首页 > 最新文献

信息安全(英文)最新文献

英文 中文
Majority Voting Ransomware Detection System 多数投票勒索软件检测系统
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144016
Simon R. Davies, Richard Macfarlane, W. Buchanan
Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making head-lines. Many different detection systems have been proposed as solutions to the ever-changing dynamic landscape of ransomware detection. In the majority of cases, these described systems propose a method based on the result of a single test performed on either the executable code, the process under investigation, its behaviour, or its output. In a small subset of ransomware detection systems, the concept of a scorecard is employed where multiple tests are performed on various aspects of a process under investigation and their re-sults are then analysed using machine learning. The purpose of this paper is to propose a new majority voting approach to ransomware detection by developing a method that uses a cumulative score derived from discrete tests based on calculations using algorithmic rather than heuristic techniques. The paper describes 23 candidate tests, as well as 9 Windows API tests which are validated to determine both their accuracy and viability for use within a ran-somware detection system. Using a cumulative score calculation approach to ransomware detection has several benefits, such as the immunity to the occasional inaccuracy of individual tests when making its final classification. The system can also leverage multiple tests that can be both comprehensive and complimentary in an attempt to achieve a broader, deeper, and more robust analysis of the program under investigation. Additionally, the use of multiple collaborative tests also significantly hinders ransomware from masking or modifying its behaviour in an attempt to bypass detection. The results achieved by this research demonstrate that many of the proposed tests achieved a high degree of accuracy in differentiating between benign and malicious targets and suggestions are offered as to how these tests, and combinations of tests, could be adapted to further improve the detection accuracy.
加密勒索软件对政府和企业都是一个重大威胁,备受瞩目的网络安全事件经常成为头条新闻。许多不同的检测系统已经被提出作为不断变化的勒索软件检测动态景观的解决方案。在大多数情况下,这些描述的系统根据对可执行代码、被调查的过程、其行为或其输出执行的单个测试的结果提出一种方法。在勒索软件检测系统的一小部分中,采用记分卡的概念,对正在调查的过程的各个方面执行多个测试,然后使用机器学习分析其结果。本文的目的是通过开发一种方法来提出一种新的多数投票方法来检测勒索软件,该方法使用基于算法而不是启发式技术计算的离散测试得出的累积分数。本文描述了23个候选测试,以及9个经过验证的Windows API测试,以确定它们在反软件检测系统中使用的准确性和可行性。使用累积分数计算方法进行勒索软件检测有几个好处,例如在进行最终分类时,可以避免个别测试偶尔出现的不准确性。系统还可以利用多种测试,这些测试既全面又互补,以尝试实现对所调查的程序的更广泛、更深入和更健壮的分析。此外,多重协作测试的使用也大大阻碍了勒索软件掩盖或修改其行为以试图绕过检测。本研究的结果表明,许多提出的测试在区分良性和恶意目标方面达到了很高的准确性,并就如何调整这些测试以及测试组合以进一步提高检测准确性提出了建议。
{"title":"Majority Voting Ransomware Detection System","authors":"Simon R. Davies, Richard Macfarlane, W. Buchanan","doi":"10.4236/jis.2023.144016","DOIUrl":"https://doi.org/10.4236/jis.2023.144016","url":null,"abstract":"Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making head-lines. Many different detection systems have been proposed as solutions to the ever-changing dynamic landscape of ransomware detection. In the majority of cases, these described systems propose a method based on the result of a single test performed on either the executable code, the process under investigation, its behaviour, or its output. In a small subset of ransomware detection systems, the concept of a scorecard is employed where multiple tests are performed on various aspects of a process under investigation and their re-sults are then analysed using machine learning. The purpose of this paper is to propose a new majority voting approach to ransomware detection by developing a method that uses a cumulative score derived from discrete tests based on calculations using algorithmic rather than heuristic techniques. The paper describes 23 candidate tests, as well as 9 Windows API tests which are validated to determine both their accuracy and viability for use within a ran-somware detection system. Using a cumulative score calculation approach to ransomware detection has several benefits, such as the immunity to the occasional inaccuracy of individual tests when making its final classification. The system can also leverage multiple tests that can be both comprehensive and complimentary in an attempt to achieve a broader, deeper, and more robust analysis of the program under investigation. Additionally, the use of multiple collaborative tests also significantly hinders ransomware from masking or modifying its behaviour in an attempt to bypass detection. The results achieved by this research demonstrate that many of the proposed tests achieved a high degree of accuracy in differentiating between benign and malicious targets and suggestions are offered as to how these tests, and combinations of tests, could be adapted to further improve the detection accuracy.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Survey for Differential Privacy Techniques in Federated Learning 联邦学习中差分隐私技术的系统研究
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.142008
Yan Zhang, Yunfan Lv, Fengxia Liu
{"title":"A Systematic Survey for Differential Privacy Techniques in Federated Learning","authors":"Yan Zhang, Yunfan Lv, Fengxia Liu","doi":"10.4236/jis.2023.142008","DOIUrl":"https://doi.org/10.4236/jis.2023.142008","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on the Existing Cybersecurity Policies and Strategies in Combating Increased Cybercrime in Zambia 赞比亚打击日益增加的网络犯罪的现有网络安全政策和战略研究
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144017
G. Siampondo, Professor Mbuyu Sumbwanyambe, Bwalya Chansa
{"title":"A Study on the Existing Cybersecurity Policies and Strategies in Combating Increased Cybercrime in Zambia","authors":"G. Siampondo, Professor Mbuyu Sumbwanyambe, Bwalya Chansa","doi":"10.4236/jis.2023.144017","DOIUrl":"https://doi.org/10.4236/jis.2023.144017","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction and Implementation of a Privacy-Preserving Identity-Based Encryption Architecture 一种保护隐私的基于身份的加密体系结构的构建与实现
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144018
David Bissessar, C. Adams
{"title":"Construction and Implementation of a Privacy-Preserving Identity-Based Encryption Architecture","authors":"David Bissessar, C. Adams","doi":"10.4236/jis.2023.144018","DOIUrl":"https://doi.org/10.4236/jis.2023.144018","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Cyber Risk: How Teens Expose Corporations in WFH Era 一种新的网络风险:WFH时代的青少年如何暴露企业
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144022
Zahm Siyed
We analyze the risks associated with teenagers’ online activities and the potential migration of cyber threats originating from teenagers to their parents’ work-from-home (WFH) devices, even when defensive measures such as VPN are employed. Furthermore, we examine the serious implications these risks have on corporate security. Of particular concern, parents who work with confidential corporate information, such as financial projections or product roadmaps, might find that their kids are targeted by hackers who seek an easier entry-point to home networks and eventually WFH devices. This paper is timely since there is a rising trend of hybrid work in white-collar professions, mixing traditional in-office work with WFH. The latter is increasingly done in split shifts, including work performed before breakfast or after dinner. While this shift offers numerous workforce advantages and helps teen-parent bonding, it also introduces a plethora of cybersecurity risks, especially when these devices and networks are shared with teenagers on home networks. We did a structured survey of 62 teens which confirms that risky online activity abounds, so the threat of risk migration onto corporate networks should not be ignored. We perform a migration risk assessment and identify which teen-origin risks are most likely to contaminate parents’ WFH devices. We evaluate 20 attack vectors and generate 60 risk ratings. We classify 29 as high risk, 8 as medium risk, 13 as low risk, and 10 as not relevant. We offer recommendations to mitigate this new set of cyber risks.
我们分析了与青少年在线活动相关的风险,以及网络威胁从青少年转移到父母在家工作(WFH)设备的潜在迁移,即使采用了VPN等防御措施。此外,我们还研究了这些风险对企业安全的严重影响。尤其令人担忧的是,那些处理公司机密信息(如财务预测或产品路线图)的父母可能会发现,他们的孩子成为黑客的目标,这些黑客寻求更容易进入家庭网络,最终进入无线宽带设备。由于白领职业中混合工作的趋势正在上升,将传统的办公室工作与WFH混合在一起,因此本文的研究恰逢其时。后者越来越多地分班工作,包括早餐前或晚餐后的工作。虽然这种转变提供了许多劳动力优势,并有助于青少年与父母建立联系,但它也带来了大量的网络安全风险,尤其是当这些设备和网络在家庭网络上与青少年共享时。我们对62名青少年进行了结构化调查,结果证实,危险的在线活动比比皆是,因此,风险转移到公司网络的威胁不容忽视。我们进行迁移风险评估,并确定哪些青少年起源的风险最有可能污染父母的WFH设备。我们评估了20个攻击向量并生成了60个风险评级。我们将29个分类为高风险,8个为中等风险,13个为低风险,10个为不相关。我们提出了一些建议,以减轻这一新的网络风险。
{"title":"A New Cyber Risk: How Teens Expose Corporations in WFH Era","authors":"Zahm Siyed","doi":"10.4236/jis.2023.144022","DOIUrl":"https://doi.org/10.4236/jis.2023.144022","url":null,"abstract":"We analyze the risks associated with teenagers’ online activities and the potential migration of cyber threats originating from teenagers to their parents’ work-from-home (WFH) devices, even when defensive measures such as VPN are employed. Furthermore, we examine the serious implications these risks have on corporate security. Of particular concern, parents who work with confidential corporate information, such as financial projections or product roadmaps, might find that their kids are targeted by hackers who seek an easier entry-point to home networks and eventually WFH devices. This paper is timely since there is a rising trend of hybrid work in white-collar professions, mixing traditional in-office work with WFH. The latter is increasingly done in split shifts, including work performed before breakfast or after dinner. While this shift offers numerous workforce advantages and helps teen-parent bonding, it also introduces a plethora of cybersecurity risks, especially when these devices and networks are shared with teenagers on home networks. We did a structured survey of 62 teens which confirms that risky online activity abounds, so the threat of risk migration onto corporate networks should not be ignored. We perform a migration risk assessment and identify which teen-origin risks are most likely to contaminate parents’ WFH devices. We evaluate 20 attack vectors and generate 60 risk ratings. We classify 29 as high risk, 8 as medium risk, 13 as low risk, and 10 as not relevant. We offer recommendations to mitigate this new set of cyber risks.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136305026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform 基于遗传算法和离散小波变换残差数的图像水印新方案
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144023
Peter Awonnatemi Agbedemnab, Mohammed Akolgo, Moses Apambila Agebure
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.
由于技术的进步,互联网上的数据传输已经成为一个关键问题,因为盗版有可能窃取内容所有者的知识产权。本文提出了一种新的数字水印方案,该方案结合遗传算法(GA)和剩余数系统(RNS)的一些算子对图像进行加密,并嵌入到封面图像中进行水印。因此,图像水印方案使用加密的图像。将秘密图像嵌入到经过三阶离散小波变换(DWT)得到的封面图像的分解帧中。这是为了确保即使对掩护信息进行了成功的攻击,也不会暴露秘密信息。内容创造者可以通过在法庭上公开秘密信息来证明多媒体内容的所有权。使用MATLAB2022对该方案进行了样本数据测试,仿真结果表明,与现有类似方案相比,该方案具有很强的不可感知性和鲁棒性。
{"title":"A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform","authors":"Peter Awonnatemi Agbedemnab, Mohammed Akolgo, Moses Apambila Agebure","doi":"10.4236/jis.2023.144023","DOIUrl":"https://doi.org/10.4236/jis.2023.144023","url":null,"abstract":"Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135008158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Development of a Security Risk Assessment Model for Saudi Arabian Business Environment Based on the ISO/IEC 27005 ISRM Standard 基于ISO/IEC 27005 ISRM标准的沙特阿拉伯商业环境安全风险评估模型的开发
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.143012
W. Alheadary
{"title":"Towards Development of a Security Risk Assessment Model for Saudi Arabian Business Environment Based on the ISO/IEC 27005 ISRM Standard","authors":"W. Alheadary","doi":"10.4236/jis.2023.143012","DOIUrl":"https://doi.org/10.4236/jis.2023.143012","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Cryptographic Algorithm in the Form of an API in Order to Secure Monetary Transactions in a Supermarket 以API形式设计一种加密算法,以保证超市货币交易的安全
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144024
Atsopmene Tango Vanette Eleonore, Gamom Ngounou Ewo Roland Christian, Kom Charles Hubert
Supermarkets and large-scale retail stores are usually subject to huge monetary transactions for certain customers’ purchases. The computerization of these systems is common in supermarkets but the security of these transactions remains a mystery. This article presents an algorithm as an API based on symmetric cryptography that can enable end-to-end encryption of a monetary transaction in a supermarket. This algorithm is the first part of the complete supermarket management system which will be presented in the following article. The Python language and the Flask framework allow us to develop the algorithm as an independent component. Tests have been performed and our algorithm uses 98.49% less memory and 10.18% time saving than the AES algorithm.
超市和大型零售商店通常会因为某些顾客的购买而发生巨额货币交易。这些系统的计算机化在超市中很常见,但这些交易的安全性仍然是一个谜。本文提出了一种基于对称密码学的API算法,可以对超市中的货币交易进行端到端加密。该算法是整个超市管理系统的第一部分,将在接下来的文章中介绍。Python语言和Flask框架允许我们将算法作为一个独立的组件来开发。经过测试,我们的算法比AES算法节省了98.49%的内存和10.18%的时间。
{"title":"Design of a Cryptographic Algorithm in the Form of an API in Order to Secure Monetary Transactions in a Supermarket","authors":"Atsopmene Tango Vanette Eleonore, Gamom Ngounou Ewo Roland Christian, Kom Charles Hubert","doi":"10.4236/jis.2023.144024","DOIUrl":"https://doi.org/10.4236/jis.2023.144024","url":null,"abstract":"Supermarkets and large-scale retail stores are usually subject to huge monetary transactions for certain customers’ purchases. The computerization of these systems is common in supermarkets but the security of these transactions remains a mystery. This article presents an algorithm as an API based on symmetric cryptography that can enable end-to-end encryption of a monetary transaction in a supermarket. This algorithm is the first part of the complete supermarket management system which will be presented in the following article. The Python language and the Flask framework allow us to develop the algorithm as an independent component. Tests have been performed and our algorithm uses 98.49% less memory and 10.18% time saving than the AES algorithm.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135156690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques 通过使用自动威胁建模技术强化安全标头实现安全Web应用技术
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.141001
Maduhu Mshangi Mlyatu, C. Sanga
{"title":"Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques","authors":"Maduhu Mshangi Mlyatu, C. Sanga","doi":"10.4236/jis.2023.141001","DOIUrl":"https://doi.org/10.4236/jis.2023.141001","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Practice on High Availability Scheme of Unified Identity Authentication System Based on CAS in Colleges and Universities 基于CAS的高校统一身份认证系统高可用性方案的研究与实践
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.141002
Man Liu, Lei Yu
{"title":"Research and Practice on High Availability Scheme of Unified Identity Authentication System Based on CAS in Colleges and Universities","authors":"Man Liu, Lei Yu","doi":"10.4236/jis.2023.141002","DOIUrl":"https://doi.org/10.4236/jis.2023.141002","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
信息安全(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1