首页 > 最新文献

Computer science & information technology最新文献

英文 中文
Order Preserving Stream Processing In Fog Computing Architectures 雾计算体系结构中的保序流处理
Pub Date : 2019-01-19 DOI: 10.5121/csit.2019.90104
Vidyasankar K
A Fog Computing architecture consists of edge nodes that generate and possibly pre-process (sensor) data, fog nodes that do some processing quickly and do any actuations that may be needed, and cloud nodes that may perform further detailed analysis for long-term and archival purposes. Processing of a batch of input data is distributed into sub-computations which are executed at the different nodes of the architecture. In many applications, the computations are expected to preserve the order in which the batches arrive at the sources. In this paper, we discuss mechanisms for performing the computations at a node in correct order, by storing some batches temporarily and/or dropping some batches. The former option causes a delay in processing and the latter option affects Quality of Service (QoS). We bring out the trade-offs between processing delay and storage capabilities of the nodes, and also between QoS and the storage capabilities. Keywords— Fog computing, Order preserving computations, Quality of Service
雾计算体系结构由生成并可能预处理(传感器)数据的边缘节点、快速进行一些处理并执行任何可能需要的动作的雾节点,以及可以为长期和存档目的执行进一步详细分析的云节点组成。一批输入数据的处理被分配到子计算中,这些子计算在体系结构的不同节点处执行。在许多应用程序中,预计计算将保持批次到达源的顺序。在本文中,我们讨论了通过临时存储一些批和/或丢弃一些批在节点上按正确顺序执行计算的机制。前一个选项导致处理延迟,后一个选项影响服务质量(QoS)。我们提出了节点的处理延迟和存储能力之间的权衡,以及QoS和存储能力的权衡。关键词——雾计算、保序计算、服务质量
{"title":"Order Preserving Stream Processing In Fog Computing Architectures","authors":"Vidyasankar K","doi":"10.5121/csit.2019.90104","DOIUrl":"https://doi.org/10.5121/csit.2019.90104","url":null,"abstract":"A Fog Computing architecture consists of edge nodes that generate and possibly pre-process (sensor) data, fog nodes that do some processing quickly and do any actuations that may be needed, and cloud nodes that may perform further detailed analysis for long-term and archival purposes. Processing of a batch of input data is distributed into sub-computations which are executed at the different nodes of the architecture. In many applications, the computations are expected to preserve the order in which the batches arrive at the sources. In this paper, we discuss mechanisms for performing the computations at a node in correct order, by storing some batches temporarily and/or dropping some batches. The former option causes a delay in processing and the latter option affects Quality of Service (QoS). We bring out the trade-offs between processing delay and storage capabilities of the nodes, and also between QoS and the storage capabilities. Keywords— Fog computing, Order preserving computations, Quality of Service","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44580523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHISHING DETECTION FROM URLS BY USING NEURAL NETWORKS 利用神经网络从url进行网络钓鱼检测
Pub Date : 2018-12-22 DOI: 10.5121/CSIT.2018.81705
O. K. Sahingoz, Saide Isilay Baykal, Deniz Bulut
{"title":"PHISHING DETECTION FROM URLS BY USING NEURAL NETWORKS","authors":"O. K. Sahingoz, Saide Isilay Baykal, Deniz Bulut","doi":"10.5121/CSIT.2018.81705","DOIUrl":"https://doi.org/10.5121/CSIT.2018.81705","url":null,"abstract":"","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70598771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
PREDICTING SECURITY CRITICAL CONDITIONS OF CYBER PHYSICAL SYSTEMS WITH UNOBSERVABLES AND OBSERVATION TIMES 具有不可观测值和观测时间的网络物理系统安全临界条件预测
Pub Date : 2018-12-22 DOI: 10.5121/CSIT.2018.81807
A. Coletta
{"title":"PREDICTING SECURITY CRITICAL CONDITIONS OF CYBER PHYSICAL SYSTEMS WITH UNOBSERVABLES AND OBSERVATION TIMES","authors":"A. Coletta","doi":"10.5121/CSIT.2018.81807","DOIUrl":"https://doi.org/10.5121/CSIT.2018.81807","url":null,"abstract":"","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":"7 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41243363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESIDENTIAL LOAD PROFILE ANALYSIS USING CLUSTERING STABILITY 基于聚类稳定性的住宅负荷分布分析
Pub Date : 2018-12-22 DOI: 10.5121/CSIT.2018.81707
Fang-Yi Chang, Shu-wei Lin, Chia-Wei Tsai, Po-Chun Kuo
Clustering is an useful tool in the data analysis to discover the natural structure in the data. The technique separates given smart meter data set into several representative clusters for the convenience of energy management. Each cluster may has its own attributes, such as energy usage time and magnitude. These attributes can help the electrical operators to manage their electrical grids with goals of energy and cost reduction. In this paper, we use principle component analysis and K-means as dimensional reduction and the reference clustering algorithm, respectively, and several choices must be considered: the number of cluster, the number of the leading principle components, and whether use normalized principle analysis schema or not. To answer these issues simultaneously, we use the stability scores as measured by dot similarity and confusion matrix as our evaluation decision. The advantage is that it is useful for comparing the performance under different decisions, and thus provides us to make these choices simultaneously.
聚类是数据分析中发现数据中自然结构的有用工具。该技术将给定的智能电表数据集分离为几个具有代表性的集群,以便于能源管理。每个集群可能有自己的属性,例如能源使用时间和数量。这些属性可以帮助电力运营商以降低能源和成本为目标来管理他们的电网。在本文中,我们分别使用主成分分析和K-means作为降维和参考聚类算法,并且必须考虑几个选择:聚类的数量、前导主成分的数量以及是否使用归一化主成分分析模式。为了同时回答这些问题,我们使用通过点相似性和混淆矩阵测量的稳定性分数作为我们的评估决策。其优点是,它有助于比较不同决策下的性能,从而使我们能够同时做出这些选择。
{"title":"RESIDENTIAL LOAD PROFILE ANALYSIS USING CLUSTERING STABILITY","authors":"Fang-Yi Chang, Shu-wei Lin, Chia-Wei Tsai, Po-Chun Kuo","doi":"10.5121/CSIT.2018.81707","DOIUrl":"https://doi.org/10.5121/CSIT.2018.81707","url":null,"abstract":"Clustering is an useful tool in the data analysis to discover the natural structure in the data. The technique separates given smart meter data set into several representative clusters for the convenience of energy management. Each cluster may has its own attributes, such as energy usage time and magnitude. These attributes can help the electrical operators to manage their electrical grids with goals of energy and cost reduction. In this paper, we use principle component analysis and K-means as dimensional reduction and the reference clustering algorithm, respectively, and several choices must be considered: the number of cluster, the number of the leading principle components, and whether use normalized principle analysis schema or not. To answer these issues simultaneously, we use the stability scores as measured by dot similarity and confusion matrix as our evaluation decision. The advantage is that it is useful for comparing the performance under different decisions, and thus provides us to make these choices simultaneously.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48234212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A PREFERMENT PLATFORM FOR IMPLEMENTING SECURITY MECHANISM FOR AUTOMOTIVE CAN BUS 一种实现汽车can总线安全机制的优化平台
Pub Date : 2018-12-22 DOI: 10.5121/csit.2018.81813
Mabrouka Gmiden, M. H. Gmiden, Hafedh Gmiden
{"title":"A PREFERMENT PLATFORM FOR IMPLEMENTING SECURITY MECHANISM FOR AUTOMOTIVE CAN BUS","authors":"Mabrouka Gmiden, M. H. Gmiden, Hafedh Gmiden","doi":"10.5121/csit.2018.81813","DOIUrl":"https://doi.org/10.5121/csit.2018.81813","url":null,"abstract":"","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49049867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING Android恶意软件检测使用机器学习和逆向工程
Pub Date : 2018-12-22 DOI: 10.5121/csit.2018.81709
M. Kedziora, Paulina Gawin, Michał Szczepanik, I. Józwiak
This paper is focused on the issue of malware detection for Android mobile system by Reverse Engineering of java code. The characteristics of malicious software were identified based on a collected set of applications. Total number of 1958 applications where tested (including 996 malware apps). A unique set of features was chosen. Five classification algorithms (Random Forest, SVM, K-NN, Nave Bayes, Logistic Regression) and three attribute selection algorithms were examined in order to choose those that would provide the most effective malware detection.
本文主要研究利用java代码的逆向工程技术对安卓移动系统进行恶意软件检测的问题。恶意软件的特征是根据收集的一组应用程序识别的。测试的1958个应用程序总数(包括996个恶意软件应用程序)。选择了一组独特的功能。为了选择最有效的恶意软件检测算法,研究了五种分类算法(随机森林、SVM、K-NN、Nave Bayes、Logistic回归)和三种属性选择算法。
{"title":"ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING","authors":"M. Kedziora, Paulina Gawin, Michał Szczepanik, I. Józwiak","doi":"10.5121/csit.2018.81709","DOIUrl":"https://doi.org/10.5121/csit.2018.81709","url":null,"abstract":"This paper is focused on the issue of malware detection for Android mobile system by Reverse Engineering of java code. The characteristics of malicious software were identified based on a collected set of applications. Total number of 1958 applications where tested (including 996 malware apps). A unique set of features was chosen. Five classification algorithms (Random Forest, SVM, K-NN, Nave Bayes, Logistic Regression) and three attribute selection algorithms were examined in order to choose those that would provide the most effective malware detection.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42729930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
AN ELASTIC-HYBRID HONEYNET FOR CLOUD ENVIRONMENT 云环境下的弹性混合蜜网
Pub Date : 2018-12-22 DOI: 10.5121/CSIT.2018.81809
Nguyen Khac Bao, S. Ahn, Minho Park
When low-interaction honey net systems are not powerful enough and high-interaction honey net systems require a lot of resources, hybrid solutions offer the benefit’s of both worlds. Affected by this trend, more and more hybrid honey net systems have been proposed to obtain wide coverage of attack traffic and high behavioral ideality in recent years. However, these system themselves contain some limitations such as the high latency, the lack of prevention method for compromised honey pots, the waste of resources and the finger printing problem of honey pot that hinder them to achieve their goals. To address these limitations, we propose a new honey net architecture called Efficient Elastic Hybrid Honey net. Utilizing the advantages of combining SDN and NFV technologies, this system can reduce the response time for attack traffic, isolate compromised honey pots effectively, defeat the finger printing problem of honey pots, and optimize the resources for maintenance and deployment. Testing our system with real attack traffic, the results have showed that Efficient Elastic-Hybrid Honey net system is not only practical, but also very efficient.
当低交互作用的蜜网系统不够强大,而高交互作用的蜂蜜网系统需要大量资源时,混合解决方案可以两全其美。受这一趋势的影响,近年来,越来越多的混合蜜网系统被提出,以获得广泛的攻击流量覆盖和较高的行为理想。然而,这些系统本身也存在一些局限性,如延迟高、缺乏对受损蜜罐的预防方法、资源浪费以及蜜罐的指纹问题,这些都阻碍了它们实现目标。为了解决这些限制,我们提出了一种新的蜜网架构,称为高效弹性混合蜜网。该系统利用SDN和NFV技术相结合的优势,可以减少攻击流量的响应时间,有效隔离受损的蜜罐,解决蜜罐指纹问题,优化维护和部署资源。通过对实际攻击流量的测试,结果表明高效弹性混合Honey网络系统不仅实用,而且效率很高。
{"title":"AN ELASTIC-HYBRID HONEYNET FOR CLOUD ENVIRONMENT","authors":"Nguyen Khac Bao, S. Ahn, Minho Park","doi":"10.5121/CSIT.2018.81809","DOIUrl":"https://doi.org/10.5121/CSIT.2018.81809","url":null,"abstract":"When low-interaction honey net systems are not powerful enough and high-interaction honey net systems require a lot of resources, hybrid solutions offer the benefit’s of both worlds. Affected by this trend, more and more hybrid honey net systems have been proposed to obtain wide coverage of attack traffic and high behavioral ideality in recent years. However, these system themselves contain some limitations such as the high latency, the lack of prevention method for compromised honey pots, the waste of resources and the finger printing problem of honey pot that hinder them to achieve their goals. To address these limitations, we propose a new honey net architecture called Efficient Elastic Hybrid Honey net. Utilizing the advantages of combining SDN and NFV technologies, this system can reduce the response time for attack traffic, isolate compromised honey pots effectively, defeat the finger printing problem of honey pots, and optimize the resources for maintenance and deployment. Testing our system with real attack traffic, the results have showed that Efficient Elastic-Hybrid Honey net system is not only practical, but also very efficient.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47662438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ANTI-VIRUS TOOLS ANALYSIS USING DEEP WEB MALWARES 基于deepweb恶意软件的反病毒工具分析
Pub Date : 2018-12-22 DOI: 10.5121/csit.2018.81713
I. Mishkovski, S. Šćepanović, Miroslav Mirchev, Sasho Gramatikov
Knowledge about the strength of the anti-virus engines (i.e. tools) to detect malware files on the Deep web is important for people and companies to devise proper security polices and to choose the proper tool in order to be more secure. In this study, using malware file set crawled from the Deep web we detect similarities and possible groupings between plethora of anti-virus tools (AVTs) that exist on the market. Moreover, using graph theory, data science and visualization we find which of the existing AVTs has greater advantage in detecting malware over the other AVTs, in a sense that the AVT detects many unique. Finally, we propose a solution, for the given malware set, what is the best strategy for a company to defend against malwares if it uses a multi-scanning approach.
了解反病毒引擎(即工具)在深层网络上检测恶意软件文件的强度对于个人和公司设计适当的安全策略和选择适当的工具以提高安全性非常重要。在这项研究中,使用从深层网络抓取的恶意软件文件集,我们检测了市场上存在的大量反病毒工具(avt)之间的相似性和可能的分组。此外,利用图论、数据科学和可视化,我们发现现有的AVT在检测恶意软件方面比其他AVT有更大的优势,在某种意义上,AVT检测到许多独特的。最后,我们提出了一个解决方案,对于给定的恶意软件集,如果使用多重扫描方法,公司防御恶意软件的最佳策略是什么。
{"title":"ANTI-VIRUS TOOLS ANALYSIS USING DEEP WEB MALWARES","authors":"I. Mishkovski, S. Šćepanović, Miroslav Mirchev, Sasho Gramatikov","doi":"10.5121/csit.2018.81713","DOIUrl":"https://doi.org/10.5121/csit.2018.81713","url":null,"abstract":"Knowledge about the strength of the anti-virus engines (i.e. tools) to detect malware files on the Deep web is important for people and companies to devise proper security polices and to choose the proper tool in order to be more secure. In this study, using malware file set crawled from the Deep web we detect similarities and possible groupings between plethora of anti-virus tools (AVTs) that exist on the market. Moreover, using graph theory, data science and visualization we find which of the existing AVTs has greater advantage in detecting malware over the other AVTs, in a sense that the AVT detects many unique. Finally, we propose a solution, for the given malware set, what is the best strategy for a company to defend against malwares if it uses a multi-scanning approach.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45064647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A POST-PROCESSING METHOD BASED ON FULLY CONNECTED CRFS FOR CHRONIC WOUND IMAGES SEGMENTATION AND IDENTIFICATION 基于全连接CRFS的慢性伤口图像分割与识别后处理方法
Pub Date : 2018-12-22 DOI: 10.5121/csit.2018.81703
Junnan Zhang, Hanyi Nie
{"title":"A POST-PROCESSING METHOD BASED ON FULLY CONNECTED CRFS FOR CHRONIC WOUND IMAGES SEGMENTATION AND IDENTIFICATION","authors":"Junnan Zhang, Hanyi Nie","doi":"10.5121/csit.2018.81703","DOIUrl":"https://doi.org/10.5121/csit.2018.81703","url":null,"abstract":"","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43991605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BLACK HOLE ATTACK SECURITY ISSUES, CHALLENGES & SOLUTION IN MANET 黑洞攻击安全问题、挑战及解决方案
Pub Date : 2018-12-22 DOI: 10.5121/CSIT.2018.81815
M. B. Yassein, Ismail Hmeidi, Y. Khamayseh, M. Al-Rousan, Danah Arrabi
MANET (Mobile Ad-hoc Network) is simply a set of mobile hosts connected wirelessly without any centralized management, where each node acts as a packet sender, packet receiver, and a router at the same time. According to the nature of this network, the dynamic topology and the absence of a centralized management cause several security issues and attacks, such as the black hole attack, the wormhole attack, and the impersonation and repudiation attack. In this survey, we are going to introduce the Black Hole attack security issues and some of the detection techniques used to detect the black hole attack. In this kind of attack (black hole attack) the intruders manipulate the normal behavior of the network, by introducing themselves as the node with the shortest path to the destination. Intruders can do a malicious behavior over the network.
MANET(移动自组织网络)只是一组无线连接的移动主机,没有任何集中管理,每个节点同时充当数据包发送器、数据包接收器和路由器。根据该网络的性质,动态拓扑和缺乏集中管理会导致一些安全问题和攻击,如黑洞攻击、虫洞攻击以及模拟和否认攻击。在本次调查中,我们将介绍黑洞攻击的安全问题以及用于检测黑洞攻击的一些检测技术。在这种攻击(黑洞攻击)中,入侵者通过将自己介绍为到达目的地的路径最短的节点来操纵网络的正常行为。入侵者可以在网络上进行恶意行为。
{"title":"BLACK HOLE ATTACK SECURITY ISSUES, CHALLENGES & SOLUTION IN MANET","authors":"M. B. Yassein, Ismail Hmeidi, Y. Khamayseh, M. Al-Rousan, Danah Arrabi","doi":"10.5121/CSIT.2018.81815","DOIUrl":"https://doi.org/10.5121/CSIT.2018.81815","url":null,"abstract":"MANET (Mobile Ad-hoc Network) is simply a set of mobile hosts connected wirelessly without any centralized management, where each node acts as a packet sender, packet receiver, and a router at the same time. According to the nature of this network, the dynamic topology and the absence of a centralized management cause several security issues and attacks, such as the black hole attack, the wormhole attack, and the impersonation and repudiation attack. In this survey, we are going to introduce the Black Hole attack security issues and some of the detection techniques used to detect the black hole attack. In this kind of attack (black hole attack) the intruders manipulate the normal behavior of the network, by introducing themselves as the node with the shortest path to the destination. Intruders can do a malicious behavior over the network.","PeriodicalId":72673,"journal":{"name":"Computer science & information technology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43224994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Computer science & information technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1