Internet of Things and Cyber-Physical Systems最新文献

筛选
英文 中文
Non-work conserving dynamic scheduling of moldable gang tasks on multicore systems 多核系统上可成型团伙任务的非工作保护动态调度
Internet of Things and Cyber-Physical Systems Pub Date : 2024-03-01 DOI: 10.1016/j.iotcps.2024.03.001
Tomoki Shimizu, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama
{"title":"Non-work conserving dynamic scheduling of moldable gang tasks on multicore systems","authors":"Tomoki Shimizu, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama","doi":"10.1016/j.iotcps.2024.03.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.03.001","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"5 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing immersive toy trial experience in mobile augmented reality 在移动增强现实技术中构建身临其境的玩具试用体验
Internet of Things and Cyber-Physical Systems Pub Date : 2024-02-01 DOI: 10.1016/j.iotcps.2024.02.001
Lingxin Yu, Jiacheng Zhang, Xinyue Wang, Siru Chen, Xuehao Qin, Zhifei Ding, Jiahao Han
{"title":"Constructing immersive toy trial experience in mobile augmented reality","authors":"Lingxin Yu, Jiacheng Zhang, Xinyue Wang, Siru Chen, Xuehao Qin, Zhifei Ding, Jiahao Han","doi":"10.1016/j.iotcps.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.02.001","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139891880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review 物联网网络入侵检测的多目标优化算法:系统综述
Internet of Things and Cyber-Physical Systems Pub Date : 2024-02-01 DOI: 10.1016/j.iotcps.2024.01.003
Shubhkirti Sharma, Vijay Kumar, K. Dutta
{"title":"Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review","authors":"Shubhkirti Sharma, Vijay Kumar, K. Dutta","doi":"10.1016/j.iotcps.2024.01.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.01.003","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139871865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MalAware: A tabletop exercise for malware security awareness education and incident response training 恶意软件:恶意软件安全意识教育和事件响应培训桌面演练
Internet of Things and Cyber-Physical Systems Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.02.003
Giddeon Angafor , Iryna Yevseyeva , Leandros Maglaras
{"title":"MalAware: A tabletop exercise for malware security awareness education and incident response training","authors":"Giddeon Angafor ,&nbsp;Iryna Yevseyeva ,&nbsp;Leandros Maglaras","doi":"10.1016/j.iotcps.2024.02.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.02.003","url":null,"abstract":"<div><p>Advancements in technology, including the Internet of Things (IoT) revolution, have enabled individuals and businesses to use systems and devices that connect, exchange data, and provide real-time information from far and near. Despite that, this interconnectivity and data sharing between systems and devices over the internet poses security and privacy risks as threat actors can intercept, steal, and use owners’ data for nefarious purposes. This paper discusses ’MalAware’, a ‘Malware Awareness Education’ and incident response (IR) scenario-based tabletop exercise and card game for malware threat mitigation training. It introduces the importance of incident management, highlights the dangers posed by malware for connected systems, and outlines the role of tabletop games and exercises in helping businesses mature their malware incident response capabilities. The study discusses the design of MalAware and summarises the results of 2 pilots undertaken to assess the concept, maintaining that the results highlighted the value of ‘MalAware’ as an essential tool to help students and staff master how to mitigate security threats caused by malware. It argues that MalAware can assist businesses in their IR preparedness endeavors, enabling incident management teams to review plans and processes to ensure they are fit for purpose. It enables staff to leverage scenario-based and simulated security breach examples, including role-play, to establish appropriate malware defences. MalAware’s practical hands-on exercises can assist trainees in gaining essential malware and other threat mitigation skills, helping to protect the security and privacy of IoTs.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 280-292"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000063/pdfft?md5=61feca14037fa00f21581df14b5c4571&pid=1-s2.0-S2667345224000063-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140180017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-enhanced smart road infrastructure systems for comprehensive real-time monitoring 用于全面实时监控的物联网增强型智能道路基础设施系统
Internet of Things and Cyber-Physical Systems Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.01.002
Zhoujing Ye , Ya Wei , Songli Yang , Pengpeng Li , Fei Yang , Biyu Yang , Linbing Wang
{"title":"IoT-enhanced smart road infrastructure systems for comprehensive real-time monitoring","authors":"Zhoujing Ye ,&nbsp;Ya Wei ,&nbsp;Songli Yang ,&nbsp;Pengpeng Li ,&nbsp;Fei Yang ,&nbsp;Biyu Yang ,&nbsp;Linbing Wang","doi":"10.1016/j.iotcps.2024.01.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.01.002","url":null,"abstract":"<div><p>With the rapid advancement of Internet of Things (IoT) technology, its applications in road infrastructure have garnered attention. However, challenges persist when applying IoT to road infrastructure monitoring, including insufficient durability of front-end sensors, pavement damage due to sensor embedding, and the redundancy of a vast amount of real-time data, hindering the long-term real-time monitoring of pavements. To address these challenges, this study developed a self-powered distributed intelligent pavement monitoring system based on IoT, encompassing a sensor network, cloud platform, communication network, and power supply system. Considering the specific characteristics of slipform paving for cement concrete pavements, an integrated paving process was proposed, merging embedded sensors with pavement material structures. Through on-site engineering monitoring, the system actively collects and analyzes various data types such as system energy consumption, temperature and humidity, environmental noise, wind speed and direction, and pavement structural vibrations, providing data support for pavement design, maintenance, and vehicle-road synergy applications. Future efforts will continue to promote the application of IoT technology in digital road maintenance, traffic safety, and optimized pavement material structure design.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 235-249"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000026/pdfft?md5=e2593131eb914f50ce726004b9037d6b&pid=1-s2.0-S2667345224000026-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139718721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges 网络物理系统中的勒索软件:分类、案例研究、安全漏洞和公开挑战
Internet of Things and Cyber-Physical Systems Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2023.12.001
Mourad Benmalek
{"title":"Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges","authors":"Mourad Benmalek","doi":"10.1016/j.iotcps.2023.12.001","DOIUrl":"10.1016/j.iotcps.2023.12.001","url":null,"abstract":"<div><p>Ransomware attacks have emerged as one of the most significant cyberthreats faced by organizations worldwide. In recent years, ransomware has also started to target critical infrastructure and Cyber-Physical Systems (CPS) such as industrial control systems, smart grids, and healthcare networks. The unique attack surface and safety-critical nature of CPS introduce new challenges in defending against ransomware. This paper provides a comprehensive overview of ransomware threats to CPS. We propose a dual taxonomy to classify ransomware attacks on CPS based on infection vectors, targets, objectives, and technical attributes. Through an analysis of 10 real-world incidents, we highlight attack patterns, vulnerabilities, and impacts of ransomware campaigns against critical systems and facilities. Based on the insights gained, we identify open research problems and future directions to improve ransomware resilience in CPS environments.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 186-202"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345223000561/pdfft?md5=4e1f20e6c28b32ae59f1f757ef9b4c6b&pid=1-s2.0-S2667345223000561-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139394158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data management method for building internet of things based on blockchain sharding and DAG 基于区块链分片和 DAG 构建物联网的数据管理方法
Internet of Things and Cyber-Physical Systems Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.01.001
Wenhu Zheng, Xu Wang, Zhenxi Xie, Yixin Li, Xiaoyun Ye, Jinlong Wang, Xiaoyun Xiong
{"title":"Data management method for building internet of things based on blockchain sharding and DAG","authors":"Wenhu Zheng,&nbsp;Xu Wang,&nbsp;Zhenxi Xie,&nbsp;Yixin Li,&nbsp;Xiaoyun Ye,&nbsp;Jinlong Wang,&nbsp;Xiaoyun Xiong","doi":"10.1016/j.iotcps.2024.01.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.01.001","url":null,"abstract":"<div><p>Sharding technology can address the throughput and scalability limitations that arise when single-chain blockchain are applied in the Internet of Things (IoT). However, existing sharding solutions focus on addressing issues like malicious nodes clustering and cross-shard transactions. Existing sharding solutions cannot adapt to the performance disparities of edge nodes and the characteristic of three-dimensional data queries in building IoT. This leads to problems such as shard overheating and inefficient data query efficiency. This paper proposes a dual-layer architecture called S-DAG, which combines sharded blockchain and DAG blockchain. The sharded blockchain processes transactions within the building IoT, while the DAG blockchain stores block headers from the sharded network. By designing an Adaptive Balancing Load Algorithm (ABLA) for periodic network sharding, nodes are divided based on their load performance values to prevent the aggregation of low-load performance nodes and the resulting issue of shard overheating. By combining the characteristics of the KD tree and Merkle tree, a block structure known as 3D-Merkle tree is designed to support three-dimensional data queries, enhancing the efficiency of three-dimensional data queries in building IoT. By deploying and conducting simulation experiments on various physical devices, we have verified the effectiveness of the solution proposed in this paper. The results indicate that, compared to other solutions, the proposed solution is better suited for building IoT data management. ABLA is effective in preventing shard overheating issue, and the 3D-Merkle tree significantly enhances data query efficiency.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 217-234"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000014/pdfft?md5=4cbb598cfddbffa06e124be5e2862437&pid=1-s2.0-S2667345224000014-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139718720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review 物联网网络入侵检测的多目标优化算法:系统综述
Internet of Things and Cyber-Physical Systems Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.01.003
Shubhkirti Sharma , Vijay Kumar , Kamlesh Dutta
{"title":"Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review","authors":"Shubhkirti Sharma ,&nbsp;Vijay Kumar ,&nbsp;Kamlesh Dutta","doi":"10.1016/j.iotcps.2024.01.003","DOIUrl":"10.1016/j.iotcps.2024.01.003","url":null,"abstract":"<div><p>The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features. The Intrusion detection system faces a trade-off between various parameters such as detection accuracy, relevance, redundancy, false alarm rate, and other objectives. The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. MOAs provide a set of optimized solutions for the intrusion detection process in highly complex IoT networks. This paper presents the identification of multiple objectives of intrusion detection, comparative analysis of multi-objective algorithms for intrusion detection in IoT based on their approaches, and the datasets used for their evaluation. The multi-objective optimization algorithms show the encouraging potential in IoT networks to enhance multiple conflicting objectives for intrusion detection. Additionally, the current challenges and future research ideas are identified. In addition to demonstrating new advancements in intrusion detection techniques, this study attempts to identify research gaps that can be addressed while designing intrusion detection systems for IoT networks.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 258-267"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000038/pdfft?md5=19510c1690405bb751695fbd58ac122c&pid=1-s2.0-S2667345224000038-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139812070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit card default prediction using ML and DL techniques 利用 ML 和 DL 技术预测信用卡违约情况
Internet of Things and Cyber-Physical Systems Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.09.001
Fazal Wahab , Imran Khan , Sneha Sabada
{"title":"Credit card default prediction using ML and DL techniques","authors":"Fazal Wahab ,&nbsp;Imran Khan ,&nbsp;Sneha Sabada","doi":"10.1016/j.iotcps.2024.09.001","DOIUrl":"10.1016/j.iotcps.2024.09.001","url":null,"abstract":"<div><p>The banking sector is widely acknowledged for its intrinsic unpredictability and susceptibility to risk. Bank loans have emerged as one of the most recent services offered over the past several decades. Banks typically serve as intermediaries for loans, investments, short-term loans, and other types of credit. The usage of credit cards is experiencing a steady increase, thereby leading to a rise in the default rate that banks encounter. Although there has been much research investigating the efficacy of conventional Machine Learning (ML) models, there has been relatively less emphasis on Deep Learning (DL) techniques. The application of DL approaches to credit card default prediction has not been extensively researched despite their considerable potential in numerous fields. Moreover, the current literature frequently lacks particular information regarding the DL structures, hyperparameters, and optimization techniques employed. To predict credit card default, this study evaluates the efficacy of a DL model and compares it to other ML models, such as Decision Tree (DT) and Adaboost. The objective of this research is to identify the specific DL parameters that contribute to the observed enhancements in the accuracy of credit card default prediction. This research makes use of the UCI ML repository to access the credit card defaulted customer dataset. Subsequently, various techniques are employed to preprocess the unprocessed data and visually present the outcomes through the use of exploratory data analysis (EDA). Furthermore, the algorithms are hypertuned to evaluate the enhancement in prediction. We used standard evaluation metrics to evaluate all the models. The evaluation indicates that the AdaBoost and DT exhibit the highest accuracy rate of 82 ​% in predicting credit card default, surpassing the accuracy of the ANN model, which is 78 ​%.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 293-306"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000087/pdfft?md5=f77f275cf416221418432e3c1d730036&pid=1-s2.0-S2667345224000087-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models 物联网安全的机器学习技术:使用生成式人工智能和大型语言模型的当前研究和未来展望
Internet of Things and Cyber-Physical Systems Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2023.12.003
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, Ammar Battah, Norbert Tihanyi
{"title":"Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models","authors":"Fatima Alwahedi,&nbsp;Alyazia Aldhaheri,&nbsp;Mohamed Amine Ferrag,&nbsp;Ammar Battah,&nbsp;Norbert Tihanyi","doi":"10.1016/j.iotcps.2023.12.003","DOIUrl":"10.1016/j.iotcps.2023.12.003","url":null,"abstract":"<div><p>Despite providing unparalleled connectivity and convenience, the exponential growth of the Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These concerns stem from various factors, including the heterogeneity of IoT devices, widespread deployment, and inherent computational limitations. Integrating emerging technologies to address these concerns becomes imperative as the dynamic IoT landscape evolves. Machine Learning (ML), a rapidly advancing technology, has shown considerable promise in addressing IoT security issues. It has significantly influenced and advanced research in cyber threat detection. This survey provides a comprehensive overview of current trends, methodologies, and challenges in applying machine learning for cyber threat detection in IoT environments. Specifically, we further perform a comparative analysis of state-of-the-art ML-based Intrusion Detection Systems (IDSs) in the landscape of IoT security. In addition, we shed light on the pressing unresolved issues and challenges within this dynamic field. We provide a future vision with Generative AI and large language models to enhance IoT security. The discussions present an in-depth understanding of different cyber threat detection methods, enhancing the knowledge base of researchers and practitioners alike. This paper is a valuable resource for those keen to delve into the evolving world of cyber threat detection leveraging ML and IoT security.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 167-185"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345223000585/pdfft?md5=d4450c6f6b2d36d74f0de919ecba7bd9&pid=1-s2.0-S2667345223000585-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139393793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信