首页 > 最新文献

International journal of network security & its applications最新文献

英文 中文
Keeping a secure hold on data through modern electronic content management 通过现代电子内容管理确保数据的安全
Pub Date : 2020-06-01 DOI: 10.1016/s1353-4858(20)30066-0
Paul Hampton
{"title":"Keeping a secure hold on data through modern electronic content management","authors":"Paul Hampton","doi":"10.1016/s1353-4858(20)30066-0","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30066-0","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"30 1","pages":"8-11"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81231012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusting the CISO 信任首席信息安全官
Pub Date : 2020-06-01 DOI: 10.1016/s1353-4858(20)30070-2
K. MacMillan
{"title":"Trusting the CISO","authors":"K. MacMillan","doi":"10.1016/s1353-4858(20)30070-2","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30070-2","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"9 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76364459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keeping critical assets safe when teleworking is the new norm 当远程办公时,保证关键资产的安全是新的规范
Pub Date : 2020-06-01 DOI: 10.1016/s1353-4858(20)30067-2
Gus Evangelakos
{"title":"Keeping critical assets safe when teleworking is the new norm","authors":"Gus Evangelakos","doi":"10.1016/s1353-4858(20)30067-2","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30067-2","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"30 1","pages":"11-14"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73803472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Keep security top of mind when moving into the cloud 在迁移到云端时,要把安全放在首位
Pub Date : 2020-06-01 DOI: 10.1016/s1353-4858(20)30069-6
Thomas Deighton, Mike Wakefield
{"title":"Keep security top of mind when moving into the cloud","authors":"Thomas Deighton, Mike Wakefield","doi":"10.1016/s1353-4858(20)30069-6","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30069-6","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"24 1","pages":"17-19"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73440213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PDMLP: Phishing Detection using Multilayer Perceptron PDMLP:基于多层感知器的网络钓鱼检测
Pub Date : 2020-05-31 DOI: 10.5121/ijnsa.2020.12304
Saad Al-Ahmadi, Tariq Lasloum
A phishing website is a significant problem on the internet. It’s one of the Cyber-attack types where attackers try to obtain sensitive information such as username and password or credit card information. The recent growth in deploying a Detection phishing URL system on many websites has resulted in a massive amount of available data to predict phishing websites. In this paper, we purpose a new method to develop a phishing detection system called phishing detection based on a multilayer perceptron (PDMLP), which used on two types of datasets. The performance of these mechanisms evaluated in terms of Accuracy, Precision, Recall, and F-measure. Results showed that PDMLP provides better performance in comparison to KNN, SVM, C4.5 Decision Tree, RF, and RoF to classifiers.
网络钓鱼网站是互联网上的一个重大问题。这是一种网络攻击类型,攻击者试图获取敏感信息,如用户名、密码或信用卡信息。最近在许多网站上部署检测网络钓鱼URL系统的增长导致了大量可用数据来预测网络钓鱼网站。本文提出了一种基于多层感知器(PDMLP)的网络钓鱼检测系统,该系统用于两种类型的数据集。这些机制的性能评估方面的准确性,精密度,召回率和f测量。结果表明,与KNN、SVM、C4.5决策树、RF和RoF等分类器相比,PDMLP具有更好的性能。
{"title":"PDMLP: Phishing Detection using Multilayer Perceptron","authors":"Saad Al-Ahmadi, Tariq Lasloum","doi":"10.5121/ijnsa.2020.12304","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12304","url":null,"abstract":"A phishing website is a significant problem on the internet. It’s one of the Cyber-attack types where attackers try to obtain sensitive information such as username and password or credit card information. The recent growth in deploying a Detection phishing URL system on many websites has resulted in a massive amount of available data to predict phishing websites. In this paper, we purpose a new method to develop a phishing detection system called phishing detection based on a multilayer perceptron (PDMLP), which used on two types of datasets. The performance of these mechanisms evaluated in terms of Accuracy, Precision, Recall, and F-measure. Results showed that PDMLP provides better performance in comparison to KNN, SVM, C4.5 Decision Tree, RF, and RoF to classifiers.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82445553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Empirical Analysis of Email Forensics Tools 电子邮件取证工具的实证分析
Pub Date : 2020-05-27 DOI: 10.5121/ijnsa.2020.12303
A. Ghafarian, Ashraf Mady, Kyungwhan Park
Emails are the most common service on the Internet for communication and sending documents. Email is used not only from computers but also from many other electronic devices such as tablets; smartphones, etc. Emails can also be used for criminal activities. Email forensic refers to the study of email detail and content as evidence to identify the actual sender and recipient of a message, date/time of transmission, detailed record of email transaction, intent of the sender, etc. Email forensics involves investigation of metadata, keyword, searching, port scanning and generating report based on investigators need. Many tools are available for any investigation that involves email forensics. Investigators should be very careful of not violating user’s privacy. To this end, investigators should run keyword searches to reveal only the relevant emails. Therefore, knowledge of the features of the tool and the search features is necessary for the tool selection. In this research, we experimentally compare the performance of several email forensics tools. Our aim is to help the investigators with the tool selection task. We evaluate the tools in terms of their keyword search, report generation, and other features such as, email format, size of the file accepted, whether they work online or offline, format of the reports, etc. We use Enron email data set for our experiment.
电子邮件是互联网上最常见的通信和发送文件的服务。电子邮件不仅可以在电脑上使用,还可以在许多其他电子设备上使用,如平板电脑;智能手机等。电子邮件也可以用于犯罪活动。电子邮件取证是指研究电子邮件的细节和内容作为证据,以识别信息的实际发送者和接收者、传输日期/时间、电子邮件交易的详细记录、发送者的意图等。电子邮件取证包括元数据调查、关键字、搜索、端口扫描和根据调查人员的需要生成报告。有许多工具可用于涉及电子邮件取证的任何调查。调查人员应该非常小心,不要侵犯用户的隐私。为此,调查人员应该进行关键词搜索,只发现相关的电子邮件。因此,了解工具的特征和搜索特征是选择工具的必要条件。在本研究中,我们通过实验比较了几种电子邮件取证工具的性能。我们的目的是帮助研究者完成工具选择任务。我们根据关键字搜索、报告生成和其他功能(如电子邮件格式、接受的文件大小、它们是在线工作还是离线工作、报告格式等)来评估这些工具。我们使用安然电子邮件数据集进行实验。
{"title":"An Empirical Analysis of Email Forensics Tools","authors":"A. Ghafarian, Ashraf Mady, Kyungwhan Park","doi":"10.5121/ijnsa.2020.12303","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12303","url":null,"abstract":"Emails are the most common service on the Internet for communication and sending documents. Email is used not only from computers but also from many other electronic devices such as tablets; smartphones, etc. Emails can also be used for criminal activities. Email forensic refers to the study of email detail and content as evidence to identify the actual sender and recipient of a message, date/time of transmission, detailed record of email transaction, intent of the sender, etc. Email forensics involves investigation of metadata, keyword, searching, port scanning and generating report based on investigators need. Many tools are available for any investigation that involves email forensics. Investigators should be very careful of not violating user’s privacy. To this end, investigators should run keyword searches to reveal only the relevant emails. Therefore, knowledge of the features of the tool and the search features is necessary for the tool selection. In this research, we experimentally compare the performance of several email forensics tools. Our aim is to help the investigators with the tool selection task. We evaluate the tools in terms of their keyword search, report generation, and other features such as, email format, size of the file accepted, whether they work online or offline, format of the reports, etc. We use Enron email data set for our experiment.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"191 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85002736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey on Malware Detection and Analysis Tools 恶意软件检测与分析工具综述
Pub Date : 2020-03-31 DOI: 10.5121/ijnsa.2020.12203
Sajedul Talukder, Zahidur Talukder
The huge amounts of data and information that need to be analyzed for possible malicious intent are one of the big and significant challenges that the Web faces today. Malicious software, also referred to as malware developed by attackers, is polymorphic and metamorphic in nature which can modify the code as it spreads. In addition, the diversity and volume of their variants severely undermine the effectiveness of traditional defenses that typically use signature-based techniques and are unable to detect malicious executables previously unknown. Malware family variants share typical patterns of behavior that indicate their origin and purpose. The behavioral trends observed either statically or dynamically can be manipulated by using machine learning techniques to identify and classify unknown malware into their established families. This survey paper gives an overview of the malware detection and analysis techniques and tools. preventive measures to cope with the threats coming in the future. Features derived from analysis of malware can be used to group unknown malware and classify them into their existing families. This paper presents a review of techniques/approaches and tools for detecting and analyzing the malware executables. There has been some study performed on comparison of static, dynamic, and hybrid analysis for malware detection [8], whereas some researchers tried to bridge the static/dynamic gap [9]. Mobile technology in healthcare has also been a target of malware [10]. Few recent studies have been done on static and dynamic analysis of Android malware [11], detection using permission [12–14], based on system call sequences and LSTM [15]. studies wavelet and of disassemblers for opcode The studies that use dynamic analysis perform synthesis the semantics of obfuscated code multi-hypothesis testing analyzing quantitative data flow graph metrics using simplified call access APIs
需要分析大量的数据和信息以发现可能存在的恶意意图,这是当今Web面临的重大挑战之一。恶意软件,也被称为攻击者开发的恶意软件,本质上是多态和变形的,可以在传播时修改代码。此外,其变体的多样性和数量严重破坏了传统防御的有效性,传统防御通常使用基于签名的技术,并且无法检测以前未知的恶意可执行文件。恶意软件家族的变体共享典型的行为模式,表明它们的起源和目的。静态或动态观察到的行为趋势可以通过使用机器学习技术来识别和分类未知恶意软件到其已建立的家族来操纵。这篇调查论文给出了恶意软件检测和分析技术和工具的概述。应对未来威胁的预防措施。从恶意软件分析中获得的特征可以用于对未知恶意软件进行分组,并将其分类到现有的家族中。本文介绍了检测和分析恶意软件可执行文件的技术/方法和工具。已经有一些研究对恶意软件检测的静态、动态和混合分析进行了比较[8],而一些研究人员试图弥合静态/动态差距[9]。医疗保健领域的移动技术也一直是恶意软件的攻击目标[10]。近年来,基于系统调用序列和LSTM[15]的Android恶意软件静态和动态分析[11]、使用权限进行检测[12-14]等方面的研究很少。使用动态分析的研究进行了混淆代码语义的综合,使用简化的调用访问api进行了多假设检验,分析了定量数据流图度量
{"title":"A Survey on Malware Detection and Analysis Tools","authors":"Sajedul Talukder, Zahidur Talukder","doi":"10.5121/ijnsa.2020.12203","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12203","url":null,"abstract":"The huge amounts of data and information that need to be analyzed for possible malicious intent are one of the big and significant challenges that the Web faces today. Malicious software, also referred to as malware developed by attackers, is polymorphic and metamorphic in nature which can modify the code as it spreads. In addition, the diversity and volume of their variants severely undermine the effectiveness of traditional defenses that typically use signature-based techniques and are unable to detect malicious executables previously unknown. Malware family variants share typical patterns of behavior that indicate their origin and purpose. The behavioral trends observed either statically or dynamically can be manipulated by using machine learning techniques to identify and classify unknown malware into their established families. This survey paper gives an overview of the malware detection and analysis techniques and tools. preventive measures to cope with the threats coming in the future. Features derived from analysis of malware can be used to group unknown malware and classify them into their existing families. This paper presents a review of techniques/approaches and tools for detecting and analyzing the malware executables. There has been some study performed on comparison of static, dynamic, and hybrid analysis for malware detection [8], whereas some researchers tried to bridge the static/dynamic gap [9]. Mobile technology in healthcare has also been a target of malware [10]. Few recent studies have been done on static and dynamic analysis of Android malware [11], detection using permission [12–14], based on system call sequences and LSTM [15]. studies wavelet and of disassemblers for opcode The studies that use dynamic analysis perform synthesis the semantics of obfuscated code multi-hypothesis testing analyzing quantitative data flow graph metrics using simplified call access APIs","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80205487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
An Enhanced User Authentication Framework in Cloud Computing 云计算中增强的用户认证框架
Pub Date : 2020-03-31 DOI: 10.5121/ijnsa.2020.12204
Hasan Al Refai, K. Batiha, Ahmad M Al-Refai
Recently, there are several studies have proposed user authentication frameworks to defend against different types of attacks such as phishing, replay attack, man in the middle attack and denial of service attack, etc. Most of these frameworks consist of three main phases, which are the registration phase, login phase, and authentication phase. Most of them have the changing password process as an additional activity.Many problemshave been noticed in the performance of these frameworks. For example, the registration phase is valunerable to internal attack such as SYN flood attack. In this work, we aim to propose a robust user authentication framework that overcomes the previous framework shortages. The proposed framework provides many security aspects such as remote authentication, mutual authentication, session key establishment,to mention a few. Besides, to ensure the security through all phases of this framework, we add a new phase called a Service Access Authentication Phase (SAAP).This phase is resposable of the internal verification .
近年来,针对网络钓鱼、重放攻击、中间人攻击、拒绝服务攻击等不同类型的攻击,研究人员提出了用户认证框架。这些框架大多由三个主要阶段组成,即注册阶段、登录阶段和身份验证阶段。它们中的大多数都将更改密码过程作为附加活动。在这些框架的性能方面已经注意到许多问题。例如,注册阶段容易受到内部攻击,如SYN flood攻击。在这项工作中,我们的目标是提出一个健壮的用户身份验证框架,以克服以前框架的不足。该框架提供了远程认证、双向认证、会话密钥建立等安全保障。此外,为了确保该框架所有阶段的安全性,我们添加了一个称为服务访问认证阶段(SAAP)的新阶段。这个阶段负责内部验证。
{"title":"An Enhanced User Authentication Framework in Cloud Computing","authors":"Hasan Al Refai, K. Batiha, Ahmad M Al-Refai","doi":"10.5121/ijnsa.2020.12204","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12204","url":null,"abstract":"Recently, there are several studies have proposed user authentication frameworks to defend against different types of attacks such as phishing, replay attack, man in the middle attack and denial of service attack, etc. Most of these frameworks consist of three main phases, which are the registration phase, login phase, and authentication phase. Most of them have the changing password process as an additional activity.Many problemshave been noticed in the performance of these frameworks. For example, the registration phase is valunerable to internal attack such as SYN flood attack. In this work, we aim to propose a robust user authentication framework that overcomes the previous framework shortages. The proposed framework provides many security aspects such as remote authentication, mutual authentication, session key establishment,to mention a few. Besides, to ensure the security through all phases of this framework, we add a new phase called a Service Access Authentication Phase (SAAP).This phase is resposable of the internal verification .","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"13 1","pages":"59-75"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79483192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Consideration in Peer-to-peer Networks with A Case Study Application 点对点网络中的安全考虑与案例研究应用
Pub Date : 2020-03-31 DOI: 10.5121/ijnsa.2020.12201
Nick Rahimi
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.
点对点(P2P)覆盖网络的广泛采用也造成了巨大的危险,因为数百万用户不熟悉潜在的安全风险。缺乏集中控制给P2P系统带来了很大的风险。这主要是由于无法为威胁管理实现适当的身份验证方法。然而,最好的解决方案包括加密、利用管理、实现加密协议、避免个人文件共享和未经授权的下载。最近一种新的基于非dht的结构化P2P系统非常适合设计安全的通信协议。该方法基于线性丢番图方程(LDE)[1]。基于该协议的P2P体系结构提供了将对称和非对称加密解决方案集成到P2P体系结构中的简化方法,而无需使用传输层安全(TLS)及其前身安全套接字层(SSL)协议。
{"title":"Security Consideration in Peer-to-peer Networks with A Case Study Application","authors":"Nick Rahimi","doi":"10.5121/ijnsa.2020.12201","DOIUrl":"https://doi.org/10.5121/ijnsa.2020.12201","url":null,"abstract":"Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76012750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Keyloggers: silent cyber security weapons 键盘记录器:无声的网络安全武器
Pub Date : 2020-02-01 DOI: 10.1016/s1353-4858(20)30021-0
Akashdeep Bhardwaj, Sam Goundar
{"title":"Keyloggers: silent cyber security weapons","authors":"Akashdeep Bhardwaj, Sam Goundar","doi":"10.1016/s1353-4858(20)30021-0","DOIUrl":"https://doi.org/10.1016/s1353-4858(20)30021-0","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"40 1","pages":"14-19"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77380677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
International journal of network security & its applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1