首页 > 最新文献

The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...最新文献

英文 中文
3. Anomaly detection in cloud big database metric 3.云大数据库度量中的异常检测
Souvik Chowdhury, Shibakali Gupta
{"title":"3. Anomaly detection in cloud big database metric","authors":"Souvik Chowdhury, Shibakali Gupta","doi":"10.1515/9783110606058-003","DOIUrl":"https://doi.org/10.1515/9783110606058-003","url":null,"abstract":"","PeriodicalId":93151,"journal":{"name":"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...","volume":"06 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78097093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
6. Big data security issues with challenges and solutions 6. 大数据安全问题、挑战和解决方案
S. Koley
: Big data is a collection of huge sets of data with different categories where it could be distinguished as structured and unstructured data. As we are revolutioniz-ing to zeta bytes from Giga/tera/peta/exabytes in this phase of computing, the threats have also increased in parallel. Besides big organizations, cost reduction is the criterion for the use of small- and medium-sized organizations too, thereby increasing the security threat. Checking of the streaming data once is not the solution as security breaches cannot be understood. The data stack up within the clouds is not the only preference as big data technology is available for dispensation of both structured and unstructured data. Nowadays, an enormous quantity of data is provoked by mobile phones (smart-phone) or equally the symphony form. Big data architecture is comprehended among the mobile cloud designed for supreme consumption. The best ever implementation is able to be conked out realistically to make use of a novel data-centric architecture of MapReduce technology, while Hadoop distributed file system also acts with immense liability in using data with divergent arrangement. As time approaches, the level of information and data engendered from different sources enhanced and faster execution is the claim for the same. In this chapter our aim is to find out big data security that is vulnerable and also to find out the best possible solutions for them. We consider that this attempt will dislodge a stride for-ward along the way to an improved evolution in secure propinquity to opportunity.
:大数据是不同类别的海量数据集的集合,可分为结构化数据和非结构化数据。当我们在这个计算阶段从千兆/tera/peta/exabytes革新到zeta字节时,威胁也随之增加。除了大型组织,降低成本也是中小型组织使用的标准,从而增加了安全威胁。一次检查流数据不是解决方案,因为安全漏洞无法理解。云中的数据堆栈并不是唯一的首选,因为大数据技术可用于分配结构化和非结构化数据。如今,大量的数据是由移动电话(智能手机)或同样的交响乐形式引起的。大数据架构在为最高消费而设计的移动云中得到了全面的理解。有史以来最好的实现是能够实际地利用MapReduce技术的新颖的以数据为中心的架构,而Hadoop分布式文件系统在使用不同排列的数据方面也承担着巨大的责任。随着时间的推移,来自不同来源的信息和数据的水平得到了提高,执行速度也得到了提高。在本章中,我们的目标是找出易受攻击的大数据安全,并找出最佳的解决方案。我们认为,这一尝试将使我们在朝着更好地接近机会的方向前进的道路上迈出一大步。
{"title":"6. Big data security issues with challenges and solutions","authors":"S. Koley","doi":"10.1515/9783110606058-006","DOIUrl":"https://doi.org/10.1515/9783110606058-006","url":null,"abstract":": Big data is a collection of huge sets of data with different categories where it could be distinguished as structured and unstructured data. As we are revolutioniz-ing to zeta bytes from Giga/tera/peta/exabytes in this phase of computing, the threats have also increased in parallel. Besides big organizations, cost reduction is the criterion for the use of small- and medium-sized organizations too, thereby increasing the security threat. Checking of the streaming data once is not the solution as security breaches cannot be understood. The data stack up within the clouds is not the only preference as big data technology is available for dispensation of both structured and unstructured data. Nowadays, an enormous quantity of data is provoked by mobile phones (smart-phone) or equally the symphony form. Big data architecture is comprehended among the mobile cloud designed for supreme consumption. The best ever implementation is able to be conked out realistically to make use of a novel data-centric architecture of MapReduce technology, while Hadoop distributed file system also acts with immense liability in using data with divergent arrangement. As time approaches, the level of information and data engendered from different sources enhanced and faster execution is the claim for the same. In this chapter our aim is to find out big data security that is vulnerable and also to find out the best possible solutions for them. We consider that this attempt will dislodge a stride for-ward along the way to an improved evolution in secure propinquity to opportunity.","PeriodicalId":93151,"journal":{"name":"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...","volume":"133 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79664686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
1. Introduction 1. 介绍
Shibakali Gupta, Dr. Indradip Banerjee, S. Bhattacharyya
{"title":"1. Introduction","authors":"Shibakali Gupta, Dr. Indradip Banerjee, S. Bhattacharyya","doi":"10.1515/9783110606058-001","DOIUrl":"https://doi.org/10.1515/9783110606058-001","url":null,"abstract":"","PeriodicalId":93151,"journal":{"name":"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...","volume":"91 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80642986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
4. Use of big data in hacking and social engineering 4. 大数据在黑客和社会工程中的应用
Shibakali Gupta, A. Mukherjee
: Nowadays, in the fast-paced world of Google and Facebook, every detail of human being could be considered as a set of data or array of data that can be stored, verified, and processed in several ways for the benefits of users. Big data would be perfectly described with humongous large and complex data entities, where classic approach application software is incompetent for them. Big data epitomizes the evidence chattels classified by a high volume, velocity, and variability to require precise technology and analytical approaches for its transformation into value. Big data include netting data, search, data stowing, transmission, updating, data scrutiny, visualization, sharing, querying, data source, and information confidentiality. Big data can castoff in innumerable sectors like defense, health care, and Internet of things. The most famous example probably being Palantir, which was primarily sponsored by the Intelligence Its primary was to deliver analytics sway in the war against terrorism of any kind but with accumulative dependency on big data, the menace of exploitation of this data also arises. The prominence of big data does not gyrate around data magnitude or dimensions rather it revolves around how you process it. You can consider stats from whichever cradle and analyze it to discover answers that facilitate cost diminutions, interval time declines, fresh product development and elevated offerings, and smart management. When you conglomer-ate big data with efficient and dynamic analytics, you can achieve business-corre-lated tasks such as detecting fraudulent behavior, recalculating entire risk portfolios in shorter span of time, determining root causes of failures, disputes, and blemishes in near real time. Few instances such as Cambridge Analytica lighten the insight of the exploitation of the big data. There are several instances where large amount of data has been stolen like in 2014, Yahoo Inc., where 3 billion accounts were effec-tively according to official sources in 2016, Adult Friend Finder where 412.2 million accounts were effected with credit card details of an event that is not a requisite illegal, but sketchy to say the least. The statistic that several sets of international figures were acknowledged in this bulk data set is what marks the news. With the evolution of big data, it makes treasured visions for hackers invariably tempting, but it also provides a big structure of data that con-verts it to payload utmost necessary to protect. In such a scenario, the security of big data is very important. This chapter shares sheer insight of how big data can be used in hacking and social engineering. This chapter will try to list down the ways big data is mined from various sources such as Google Services of Android and Facebook. It will list the various ways the big data is used in day-to-day life by the given companies and other advertising companies. This chapter will try to enlist all the major ill ways this data can be use
:如今,在谷歌和Facebook的快节奏世界中,人类的每一个细节都可以被认为是一组数据或数据阵列,这些数据可以通过多种方式存储、验证和处理,以造福用户。大数据将被完美地描述为巨大而复杂的数据实体,传统的方法应用软件无法胜任。大数据集中了大量、快速和可变性的证据,需要精确的技术和分析方法才能将其转化为价值。大数据包括网络数据、搜索、数据存储、传输、更新、数据审查、可视化、共享、查询、数据源、信息保密等。大数据可以被用于国防、医疗保健和物联网等无数领域。最著名的例子可能是Palantir,它主要是由情报部门赞助的,它的主要目的是在打击任何形式的恐怖主义的战争中提供分析,但随着对大数据的累积依赖,利用这些数据的威胁也会出现。大数据的重要性不在于数据的大小或维度,而在于你如何处理它。您可以考虑来自任何摇篮的统计数据,并对其进行分析,以发现有助于降低成本、缩短间隔时间、开发新产品和提高产品质量以及智能管理的答案。当您通过高效、动态的分析整合大数据时,您可以完成与业务相关的任务,例如检测欺诈行为、在更短的时间内重新计算整个风险组合、近乎实时地确定故障、纠纷和瑕疵的根本原因。很少有像剑桥分析这样的例子能让人们对大数据的利用有更深刻的认识。有几个案例显示,大量数据被盗,比如2014年雅虎公司(Yahoo Inc.),根据官方消息来源,2016年有30亿个账户被有效窃取;Adult Friend Finder, 4.122亿个账户被信用卡详细信息影响,这不是必要的非法事件,但至少可以说是粗略的。在这个大数据集中,几组国际数据被承认的统计数据是新闻的标志。随着大数据的发展,它为黑客提供了宝贵的愿景,但它也提供了一个大的数据结构,将其转换为最需要保护的有效载荷。在这样的场景下,大数据的安全性就显得尤为重要。本章分享了大数据在黑客和社会工程中的应用。本章将尝试列出从各种来源(如Android的Google服务和Facebook)挖掘大数据的方式。它将列出给定公司和其他广告公司在日常生活中使用大数据的各种方式。本章将尝试列出这些数据可能被用来对付我们的所有主要不良方式,以及保护重要和私人数据免受数据收集公司侵害的方法。
{"title":"4. Use of big data in hacking and social engineering","authors":"Shibakali Gupta, A. Mukherjee","doi":"10.1515/9783110606058-004","DOIUrl":"https://doi.org/10.1515/9783110606058-004","url":null,"abstract":": Nowadays, in the fast-paced world of Google and Facebook, every detail of human being could be considered as a set of data or array of data that can be stored, verified, and processed in several ways for the benefits of users. Big data would be perfectly described with humongous large and complex data entities, where classic approach application software is incompetent for them. Big data epitomizes the evidence chattels classified by a high volume, velocity, and variability to require precise technology and analytical approaches for its transformation into value. Big data include netting data, search, data stowing, transmission, updating, data scrutiny, visualization, sharing, querying, data source, and information confidentiality. Big data can castoff in innumerable sectors like defense, health care, and Internet of things. The most famous example probably being Palantir, which was primarily sponsored by the Intelligence Its primary was to deliver analytics sway in the war against terrorism of any kind but with accumulative dependency on big data, the menace of exploitation of this data also arises. The prominence of big data does not gyrate around data magnitude or dimensions rather it revolves around how you process it. You can consider stats from whichever cradle and analyze it to discover answers that facilitate cost diminutions, interval time declines, fresh product development and elevated offerings, and smart management. When you conglomer-ate big data with efficient and dynamic analytics, you can achieve business-corre-lated tasks such as detecting fraudulent behavior, recalculating entire risk portfolios in shorter span of time, determining root causes of failures, disputes, and blemishes in near real time. Few instances such as Cambridge Analytica lighten the insight of the exploitation of the big data. There are several instances where large amount of data has been stolen like in 2014, Yahoo Inc., where 3 billion accounts were effec-tively according to official sources in 2016, Adult Friend Finder where 412.2 million accounts were effected with credit card details of an event that is not a requisite illegal, but sketchy to say the least. The statistic that several sets of international figures were acknowledged in this bulk data set is what marks the news. With the evolution of big data, it makes treasured visions for hackers invariably tempting, but it also provides a big structure of data that con-verts it to payload utmost necessary to protect. In such a scenario, the security of big data is very important. This chapter shares sheer insight of how big data can be used in hacking and social engineering. This chapter will try to list down the ways big data is mined from various sources such as Google Services of Android and Facebook. It will list the various ways the big data is used in day-to-day life by the given companies and other advertising companies. This chapter will try to enlist all the major ill ways this data can be use","PeriodicalId":93151,"journal":{"name":"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...","volume":"63 5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87742869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frontmatter
{"title":"Frontmatter","authors":"","doi":"10.1515/9783110606058-fm","DOIUrl":"https://doi.org/10.1515/9783110606058-fm","url":null,"abstract":"","PeriodicalId":93151,"journal":{"name":"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...","volume":"154 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77706858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5. Steganography, the widely used name for data hiding 5. 隐写术,广泛用于数据隐藏的名称
Srilekha Mukherjee, G. Sanyal
{"title":"5. Steganography, the widely used name for data hiding","authors":"Srilekha Mukherjee, G. Sanyal","doi":"10.1515/9783110606058-005","DOIUrl":"https://doi.org/10.1515/9783110606058-005","url":null,"abstract":"","PeriodicalId":93151,"journal":{"name":"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...","volume":"115 15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84185549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collusion Resistant Multi-Matrix Masking for Privacy-Preserving Data Collection. 保护隐私数据收集的抗合谋多矩阵掩蔽。
Samuel S Wu, Shigang Chen, Abhishek Bhattacharjee, Ying He

An integral part of any social or medical research is the availability of reliable data. For the integrity of participants' responses, a secure environment for collecting sensitive data is required. This paper introduces a novel privacy-preserving data collection method: collusion resistant multi-matrix masking (CRM3). The CRM3 method requires multiple masking service providers (MSP), each generating its own random masking matrices. The key step is that each participant's data is randomly decomposed into the sum of component vectors, and each component vector is sent to the MSPs for masking in a different order. The CRM3 method publicly releases two sets of masked data: one being right multiplied by random invertible matrices and the other being left multiplied by random orthogonal matrices. Both MSPs and the released data may be hosted on cloud platforms. Our data collection and release procedure is designed so that MSPs and the data collector are not able to derive the original participants' data hence providing strong privacy protection. However, statistical inference on parameters of interest will produce exactly the same results from the masked data as from the original data, under commonly used statistical methods such as general linear model, contingency table analysis, logistic regression, and Cox proportional hazard regression.

任何社会或医学研究的一个组成部分是获得可靠的数据。为了保证参与者响应的完整性,需要一个安全的环境来收集敏感数据。介绍了一种新的保护隐私的数据收集方法:抗合谋多矩阵掩蔽(CRM3)。CRM3方法需要多个屏蔽服务提供商(MSP),每个MSP生成自己的随机屏蔽矩阵。关键步骤是将每个参与者的数据随机分解为分量向量的和,并将每个分量向量按不同的顺序发送给msp进行屏蔽。CRM3方法公开释放两组屏蔽数据:一组是右乘随机可逆矩阵,另一组是左乘随机正交矩阵。托管服务提供商和发布的数据都可以托管在云平台上。我们的数据收集和发布程序的设计使msp和数据收集者无法获得原始参与者的数据,从而提供了强有力的隐私保护。然而,在常用的统计方法下,如一般线性模型、列联表分析、逻辑回归、Cox比例风险回归等,对感兴趣参数的统计推断将从被屏蔽数据中得到与原始数据完全相同的结果。
{"title":"Collusion Resistant Multi-Matrix Masking for Privacy-Preserving Data Collection.","authors":"Samuel S Wu,&nbsp;Shigang Chen,&nbsp;Abhishek Bhattacharjee,&nbsp;Ying He","doi":"10.1109/bigdatasecurity.2017.10","DOIUrl":"https://doi.org/10.1109/bigdatasecurity.2017.10","url":null,"abstract":"<p><p>An integral part of any social or medical research is the availability of reliable data. For the integrity of participants' responses, a secure environment for collecting sensitive data is required. This paper introduces a novel privacy-preserving data collection method: <i>collusion resistant multi-matrix masking</i> (CRM<sup>3</sup>). The CRM<sup>3</sup> method requires multiple masking service providers (MSP), each generating its own random masking matrices. The key step is that each participant's data is randomly decomposed into the sum of component vectors, and each component vector is sent to the MSPs for masking in a different order. The CRM<sup>3</sup> method publicly releases two sets of masked data: one being right multiplied by random invertible matrices and the other being left multiplied by random orthogonal matrices. Both MSPs and the released data may be hosted on cloud platforms. Our data collection and release procedure is designed so that MSPs and the data collector are not able to derive the original participants' data hence providing strong privacy protection. However, statistical inference on parameters of interest will produce exactly the same results from the masked data as from the original data, under commonly used statistical methods such as general linear model, contingency table analysis, logistic regression, and Cox proportional hazard regression.</p>","PeriodicalId":93151,"journal":{"name":"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...","volume":"2017 ","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/bigdatasecurity.2017.10","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"38555119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
7. Conclusions 7. 结论
Shibakali Gupta, Dr. Indradip Banerjee, S. Bhattacharyya
{"title":"7. Conclusions","authors":"Shibakali Gupta, Dr. Indradip Banerjee, S. Bhattacharyya","doi":"10.1515/9783110612400-007","DOIUrl":"https://doi.org/10.1515/9783110612400-007","url":null,"abstract":"","PeriodicalId":93151,"journal":{"name":"The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...","volume":"44 12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"1993-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72991129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The Third IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2017 : The Third IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2017 ; the Second IEEE International Conferenc...
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1