首页 > 最新文献

Hospital security and safety management最新文献

英文 中文
Concretely efficient secure multi-party computation protocols: survey and more 具体有效的安全多方计算协议:调查和更多
Pub Date : 2022-01-01 DOI: 10.1051/sands/2021001
D. Feng, Kang Yang
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their private inputs, and reveals nothing but the output of the function. In the last decade, MPC has rapidly moved from a purely theoretical study to an object of practical interest, with a growing interest in practical applications such as privacy-preserving machine learning (PPML). In this paper, we comprehensively survey existing work on concretely efficient MPC protocols with both semi-honest and malicious security, in both dishonest-majority and honest-majority settings. We focus on considering the notion of security with abort, meaning that corrupted parties could prevent honest parties from receiving output after they receive output. We present high-level ideas of the basic and key approaches for designing different styles of MPC protocols and the crucial building blocks of MPC. For MPC applications, we compare the known PPML protocols built on MPC, and describe the efficiency of private inference and training for the state-of-the-art PPML protocols. Furthermore, we summarize several challenges and open problems to break though the efficiency of MPC protocols as well as some interesting future work that is worth being addressed. This survey aims to provide the recent development and key approaches of MPC to researchers, who are interested in knowing, improving, and applying concretely efficient MPC protocols.
安全多方计算(MPC)允许一组各方在他们的私有输入上共同计算一个函数,并且只显示函数的输出。在过去的十年中,MPC已经迅速从纯粹的理论研究转变为实际兴趣的对象,对隐私保护机器学习(PPML)等实际应用的兴趣越来越大。在本文中,我们全面地调查了在半诚实和恶意安全、非诚实多数和诚实多数设置下具体有效的MPC协议的现有工作。我们将重点考虑带有abort的安全概念,这意味着腐败方可能会阻止诚实方在收到输出后接收输出。我们提出了设计不同风格的MPC协议的基本方法和关键方法的高级思想,以及MPC的关键构建块。对于MPC应用,我们比较了建立在MPC上的已知PPML协议,并描述了最先进的PPML协议的私有推理和训练的效率。此外,我们总结了突破MPC协议效率的几个挑战和开放问题,以及一些值得解决的有趣的未来工作。本文旨在为有兴趣了解、改进和应用具体有效的MPC协议的研究人员提供MPC的最新发展和关键方法。
{"title":"Concretely efficient secure multi-party computation protocols: survey and more","authors":"D. Feng, Kang Yang","doi":"10.1051/sands/2021001","DOIUrl":"https://doi.org/10.1051/sands/2021001","url":null,"abstract":"Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their private inputs, and reveals nothing but the output of the function. In the last decade, MPC has rapidly moved from a purely theoretical study to an object of practical interest, with a growing interest in practical applications such as privacy-preserving machine learning (PPML). In this paper, we comprehensively survey existing work on concretely efficient MPC protocols with both semi-honest and malicious security, in both dishonest-majority and honest-majority settings. We focus on considering the notion of security with abort, meaning that corrupted parties could prevent honest parties from receiving output after they receive output. We present high-level ideas of the basic and key approaches for designing different styles of MPC protocols and the crucial building blocks of MPC. For MPC applications, we compare the known PPML protocols built on MPC, and describe the efficiency of private inference and training for the state-of-the-art PPML protocols. Furthermore, we summarize several challenges and open problems to break though the efficiency of MPC protocols as well as some interesting future work that is worth being addressed. This survey aims to provide the recent development and key approaches of MPC to researchers, who are interested in knowing, improving, and applying concretely efficient MPC protocols.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80814972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems 智能交通系统DDoS预测中未标记数据的高效投毒攻击与防御
Pub Date : 2022-01-01 DOI: 10.1051/sands/2022003
Zhong Li, Xianke Wu, Changjun Jiang
Nowadays, large numbers of smart sensors (e.g., road-side cameras) which communicate with nearby base stations could launch distributed denial of services (DDoS) attack storms in intelligent transportation systems. DDoS attacks disable the services provided by base stations. Thus in this paper, considering the uneven communication traffic flows and privacy preserving, we give a hidden Markov model-based prediction model by utilizing the multi-step characteristic of DDoS with a federated learning framework to predict whether DDoS attacks will happen on base stations in the future. However, in the federated learning, we need to consider the problem of poisoning attacks due to malicious participants. The poisoning attacks will lead to the intelligent transportation systems paralysis without security protection. Traditional poisoning attacks mainly apply to the classification model with labeled data. In this paper, we propose a reinforcement learning-based poisoning method specifically for poisoning the prediction model with unlabeled data. Besides, previous related defense strategies rely on validation datasets with labeled data in the server. However, it is unrealistic since the local training datasets are not uploaded to the server due to privacy preserving, and our datasets are also unlabeled. Furthermore, we give a validation dataset-free defense strategy based on Dempster–Shafer (D–S) evidence theory avoiding anomaly aggregation to obtain a robust global model for precise DDoS prediction. In our experiments, we simulate 3000 points in combination with DARPA2000 dataset to carry out evaluations. The results indicate that our poisoning method can successfully poison the global prediction model with unlabeled data in a short time. Meanwhile, we compare our proposed defense algorithm with three popularly used defense algorithms. The results show that our defense method has a high accuracy rate of excluding poisoners and can obtain a high attack prediction probability.
如今,大量与附近基站通信的智能传感器(如路边摄像头)可能会在智能交通系统中引发分布式拒绝服务(DDoS)攻击风暴。DDoS攻击会导致基站无法提供服务。因此,在考虑通信流量不均匀和隐私保护的前提下,利用分布式拒绝服务的多步特性,结合联邦学习框架,给出了一种基于隐马尔可夫模型的预测模型,用于预测未来基站是否会发生DDoS攻击。然而,在联邦学习中,我们需要考虑恶意参与者的中毒攻击问题。投毒事件将导致智能交通系统在没有安全防护的情况下瘫痪。传统的投毒攻击主要适用于带有标记数据的分类模型。在本文中,我们提出了一种基于强化学习的中毒方法,专门用于对未标记数据的预测模型进行中毒。此外,以前的相关防御策略依赖于服务器中带有标记数据的验证数据集。然而,这是不现实的,因为本地训练数据集由于隐私保护而没有上传到服务器,并且我们的数据集也是未标记的。此外,我们还提出了一种基于Dempster-Shafer (D-S)证据理论的无验证数据集防御策略,避免了异常聚集,从而获得了精确预测DDoS的鲁棒全局模型。在我们的实验中,我们结合DARPA2000数据集模拟3000个点进行评估。结果表明,该方法可以在短时间内成功地对未标记数据的全局预测模型下毒。同时,将本文提出的防御算法与三种常用的防御算法进行了比较。结果表明,该防御方法具有较高的排除投毒准确率和较高的攻击预测概率。
{"title":"Efficient poisoning attacks and defenses for unlabeled data in DDoS prediction of intelligent transportation systems","authors":"Zhong Li, Xianke Wu, Changjun Jiang","doi":"10.1051/sands/2022003","DOIUrl":"https://doi.org/10.1051/sands/2022003","url":null,"abstract":"Nowadays, large numbers of smart sensors (e.g., road-side cameras) which communicate with nearby base stations could launch distributed denial of services (DDoS) attack storms in intelligent transportation systems. DDoS attacks disable the services provided by base stations. Thus in this paper, considering the uneven communication traffic flows and privacy preserving, we give a hidden Markov model-based prediction model by utilizing the multi-step characteristic of DDoS with a federated learning framework to predict whether DDoS attacks will happen on base stations in the future. However, in the federated learning, we need to consider the problem of poisoning attacks due to malicious participants. The poisoning attacks will lead to the intelligent transportation systems paralysis without security protection. Traditional poisoning attacks mainly apply to the classification model with labeled data. In this paper, we propose a reinforcement learning-based poisoning method specifically for poisoning the prediction model with unlabeled data. Besides, previous related defense strategies rely on validation datasets with labeled data in the server. However, it is unrealistic since the local training datasets are not uploaded to the server due to privacy preserving, and our datasets are also unlabeled. Furthermore, we give a validation dataset-free defense strategy based on Dempster–Shafer (D–S) evidence theory avoiding anomaly aggregation to obtain a robust global model for precise DDoS prediction. In our experiments, we simulate 3000 points in combination with DARPA2000 dataset to carry out evaluations. The results indicate that our poisoning method can successfully poison the global prediction model with unlabeled data in a short time. Meanwhile, we compare our proposed defense algorithm with three popularly used defense algorithms. The results show that our defense method has a high accuracy rate of excluding poisoners and can obtain a high attack prediction probability.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90351526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Drug Testing In The Workplace: An Update 工作场所的药物检测:最新进展
Pub Date : 2011-10-18 DOI: 10.19030/JABR.V8I2.6175
Patricia S. Wall
{"title":"Drug Testing In The Workplace: An Update","authors":"Patricia S. Wall","doi":"10.19030/JABR.V8I2.6175","DOIUrl":"https://doi.org/10.19030/JABR.V8I2.6175","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"8 1","pages":"127-132"},"PeriodicalIF":0.0,"publicationDate":"2011-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68231577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
RFID Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard 符合EPC第1类第2代标准的RFID认证协议
Pub Date : 2011-09-22 DOI: 10.1007/978-3-642-24082-9_60
Guiyue Jin, Eun Young Jeong, Ho-Youl Jung, Ki Dong Lee
{"title":"RFID Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard","authors":"Guiyue Jin, Eun Young Jeong, Ho-Youl Jung, Ki Dong Lee","doi":"10.1007/978-3-642-24082-9_60","DOIUrl":"https://doi.org/10.1007/978-3-642-24082-9_60","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"4 1","pages":"488-495"},"PeriodicalIF":0.0,"publicationDate":"2011-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75522546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks 一种基于ZRP的Ad-Hoc网络可靠路由发现方案
Pub Date : 2004-01-01 DOI: 10.3745/KIPSTC.2004.11C.3.293
Kyoung-Ja Kim, Tae-Mu Chang
Ad hoc networks are groups of mobile hosts without any fixed infrastructure. Frequent changes in network topology owing to node mobility make these networks very difficult to manage. Therefore, enhancing the reliability of routing paths in ad hoc networks gets more important. In this paper, we propose a ZRP(Zone Routing Protocol)-based route discovery scheme that can not only reduce the total hops of routing path, but Improve security through authentications between two nodes. And to solve the problem in maintenance of routing paths owing to frequent changes of the network topology, we adopt a query control mechanism. The effectiveness of our scheme is shown by simulation methods.
自组织网络是一组没有任何固定基础设施的移动主机。由于节点的移动性,网络拓扑结构的频繁变化使得这些网络非常难以管理。因此,提高ad hoc网络中路由路径的可靠性就显得尤为重要。本文提出了一种基于ZRP(区域路由协议)的路由发现方案,该方案不仅可以减少路由路径的总跳数,而且可以通过两个节点之间的认证来提高安全性。为了解决由于网络拓扑结构的频繁变化而导致的路由路径维护问题,我们采用了查询控制机制。仿真结果表明了该方案的有效性。
{"title":"A ZRP Based Reliable Route Discovery Scheme in Ad-Hoc Networks","authors":"Kyoung-Ja Kim, Tae-Mu Chang","doi":"10.3745/KIPSTC.2004.11C.3.293","DOIUrl":"https://doi.org/10.3745/KIPSTC.2004.11C.3.293","url":null,"abstract":"Ad hoc networks are groups of mobile hosts without any fixed infrastructure. Frequent changes in network topology owing to node mobility make these networks very difficult to manage. Therefore, enhancing the reliability of routing paths in ad hoc networks gets more important. In this paper, we propose a ZRP(Zone Routing Protocol)-based route discovery scheme that can not only reduce the total hops of routing path, but Improve security through authentications between two nodes. And to solve the problem in maintenance of routing paths owing to frequent changes of the network topology, we adopt a query control mechanism. The effectiveness of our scheme is shown by simulation methods.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"12 1","pages":"325-331"},"PeriodicalIF":0.0,"publicationDate":"2004-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89871976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CA hospitals set uniform emergency codes to ease staff confusion. CA医院设置统一的紧急代码,以减轻工作人员的混乱。
{"title":"CA hospitals set uniform emergency codes to ease staff confusion.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Staff training helps hospital deal with two negative incidents. 员工培训有助于医院处理两个负面事件。
{"title":"Staff training helps hospital deal with two negative incidents.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"13-4"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An interview with: Hugh Greeley on conducting criminal background checks. 采访:休·格里利进行犯罪背景调查。
H Greeley
{"title":"An interview with: Hugh Greeley on conducting criminal background checks.","authors":"H Greeley","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"10-3"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21959043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New developments in guard tour reporting and employee key control. 门卫巡视报告和员工钥匙控制的新进展。

Among the numerous products and systems available from security product manufacturers, two have been involved for years with day-to-day activities that, if properly carried out, can result in a more secure hospital environment for individuals and greater protection from product loss or liability--guard tour reporting and key control. This report gives details on recent advances in such systems, the costs involved, and how individual hospitals are using them.

在安防产品制造商提供的众多产品和系统中,有两种产品和系统已经参与了多年的日常活动,如果执行得当,可以为个人提供更安全的医院环境,并更好地防止产品丢失或责任——警卫巡视报告和钥匙控制。本报告详细介绍了这类系统的最新进展、所涉及的成本以及各医院如何使用这些系统。
{"title":"New developments in guard tour reporting and employee key control.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Among the numerous products and systems available from security product manufacturers, two have been involved for years with day-to-day activities that, if properly carried out, can result in a more secure hospital environment for individuals and greater protection from product loss or liability--guard tour reporting and key control. This report gives details on recent advances in such systems, the costs involved, and how individual hospitals are using them.</p>","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"5-8"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Training seen key to limiting gang activity in your hospital. 培训是限制你们医院帮派活动的关键。
{"title":"Training seen key to limiting gang activity in your hospital.","authors":"","doi":"","DOIUrl":"","url":null,"abstract":"","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"21 8","pages":"8-9"},"PeriodicalIF":0.0,"publicationDate":"2000-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"21966700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Hospital security and safety management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1