2022 IEEE International Symposium on Technologies for Homeland Security (HST)最新文献

筛选
英文 中文
Low-cost multichannel radio direction finding system based on software-defined radio 基于软件无线电的低成本多通道无线电测向系统
2022 IEEE International Symposium on Technologies for Homeland Security (HST) Pub Date : 2022-11-14 DOI: 10.1109/HST56032.2022.10025440
A. Sedunov, N. Sedunov, H. Salloum, A. Sutin
{"title":"Low-cost multichannel radio direction finding system based on software-defined radio","authors":"A. Sedunov, N. Sedunov, H. Salloum, A. Sutin","doi":"10.1109/HST56032.2022.10025440","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025440","url":null,"abstract":"A radio direction finding (RDF) system to find line-of-bearing (LOB) towards communication used by nefarious actors may be a useful tool for illegal boat activity detection. Crews of boats involved in illegal activities, such as smuggling, may communicate with their accomplices on other boats or land using various RF communication systems with different frequencies. The Citizen Band (CB) radios have less of a chance to be intercepted by Electronic Intelligence (ELINT) and direction finding used by the USCG than VHF, UHF two-way radios. Also, 27 MHz GPS buoys are used by smugglers to tag packages left afloat in open water to be picked up by an accomplice. To detect such activity RDF system should be able to detect transmissions that are: distant, few, and short and occurring on any channel. The system should support installation on a vehicle or a boat for mobility. Stevens Institute of Technology has developed and tested a low-cost RDF system, that is capable of simultaneous direction-finding towards distant transmissions with simultaneous detection on multiple channels based on software-defined radio (SDR) and pseudo-doppler (PD) principles of direction-finding. Software with a user-friendly interface has been developed to process, display results, and integrate with mapping systems in real-time. The same approach can be used for RDF working in the other frequency bands.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115020127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human-Supervised Automation Test Cell to Accelerate Personal Protective Equipment Manufacturing During the COVID-19 Pandemic 在COVID-19大流行期间加速个人防护装备制造的人工监督自动化测试单元
2022 IEEE International Symposium on Technologies for Homeland Security (HST) Pub Date : 2022-11-14 DOI: 10.1109/HST56032.2022.10025429
Michael Shaham, Matthew Skopin, Hillel Hochsztein, Katiso Mabulu, Lee Milburn, James Tukpah, A. Tunik, James Winn, Mark Zolotas, D. Erdoğmuş, T. Padır
{"title":"Human-Supervised Automation Test Cell to Accelerate Personal Protective Equipment Manufacturing During the COVID-19 Pandemic","authors":"Michael Shaham, Matthew Skopin, Hillel Hochsztein, Katiso Mabulu, Lee Milburn, James Tukpah, A. Tunik, James Winn, Mark Zolotas, D. Erdoğmuş, T. Padır","doi":"10.1109/HST56032.2022.10025429","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025429","url":null,"abstract":"The shortage of medical-grade personal protective equipment for frontline healthcare workers is an important issue during the ongoing COVID-19 pandemic. The demand placed on textile manufacturers to rapidly produce products that adhere to a set of standard quality assurance requirements has increased dramatically, leading to increased burden on quality assurance floors and national testing labs. Standardized testing of protective equipment is a labor-intensive and time-consuming process that requires human operators to perform tasks that can be automated using various technologies, such as collaborative robots and computer vision systems. The tests we focus on involve evaluating surgical masks and protective materials for blood penetration resistance, flammability, and liquid barrier performance. This work introduces a test cell designed to accommodate human operators in completing various quality assurance tests for protective equipment. The test cell is comprised of custom-designed cases containing test specimens to facilitate robot manipulation and cameras to monitor and characterize the test results. We demonstrate how the system can reduce the workload and reliance on human operators at no expense to the quality assurance process. Based on validation test results and user experience, it is predicted that the human operator will only have to prepare cases with test specimens and handle infrequent failures that occur within the system, without compromising overall completion time. We envision that this system will relieve the strain on textile manufacturing processes requiring human labor to repeatedly perform simple tasks.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128949357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience of Urban Rail Transit Networks under Compound Natural and Opportunistic Failures 自然和机会性复合失效下城市轨道交通网络的恢复力
2022 IEEE International Symposium on Technologies for Homeland Security (HST) Pub Date : 2022-11-14 DOI: 10.1109/HST56032.2022.10025456
J. Watson, Samrat Chatterjee, A. Ganguly
{"title":"Resilience of Urban Rail Transit Networks under Compound Natural and Opportunistic Failures","authors":"J. Watson, Samrat Chatterjee, A. Ganguly","doi":"10.1109/HST56032.2022.10025456","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025456","url":null,"abstract":"Critical infrastructure systems are increasingly at risk of failure due to extreme weather, exacerbated by climate change, and cyber-physical attack, due to reliance on digital information technology. When assessing the state of current infrastructure systems, and when planning new infrastructures, considerations of operational efficiency and resource constraints must be balanced with resilience. A resilient infrastructure design paradigm must account for low-probability, high-impact “grey swan” hazards, and resilience must be structurally embedded by design. This work extends the state-of-the-art in quantification of infrastructure resilience with compound natural-human hazard scenarios and focuses on urban rail transit networks as a proof-of-concept infrastructure system. With new and existing rail projects receiving funding opportunities, an imperative emerges to develop methodological frameworks which can address uncertainty and build resilience into design decisions in addition to operational efficiency. The contributions of this paper are threefold: (1) developing an analytical modeling framework for the simulation of compound failure and recovery in spatially-constrained rail transit networks leveraging system-level awareness; (2) characterizing the dynamics of an urban rail transit network by constructing resilience curves using the largest connected component of the network as a proxy measure for system functionality; and (3) leveraging network science and engineering principles to generate decision-support insights under uncertainty.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123051417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Juvenile Morph Dataset: A Study of Attack Detectability and Recognition Vulnerability 未成年变形数据集:攻击可检测性与识别漏洞研究
2022 IEEE International Symposium on Technologies for Homeland Security (HST) Pub Date : 2022-11-14 DOI: 10.1109/HST56032.2022.10025448
Kelsey O'Haire, Sobhan Soleymani, Samuel Price, N. Nasrabadi
{"title":"Juvenile Morph Dataset: A Study of Attack Detectability and Recognition Vulnerability","authors":"Kelsey O'Haire, Sobhan Soleymani, Samuel Price, N. Nasrabadi","doi":"10.1109/HST56032.2022.10025448","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025448","url":null,"abstract":"A morph is an image of an ambiguous subject generated by combining multiple individuals. The morphed image can be submitted to a facial recognition system and erroneously verified with the contributing bad actors. When submitted as a passport image, a morphed face poses a national security threat because a passport can then be shared between the individuals. As morphed images become easier to generate, it is vital that the research community expands available datasets in order to contentiously improve current technology. Children are a challenging paradigm for facial recognition systems and morphing children takes advantage of this disparity. In this paper, we morph juvenile faces in order to create a unique, high-quality dataset to challenge FRS. To the best of our knowledge, this is the first study on the generation and evaluation of juvenile morphed faces. The evaluation of the generated morphed juvenile dataset is performed in terms of vulnerability analysis and presentation attack error rates.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116048758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Cybersecurity Budgets with AttackSimulation 利用攻击仿真优化网络安全预算
2022 IEEE International Symposium on Technologies for Homeland Security (HST) Pub Date : 2022-11-14 DOI: 10.1109/HST56032.2022.10024984
Alexander Master, George Hamilton, J. E. Dietz
{"title":"Optimizing Cybersecurity Budgets with AttackSimulation","authors":"Alexander Master, George Hamilton, J. E. Dietz","doi":"10.1109/HST56032.2022.10024984","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10024984","url":null,"abstract":"Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that their model is an effective quantitative means of measuring the probability of success of a threat actor and implements two primary changes to increase the model's accuracy. First, the authors modified the model's inputs, allowing users to select threat actors based on the organization's specific threat model. Threat actor effectiveness is evaluated based on publicly available breach data (in addition to security control efficacy), resulting in further refined attack success probabilities. Second, all three elements - threat effectiveness, control efficacy, and model variance - are computed and evaluated at each node to increase the estimation fidelity in place of pooled variance calculations. Visualization graphs, multiple simulation runs (up to 1 million), attack path customization, and code efficiency changes are also implemented. The result is a simulation tool that provides valuable insight to decision-makers and practitioners about where to most efficiently invest resources in their computing environment to increase cybersecurity posture. AttackSimulation and its source code are freely available on GitHub.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116848183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reinforcement Learning for Collaborative Search and Rescue Using Unmanned Aircraft System Swarms 基于无人机系统群的协同搜救强化学习
2022 IEEE International Symposium on Technologies for Homeland Security (HST) Pub Date : 2022-11-14 DOI: 10.1109/HST56032.2022.10025435
Ross D. Arnold, M. Osinski, Christopher Reddy, Austin Lowey
{"title":"Reinforcement Learning for Collaborative Search and Rescue Using Unmanned Aircraft System Swarms","authors":"Ross D. Arnold, M. Osinski, Christopher Reddy, Austin Lowey","doi":"10.1109/HST56032.2022.10025435","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025435","url":null,"abstract":"This work presents a novel approach to search and rescue, and other wide-area search problems, by combining the effectiveness of deep reinforcement learning (DRL) with the power of Subsumption architecture in a collaborative multi-agent system. We present a multi-agent parameter-sharing deep reinforcement learning paradigm with an action space consisting of the activation of an array of premade “roles.” Each role is a collection of individual behaviors organized in a Subsumption-inspired hierarchy. We describe a low-cost implementation of our approach and its results using a basic DRL algorithm, DQN, and a simple reward signal. Using only a small amount of training time and power with our minimal implementation, we were able to see improvement in swarm performance over baseline statistical methods. These results indicate that our technique can be extended to achieve even greater performance results over a wide variety of problem sets. Additionally, this technique can be extended to many problems within the swarm and collaborative multi-agent system space.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131548700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Urban Resilience Capabilities: Applying Capability Analysis to Improve Local Policy Planning 城市弹性能力:运用能力分析改进地方政策规划
2022 IEEE International Symposium on Technologies for Homeland Security (HST) Pub Date : 2022-11-14 DOI: 10.1109/HST56032.2022.10025451
S. Dobie, David Luckey, T. Deen
{"title":"Urban Resilience Capabilities: Applying Capability Analysis to Improve Local Policy Planning","authors":"S. Dobie, David Luckey, T. Deen","doi":"10.1109/HST56032.2022.10025451","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025451","url":null,"abstract":"Urban resilience has become the new norm for cities as they cope with, among other things, extreme weather and climate disasters. Cities throughout the United States have begun to develop plans to prepare for these emerging risks. Despite cities' planning efforts, implementation of changes and evaluation of the effects of those changes on urban resilience remains a challenge. This is in part due to the lack of understanding of what it means to operationalize resilience. In many ways, resilience remains a “fuzzy concept” that is subject to interpretation and being “coopted” by local planners and policymakers. In this paper, we explore the feasibility of applying a homeland security capability analysis methodology to the field of urban resilience, using the City of Los Angeles as an example to demonstrate its application. We suggest employing this methodology might lead to an improved understanding of cities' abilities to operationalize resilience. This should, in turn, provide improved processes and guidance for how cities approach implementing and evaluating these plans and policies. Our exploratory research focuses specifically on extreme weather and climate disaster risk, although it could hold value for managing other types of risk.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133010874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Most Common Control Deficiencies in CMMC non-compliant DoD contractors 不符合CMMC要求的国防部承包商中最常见的控制缺陷
2022 IEEE International Symposium on Technologies for Homeland Security (HST) Pub Date : 2022-11-14 DOI: 10.1109/HST56032.2022.10025445
Vijay Sundararajan, Arman Ghodousi, J. E. Dietz
{"title":"The Most Common Control Deficiencies in CMMC non-compliant DoD contractors","authors":"Vijay Sundararajan, Arman Ghodousi, J. E. Dietz","doi":"10.1109/HST56032.2022.10025445","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025445","url":null,"abstract":"As cyber threats become highly damaging and complex, a new cybersecurity compliance certification model has been developed by the Department of Defense (DoD) to secure its Defense Industrial Base (DIB), and communication with its private partners. These partners or contractors are obligated by the Defense Federal Acquisition Regulations (DFARS) to be compliant with the latest standards in computer and data security. The Cybersecurity Maturity Model Certification (CMMC), and it is built upon existing DFARS 252.204-7012 and the NIST SP 800–171 controls. As of 2020, the DoD has incorporated DFARS and the National Institute of Standards and Technology (NIST) recommended security practices into what is now the CMMC. This paper presents the most commonly identified Security-Control-Deficiencies (SCD) faced, the attacks mitigated by addressing these SCD, and remediations applied to 127 DoD contractors in order to bring them into compliance with the CMMC guidelines. An analysis is done on what vulnerabilities are most prominent in the companies, and remediations applied to ensure these vulnerabilities are better avoided and the DoD supply-chain is more secure from attacks.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130638559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Size and Cost Acoustic Buoy for Autonomous Vessel Detection 用于自主船舶探测的低尺寸、低成本声学浮标
2022 IEEE International Symposium on Technologies for Homeland Security (HST) Pub Date : 2022-11-14 DOI: 10.1109/HST56032.2022.10025447
A. Sedunov, Christopher Francis, H. Salloum, A. Sutin, N. Sedunov
{"title":"Low-Size and Cost Acoustic Buoy for Autonomous Vessel Detection","authors":"A. Sedunov, Christopher Francis, H. Salloum, A. Sutin, N. Sedunov","doi":"10.1109/HST56032.2022.10025447","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025447","url":null,"abstract":"Achieving maritime domain awareness through the deployment of many low-cost, low-power sensors to monitor large ocean areas has become an international trend [1], [2], an approach known as “Ocean of Things” (OoT). The STAR Center at Stevens Institute of Technology is currently developing a sensor contained in a small, rapidly deployable “smart” buoy for automated detection of vessels by their underwater acoustic signatures. Designed with commercial off-the-shelf (COTS) components and materials, multiple such buoys can work together to form a large, distributed sensor network, periodically communicating data to a command center for analysis. Marine-traffic monitoring is of particular interest in areas where small-boat traffic is a security concern, but many existing systems for detecting such vessels can be difficult to deploy. The buoy is based on in-house manufactured hydrophones. Processing is performed on an ARM Cortex-M7 microcontroller. Methods were developed based on numerous past data collections by the Stevens Institute of Technology.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130906317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Is Facial Recognition Biased at Near-Infrared Spectrum as Well? 人脸识别在近红外光谱上也有偏差吗?
2022 IEEE International Symposium on Technologies for Homeland Security (HST) Pub Date : 2022-10-31 DOI: 10.1109/HST56032.2022.10025433
Anoop Krishnan, B. Neas, A. Rattani
{"title":"Is Facial Recognition Biased at Near-Infrared Spectrum as Well?","authors":"Anoop Krishnan, B. Neas, A. Rattani","doi":"10.1109/HST56032.2022.10025433","DOIUrl":"https://doi.org/10.1109/HST56032.2022.10025433","url":null,"abstract":"Published academic research and media articles suggest face recognition is biased across demographics. Specifically, unequal performance is obtained for women, dark-skinned people, and older adults. However, these published studies have examined the bias of facial recognition in the visible spectrum (VIS). Factors such as facial makeup, facial hair, skin color, and illumination variation have been attributed to the bias of this technology at VIS. The near-infrared (NIR) spectrum offers an advantage over VIS in terms of robustness to factors such as illumination changes, facial make-up, and skin color. Therefore, it is worth-while to investigate the bias of the facial recognition at near-infrared spectrum (NIR). This first study investigates the bias of face recognition system at NIR spectrum. To this aim, two popular NIR facial image datasets namely, CASIA-Face-Africa and NotreDame-NIVL consisting of African and Caucasian subjects, respectively, are used to investigate the bias of facial recognition technology across gender and race. Interestingly, experimental results suggest equitable performance of the face recognition across gender and race at NIR spectrum.","PeriodicalId":162426,"journal":{"name":"2022 IEEE International Symposium on Technologies for Homeland Security (HST)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信