novel immersive and mission-critical services necessitate increased computing and network resources, reduced communication latency, and guaranteed reliability. Thus, efficient and adaptive resource management schemes are required to provide and maintain sufficient levels of Quality of Experience (QoE) during the service life-cycle. Service migration is considered a key enabler of dynamic service orchestration. Indeed, moving services on demand is an efficient mechanism for user mobility support, load balancing in case of fluctuations in service demands, and hardware failure mitigation. However, service migration requires planning, as multiple parameters must be optimized to reduce service disruption to a minimum. Recent breakthroughs in computational capabilities allowed the emergence of Machine Learning as a tool for decision making that is expected to enable seamless automation of network resource management by predicting events and learning optimal decision policies. This paper surveys contributions applying Machine Learning (ML) methods to optimize service migration, providing a detailed literature review on recent advances in the field and establishing a classification of current research efforts with an analysis of their strengths and limitations. Finally, the paper provides insights on the main directions for future research.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1991-2020"},"PeriodicalIF":35.6,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of Wide-Area Monitoring, Protection, and Control (WAMPAC) Systems of the Smart Grid: A Survey on Challenges and Opportunities 智能电网广域监测、保护和控制(WAMPAC)系统的安全:挑战与机遇的调查
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-08 DOI: 10.1109/COMST.2023.3251899
Saghar Vahidi;Mohsen Ghafouri;Minh Au;Marthe Kassouf;Arash Mohammadi;Mourad Debbabi
The evolution of power generation systems, along with their related increase in complexity, led to the critical necessity of Wide-Area Monitoring, Protection, and Control (WAMPAC) systems in today’s smart grid. Recent developments in smart measurement devices coupled with data communication technologies allow for significant improvements in power systems’ reliability, efficiency, and security. These technological advancements make WAMPAC systems of significant practical interest. However, the geographically distributed nature of such systems increases the potential attack surface and the risk of critical vulnerabilities. Thus, it is of paramount importance to identify the related threats and vulnerabilities as well as the prominent solutions relevant to WAMPAC systems. Consequently, this paper aims to provide a comprehensive review of WAMPAC security aspects along with the state-of-the-art research initiatives addressing such aspects. Specifically, this paper provides critical taxonomies of the cyber-security scope of WAMPAC that guide the accompanying survey of the recent studies on the WAMPAC security domain. As such, this article aims to pave the way for prospective researchers to pursue further studies in areas that require in-depth investigation into the security, reliability, and efficiency of WAMPAC as the backbone of smart grids.
发电系统的发展及其相关复杂性的增加,导致了广域监测、保护和控制(WAMPAC)系统在当今智能电网中的关键必要性。智能测量设备的最新发展与数据通信技术相结合,大大提高了电力系统的可靠性、效率和安全性。这些技术进步使WAMPAC系统具有重大的实际意义。然而,此类系统的地理分布性质增加了潜在的攻击面和关键漏洞的风险。因此,识别相关威胁和漏洞以及与WAMPAC系统相关的突出解决方案至关重要。因此,本文旨在全面回顾WAMPAC的安全方面,以及针对这些方面的最新研究举措。具体而言,本文提供了WAMPAC网络安全范围的关键分类法,以指导WAMPAC安全领域的最新研究。因此,本文旨在为未来的研究人员在需要深入调查WAMPAC作为智能电网骨干的安全性、可靠性和效率的领域进行进一步研究铺平道路。
{"title":"Security of Wide-Area Monitoring, Protection, and Control (WAMPAC) Systems of the Smart Grid: A Survey on Challenges and Opportunities","authors":"Saghar Vahidi;Mohsen Ghafouri;Minh Au;Marthe Kassouf;Arash Mohammadi;Mourad Debbabi","doi":"10.1109/COMST.2023.3251899","DOIUrl":"https://doi.org/10.1109/COMST.2023.3251899","url":null,"abstract":"The evolution of power generation systems, along with their related increase in complexity, led to the critical necessity of Wide-Area Monitoring, Protection, and Control (WAMPAC) systems in today’s smart grid. Recent developments in smart measurement devices coupled with data communication technologies allow for significant improvements in power systems’ reliability, efficiency, and security. These technological advancements make WAMPAC systems of significant practical interest. However, the geographically distributed nature of such systems increases the potential attack surface and the risk of critical vulnerabilities. Thus, it is of paramount importance to identify the related threats and vulnerabilities as well as the prominent solutions relevant to WAMPAC systems. Consequently, this paper aims to provide a comprehensive review of WAMPAC security aspects along with the state-of-the-art research initiatives addressing such aspects. Specifically, this paper provides critical taxonomies of the cyber-security scope of WAMPAC that guide the accompanying survey of the recent studies on the WAMPAC security domain. As such, this article aims to pave the way for prospective researchers to pursue further studies in areas that require in-depth investigation into the security, reliability, and efficiency of WAMPAC as the backbone of smart grids.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"1294-1335"},"PeriodicalIF":35.6,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives 面向主动网络安全防御的网络威胁情报挖掘:综述与新视角
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-05 DOI: 10.1109/COMST.2023.3273282
Nan Sun;Ming Ding;Jiaojiao Jiang;Weikang Xu;Xiaoxing Mo;Yonghang Tai;Jun Zhang
Today’s cyber attacks have become more severe and frequent, which calls for a new line of security defenses to protect against them. The dynamic nature of new-generation threats, which are evasive, resilient, and complex, makes traditional security systems based on heuristics and signatures struggle to match. Organizations aim to gather and share real-time cyber threat information and then turn it into threat intelligence for preventing attacks or, at the very least, responding quickly in a proactive manner. Cyber Threat Intelligence (CTI) mining, which uncovers, processes, and analyzes valuable information about cyber threats, is booming. However, most organizations today mainly focus on basic use cases, such as integrating threat data feeds with existing network and firewall systems, intrusion prevention systems, and Security Information and Event Management systems (SIEMs), without taking advantage of the insights that such new intelligence can deliver. In order to make the most of CTI so as to significantly strengthen security postures, we present a comprehensive review of recent research efforts on CTI mining from multiple data sources in this article. Specifically, we provide and devise a taxonomy to summarize the studies on CTI mining based on the intended purposes (i.e., cybersecurity-related entities and events, cyber attack tactics, techniques and procedures, profiles of hackers, indicators of compromise, vulnerability exploits and malware implementation, and threat hunting), along with a comprehensive review of the current state-of-the-art. Lastly, we discuss research challenges and possible future research directions for CTI mining.
今天的网络攻击变得更加严重和频繁,这需要新的安全防御线来保护它们。新一代威胁具有规避性、弹性和复杂性的动态特性,使得基于启发式和签名的传统安全系统难以匹配。组织的目标是收集和共享实时网络威胁信息,然后将其转化为威胁情报,以防止攻击,或者至少以主动的方式快速响应。网络威胁情报(CTI)挖掘是一种发现、处理和分析有关网络威胁的有价值信息的技术,正在蓬勃发展。然而,今天大多数组织主要关注基本用例,例如将威胁数据源与现有的网络和防火墙系统、入侵防御系统以及安全信息和事件管理系统(SIEMs)集成,而没有利用这种新智能可以提供的洞察力。为了充分利用CTI以显著加强安全态势,我们在本文中全面回顾了最近从多个数据源中对CTI挖掘的研究成果。具体来说,我们提供并设计了一个分类法,根据预期目的(即,与网络安全相关的实体和事件,网络攻击战术,技术和程序,黑客概况,妥协指标,漏洞利用和恶意软件实施,以及威胁狩猎)总结CTI挖掘的研究,以及对当前最新技术的全面回顾。最后,我们讨论了CTI挖掘的研究挑战和未来可能的研究方向。
{"title":"Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives","authors":"Nan Sun;Ming Ding;Jiaojiao Jiang;Weikang Xu;Xiaoxing Mo;Yonghang Tai;Jun Zhang","doi":"10.1109/COMST.2023.3273282","DOIUrl":"https://doi.org/10.1109/COMST.2023.3273282","url":null,"abstract":"Today’s cyber attacks have become more severe and frequent, which calls for a new line of security defenses to protect against them. The dynamic nature of new-generation threats, which are evasive, resilient, and complex, makes traditional security systems based on heuristics and signatures struggle to match. Organizations aim to gather and share real-time cyber threat information and then turn it into threat intelligence for preventing attacks or, at the very least, responding quickly in a proactive manner. Cyber Threat Intelligence (CTI) mining, which uncovers, processes, and analyzes valuable information about cyber threats, is booming. However, most organizations today mainly focus on basic use cases, such as integrating threat data feeds with existing network and firewall systems, intrusion prevention systems, and Security Information and Event Management systems (SIEMs), without taking advantage of the insights that such new intelligence can deliver. In order to make the most of CTI so as to significantly strengthen security postures, we present a comprehensive review of recent research efforts on CTI mining from multiple data sources in this article. Specifically, we provide and devise a taxonomy to summarize the studies on CTI mining based on the intended purposes (i.e., cybersecurity-related entities and events, cyber attack tactics, techniques and procedures, profiles of hackers, indicators of compromise, vulnerability exploits and malware implementation, and threat hunting), along with a comprehensive review of the current state-of-the-art. Lastly, we discuss research challenges and possible future research directions for CTI mining.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1748-1774"},"PeriodicalIF":35.6,"publicationDate":"2023-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10226436/10117505.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Toward Addressing Training Data Scarcity Challenge in Emerging Radio Access Networks: A Survey and Framework 解决新兴无线接入网络中训练数据短缺的挑战:调查和框架
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-01 DOI: 10.1109/COMST.2023.3271419
Haneya Naeem Qureshi;Usama Masood;Marvin Manalastas;Syed Muhammad Asad Zaidi;Hasan Farooq;Julien Forgeat;Maxime Bouton;Shruti Bothe;Per Karlsson;Ali Rizwan;Ali Imran
The future of cellular networks is contingent on artificial intelligence (AI) based automation, particularly for radio access network (RAN) operation, optimization, and troubleshooting. To achieve such zero-touch automation, a myriad of AI-based solutions are being proposed in literature to leverage AI for modeling and optimizing network behavior to achieve the zero-touch automation goal. However, to work reliably, AI based automation, requires a deluge of training data. Consequently, the success of the proposed AI solutions is limited by a fundamental challenge faced by cellular network research community: scarcity of the training data. In this paper, we present an extensive review of classic and emerging techniques to address this challenge. We first identify the common data types in RAN and their known use-cases. We then present a taxonomized survey of techniques used in literature to address training data scarcity for various data types. This is followed by a framework to address the training data scarcity. The proposed framework builds on available information and combination of techniques including interpolation, domain-knowledge based, generative adversarial neural networks, transfer learning, autoencoders, few-shot learning, simulators and testbeds. Potential new techniques to enrich scarce data in cellular networks are also proposed, such as by matrix completion theory, and domain knowledge-based techniques leveraging different types of network geometries and network parameters. In addition, an overview of state-of-the art simulators and testbeds is also presented to make readers aware of current and emerging platforms to access real data in order to overcome the data scarcity challenge. The extensive survey of training data scarcity addressing techniques combined with proposed framework to select a suitable technique for given type of data, can assist researchers and network operators in choosing the appropriate methods to overcome the data scarcity challenge in leveraging AI to radio access network automation.
蜂窝网络的未来取决于基于人工智能(AI)的自动化,特别是无线电接入网(RAN)的操作、优化和故障排除。为了实现这种零接触自动化,文献中提出了无数基于人工智能的解决方案,以利用人工智能对网络行为进行建模和优化,从而实现零接触自动化目标。然而,要想可靠地工作,基于人工智能的自动化需要大量的训练数据。因此,所提出的人工智能解决方案的成功受到蜂窝网络研究界面临的一个根本挑战的限制:训练数据的稀缺。在本文中,我们对解决这一挑战的经典和新兴技术进行了广泛的回顾。我们首先确定RAN中常见的数据类型及其已知的用例。然后,我们对文献中用于解决各种数据类型的训练数据稀缺性的技术进行了分类调查。随后是一个解决培训数据短缺问题的框架。所提出的框架建立在可用信息和技术组合的基础上,包括插值、基于领域知识、生成对抗性神经网络、迁移学习、自动编码器、少镜头学习、模拟器和测试台。还提出了丰富蜂窝网络中稀缺数据的潜在新技术,例如通过矩阵完成理论,以及利用不同类型的网络几何形状和网络参数的基于领域的技术。此外,还概述了最先进的模拟器和试验台,以使读者了解当前和新兴的访问真实数据的平台,从而克服数据稀缺的挑战。对训练数据稀缺性解决技术的广泛调查,结合为给定类型的数据选择合适技术的拟议框架,可以帮助研究人员和网络运营商选择合适的方法,以克服利用人工智能实现无线电接入网络自动化的数据稀缺性挑战。
{"title":"Toward Addressing Training Data Scarcity Challenge in Emerging Radio Access Networks: A Survey and Framework","authors":"Haneya Naeem Qureshi;Usama Masood;Marvin Manalastas;Syed Muhammad Asad Zaidi;Hasan Farooq;Julien Forgeat;Maxime Bouton;Shruti Bothe;Per Karlsson;Ali Rizwan;Ali Imran","doi":"10.1109/COMST.2023.3271419","DOIUrl":"https://doi.org/10.1109/COMST.2023.3271419","url":null,"abstract":"The future of cellular networks is contingent on artificial intelligence (AI) based automation, particularly for radio access network (RAN) operation, optimization, and troubleshooting. To achieve such zero-touch automation, a myriad of AI-based solutions are being proposed in literature to leverage AI for modeling and optimizing network behavior to achieve the zero-touch automation goal. However, to work reliably, AI based automation, requires a deluge of training data. Consequently, the success of the proposed AI solutions is limited by a fundamental challenge faced by cellular network research community: scarcity of the training data. In this paper, we present an extensive review of classic and emerging techniques to address this challenge. We first identify the common data types in RAN and their known use-cases. We then present a taxonomized survey of techniques used in literature to address training data scarcity for various data types. This is followed by a framework to address the training data scarcity. The proposed framework builds on available information and combination of techniques including interpolation, domain-knowledge based, generative adversarial neural networks, transfer learning, autoencoders, few-shot learning, simulators and testbeds. Potential new techniques to enrich scarce data in cellular networks are also proposed, such as by matrix completion theory, and domain knowledge-based techniques leveraging different types of network geometries and network parameters. In addition, an overview of state-of-the art simulators and testbeds is also presented to make readers aware of current and emerging platforms to access real data in order to overcome the data scarcity challenge. The extensive survey of training data scarcity addressing techniques combined with proposed framework to select a suitable technique for given type of data, can assist researchers and network operators in choosing the appropriate methods to overcome the data scarcity challenge in leveraging AI to radio access network automation.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 3","pages":"1954-1990"},"PeriodicalIF":35.6,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10226436/10113782.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49963432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds 在通往6G的道路上:愿景、需求、关键技术和测试平台
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-02-27 DOI: 10.1109/COMST.2023.3249835
Cheng-Xiang Wang;Xiaohu You;Xiqi Gao;Xiuming Zhu;Zixin Li;Chuan Zhang;Haiming Wang;Yongming Huang;Yunfei Chen;Harald Haas;John S. Thompson;Erik G. Larsson;Marco Di Renzo;Wen Tong;Peiying Zhu;Xuemin Shen;H. Vincent Poor;Lajos Hanzo
Fifth generation (5G) mobile communication systems have entered the stage of commercial deployment, providing users with new services, improved user experiences as well as a host of novel opportunities to various industries. However, 5G still faces many challenges. To address these challenges, international industrial, academic, and standards organizations have commenced research on sixth generation (6G) wireless communication systems. A series of white papers and survey papers have been published, which aim to define 6G in terms of requirements, application scenarios, key technologies, etc. Although ITU-R has been working on the 6G vision and it is expected to reach a consensus on what 6G will be by mid-2023, the related global discussions are still wide open and the existing literature has identified numerous open issues. This paper first provides a comprehensive portrayal of the 6G vision, technical requirements, and application scenarios, covering the current common understanding of 6G. Then, a critical appraisal of the 6G network architecture and key technologies is presented. Furthermore, existing testbeds and advanced 6G verification platforms are detailed for the first time. In addition, future research directions and open challenges are identified to stimulate the on-going global debate. Finally, lessons learned to date concerning 6G networks are discussed.
第五代(5G)移动通信系统已进入商业部署阶段,为用户提供了新的服务,改善了用户体验,并为各个行业提供了一系列新的机会。然而,5G仍面临许多挑战。为了应对这些挑战,国际工业、学术和标准组织已经开始研究第六代(6G)无线通信系统。已经发表了一系列白皮书和调查论文,旨在从需求、应用场景、关键技术等方面定义6G。尽管ITU-R一直在致力于6G愿景,预计到2023年年中将对6G达成共识,但相关的全球讨论仍然是开放的,现有文献已经确定了许多悬而未决的问题。本文首先全面描述了6G的愿景、技术要求和应用场景,涵盖了当前对6G的普遍理解。然后,对6G网络体系结构和关键技术进行了评价。此外,还首次详细介绍了现有的试验台和先进的6G验证平台。此外,还确定了未来的研究方向和悬而未决的挑战,以激发正在进行的全球辩论。最后,讨论了迄今为止有关6G网络的经验教训。
{"title":"On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds","authors":"Cheng-Xiang Wang;Xiaohu You;Xiqi Gao;Xiuming Zhu;Zixin Li;Chuan Zhang;Haiming Wang;Yongming Huang;Yunfei Chen;Harald Haas;John S. Thompson;Erik G. Larsson;Marco Di Renzo;Wen Tong;Peiying Zhu;Xuemin Shen;H. Vincent Poor;Lajos Hanzo","doi":"10.1109/COMST.2023.3249835","DOIUrl":"https://doi.org/10.1109/COMST.2023.3249835","url":null,"abstract":"Fifth generation (5G) mobile communication systems have entered the stage of commercial deployment, providing users with new services, improved user experiences as well as a host of novel opportunities to various industries. However, 5G still faces many challenges. To address these challenges, international industrial, academic, and standards organizations have commenced research on sixth generation (6G) wireless communication systems. A series of white papers and survey papers have been published, which aim to define 6G in terms of requirements, application scenarios, key technologies, etc. Although ITU-R has been working on the 6G vision and it is expected to reach a consensus on what 6G will be by mid-2023, the related global discussions are still wide open and the existing literature has identified numerous open issues. This paper first provides a comprehensive portrayal of the 6G vision, technical requirements, and application scenarios, covering the current common understanding of 6G. Then, a critical appraisal of the 6G network architecture and key technologies is presented. Furthermore, existing testbeds and advanced 6G verification platforms are detailed for the first time. In addition, future research directions and open challenges are identified to stimulate the on-going global debate. Finally, lessons learned to date concerning 6G networks are discussed.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 2","pages":"905-974"},"PeriodicalIF":35.6,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49952904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
Editorial: First Quarter 2023 IEEE Communications Surveys and Tutorials 编辑:2023年第一季度IEEE通信调查和教程
IF 35.6 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-02-23 DOI: 10.1109/COMST.2023.3238202
Dusit Niyato
Iwelcome you to the first issue of the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS in 2023. This issue includes 25 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “IoT and M2M”, “Internet Technologies”, “Network Virtualization”, “Network and Service Management and Green Communications”, and “Vehicular and Sensor Communications”. A brief account for each of these papers is given below.
欢迎您阅读2023年IEEE通信调查和教程的第一期。这期包括25篇论文,涵盖了通信网络的不同方面。特别是,这些文章对“无线通信”、“网络安全”、“物联网和M2M”、“互联网技术”、“网络虚拟化”、“网络和服务管理与绿色通信”、“车辆和传感器通信”等问题进行了调查和指导。下面是对每一篇论文的简要介绍。
{"title":"Editorial: First Quarter 2023 IEEE Communications Surveys and Tutorials","authors":"Dusit Niyato","doi":"10.1109/COMST.2023.3238202","DOIUrl":"https://doi.org/10.1109/COMST.2023.3238202","url":null,"abstract":"Iwelcome you to the first issue of the IEEE COMMUNICATIONS SURVEYS AND TUTORIALS in 2023. This issue includes 25 papers covering different aspects of communication networks. In particular, these articles survey and tutor various issues in “Wireless Communications”, “Cyber Security”, “IoT and M2M”, “Internet Technologies”, “Network Virtualization”, “Network and Service Management and Green Communications”, and “Vehicular and Sensor Communications”. A brief account for each of these papers is given below.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"25 1","pages":"i-vii"},"PeriodicalIF":35.6,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9739/10051138/10051143.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49931811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Communications Surveys and Tutorials
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1