首页 > 最新文献

物联网(英文)最新文献

英文 中文
Security Challenges and Requirements for Industrial IoT Systems 工业物联网系统的安全挑战和需求
Pub Date : 2020-11-19 DOI: 10.1201/9780429270567-5
V. Valentin, A. Mehaoua, F. Guenane
{"title":"Security Challenges and Requirements for Industrial IoT Systems","authors":"V. Valentin, A. Mehaoua, F. Guenane","doi":"10.1201/9780429270567-5","DOIUrl":"https://doi.org/10.1201/9780429270567-5","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81425717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Low Power Physical Layer Security Solutions for IoT Devices 物联网设备的低功耗物理层安全解决方案
Pub Date : 2020-11-19 DOI: 10.1201/9780429270567-10
Chithraja Rajan, D. Sharma, D. P. Samajdar, Jyoti Patel
{"title":"Low Power Physical Layer Security Solutions for IoT Devices","authors":"Chithraja Rajan, D. Sharma, D. P. Samajdar, Jyoti Patel","doi":"10.1201/9780429270567-10","DOIUrl":"https://doi.org/10.1201/9780429270567-10","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77750637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some Research Issues of Harmful and Violent Content Filtering for Social Networks in the Context of Large-Scale and Streaming Data with Apache Spark 基于Apache Spark的大规模流数据环境下社交网络有害暴力内容过滤研究
Pub Date : 2020-11-19 DOI: 10.1201/9780429270567-11
P. Do, Phu Pham, T. Phan
{"title":"Some Research Issues of Harmful and Violent Content Filtering for Social Networks in the Context of Large-Scale and Streaming Data with Apache Spark","authors":"P. Do, Phu Pham, T. Phan","doi":"10.1201/9780429270567-11","DOIUrl":"https://doi.org/10.1201/9780429270567-11","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82124319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Physical Systems in Healthcare 医疗保健中的网络物理系统
Pub Date : 2020-11-19 DOI: 10.1201/9780429270567-2
R. Raju, M. Moh
{"title":"Cyber-Physical Systems in Healthcare","authors":"R. Raju, M. Moh","doi":"10.1201/9780429270567-2","DOIUrl":"https://doi.org/10.1201/9780429270567-2","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79603845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly Detection on Encrypted and High-Performance Data Networks by Means of Machine Learning Techniques 基于机器学习技术的加密高性能数据网络异常检测
Pub Date : 2020-11-19 DOI: 10.1201/9780429270567-7
Lorenzo Fernández Maimó, Alberto Huertas Celdrán, F. J. G. Clemente
{"title":"Anomaly Detection on Encrypted and High-Performance Data Networks by Means of Machine Learning Techniques","authors":"Lorenzo Fernández Maimó, Alberto Huertas Celdrán, F. J. G. Clemente","doi":"10.1201/9780429270567-7","DOIUrl":"https://doi.org/10.1201/9780429270567-7","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84356340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Learning for Network Intrusion Detection: An Empirical Assessment 网络入侵检测的深度学习:经验评估
Pub Date : 2020-11-19 DOI: 10.1201/9780429270567-8
A. Gouveia, M. Correia
The detection of security-related events using machine learning approaches has been extensively investigated in the past. Particularly, machine learningbased network intrusion detection has attracted a lot of attention due to its potential to detect unknown attacks. A number of classification techniques have been used for that purpose, but they were mostly classical schemes like decision trees. In this paper we go one step further and explore the use of a set of machine learning techniques denominated generically as “deep learning” that have been generating excellent results in other areas. We compare three recent techniques – generalized linear models, gradient boosting machines, and deep learning – with classical classifiers. The comparison is performed using a recent data set of network communication traces designed carefully for evaluating intrusion detection schemes. We show that deep learning techniques have an undeniable value over older algorithms, since better model fitting indicators can be achieved.
使用机器学习方法检测安全相关事件在过去已经得到了广泛的研究。特别是,基于机器学习的网络入侵检测由于其检测未知攻击的潜力而引起了人们的广泛关注。为了这个目的,已经使用了许多分类技术,但它们大多是像决策树这样的经典方案。在本文中,我们进一步探索了一组机器学习技术的使用,这些技术通常被称为“深度学习”,在其他领域产生了出色的结果。我们比较了三种最新的技术——广义线性模型、梯度增强机器和深度学习——与经典分类器。使用最近的网络通信轨迹数据集进行比较,该数据集是为评估入侵检测方案而精心设计的。我们表明,深度学习技术与旧算法相比具有不可否认的价值,因为可以实现更好的模型拟合指标。
{"title":"Deep Learning for Network Intrusion Detection: An Empirical Assessment","authors":"A. Gouveia, M. Correia","doi":"10.1201/9780429270567-8","DOIUrl":"https://doi.org/10.1201/9780429270567-8","url":null,"abstract":"The detection of security-related events using machine learning approaches has been extensively investigated in the past. Particularly, machine learningbased network intrusion detection has attracted a lot of attention due to its potential to detect unknown attacks. A number of classification techniques have been used for that purpose, but they were mostly classical schemes like decision trees. In this paper we go one step further and explore the use of a set of machine learning techniques denominated generically as “deep learning” that have been generating excellent results in other areas. We compare three recent techniques – generalized linear models, gradient boosting machines, and deep learning – with classical classifiers. The comparison is performed using a recent data set of network communication traces designed carefully for evaluating intrusion detection schemes. We show that deep learning techniques have an undeniable value over older algorithms, since better model fitting indicators can be achieved.","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76148108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Network Intrusion Detection with XGBoost 基于XGBoost的网络入侵检测
Pub Date : 2020-11-19 DOI: 10.1201/9780429270567-6
A. Gouveia, M. Correia
XGBoost is a recent machine learning method that has been getting increasing attention. It won Kaggle’s Higgs Machine Learning Challenge, among several other Kaggle competitions, due to its performance. In this , we explore the use of XGBoost in the context of anomaly-based network intrusion detection, an area in which there is a considerable gap. We study not only the performance of XGBoost with two recent datasets, but also how to optimize its performance and model parameter choice. We also provide insights into which dataset features are best for performance tuning.
XGBoost是一种最近受到越来越多关注的机器学习方法。由于它的表现,它赢得了Kaggle的希格斯机器学习挑战赛,以及其他几项Kaggle比赛。在这方面,我们探讨了在基于异常的网络入侵检测的背景下使用XGBoost,这是一个存在相当大差距的领域。我们不仅用两个最新的数据集研究了XGBoost的性能,还研究了如何优化其性能和模型参数的选择。我们还提供了关于哪些数据集特性最适合进行性能调优的见解。
{"title":"Network Intrusion Detection with XGBoost","authors":"A. Gouveia, M. Correia","doi":"10.1201/9780429270567-6","DOIUrl":"https://doi.org/10.1201/9780429270567-6","url":null,"abstract":"XGBoost is a recent machine learning method that has been getting increasing attention. It won Kaggle’s Higgs Machine Learning Challenge, among several other Kaggle competitions, due to its performance. In this , we explore the use of XGBoost in the context of anomaly-based network intrusion detection, an area in which there is a considerable gap. We study not only the performance of XGBoost with two recent datasets, but also how to optimize its performance and model parameter choice. We also provide insights into which dataset features are best for performance tuning.","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78682395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Overview of the Integration between Cloud Computing and Internet of Things (IoT) Technologies 云计算与物联网技术融合综述
Pub Date : 2020-11-19 DOI: 10.1201/9780429270567-1
R. P. França, Ana Carolina Borges Monteiro, Rangel Arthur, Y. Iano
{"title":"An Overview of the Integration between Cloud Computing and Internet of Things (IoT) Technologies","authors":"R. P. França, Ana Carolina Borges Monteiro, Rangel Arthur, Y. Iano","doi":"10.1201/9780429270567-1","DOIUrl":"https://doi.org/10.1201/9780429270567-1","url":null,"abstract":"","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90553489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trust-Based Collaborative Filtering Recommendation Systems on the Blockchain 基于信任的区块链协同过滤推荐系统
Pub Date : 2020-10-13 DOI: 10.4236/ait.2020.104004
Tzu-Yu Yeh, R. Kashef
A blockchain is a digitized, decentralized, public ledger of all cryptocurrency transactions. The blockchain is transforming industries by enabling innovative business practices. Its revolutionary power has permeated areas such as bank-ing, financing, trading, manufacturing, supply chain management, healthcare, and government. Blockchain and the Internet of Things (BIOT) apply the us-age of blockchain in the inter-IOT communication system, therefore, security and privacy factors are achievable. The integration of blockchain technology and IoT creates modern decentralized systems. The BIOT models can be ap-plied by various industries including e-commerce to promote decentralization, scalability, and security. This research calls for innovative and advanced re-search on Blockchain and recommendation systems. We aim at building a se-cure and trust-based system using the advantages of blockchain-supported secure multiparty computation by adding smart contracts with the main blockchain protocol. Combining the recommendation systems and blockchain technology allows online activities to be more secure and private. A system is constructed for enterprises to collaboratively create a secure database and host a steadily updated model using smart contract systems. Learning case studies include a model to recommend movies to users. The accuracy of models is evaluated by an incentive mechanism that offers a fully trust-based recom-mendation system with acceptable performance.
区块链是所有加密货币交易的数字化、去中心化公共账本。区块链正在通过实现创新的商业实践来改变行业。它的革命性力量已经渗透到银行、金融、贸易、制造、供应链管理、医疗保健和政府等领域。区块链和物联网(BIOT)将区块链时代应用于物联网通信系统,因此,安全和隐私因素是可以实现的。区块链技术与物联网的融合创造了现代去中心化系统。BIOT模型可以应用于包括电子商务在内的各个行业,以促进去中心化、可扩展性和安全性。这项研究呼吁在区块链和推荐系统上进行创新和高级的重新搜索。我们的目标是通过在主区块链协议中添加智能合约,利用区块链支持的安全多方计算的优势,构建一个基于安全和信任的系统。将推荐系统和区块链技术相结合,可以使在线活动更加安全和私密。构建了一个系统,供企业协同创建一个安全的数据库,并使用智能合约系统托管一个稳定更新的模型。学习案例研究包括一个向用户推荐电影的模型。通过一种激励机制来评估模型的准确性,该机制提供了一个具有可接受性能的完全基于信任的推荐系统。
{"title":"Trust-Based Collaborative Filtering Recommendation Systems on the Blockchain","authors":"Tzu-Yu Yeh, R. Kashef","doi":"10.4236/ait.2020.104004","DOIUrl":"https://doi.org/10.4236/ait.2020.104004","url":null,"abstract":"A blockchain is a digitized, decentralized, public ledger of all cryptocurrency transactions. The blockchain is transforming industries by enabling innovative business practices. Its revolutionary power has permeated areas such as bank-ing, financing, trading, manufacturing, supply chain management, healthcare, and government. Blockchain and the Internet of Things (BIOT) apply the us-age of blockchain in the inter-IOT communication system, therefore, security and privacy factors are achievable. The integration of blockchain technology and IoT creates modern decentralized systems. The BIOT models can be ap-plied by various industries including e-commerce to promote decentralization, scalability, and security. This research calls for innovative and advanced re-search on Blockchain and recommendation systems. We aim at building a se-cure and trust-based system using the advantages of blockchain-supported secure multiparty computation by adding smart contracts with the main blockchain protocol. Combining the recommendation systems and blockchain technology allows online activities to be more secure and private. A system is constructed for enterprises to collaboratively create a secure database and host a steadily updated model using smart contract systems. Learning case studies include a model to recommend movies to users. The accuracy of models is evaluated by an incentive mechanism that offers a fully trust-based recom-mendation system with acceptable performance.","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49215815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Enabling IoT Network Slicing with Network Function Virtualization 通过网络功能虚拟化实现物联网网络切片
Pub Date : 2020-07-30 DOI: 10.4236/ait.2020.103003
Ting-An Tsai, F. Lin
Numerous Internet of Things (IoT) devices are being connected to the net-works to offer services. To cope with a large diversity and number of IoT ser-vices, operators must meet those needs with a more flexible and efficient net-work architecture. Network slicing in 5G promises a feasible solution for this issue with network virtualization and programmability enabled by NFV (Net-work Functions Virtualization). In this research, we use virtualized IoT plat-forms as the Virtual Network Functions (VNFs) and customize network slices enabled by NFV with different QoS to support various kinds of IoT services for their best performance. We construct three different slicing systems including: 1) a single slice system, 2) a multiple customized slices system and 3) a single but scalable network slice system to support IoT services. Our objective is to compare and evaluate these three systems in terms of their throughput, aver-age response time and CPU utilization in order to identify the best system de-sign. Validated with our experiments, the performance of the multiple slicing system is better than those of the single slice systems whether it is equipped with scalability or not.
许多物联网(IoT)设备正在连接到网络以提供服务。为了应对大量多样的物联网服务,运营商必须通过更灵活高效的网络架构来满足这些需求。5G中的网络切片有望通过NFV(网络功能虚拟化)实现网络虚拟化和可编程性,为解决这一问题提供可行的解决方案。在这项研究中,我们使用虚拟物联网平台作为虚拟网络功能(VNF),并定制具有不同QoS的NFV支持的网络切片,以支持各种物联网服务,从而获得最佳性能。我们构建了三个不同的切片系统,包括:1)单个切片系统,2)多个定制切片系统和3)单个但可扩展的网络切片系统,以支持物联网服务。我们的目标是比较和评估这三个系统的吞吐量、平均响应时间和CPU利用率,以确定最佳的系统设计。通过实验验证,无论是否具有可扩展性,多切片系统的性能都优于单切片系统。
{"title":"Enabling IoT Network Slicing with Network Function Virtualization","authors":"Ting-An Tsai, F. Lin","doi":"10.4236/ait.2020.103003","DOIUrl":"https://doi.org/10.4236/ait.2020.103003","url":null,"abstract":"Numerous Internet of Things (IoT) devices are being connected to the net-works to offer services. To cope with a large diversity and number of IoT ser-vices, operators must meet those needs with a more flexible and efficient net-work architecture. Network slicing in 5G promises a feasible solution for this issue with network virtualization and programmability enabled by NFV (Net-work Functions Virtualization). In this research, we use virtualized IoT plat-forms as the Virtual Network Functions (VNFs) and customize network slices enabled by NFV with different QoS to support various kinds of IoT services for their best performance. We construct three different slicing systems including: 1) a single slice system, 2) a multiple customized slices system and 3) a single but scalable network slice system to support IoT services. Our objective is to compare and evaluate these three systems in terms of their throughput, aver-age response time and CPU utilization in order to identify the best system de-sign. Validated with our experiments, the performance of the multiple slicing system is better than those of the single slice systems whether it is equipped with scalability or not.","PeriodicalId":69922,"journal":{"name":"物联网(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47513254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
物联网(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1