首页 > 最新文献

信息安全(英文)最新文献

英文 中文
Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage? 零零碎碎的黑客攻击:我们能从一个企业间谍的例子中学到什么?
Pub Date : 2021-05-13 DOI: 10.4236/jis.2021.123012
Jack Schafer, M. Karlins
Information security often involves the development and application of sophisticated software to protect sensitive information stored in corporate computers. Yet, in this example of corporate espionage, a clever person, a cellphone and some readily available software were all it took to crack through one company’s advanced security barriers. By reading this article it is hoped that employees at all levels of an organization’s hierarchy will become more aware of—and recognize—how: 1) bits and pieces of seemingly harmless and easy-to-acquire information can be used for sinister purposes; 2) building rapport and trust with a person can make them more likely to become unknowing co-conspirators in a devious undertaking; and 3) how one must be constantly alert not to give out information without carefully considering the authenticity and justification of the source requesting it.
信息安全通常涉及复杂软件的开发和应用,以保护存储在公司计算机中的敏感信息。然而,在这个企业间谍的例子中,一个聪明的人、一部手机和一些现成的软件就足以突破一家公司的高级安全屏障。通过阅读这篇文章,希望组织层级的所有级别的员工都能更加意识到——并认识到——如何:1)看似无害且易于获取的信息可能被用于险恶目的;2) 与一个人建立融洽的关系和信任会使他们更有可能在不知情的情况下成为狡猾的同谋;以及3)人们必须时刻保持警惕,不要在没有仔细考虑请求信息来源的真实性和正当性的情况下泄露信息。
{"title":"Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?","authors":"Jack Schafer, M. Karlins","doi":"10.4236/jis.2021.123012","DOIUrl":"https://doi.org/10.4236/jis.2021.123012","url":null,"abstract":"Information security often involves the development and application of sophisticated software to protect sensitive \u0000information stored in corporate computers. Yet, in this example of \u0000corporate espionage, a clever person, a cellphone and some readily available \u0000software were all it took to crack through one company’s advanced security \u0000barriers. By reading this article it is hoped that employees at all levels of \u0000an organization’s hierarchy will become more aware of—and recognize—how: 1) \u0000bits and pieces of seemingly harmless and easy-to-acquire information can be \u0000used for sinister purposes; 2) building rapport and trust with a person can \u0000make them more likely to become unknowing co-conspirators in a devious \u0000undertaking; and 3) how one must be constantly alert not to give out information \u0000without carefully considering the authenticity and justification of the source \u0000requesting it.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41424549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Authentication of Video Evidence for Forensic Investigation: A Case of Nigeria 用于司法调查的视频证据鉴定——以尼日利亚为例
Pub Date : 2021-04-28 DOI: 10.4236/JIS.2021.122008
B. O. Akumba, A. Iorliam, S. Agber, E. O. Okube, K. D. Kwaghtyo
Video shreds of evidence are usually admissible in the court of law all over the world. However, individuals manipulate these videos to either defame or incriminate innocent people. Others indulge in video tampering to falsely escape the wrath of the law against misconducts. One way impostors can forge these videos is through inter-frame video forgery. Thus, the integrity of such videos is under threat. This is because these digital forgeries seriously debase the credibility of video contents as being definite records of events. This leads to an increasing concern about the trustworthiness of video contents. Hence, it continues to affect the social and legal system, forensic investigations, intelligence services, and security and surveillance systems as the case may be. The problem of inter-frame video forgery is increasingly spontaneous as more video-editing software continues to emerge. These video editing tools can easily manipulate videos without leaving obvious traces and these tampered videos become viral. Alarmingly, even the beginner users of these editing tools can alter the contents of digital videos in a manner that renders them practically indistinguishable from the original content by mere observations. This paper, however, leveraged on the concept of correlation coefficients to produce a more elaborate and reliable inter-frame video detection to aid forensic investigations, especially in Nigeria. The model employed the use of the idea of a threshold to efficiently distinguish forged videos from authentic videos. A benchmark and locally manipulated video datasets were used to evaluate the proposed model. Experimentally, our approach performed better than the existing methods. The overall accuracy for all the evaluation metrics such as accuracy, recall, precision and F1-score was 100%. The proposed method implemented in the MATLAB programming language has proven to effectively detect inter-frame forgeries.
在世界各地的法庭上,视频碎片证据通常是可以接受的。然而,个人操纵这些视频来诽谤或指控无辜者。其他人则沉迷于篡改视频,以虚假地逃避法律对不当行为的愤怒。冒名顶替者伪造这些视频的一种方法是通过帧间视频伪造。因此,此类视频的完整性受到威胁。这是因为这些数字伪造严重降低了视频内容作为事件确切记录的可信度。这导致人们越来越担心视频内容的可信度。因此,它继续影响着社会和法律系统、法医调查、情报服务以及安全和监控系统。随着越来越多的视频编辑软件的出现,帧间视频伪造问题越来越自发。这些视频编辑工具可以很容易地操纵视频,而不会留下明显的痕迹,这些被篡改的视频会像病毒一样传播开来。令人担忧的是,即使是这些编辑工具的初学者,也可以通过观察来改变数字视频的内容,使其与原始内容几乎无法区分。然而,本文利用相关系数的概念,产生了一种更精细、更可靠的帧间视频检测,以帮助法医调查,特别是在尼日利亚。该模型采用了阈值的思想来有效地区分伪造视频和真实视频。使用基准和本地操作的视频数据集来评估所提出的模型。在实验上,我们的方法比现有方法表现得更好。准确度、召回率、准确度和F1分数等所有评估指标的总体准确度均为100%。所提出的方法在MATLAB编程语言中实现,已被证明可以有效地检测帧间伪造。
{"title":"Authentication of Video Evidence for Forensic Investigation: A Case of Nigeria","authors":"B. O. Akumba, A. Iorliam, S. Agber, E. O. Okube, K. D. Kwaghtyo","doi":"10.4236/JIS.2021.122008","DOIUrl":"https://doi.org/10.4236/JIS.2021.122008","url":null,"abstract":"Video shreds of evidence are usually admissible in the court of law all \u0000over the world. However, individuals manipulate these videos to either defame \u0000or incriminate innocent people. Others indulge in video tampering to falsely \u0000escape the wrath of the law against misconducts. One way impostors can forge \u0000these videos is through inter-frame video forgery. Thus, the integrity of such \u0000videos is under threat. This is because these digital forgeries seriously \u0000debase the credibility of video contents as being definite records of events. This leads to an increasing concern about the \u0000trustworthiness of video contents. Hence, it continues to affect the social and \u0000legal system, forensic investigations, intelligence services, and security and \u0000surveillance systems as the case may be. The problem of inter-frame video \u0000forgery is increasingly spontaneous as more video-editing software continues to \u0000emerge. These video editing tools can easily manipulate videos without leaving \u0000obvious traces and these tampered videos become viral. Alarmingly, even the \u0000beginner users of these editing tools can alter the contents of digital videos \u0000in a manner that renders them practically indistinguishable from the original \u0000content by mere observations. This paper, however, leveraged on the concept of \u0000correlation coefficients to produce a more elaborate and reliable inter-frame \u0000video detection to aid forensic investigations, especially in Nigeria. The \u0000model employed the use of the idea of a threshold to efficiently distinguish \u0000forged videos from authentic videos. A benchmark and locally manipulated video \u0000datasets were used to evaluate the proposed model. Experimentally, our approach \u0000performed better than the existing methods. The overall accuracy for all the \u0000evaluation metrics such as accuracy, recall, precision and F1-score was 100%. \u0000The proposed method implemented in the MATLAB programming language has proven \u0000to effectively detect inter-frame forgeries.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49613746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimum Spending on Cybersecurity Measures: Part II 网络安全措施的最佳支出:第二部分
Pub Date : 2021-01-21 DOI: 10.4236/JIS.2021.121007
Sherita Tara Kissoon
The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: https://www.emerald.com/insight/1750-6166.htm, contains the detailed literature review, and the data results from Phase I and Phase II of this research REF _Ref61862658 r h * MERGEFORMAT [1]. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations is explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security; 2) strategic management; and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the development of a cyber risk investment model and a digital cybersecurity risk management framework. Using a case study methodology, this model and framework were leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio; 2) data centric focus; 3) risk management practices; 4) cost-benefit analysis for cybersecurity measures; and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks, specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss; 2) brand/reputational impact; 3) financial loss fines; 4) increase oversight by regulators/internal audit; and 5) customer/client impact. The implication
本研究的目的是通过开发和利用数字网络安全风险管理框架,调查组织网络安全投资的决策过程。第一篇文章《网络安全措施的最佳支出》发表在Emerald Insight上,网址:https://www.emerald.com/insight/1750-6166.htm,包含详细的文献综述,以及本研究第一阶段和第二阶段的数据结果REF _Ref61862658h*MERGEFORMAT[1]。本文将重点介绍在网络安全支出的组织决策领域完成的研究。在利用对其他研究的审查时,本研究利用回归框架和案例研究方法来证明在实施网络安全控制时,有效的基于风险的决策是必要的。通过回归分析,当将一个因变量与几个自变量联系起来时,探讨了当前组织中实施的网络安全措施的有效性。本文的重点是组织在实施网络安全措施时做出的战略决策。本研究属于风险管理领域,并在以下领域建立了各种模型:1)信息安全;2) 战略管理;以及3)组织决策,以确定承担风险的组织在网络安全措施上的最佳支出。这项研究开发了网络风险投资模型和数字网络安全风险管理框架。使用案例研究方法,利用该模型和框架来评估和实施网络安全措施。案例研究方法深入了解了冒险组织在教育环境范围内的风险缓解策略,重点关注数字网络风险模型中确定的五个领域:1)技术前景和应用组合;2) 以数据为中心;3) 风险管理实践;4) 网络安全措施的成本效益分析;五是战略发展。这项研究的结果为组织在实施网络安全控制时如何做出决策提供了更深入的见解。这项研究表明,大多数组织都在努力实施安全措施,以有效监控和检测网络安全攻击,特别是表明承担风险的组织实施了网络安全措施,履行合规和审计义务,每年支出318万美元。报告还指出,23.6%的风险承担组织发生了6次以上的网络安全漏洞,平均损失350万美元。此外,网络安全漏洞对风险承担组织的影响如下:1)数据丢失;2) 品牌/声誉影响;3) 经济损失罚款;4) 加强监管机构/内部审计的监督;以及5)客户/客户影响。这项研究对实践的影响是广泛的,因为它关注的领域很广,包括风险、资金以及遇到的网络安全漏洞的类型和影响。调查研究清楚地表明,有必要开发和利用数字网络安全风险管理框架,将当前的行业框架整合到风险管理实践中,以包括持续的合规管理。在实施网络安全措施时,这种类型的框架将提供一种平衡的方法来管理冒险组织和规避风险组织之间的差距。
{"title":"Optimum Spending on Cybersecurity Measures: Part II","authors":"Sherita Tara Kissoon","doi":"10.4236/JIS.2021.121007","DOIUrl":"https://doi.org/10.4236/JIS.2021.121007","url":null,"abstract":"The purpose of this research is to \u0000investigate the decision-making process for cybersecurity investments in \u0000organizations through development and utilization of a digital cybersecurity \u0000risk management framework. The initial article, Optimum Spending on \u0000Cybersecurity Measures is published on Emerald Insight at: https://www.emerald.com/insight/1750-6166.htm, contains the detailed literature review, and the data results from \u0000Phase I and Phase II of this research REF _Ref61862658 r h * MERGEFORMAT [1]. This article will \u0000highlight the research completed in the area of organizational decision-making \u0000on cybersecurity spend. In leveraging the review of additional studies, this \u0000research utilizes a regression framework and case study methodology to \u0000demonstrate that effective risk-based decisions are necessary when implementing \u0000cybersecurity controls. Through regression analysis, the effectiveness of \u0000current implemented cybersecurity measures in organizations is explored when connecting a dependent variable with several independent \u0000variables. The focus of this article is on the strategic decisions made by \u0000organizations when implementing cybersecurity measures. This research belongs \u0000to the area of risk management, and various models within the field of 1) \u0000information security; 2) strategic management; and 3) organizational decision-making to determine optimum spending on \u0000cybersecurity measures for risk taking organizations. This research resulted in \u0000the development of a cyber risk investment model and a digital cybersecurity risk management framework. Using a case study methodology, \u0000this model and framework were leveraged to evaluate \u0000and implement cybersecurity measures. The case study methodology provides an \u0000in-depth view of a risk-taking organization’s risk mitigation strategy within \u0000the bounds of the educational environment focusing on five areas identified \u0000within a digital cyber risk model: 1) technology landscape and application \u0000portfolio; 2) data centric focus; 3) risk management \u0000practices; 4) cost-benefit analysis for cybersecurity measures; and 5) strategic development. The outcome of this research provides \u0000greater insight into how an organization makes decisions when implementing \u0000cybersecurity controls. This research shows that most organizations are \u0000diligently implementing security measures to effectively monitor and detect \u0000cyber security attacks, specifically showing \u0000that risk taking organizations implemented cybersecurity measures to meet \u0000compliance and audit obligations with an annual spend of $3.18 million. It also \u0000indicated that 23.6% of risk-taking organizations incurred more than 6 \u0000cybersecurity breaches with an average dollar loss of $3.5 million. In \u0000addition, the impact of a cybersecurity breach on risk taking organizations is \u0000as follows: 1) data loss; 2) brand/reputational \u0000impact; 3) financial loss fines; 4) increase oversight \u0000by regulators/internal audit; and 5) \u0000customer/client impact. The implication","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49016631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning 数据库安全威胁解决方案概述:传统和机器学习
Pub Date : 2021-01-11 DOI: 10.4236/JIS.2021.121002
Yong Wang, Jinsong Xi, Tong Cheng
As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of database security research is to prevent the database from being illegally used or destroyed. This paper introduces the main literature in the field of database security research in recent years. First of all, we classify these papers, the classification criteria are the influencing factors of database security. Compared with the traditional and machine learning (ML) methods, some explanations of concepts are interspersed to make these methods easier to understand. Secondly, we find that the related research has achieved some gratifying results, but there are also some shortcomings, such as weak generalization, deviation from reality. Then, possible future work in this research is proposed. Finally, we summarize the main contribution.
作为一个信息丰富的集体,总有一些人出于不可告人的目的选择冒险,而另一些人则致力于寻找应对数据库安全威胁的方法。数据库安全研究的目的是防止数据库被非法使用或破坏。本文介绍了近年来数据库安全研究领域的主要文献。首先,我们对这些论文进行了分类,分类标准是影响数据库安全的因素。与传统的和机器学习(ML)方法相比,一些概念的解释穿插在其中,使这些方法更容易理解。其次,我们发现相关研究取得了一些可喜的成果,但也存在一些不足,如泛化能力弱、偏离实际等。然后,提出了本研究今后可能开展的工作。最后,我们总结了主要贡献。
{"title":"The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning","authors":"Yong Wang, Jinsong Xi, Tong Cheng","doi":"10.4236/JIS.2021.121002","DOIUrl":"https://doi.org/10.4236/JIS.2021.121002","url":null,"abstract":"As an information-rich collective, \u0000there are always some people who choose to take risks for some ulterior purpose \u0000and others are committed to finding ways to deal with database security \u0000threats. The purpose of database security research is to prevent the database \u0000from being illegally used or destroyed. This paper introduces the main literature \u0000in the field of database security research in recent years. First of all, we \u0000classify these papers, the classification criteria are the influencing \u0000factors of database security. Compared with the traditional and machine \u0000learning (ML) methods, some explanations of concepts are interspersed to make \u0000these methods easier to understand. Secondly, we find that the related research \u0000has achieved some gratifying results, but there are also some shortcomings, \u0000such as weak generalization, deviation from reality. Then, possible future work \u0000in this research is proposed. Finally, we summarize the main contribution.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49186650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue 部分轮廓定时攻击的信息论鉴别:解决空箱问题
Pub Date : 2021-01-01 DOI: 10.4236/jis.2021.121001
Éloi de Chérisey, S. Guilley, O. Rioul, Darshana Jayasinghe
In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exhaustive. As a result, information theoretic distinguishers may come up on previously unseen data, a phenomenon yielding empty bins. A strict application of the maximum likelihood method yields a distinguisher that is not even sound. Ignoring empty bins reestablishes soundness, but seriously limits its performance in terms of success rate. The purpose of this paper is to remedy this situation. In this research, we propose six different techniques to improve the performance of information theoretic distinguishers. We study them thoroughly by applying them to timing attacks, both with synthetic and real leakages. Namely, we compare them in terms of success rate, and show that their performance depends on the amount of profiling, and can be explained by a bias-variance analysis. The result of our work is that there exist use-cases, especially when measurements are noisy, where our novel information theoretic distinguishers (typically the soft-drop distinguisher) perform the best compared to known side-channel distinguishers, despite the empty bin situation.
在任何侧信道攻击中,都希望利用所有可用的泄漏数据来计算区分符的值。剖面阶段对于获得准确的泄漏模型至关重要,但它可能不是详尽的。因此,信息理论的区分者可能会出现在以前看不见的数据上,这是一种产生空箱的现象。严格应用最大似然方法会产生一个甚至不健全的区分符。忽略空箱子重新建立健全,但严重限制其成功率方面的表现。本文的目的就是要纠正这种情况。在这项研究中,我们提出了六种不同的技术来提高信息理论区分器的性能。我们通过将它们应用于定时攻击,包括合成泄漏和真实泄漏,对它们进行了深入的研究。也就是说,我们在成功率方面比较了它们,并表明它们的性能取决于分析的数量,并且可以通过偏差方差分析来解释。我们的工作结果是,存在一些用例,特别是当测量有噪声时,我们的新信息理论区分器(通常是软滴区分器)与已知的侧信道区分器相比表现最好,尽管是空箱情况。
{"title":"Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue","authors":"Éloi de Chérisey, S. Guilley, O. Rioul, Darshana Jayasinghe","doi":"10.4236/jis.2021.121001","DOIUrl":"https://doi.org/10.4236/jis.2021.121001","url":null,"abstract":"In any side-channel attack, it is desirable to exploit all the available leakage data to compute the distinguisher’s values. The profiling phase is essential to obtain an accurate leakage model, yet it may not be exhaustive. As a result, information theoretic distinguishers may come up on previously unseen data, a phenomenon yielding empty bins. A strict application of the maximum likelihood method yields a distinguisher that is not even sound. Ignoring empty bins reestablishes soundness, but seriously limits its performance in terms of success rate. The purpose of this paper is to remedy this situation. In this research, we propose six different techniques to improve the performance of information theoretic distinguishers. We study them thoroughly by applying them to timing attacks, both with synthetic and real leakages. Namely, we compare them in terms of success rate, and show that their performance depends on the amount of profiling, and can be explained by a bias-variance analysis. The result of our work is that there exist use-cases, especially when measurements are noisy, where our novel information theoretic distinguishers (typically the soft-drop distinguisher) perform the best compared to known side-channel distinguishers, despite the empty bin situation.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Complex Encryption System Design Implemented by AES 用AES实现的复杂加密系统设计
Pub Date : 2021-01-01 DOI: 10.4236/JIS.2021.122009
Zhimao Lu, H. Mohamed
With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs.
随着互联网技术的飞速发展和电子商务的日益普及,数据加密技术在数据安全中起着非常重要的作用。信息安全包括安全协议和加密算法两个方面,加密算法是信息安全的基础和核心技术。高级加密标准AES (Advanced Encryption Standard)加密算法是对称加密算法中最常用的算法之一。这种算法在用于密钥管理和安全功能时面临问题。本文着重对这些问题进行了系统的分析,总结了AES算法的实现、综合应用以及与其他现有方法的算法比较。为了分析所提出算法的性能,充分利用AES加密算法的优点,需要减少轮密钥和改进密钥调度,并与RSA算法有机集成。由于Java语言的库较大,采用Java语言实现该算法,并将其与经典算法的加解密速度、熵和内存消耗等参数进行了比较,以证明该算法的有效性。将AES算法与混合AES算法进行了比较,结果表明该算法具有良好的性能和较高的安全性。因此,它可以用于密钥管理和安全功能,特别是通过不安全的通道共享敏感文件。该分析为根据不同的业务需求选择不同的加密算法提供了有用的参考。
{"title":"A Complex Encryption System Design Implemented by AES","authors":"Zhimao Lu, H. Mohamed","doi":"10.4236/JIS.2021.122009","DOIUrl":"https://doi.org/10.4236/JIS.2021.122009","url":null,"abstract":"With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Information Segmentation and Investing in Cybersecurity 信息分割与网络安全投资
Pub Date : 2021-01-01 DOI: 10.4236/JIS.2021.121006
Lawrence A. Gordon, Martin P. Loeb, Lei Zhou
This paper provides an analysis of how the benefits of information segmentation can assist an organization to derive the appropriate amount to invest in cybersecurity from a cost-benefit perspective. An analytical model based on the framework of the Gordon-Loeb Model ([1]) is presented that provides a set of sufficient conditions for information segmentation to lower the total investments in cybersecurity and the expected loss from cybersecurity breaches. A numerical example illustrating the insights gained from the model is also presented.
本文分析了信息分割的好处如何帮助组织从成本效益的角度得出适当的网络安全投资金额。提出了一种基于Gordon-Loeb模型([1])框架的分析模型,该模型为信息分割提供了一组充分条件,以降低网络安全总投资和网络安全漏洞的预期损失。文中还给出了一个数值例子来说明从该模型中获得的见解。
{"title":"Information Segmentation and Investing in Cybersecurity","authors":"Lawrence A. Gordon, Martin P. Loeb, Lei Zhou","doi":"10.4236/JIS.2021.121006","DOIUrl":"https://doi.org/10.4236/JIS.2021.121006","url":null,"abstract":"This paper provides an analysis of how the benefits of information segmentation can assist an organization to derive the appropriate amount to invest in cybersecurity from a cost-benefit perspective. An analytical model based on the framework of the Gordon-Loeb Model ([1]) is presented that provides a set of sufficient conditions for information segmentation to lower the total investments in cybersecurity and the expected loss from cybersecurity breaches. A numerical example illustrating the insights gained from the model is also presented.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1) 网络安全罪行、道德及克服网络物理系统问题的建议算法(CybSec1)
Pub Date : 2021-01-01 DOI: 10.4236/JIS.2021.121003
A. Hussien
Digital systems have changed our world and will continue to change it. Supportive government policy, a strong research base and history of industrial success place the benefits of an emerging digital society. Protecting benefits and minimizing risks requires reliable and robust cyber security, backed by a robust research and translation system. Trust is essential for growth and maintenance of participation in the digital community. Organizations gain trust by acting in a trustworthy way leading to building reliable and secure systems, treating people, their privacy and their data with respect, and providing reliable and understandable information to help people understand how safe they are. Research and revolution in industry and academia will continue to make important contributions to create flexible and reliable digital environment. Cyber Security has a main role in the field of information technology because securing information has become one of the greatest challenges today. When we think about the cyber security, the first thing that comes to our mind is “cyber crimes” which are increasing exponentially day by day. Many governments and firms are taking many measures to prevent these cybercrimes. Besides the various measures, cyber security remains a major concern. This paper intended to give a deep overview of the concepts and principles of cyber security that affect the safety and security in an international context. It mainly focuses on challenges faced by cyber security on the latest technologies and focuses also on introducing security types, cyber security techniques, cyber security ethics, trends that change the face of cyber security and finally attempting to solve one of the most serious cyber security crimes of violating privacy on the internet by improving the security of sensitive personal information (SPI) in Cyber-physical systems using a selected proposed algorithm that analyzes the user’s information resources and determines the valid data to be encrypted, then uses adaptive acquisition methods to collect the information and finally a new cryptographic method is used to complete SPI secure encryption according to acquisition results as described in details in Section 4.
数字系统已经并将继续改变我们的世界。支持性的政府政策、强大的研究基础和工业成功的历史为新兴的数字社会带来了好处。保护利益和降低风险需要可靠和强大的网络安全,并以强大的研究和翻译系统为后盾。信任对于数字社区的发展和参与至关重要。组织通过建立可靠和安全的系统,尊重员工、他们的隐私和数据,并提供可靠和可理解的信息来帮助人们了解他们的安全程度,从而获得信任。工业界和学术界的研究和革命将继续为创造灵活可靠的数字环境做出重要贡献。网络安全在信息技术领域具有重要作用,因为信息安全已成为当今最大的挑战之一。当我们想到网络安全时,我们首先想到的是“网络犯罪”,这是呈指数增长的一天。许多政府和公司正在采取许多措施来防止这些网络犯罪。除了各种措施,网络安全仍然是一个主要问题。本文旨在深入概述在国际背景下影响安全和安保的网络安全概念和原则。它主要关注网络安全在最新技术上面临的挑战,并着重介绍安全类型,网络安全技术,网络安全伦理,改变网络安全面貌的趋势,并最终试图解决侵犯互联网隐私的最严重网络安全犯罪之一,通过使用选定的建议算法来提高网络物理系统中敏感个人信息(SPI)的安全性,该算法分析用户的信息资源并确定要加密的有效数据。然后采用自适应采集方法采集信息,最后根据采集结果采用新的加密方法完成SPI安全加密,具体步骤见第4节。
{"title":"Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)","authors":"A. Hussien","doi":"10.4236/JIS.2021.121003","DOIUrl":"https://doi.org/10.4236/JIS.2021.121003","url":null,"abstract":"Digital systems have changed our world and will continue to change it. Supportive government policy, a strong research base and history of industrial success place the benefits of an emerging digital society. Protecting benefits and minimizing risks requires reliable and robust cyber security, backed by a robust research and translation system. Trust is essential for growth and maintenance of participation in the digital community. Organizations gain trust by acting in a trustworthy way leading to building reliable and secure systems, treating people, their privacy and their data with respect, and providing reliable and understandable information to help people understand how safe they are. Research and revolution in industry and academia will continue to make important contributions to create flexible and reliable digital environment. Cyber Security has a main role in the field of information technology because securing information has become one of the greatest challenges today. When we think about the cyber security, the first thing that comes to our mind is “cyber crimes” which are increasing exponentially day by day. Many governments and firms are taking many measures to prevent these cybercrimes. Besides the various measures, cyber security remains a major concern. This paper intended to give a deep overview of the concepts and principles of cyber security that affect the safety and security in an international context. It mainly focuses on challenges faced by cyber security on the latest technologies and focuses also on introducing security types, cyber security techniques, cyber security ethics, trends that change the face of cyber security and finally attempting to solve one of the most serious cyber security crimes of violating privacy on the internet by improving the security of sensitive personal information (SPI) in Cyber-physical systems using a selected proposed algorithm that analyzes the user’s information resources and determines the valid data to be encrypted, then uses adaptive acquisition methods to collect the information and finally a new cryptographic method is used to complete SPI secure encryption according to acquisition results as described in details in Section 4.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1) 数据迁移的需求、策略、挑战、方法、类别、风险、与云计算的使用,以及使用建议的模型在云计算中使用的改进(DMig 1)
Pub Date : 2021-01-01 DOI: 10.4236/JIS.2021.121004
Abouelela Abdou Hussein
Data Migration is a multi-step process that begins with analyzing old data and culminates in data uploading and reconciliation in new applications. With the rapid growth of data, organizations constantly need to migrate data. Data migration can be a complex process as testing must be done to ensure data quality. Migration also can be very costly if best practices are not followed and hidden costs are not identified in the early stage. On the other hand, many organizations today instead of buying IT equipment (hardware and/or software) and managing it themselves, they prefer to buy services from IT service providers. The number of service providers is increasing dramatically and the cloud is becoming the preferred tool for more cloud storage services. However, as more information and personal data are transferred to the cloud, to social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. So, academia and industry circles strive to find an effective way to secure data migration in the cloud. Various resolving methods and encryption techniques have been implemented. In this work, we will try to cover many important points in data migration as Strategy, Challenges, Need, methodology, Categories, Risks, and Uses with Cloud computing. Finally, we discuss data migration security and privacy challenge and how to solve this problem by making improvements in it’s using with Cloud through suggested proposed model that enhances data security and privacy by gathering Advanced Encryption Standard-256 (ATS256), Data Dispersion Algorithms and Secure Hash Algorithm-512. This model achieves verifiable security ratings and fast execution times.
数据迁移是一个多步骤的过程,从分析旧数据开始,最终在新应用程序中上传和协调数据。随着数据的快速增长,组织需要不断迁移数据。数据迁移可能是一个复杂的过程,因为必须进行测试以确保数据质量。如果不遵循最佳实践,并且未在早期阶段确定隐藏成本,那么迁移也可能代价高昂。另一方面,今天的许多组织不是购买IT设备(硬件和/或软件)并自己管理它,而是更喜欢从IT服务提供商那里购买服务。服务提供商的数量正在急剧增加,云正在成为更多云存储服务的首选工具。然而,随着越来越多的信息和个人数据被转移到云端、社交媒体网站、DropBox、百度网盘等,数据安全和隐私问题受到了质疑。因此,学术界和业界都在努力寻找一种有效的方法来保护云中的数据迁移。已经实现了各种解析方法和加密技术。在这项工作中,我们将尝试涵盖数据迁移中的许多要点,如战略,挑战,需求,方法,类别,风险和云计算的使用。最后,我们讨论了数据迁移的安全性和隐私性挑战,以及如何通过通过收集高级加密标准256 (ATS256)、数据分散算法和安全哈希算法-512来提高数据安全性和隐私性的建议模型来改进其与云的使用来解决这一问题。该模型实现了可验证的安全等级和快速的执行时间。
{"title":"Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)","authors":"Abouelela Abdou Hussein","doi":"10.4236/JIS.2021.121004","DOIUrl":"https://doi.org/10.4236/JIS.2021.121004","url":null,"abstract":"Data Migration is a multi-step process that begins with analyzing old data and culminates in data uploading and reconciliation in new applications. With the rapid growth of data, organizations constantly need to migrate data. Data migration can be a complex process as testing must be done to ensure data quality. Migration also can be very costly if best practices are not followed and hidden costs are not identified in the early stage. On the other hand, many organizations today instead of buying IT equipment (hardware and/or software) and managing it themselves, they prefer to buy services from IT service providers. The number of service providers is increasing dramatically and the cloud is becoming the preferred tool for more cloud storage services. However, as more information and personal data are transferred to the cloud, to social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. So, academia and industry circles strive to find an effective way to secure data migration in the cloud. Various resolving methods and encryption techniques have been implemented. In this work, we will try to cover many important points in data migration as Strategy, Challenges, Need, methodology, Categories, Risks, and Uses with Cloud computing. Finally, we discuss data migration security and privacy challenge and how to solve this problem by making improvements in it’s using with Cloud through suggested proposed model that enhances data security and privacy by gathering Advanced Encryption Standard-256 (ATS256), Data Dispersion Algorithms and Secure Hash Algorithm-512. This model achieves verifiable security ratings and fast execution times.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Empirical Evidence for a Descriptive Model of Principles of Information Security Course 信息安全原理课程描述模型的实证研究
Pub Date : 2020-08-21 DOI: 10.4236/jis.2020.114012
A. Adekoya, A. Donald, S. Akkaladevi, A. A. Akinola
The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs; (b) majority of the courses examined, stress both strong technical and hands-on skills; (c) encourage vendor-neutral certifications as a course exit characteristic; and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.
本研究的目的是研究快速发展的本科生信息原理/网络安全课程的性质和内容,该课程在过去十年中一直吸引着计算机学科越来越多的关注。更具体地说,它是为了推动信息/网络安全课程标准化原则的设计。为此,对开设该课程的学院和大学进行了一项调查。对几个国家的大学和学院中的几所工程和商业学院进行了调查,以生成必要的数据。调查问卷仅针对计算机信息系统(CIS)、计算机科学(CS)、管理信息系统(MIS)、信息系统(IS)和其他计算机相关部门。研究工具由两个主要部分组成:一部分涉及机构人口信息,另一部分侧重于课程的相关要素。共有六十二(62)个问卷项目,涵盖人口统计、课程认知、课程内容和覆盖范围、教学偏好、交付方法和部署的课程技术、分配的教科书和相关资源、学习者支持、课程评估以及基于许可证的认证等领域。数据分析中出现了几个主题:(a)原理课程是大多数网络安全项目的组成部分;(b) 大多数课程都强调强大的技术和动手能力;(c) 鼓励供应商中立认证作为课程退出的特征;以及(d)课程结束时的项目,仍然是成功完成课程的标准要求。总的来说,这项研究清楚地表明,网络安全是一门多边学科,不受背景和内容的限制。据设想,这项研究的结果将对所有实际目的具有指导意义。我们希望它能成为这门基础课程最权威的描述性模型之一,并有助于指导和实际塑造大学和学术项目在更新和升级课程时关注信息/网络安全的决策,尤其是根据本文阐述的新发现,基础原理课程。
{"title":"Empirical Evidence for a Descriptive Model of Principles of Information Security Course","authors":"A. Adekoya, A. Donald, S. Akkaladevi, A. A. Akinola","doi":"10.4236/jis.2020.114012","DOIUrl":"https://doi.org/10.4236/jis.2020.114012","url":null,"abstract":"The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs; (b) majority of the courses examined, stress both strong technical and hands-on skills; (c) encourage vendor-neutral certifications as a course exit characteristic; and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41387756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
信息安全(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1