2016 IEEE 24th International Conference on Network Protocols (ICNP)最新文献

筛选
英文 中文
Considerations for re-designing the cellular infrastructure exploiting software-based networks 利用基于软件的网络重新设计蜂窝基础设施的考虑
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784474
Ali Mohammadkhan, K. Ramakrishnan, A. S. Rajan, C. Maciocco
{"title":"Considerations for re-designing the cellular infrastructure exploiting software-based networks","authors":"Ali Mohammadkhan, K. Ramakrishnan, A. S. Rajan, C. Maciocco","doi":"10.1109/ICNP.2016.7784474","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784474","url":null,"abstract":"As demand for wireless mobile connectivity continues to explode, cellular network infrastructure capacity requirements continue to grow. While 5G tries to address capacity requirements at the radio layer, the load on the cellular core network infrastructure (called Enhanced Packet Core (EPC)) stresses the network infrastructure. Our work examines the architecture, protocols of current cellular infrastructures and the workload on the EPC. We study the challenges in dimensioning capacity and review the design alternatives to support the significant scale up desired, even for the near future. We breakdown the workload on the network infrastructure into its components-signaling event transactions; database or lookup transactions and packet processing. We quantitatively show the control plane and data plane load on the various components of the EPC and estimate how future 5G cellular network workloads will scale. This analysis helps us to understand the scalability challenges for future 5G EPC network components. Other efforts to scale the 5G cellular network take a system view where the control plane is separated from the data path and is terminated on a centralized SDN controller. The SDN controller configures the data path on a widely distributed switching infrastructure. Our analysis of the workload informs us on the feasibility of various design alternatives and motivates our efforts to develop our clean-slate approach, called CleanG.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SliM: Enabling efficient, seamless NFV state migration SliM:实现高效、无缝的NFV状态迁移
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784459
Leonhard Nobach, Ivica Rimac, V. Hilt, D. Hausheer
{"title":"SliM: Enabling efficient, seamless NFV state migration","authors":"Leonhard Nobach, Ivica Rimac, V. Hilt, D. Hausheer","doi":"10.1109/ICNP.2016.7784459","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784459","url":null,"abstract":"Instance migration and scale-in/out operations in network functions virtualization (NFV) require state transfer mechanisms, which are known to cause service degradation through increased jitter and packet loss. Techniques such as packet duplication for state synchronization mitigate this problem, however, they incur significant additional costs. In this paper, we provide a novel interface to the VNF to announce “statelets” for incoming packets, which comprise only the information in the packet which is required for a VNF's internal state change. Based on this interface, we design and implement SliM, a statelet-based framework for seamless VNF migration. First evaluation results show that SliM operates seamlessly at very high dataplane utilization of physical links, up to 3 times the utilization level at which existing approaches are failing due to insufficient bandwidth for state synchronization.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134554776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
GUIDE: Graphical user interface fingerprints physical devices 指南:图形用户界面指纹物理设备
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784468
Qiang Li, Xuan Feng, Zhi Li, Haining Wang, Limin Sun
{"title":"GUIDE: Graphical user interface fingerprints physical devices","authors":"Qiang Li, Xuan Feng, Zhi Li, Haining Wang, Limin Sun","doi":"10.1109/ICNP.2016.7784468","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784468","url":null,"abstract":"Nowadays, the number of visible physical devices exposed on the Internet is dynamically increasing and they play a crucial role for bridging between the cyber space and the physical world, such as network printer, Webcam, and industrial control devices. Discovering these devices brings about the deep understanding on these devices' characteristics and help secure device security in the cyber space. A device fingerprint is a prerequisite of device discovery in the Internet. However, today's online device search depends on keywords of packet head fields and the keyword collection is done manually. This impedes an accurate and large-scale device discovery, due to high human efforts and inevitable human errors, as well as the difficulty of keeping keywords complete and updated. To address this problem, we propose GUIDE, a framework to automatically generate device fingerprints based on webpages embedded in these devices. In order to demonstrate how GUIDE works, we also develop its prototype system and provide a case study which discover surveillance devices in the cyber space.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Communication based on per-packet One-Time Addresses 基于单包一次性地址的通信
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784450
Taeho Lee, C. Pappas, Pawel Szalachowski, A. Perrig
{"title":"Communication based on per-packet One-Time Addresses","authors":"Taeho Lee, C. Pappas, Pawel Szalachowski, A. Perrig","doi":"10.1109/ICNP.2016.7784450","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784450","url":null,"abstract":"The act of communication on the Internet inevitably leaks information. In particular, network headers reveal information (e.g., source address, flow information); yet, protecting the header has proven challenging. Past research successfully protected certain fields of the headers (e.g., source address), but no proposal has attempted to eliminate flow information from the header so that packets cannot be linked to flows; flow information is systematically used to subvert privacy. Hence, we investigate the following questions: Can we design an architecture that eliminates flow-packet linkability? Can we do so without imposing impractical requirements on the network infrastructure? Our proposed architecture is based on per-packet One Time Address (OTA)-an address that a host uses to send or receive exactly one packet. Furthermore, the architecture eliminates any implicit (e.g., the standard five-tuple in TCP/UDP packets) or explicit (e.g., flow identifier) flow information from packet headers. Yet, the architecture allows the communicating hosts to demultiplex seemingly unrelated packets to flows. We have implemented the proposed architecture, and our evaluation shows that it can satisfy today's packet forwarding requirements.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Stream: Decentralized opportunistic inter-coflow scheduling for datacenter networks 流:用于数据中心网络的分散式机会互流调度
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784423
Hengky Susanto, Hao Jin, Kai Chen
{"title":"Stream: Decentralized opportunistic inter-coflow scheduling for datacenter networks","authors":"Hengky Susanto, Hao Jin, Kai Chen","doi":"10.1109/ICNP.2016.7784423","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784423","url":null,"abstract":"Coflow scheduling can improve application-level communication performance for data-parallel clusters. However, most prior coflow scheduling schemes are based on the centralized approach, which achieve good performance but suffers from high control overhead and scalability issue. On the other hand, state of the art decentralized solution requires switch modification, which makes it hard to implement. In this paper, we present Stream, the decentralized and readilyimplementable solution for coflow scheduling. The key idea of Stream is to opportunistically take advantage of many-to-one and many-to-many coflow patterns to coordinate coflows without resorting to the centralized controller, and then emulate shortest coflow first scheduling to minimize the average coflow completion time (CCT). We implement Stream with existing commodity switches and show its performance using both testbed experiments and large-scale simulations. Our evaluation results show that Stream's performance is comparable to the centralized solution, and outperforms the state of the art decentralized scheme by 1.77x on average.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
LocP: An efficient Localized Polling Protocol for large-scale RFID systems LocP:大规模RFID系统的高效本地化轮询协议
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784409
Binbin Li, Yuan He, Wenyuan Liu, L. Wang, Hongyan Wang
{"title":"LocP: An efficient Localized Polling Protocol for large-scale RFID systems","authors":"Binbin Li, Yuan He, Wenyuan Liu, L. Wang, Hongyan Wang","doi":"10.1109/ICNP.2016.7784409","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784409","url":null,"abstract":"RFID systems nowadays are operated at large-scale in terms of both occupied space and tag quantity. One may have prior knowledge of the complete set of tags (denoted by N) and any set of wanted tags (denoted by M) within the complete set, i.e., M ⊆ N. Then here comes an open problem: when one is particularly interested in a subarea of the system, how to collect information (not simply tagIDs) from a wanted subset (denoted by dM) of the interrogated tags (denoted by dN) in that subarea? This issue has great significance in many practical applications but appears to be challenging when there is a stringent time constraint. In this work, we first establish the lower-bound of this problem, and show a straightforward polling solution. Then, we propose a novel polling protocol called LocP, which consists of two phases: the Tags-Filtering phase and the Ordering-and-Reporting phase. LocP employs Bloom Filter twice to significantly reduce the scale of candidate tags in the Tags-Filtering phase. In the Ordering-and-Reporting phase, tags determine their own transmission time-slots according to the allocation vectors iteratively broadcasted by the reader. LocP thus achieves a delicate tradeoff between time and polling accuracy. We conduct extensive simulations to evaluate the performance of LocP. The results demonstrate that LocP is highly efficient in terms of information collection time, leading to convincing applicability and scalability of large-scale RFID systems.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124638949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CTCV: A protocol for Coordinated Transport of Correlated Video in Smart Camera Networks CTCV:智能摄像机网络中相关视频的协调传输协议
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784428
Vinay Kolar, I. Haque, Vikram P. Munishwar, N. Abu-Ghazaleh
{"title":"CTCV: A protocol for Coordinated Transport of Correlated Video in Smart Camera Networks","authors":"Vinay Kolar, I. Haque, Vikram P. Munishwar, N. Abu-Ghazaleh","doi":"10.1109/ICNP.2016.7784428","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784428","url":null,"abstract":"Smart camera networks (SCNs) are increasingly used in applications such as homeland security, border control and traffic monitoring. The cameras are often wireless with an organically growing structure, to reduce the overhead of deployment. We frame a new and important problem in SCNs: how to transmit videos from multiple cameras with overlapping coverage given the limited available wireless bandwidth to maximize the quality of the received videos. We call this problem Coordinated Transport of Correlated Videos (CTCV). CTCV is a more general version of 3D video transport: in that problem, highly correlated videos from two cameras (that provide the 3D perspective) are jointly encoded exploiting their pre-defined and known overlap. In contrast, in CTCV there is an arbitrary number of cameras whose overlap is not known apriori and that require transmission as multiple video streams. To effectively support CTCV, we propose a video delivery protocol that consists of two primary components: (1) Consolidation of correlated videos from multiple cameras which removes spatially redundant fields-of-view; and (2) Network and coverage aware bandwidth allocation to optimize coverage quality cooperatively among the different video streams to match the available bandwidth. We formulate the problem of optimal bandwidth allocation for maximizing coverage. We propose and investigate different heuristic policies for bandwidth allocation. We evaluate CTCV using data from a small camera testbed as well as topologies from realistic deployments. Experiments show that CTCV achieves around 10 dB gains in video quality in the scenarios we consider.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131159452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Harmony: Exploiting coarse-grained received signal strength from IoT devices for human activity recognition 和谐:利用来自物联网设备的粗粒度接收信号强度进行人类活动识别
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784414
Zicheng Chi, Yao Yao, Tiantian Xie, Zhichuan Huang, Michael Hammond, Ting Zhu
{"title":"Harmony: Exploiting coarse-grained received signal strength from IoT devices for human activity recognition","authors":"Zicheng Chi, Yao Yao, Tiantian Xie, Zhichuan Huang, Michael Hammond, Ting Zhu","doi":"10.1109/ICNP.2016.7784414","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784414","url":null,"abstract":"The emerging smart health and smart home applications require pervasive and non-intrusive human activity recognition and monitoring. Traditional technologies (e.g., using cameras or accelerometers and gyroscopes) may introduce privacy issues or require people to wear sensors. To address these issues, recent approaches exploit fine-grained wireless signals for activity recognition. However, these approaches require devices that are costly or need to provide unique wireless features (e.g., Doppler shifts or phase information). With the increasingly available Internet of Things (IoT) devices, in this paper, we propose Harmony, a human activity recognition and monitoring middleware which can utilize the coarse-grained (but pervasively available) received signal strength (RSS) measurements from the radios of IoT devices. We implement a complete evaluation platform (from data collection to data analysis) of the middleware on top of low cost ZigBee compliant MICAz nodes and a laptop. We also conducted extensive experiments. Our results show that our design can achieve similar accuracy as fine-grained WiFi channel state information (CSI) measurement-based approaches. Specifically, our overall human activities recognition accuracy is up to 74% and 90% for RSS readings from a single pair and 3 pairs of IoT devices, respectively.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131776079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Characterizing industrial control system devices on the Internet 因特网上工业控制系统设备的特性
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784407
Xuan Feng, Qiang Li, Haining Wang, Limin Sun
{"title":"Characterizing industrial control system devices on the Internet","authors":"Xuan Feng, Qiang Li, Haining Wang, Limin Sun","doi":"10.1109/ICNP.2016.7784407","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784407","url":null,"abstract":"Industrial control system (ICS) devices with IP addresses are accessible on the Internet and play a crucial role for critical infrastructures like power grid. However, there is a lack of deep understanding of these devices' characteristics in the cyberspace. In this paper, we take a first step in this direction by investigating these accessible industrial devices on the Internet. Because of critical nature of industrial control systems, the detection of online ICS devices should be done in a real-time and non-intrusive manner. Thus, we first analyze 17 industrial protocols widely used in industrial control systems, and train a probability model through the learning algorithm to improve detection accuracy. Then, we discover online ICS devices in the IPv4 space while reducing the noise of industrial honeypots. To observe the dynamics of ICS devices in a relatively long run, we have deployed our discovery system on Amazon EC2 and detected online ICS devices in the whole IPv4 space for eight times from August 2015 to March 2016. Based on the ICS device data collection, we conduct a comprehensive data analysis to characterize the usage of ICS devices, especially in the answer to the following three questions: (1) what are the distribution features of ICS devices, (2) who use these ICS devices, and (3) what are the functions of these ICS devices.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"9 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
NeSMA: Enabling network-level state-aware applications in SDN NeSMA:在SDN中启用网络级状态感知应用
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784476
Chen Sun, J. Bi, Hongxin Hu, Zhilong Zheng
{"title":"NeSMA: Enabling network-level state-aware applications in SDN","authors":"Chen Sun, J. Bi, Hongxin Hu, Zhilong Zheng","doi":"10.1109/ICNP.2016.7784476","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784476","url":null,"abstract":"As the de facto data plane technique of Software-Defined Networking (SDN), OpenFlow introduces significant programmability to enable innovative network applications. However, the simple OpenFlow data plane only maintains flow-level counters and lacks an efficient mechanism to manage network-level states, which limits its support for advanced state-aware applications. Regularly pulling whole state information from the data plane to the controller might incur untimely response to important network-level states such as CPU exhaustion, switch overload, etc and cause unnecessary traffic. To address above challenges, we introduce a novel Network-level State Management Architecture (NeSMA) to efficiently support advanced network-level state-aware applications by exploiting the opportunity of SDN central control. The data plane could be configured to check state regularly and report to the controller when triggered by state transitions. We design both sequential and parallel composition methods to deal with complex network-level states in NeSMA. To demonstrate the feasibility of our approach, we implement a software prototype of NeSMA, based on which we develop a data-center flow scheduling application. Experimental results show that NeSMA can process network-level states with low network resource consumption and high scalability without compromising packet forwarding efficiency.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"7 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114025248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信