IEEE Transactions on Industrial Cyber-Physical Systems最新文献

筛选
英文 中文
Stealthy False Data Injection Attacks Against the Summation Detector in Cyber-Physical Systems 针对网络物理系统中求和检测器的隐形虚假数据注入攻击
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-08-20 DOI: 10.1109/TICPS.2024.3446469
Yifa Liu;Long Cheng;Dan Ye
{"title":"Stealthy False Data Injection Attacks Against the Summation Detector in Cyber-Physical Systems","authors":"Yifa Liu;Long Cheng;Dan Ye","doi":"10.1109/TICPS.2024.3446469","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3446469","url":null,"abstract":"This article proposes an alternating false data injection attack strategy, which can bypass the summation detector in cyber-physical systems. This attack strategy offsets the impact on historical residuals by constantly changing the attack direction, and therefore invalidates the summation detector integrating historical information to detect the well-designed stealthy attacks. In the simulation, the proposed attack strategy reduces the increment of cumulative summation of residuals by 70% compared to the classical stealthy attack strategy, and bypasses both the \u0000<inline-formula><tex-math>$chi ^{2}$</tex-math></inline-formula>\u0000 detector and the summation detector. Furthermore, from a more general perspective, by proposing an almost completely stealthy attack strategy to make the residual information almost unchanged, this article proves that residual based detection methods regardless of single-step residual based ones nor historical residual based ones cannot fully detect false data injection attacks.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"391-403"},"PeriodicalIF":0.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized Switching-Type Adaptive Event-Triggered-Based Non-Recursive Control for Interconnected Cyber-Physical Systems Against Multiple Cyber Attacks 基于事件触发的分散交换式自适应非递归控制,用于互联网络物理系统对抗多重网络攻击
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-08-20 DOI: 10.1109/TICPS.2024.3446769
Haibin Sun;Yahui Cui;Linlin Hou;Ticao Jiao
{"title":"Decentralized Switching-Type Adaptive Event-Triggered-Based Non-Recursive Control for Interconnected Cyber-Physical Systems Against Multiple Cyber Attacks","authors":"Haibin Sun;Yahui Cui;Linlin Hou;Ticao Jiao","doi":"10.1109/TICPS.2024.3446769","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3446769","url":null,"abstract":"This study addresses a decentralized switching-type adaptive event-triggered-based non-recursive security controller design for interconnected cyber-physical systems under multiple cyber attacks. First, an acknowledgment character technique is introduced in the measurement channel to detect whether DoS attacks occur. In the control channel, system signals are subject to hybrid cyber attacks, which consist of DoS and deception attacks obeying independent Bernoulli distributions. Second, a switching-type adaptive event-triggered mechanism is constructed in the sensor-to-controller channel to improve bandwidth resource utilization and compensate for the impact of DoS attacks. A decentralized linear observer is built to estimate the unmeasured states, and an output feedback controller is developed using a non-recursive method, which ensures that all signals in the closed-loop system are uniformly ultimately bounded. Finally, an inverted pendulum system is provided to illustrate the effectiveness of the proposed scheme.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"350-361"},"PeriodicalIF":0.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance/Reliability Tradeoffs When Watermarking Cyber-Physical Systems 网络物理系统水印时的性能/可靠性权衡
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-08-19 DOI: 10.1109/TICPS.2024.3443772
C.M. Krishna
{"title":"Performance/Reliability Tradeoffs When Watermarking Cyber-Physical Systems","authors":"C.M. Krishna","doi":"10.1109/TICPS.2024.3443772","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3443772","url":null,"abstract":"Watermarking is an important security technique in cyber-physical systems. It is a process by which the user injects unexpected actuator inputs and then checks if the reported sensor inputs respond as they should to such inputs. Such an approach can detect the falsification, by an attacker, of sensor reports. Significant control-theoretic research has been reported on watermark performance and strategy. Missing in all this work, however, has been the impact of watermarking on the cyber platform of the CPS. This is the focus of the present paper. Watermarking creates pressure to reduce the control update period, which increases thermal stress on the cyber platform. This can dramatically increase the processor aging rate and significantly reduce mean processor lifetimes. The problem is especially acute when the controlled plant is close to the edge of its Safe State Space. One approach to mitigating cyber platform stress is to proactively skip control update calculations. At the price of some degradation in the plant Quality of Control, such proactive skips can meaningfully improve thermal stress and reduce processor aging.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"606-614"},"PeriodicalIF":0.0,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142579227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly Detection Using Bi-Directional Long Short-Term Memory Networks for Cyber-Physical Electric Vehicle Charging Stations 利用双向长短期记忆网络进行网络物理电动汽车充电站异常检测
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-08-02 DOI: 10.1109/TICPS.2024.3437349
Arif Hussain;Ankit Yadav;Gelli Ravikumar
{"title":"Anomaly Detection Using Bi-Directional Long Short-Term Memory Networks for Cyber-Physical Electric Vehicle Charging Stations","authors":"Arif Hussain;Ankit Yadav;Gelli Ravikumar","doi":"10.1109/TICPS.2024.3437349","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3437349","url":null,"abstract":"With the increasing integration of electric vehicles (EVs) into the distributed energy resources (DER) system, the security of EV charging stations (EVCS) from cyber-attacks is paramount. Utilizing deep learning and recurrent neural networks (RNNs) presents promising advantages in anomaly detection within power systems. Bi-directional long-short-term memory (Bi-LSTM) emerges as a viable choice for anomaly detection, offering distinct advantages that learn from both the forward and backward sequences of the data compared to conventional deep neural networks, RNNs, and basic LSTMs. This study proposes data-driven anomaly detection (DDAD) techniques using a Bi-LSTM network. Seven statistical features are extracted from the passive parameters (voltage, current, frequency, and SoC). Then, the wrapper feature selection method is used to identify the most relevant features, enhancing the accuracy of the proposed DDAD model. We generate a dataset of normal events such as line faults, load switching, capacitor switching, and cyberattack events, including denial-of-service (DoS), spoofing, replay, and data manipulation attacks, using an extended API integrated with RT-LAB to automate the process. We demonstrated the DDAD model on a DER-integrated EVCS microgrid model on a Hardware-in-Loop (HIL)-based intelligent Cyber Physical System (iCPS) testbed environment. Comprehensive experiments are conducted to evaluate the performance of our proposed DDAD model's accuracy, precision, recall, and F1 score with the testing dataset. We compared our results against LSTM, multi-layer perception (MLP), support vector machine (SVM), and linear regression (LR) techniques. This study emphasizes the development of an efficient approach for detecting anomalies on EVCS, and our results underscore the effectiveness of our proposed methodology, achieving an average testing accuracy of 99.42%, thereby reinforcing the cyber-physical security of EVCS.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"508-518"},"PeriodicalIF":0.0,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GraphCCI: Critical Components Identification for Enhancing Security of Cyber-Physical Power Systems GraphCCI:增强网络物理电力系统安全的关键部件识别
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-08-02 DOI: 10.1109/TICPS.2024.3436647
Yigu Liu;Alexandru Ştefanov;Ioannis Semertzis;Peter Palensky
{"title":"GraphCCI: Critical Components Identification for Enhancing Security of Cyber-Physical Power Systems","authors":"Yigu Liu;Alexandru Ştefanov;Ioannis Semertzis;Peter Palensky","doi":"10.1109/TICPS.2024.3436647","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3436647","url":null,"abstract":"Cyber security risks are emerging in Cyber-Physical power Systems (CPS) due to the increasing integration of cyber and physical infrastructures. Critical component identification is a crucial task for the mitigation and prevention of catastrophic blackouts. In this paper, we propose a novel method using graph data mining for critical CPS components identification named GraphCCI. First, it defines two categories of component correlations to reveal the cascading features of CPS. GraphCCI maps cascading failure datasets under time-varying operational states into weighted cascading graphs and constructs a graph database for graph data mining. By adopting graph data mining techniques, frequent subgraphs are identified to construct the Cascading Characteristics Graph (CC-Graph). Finally, the Node Criticality Index (NC-Index) is proposed to quantify the criticality of each CPS component. The experimental results on the IEEE 39-bus system verify the effectiveness of the proposed method and present an in-depth analysis of the CPS cascading features.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"340-349"},"PeriodicalIF":0.0,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141991496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Lagrangian Network Learning and Control of Robotic Exoskeleton Based on Multi-Sensor-Cyber Information Fusion 基于多传感器-网络信息融合的机器人外骨骼的深度拉格朗日网络学习与控制
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-08-02 DOI: 10.1109/TICPS.2024.3437347
Qing Guo;Haoran Zhan;Jiyu Zhang
{"title":"Deep Lagrangian Network Learning and Control of Robotic Exoskeleton Based on Multi-Sensor-Cyber Information Fusion","authors":"Qing Guo;Haoran Zhan;Jiyu Zhang","doi":"10.1109/TICPS.2024.3437347","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3437347","url":null,"abstract":"The overall performance improvement of model-based controller depends on the accurate plant model. However, many complicated plants exist unmodeled uncertainties caused by irregular structure, motion frictions, and external disturbances, which are difficult to obtain the mathematical model with high accuracy. In this work, a multi-sensor-cyber is constructed to sample the physics information about human-exoskeleton interaction and exoskeleton joint motion. Meanwhile, a model identification method based on Deep Lagrangian Network (DeLaN) is presented in robotic exoskeleton to realize multi-sensor information fusion and obtain the reasonable parameters of Lagrangian model. Then a human-exoskeleton cooperative motion control based on nonlinear extended state observer is proposed to guarantee that the exoskeleton tracks two joint demands in the case of tolerable human-exoskeleton interaction. Finally, the effectiveness of the proposed model identification and control scheme is verified by the experimental results in two-DOF exoskeleton platform.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"331-339"},"PeriodicalIF":0.0,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141965371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sliding-Mode Perturbation Observer-Based Delay-Independent Active Mitigation for AGC Systems Against False Data Injection and Random Time-Delay Attacks 基于滑动模式惰性扰动观测器的 AGC 系统延迟无关主动缓解技术,对抗虚假数据注入和随机时延攻击
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-07-31 DOI: 10.1109/TICPS.2024.3436188
Kaishun Xiahou;Xingye Xu;Deyang Huang;Wei Du;Mengshi Li
{"title":"Sliding-Mode Perturbation Observer-Based Delay-Independent Active Mitigation for AGC Systems Against False Data Injection and Random Time-Delay Attacks","authors":"Kaishun Xiahou;Xingye Xu;Deyang Huang;Wei Du;Mengshi Li","doi":"10.1109/TICPS.2024.3436188","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3436188","url":null,"abstract":"This article presents a sliding-mode perturbation observer (SMPO) based delay-independent active mitigation (DIAM) scheme for automatic generation control (AGC) systems of multi-area interconnected power grid. It is designed to defend against malicious cyber attacks such as false data injection attack (FDIA), random time-delay attack (RTDA), and coordinated cyber attack (CCA) in the measurement channel and control channel. In the DIAM scheme, perturbation terms are introduced to describe the comprehensive effects of injected false signals and random delay components caused by cyber attacks. SMPO is designed for each control area of AGC systems to reconstruct the perturbations in the measurement channel and control channel based on the equivalent output injection method. The cyber attacks are mitigated by compensating the perturbation terms based on the accurate perturbation estimations provided by SMPO. The proposed DIAM is a delay-independent scheme which does not require any time-delay knowledge, and it is able to deal with the coordinated attacks of FDIA and RTDA at the same time. Simulation studies and experimental tests are undertaken on a three-area AGC systems to demonstrate the performance of the proposed DIAM scheme.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"446-458"},"PeriodicalIF":0.0,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142230843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IP2FL: Interpretation-Based Privacy-Preserving Federated Learning for Industrial Cyber-Physical Systems IP2FL:基于解释的工业网络物理系统隐私保护联合学习
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-07-30 DOI: 10.1109/TICPS.2024.3435178
Danyal Namakshenas;Abbas Yazdinejad;Ali Dehghantanha;Reza M. Parizi;Gautam Srivastava
{"title":"IP2FL: Interpretation-Based Privacy-Preserving Federated Learning for Industrial Cyber-Physical Systems","authors":"Danyal Namakshenas;Abbas Yazdinejad;Ali Dehghantanha;Reza M. Parizi;Gautam Srivastava","doi":"10.1109/TICPS.2024.3435178","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3435178","url":null,"abstract":"The expansion of Industrial Cyber-Physical Systems (ICPS) has introduced new challenges in security and privacy, highlighting a research gap in effective anomaly detection while preserving data confidentiality. In the ICPS landscape, where vast amounts of sensitive industrial data are exchanged, ensuring privacy is not just a regulatory compliance issue but a critical shield against industrial espionage and cyber threats. Existing solutions often compromise data privacy for enhanced security, leaving a significant void in protecting sensitive information within ICPS networks. Addressing this, our research presents the \u0000<italic>IP2FL</i>\u0000 model, an Interpretation-based Privacy-Preserving Federated Learning approach tailored for ICPS. This model combines Additive Homomorphic Encryption (AHE) for privacy with advanced feature selection methods and Shapley Values (SV) for enhanced explainability. The proposed solution mitigates privacy concerns in federated learning, where traditional methods fall short due to computational constraints and lack of interpretability. By integrating AHE, the \u0000<italic>IP2FL</i>\u0000 model minimizes computational overhead and ensures data privacy. Our dual feature selection approach optimizes system performance while incorporating SV to provide critical insights into model decisions, advancing the field towards more transparent and understandable AI systems in ICPS. The validation of our model using ICPS-specific datasets demonstrates its effectiveness and potential for practical applications.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"321-330"},"PeriodicalIF":0.0,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141965064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Distributed Fusion Estimation Under Double Layer Defense Architecture 双层防御架构下的安全分布式融合估计
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-07-30 DOI: 10.1109/TICPS.2024.3435648
Pindi Weng;Tongxiang Li;Mingnan Hu;Jing Zhou;Bo Chen
{"title":"Secure Distributed Fusion Estimation Under Double Layer Defense Architecture","authors":"Pindi Weng;Tongxiang Li;Mingnan Hu;Jing Zhou;Bo Chen","doi":"10.1109/TICPS.2024.3435648","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3435648","url":null,"abstract":"This paper is concerned with the problem of secure fusion estimation for cyber-physical systems under false data injection (FDI) attacks and eavesdropping attacks. In this work, the active and passive defense mechanisms are respectively designed to preserve the privacy of local estimation information from eavesdroppers and to obtain satisfactory fusion estimation performance against FDI attacks. Specificly, encryption and decryption schemes are designed for the transmitted local estimates, which prevents the eavesdropper from obtaining the correct estimates while the monitoring center is not affected. Then, a secure fusion method is proposed consisting of encryption-based attack detection and prediction based compensation fusion, which can effectively reduce the impact of FDI attack signals. Finally, an illustrative example is employed to show the effectiveness and advantages of the proposed methods.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"362-369"},"PeriodicalIF":0.0,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Minority Cluster-Informed Semi-Supervised Random Vector Functional Link Network for Multi-Mode Intermittent Fault Diagnosis 用于多模式间歇性故障诊断的在线少数群组半监督随机向量功能链接网络
IEEE Transactions on Industrial Cyber-Physical Systems Pub Date : 2024-07-29 DOI: 10.1109/TICPS.2024.3434788
Wei Li;Pengyu Han;Zeyi Liu;Xiao He;Limin Wang;Tao Zhang
{"title":"Online Minority Cluster-Informed Semi-Supervised Random Vector Functional Link Network for Multi-Mode Intermittent Fault Diagnosis","authors":"Wei Li;Pengyu Han;Zeyi Liu;Xiao He;Limin Wang;Tao Zhang","doi":"10.1109/TICPS.2024.3434788","DOIUrl":"https://doi.org/10.1109/TICPS.2024.3434788","url":null,"abstract":"Industrial intermittent fault diagnosis is crucial for maintaining efficient and safe production processes. However, existing methodologies often fail to account for practical sample imbalance constraints encountered in multi-mode scenarios. In this paper, an online minority cluster-informed semi-supervised random vector functional link network, termed OMIS-RVFL, is proposed to tackle these challenges. It incorporates a minority-cluster informed strategy, employing dimensionality reduction and minority prioritization to enhance linear separability of samples in transitional conditions and improve identification of minority instances. Multiple experiments are conducted using the multi-mode Tennessee Eastman process datasets. Experimental results verified that the effectiveness of the proposed OMIS-RVFL.","PeriodicalId":100640,"journal":{"name":"IEEE Transactions on Industrial Cyber-Physical Systems","volume":"2 ","pages":"404-411"},"PeriodicalIF":0.0,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142143601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信