Secur. Commun. Networks最新文献

筛选
英文 中文
GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection GCN-ETA:高效加密恶意流量检测
Secur. Commun. Networks Pub Date : 2022-01-22 DOI: 10.1155/2022/4274139
Juan Zheng, Zhiyong Zeng, Tao Feng
{"title":"GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection","authors":"Juan Zheng, Zhiyong Zeng, Tao Feng","doi":"10.1155/2022/4274139","DOIUrl":"https://doi.org/10.1155/2022/4274139","url":null,"abstract":"Encrypted network traffic is the principal foundation of secure network communication, and it can help ensure the privacy and integrity of confidential information. However, it hides the characteristics of the data, increases the difficulty of detecting malicious traffic, and protects such malicious behavior. Therefore, encryption alone cannot fundamentally guarantee information security. It is also necessary to monitor traffic to detect malicious actions. At present, the more commonly used traffic classification methods are the method based on statistical features and the method based on graphs. However, these two methods are not always reliable when they are applied to the problem of encrypted malicious traffic detection due to their limitations. The former only focuses on the internal information of the network flow itself and ignores the external connections between the network flows. The latter is just the opposite. This paper proposes an encrypted malicious traffic detection method based on a graph convolutional network (GCN) called GCN-ETA, which considers the statistical features (internal information) of network flows and the structural information (external connections) between them. GCN-ETA consists of two parts: a feature extractor that uses an improved GCN and a classifier that uses a decision tree. Improving on the traditional GCN, the effect and speed of encrypted malicious traffic detection can be effectively improved and the deployment of the detection model in the real environment is increased, which provides a reference for the application of GCN in similar scenarios. This method has achieved excellent performance in experiments using real-world encrypted network traffic data for malicious traffic detection, with the accuracy, AUC, and F1-score exceeding 98% and more than 1,300 flows detected per second.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Impact of Self-Efficacy and Perceived Value on Customer Engagement under Live Streaming Commerce Environment 流媒体商务环境下自我效能感和感知价值对客户参与的影响
Secur. Commun. Networks Pub Date : 2022-01-22 DOI: 10.1155/2022/2904447
Jihua Cao, Jie Li, Yunfeng Wang, Mengqi Ai
{"title":"The Impact of Self-Efficacy and Perceived Value on Customer Engagement under Live Streaming Commerce Environment","authors":"Jihua Cao, Jie Li, Yunfeng Wang, Mengqi Ai","doi":"10.1155/2022/2904447","DOIUrl":"https://doi.org/10.1155/2022/2904447","url":null,"abstract":"Live streaming commerce, which has led to the emergence of new forms of social commerce called live streaming, has already improved the performance of many social commerce streamers. Live streaming commerce is an emerging business model that has blended the functions of e-commerce and live webcasting. The total sales volume will increase when the streamers and the customers communicate in the real-time interaction platform. In live streaming commerce, customer engagement behavior has been beneficial for realizing the value of live streaming commerce, which scholars have studied and valued. However, internal and external factors often affect customer engagement behavior, and most of the existing research focuses on only one aspect. This article will analyze internal and external influencing factors (internal influencing factors are based on self-efficacy theory, and external influencing factors are based on value-based adoption models) and their interactions to get a broad conclusion. To understand customer engagement behavior in the live streaming commerce with comprehensive research, the article constructs a customer engagement model in the live streaming commerce environment and uses structural equations for empirical testing. In applying self-efficacy theory, it is committed to distinguishing the functional logic between general self-efficacy and special self-efficacy and understanding the mechanism of special self-efficacy, namely, the influence mechanism of live streaming self-efficacy on perceived value and customer engagement in specific situations. The research results show that general self-efficacy positively influences perceived usefulness, perceived entertainment, and live streaming commerce self-efficacy, while perceived usefulness, perceived entertainment, and live streaming commerce self-efficacy positively affect perceived value, live streaming commerce self-efficacy, and self-efficacy. Perceived value has a positive and significant impact on customer engagement behavior. This research explains the influencing factors and mechanism of customer engagement in the live streaming commerce environment from the internal and external perspectives, enriches the theoretical research on customer engagement, and provides practical guidance for customer engagement behavior in the live streaming commerce environment.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125494804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud 外包云中基于位置服务的隐私保护查询方案(PPQS
Secur. Commun. Networks Pub Date : 2022-01-21 DOI: 10.1155/2022/9360899
Guangcan Yang, Yunhua He, Ke Xiao, Qifeng Tang, Yang Xin, Hongliang Zhu
{"title":"Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud","authors":"Guangcan Yang, Yunhua He, Ke Xiao, Qifeng Tang, Yang Xin, Hongliang Zhu","doi":"10.1155/2022/9360899","DOIUrl":"https://doi.org/10.1155/2022/9360899","url":null,"abstract":"Pervasive smartphones boost the prosperity of location-based service (LBS) and the increasing data prompt LBS providers to outsource their LBS datasets to the cloud side. The privacy issues of LBS in the outsourced cloud scenario have attracted considerable interest recently. However, current schemes cannot provide sufficient privacy preservation against practical challenges and are little concerned about the data retrieval efficiency of the cloud side. Therefore, we present an efficient Privacy-Preserving LBS Query Scheme (i.e., \u0000 \u0000 PPQS\u0000 \u0000 ). In our scheme, two cloud entities are employed to store the sensitive information of the outsourced data and provide the query service, which enhances the ability of privacy preservation for sensitive information. Besides, by using the techniques of homomorphic encryption and searchable symmetric encryption, the proposed scheme supports both the type query and the range query, which can significantly improve the data retrieval efficiency of the cloud side and reduce the computation burden on the cloud side and the user side. Through detailed analysis on security and computation cost, we show the enhanced ability of privacy preservation and the lower computation cost compared to previous schemes. Based on a real dataset, extensive simulations are performed to validate the effectiveness and performance of our scheme.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115938418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN 基于多级数据排列的车载CAN入侵检测系统
Secur. Commun. Networks Pub Date : 2022-01-20 DOI: 10.1155/2022/4322148
Wansoo Kim, Jungho Lee, Yousik Lee, Yeonjin Kim, Jin-Gyun Chung, Samuel Woo
{"title":"Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN","authors":"Wansoo Kim, Jungho Lee, Yousik Lee, Yeonjin Kim, Jin-Gyun Chung, Samuel Woo","doi":"10.1155/2022/4322148","DOIUrl":"https://doi.org/10.1155/2022/4322148","url":null,"abstract":"Modern vehicles are equipped with various types of electrical/electronic (E/E) systems. Electronic control units (ECUs) are used to control various E/E systems in the vehicle. For efficient information exchange between ECUs, most vehicle manufacturers use the Controller Area Network (CAN) protocol. However, CAN has security vulnerabilities because it does not have an authentication or encryption method. Since attacks on in-vehicle networks affect the safety of drivers, it is essential to develop a technology to prevent attacks. The intrusion detection system (IDS) is one of the best ways to enhance network security. Unlike the traditional IDS for network security, IDS for the in-vehicle network requires a lightweight algorithm because of the limitation of the computing power of in-vehicle ECUs. In this paper, we propose a lightweight IDS algorithm for in-vehicle CAN based on the degree of change between successive data frames. In particular, the proposed method minimizes the load on the ECU by using the CAN data frame compression algorithm based on exclusive-OR operations as a tool for calculating the degree of change.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124715467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Construction of Ideological and Political Education in Colleges and Universities Based on the Carrier of Smartphone 基于智能手机载体的高校思想政治教育建设
Secur. Commun. Networks Pub Date : 2022-01-20 DOI: 10.1155/2022/7214844
Tingma Tao, Xinyu Lv
{"title":"Construction of Ideological and Political Education in Colleges and Universities Based on the Carrier of Smartphone","authors":"Tingma Tao, Xinyu Lv","doi":"10.1155/2022/7214844","DOIUrl":"https://doi.org/10.1155/2022/7214844","url":null,"abstract":"At present, mobile phone (MP) and the Internet have become indispensable items in people’s daily lives. While smartphones (SPs) bring convenience to people, they also provide opportunities and challenges for ideological and political education (IPE) in colleges and universities (CU). CU are the main development positions of China’s socialist higher education. Therefore, it is particularly necessary to strengthen the ideological and moral training and guidance of college students (CS). However, the current complex and changeable social environment and the frequent occurrence of unstable factors have exposed various shortcomings in the traditional way of ideological and political work, putting political educators under tremendous pressure. Therefore, ideological and political educators in CU must conform to the development trend of the Internet in the new era and meet social needs and use advanced scientific and technological means to carry out ideological and political work. This article uses the questionnaire and data analysis methods to better understand the specific situation of CS using smartphones through the questionnaire, so as to explore new educational methods and methods for the construction of IPE in CU. According to the survey results, most respondents use smartphones more often and less use traditional information media. But at the same time, although newspapers and televisions are far behind computers, the Internet, and SP, they still have a certain value in obtaining information. Among contemporary CS, the tools used in the learning process are becoming more and more abundant. Among them, SPs often act as learning tools in students’ lives, followed by personal computers, and other methods also play an important role.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Early Detection of Cognitive Decline Using Machine Learning Algorithm and Cognitive Ability Test 基于机器学习算法和认知能力测试的认知衰退早期检测
Secur. Commun. Networks Pub Date : 2022-01-20 DOI: 10.1155/2022/4190023
A. Revathi, R. Kaladevi, K. Ramana, R. Jhaveri, Madapuri Rudra Kumar, M. Sankara Prasanna Kumar
{"title":"Early Detection of Cognitive Decline Using Machine Learning Algorithm and Cognitive Ability Test","authors":"A. Revathi, R. Kaladevi, K. Ramana, R. Jhaveri, Madapuri Rudra Kumar, M. Sankara Prasanna Kumar","doi":"10.1155/2022/4190023","DOIUrl":"https://doi.org/10.1155/2022/4190023","url":null,"abstract":"Elderly people are the assets of the country and the government can ensure their peaceful and healthier life. Life expectancy of individuals has expanded with technological advancements and survey tells that the elderly population will become double in the year 2030. The noninfectious cognitive dysfunction is the most important risk factor among elderly people due to a decline in their physiological function. Alzheimer, Vascular Dementia, and Dementia are the key reasons for cognitive inabilities. These diseases require manual assistance, which is difficult to provide in this fast-growing world. Prevention and early detection are the wise solution for the above diseases. Diabetes and hypertension are considered as main risk factors allied with Alzheimer's disease. Our proposed work applies a two-stage classification technique to improve prediction accuracy. In the first stage, we train a Support vector machine and a Random Forest algorithm to analyze the influence of diabetes and high blood pressure on cognitive decline. In the second stage, the cognitive function of the person with the possibility of Dementia is assessed using the neuropsychological test called Cognitive Ability Test (CAT). Multinomial Logistic Regression algorithm is applied to CAT results to predict the possibility of cognitive decline in their postlife. We classified the risk factor using the operational definitions: “No Alzheimer’s,” “Uncertain Alzheimer’s,” and “Definite Alzheimer’s”. SVM of stage 1 classifier predicts with an accuracy of 0.86 and Random Forest with an accuracy of 0.71. Multinomial Logistic algorithm of stage 2 classifier accuracy is 0.89. The proposed work enables early prediction of a person at risk of Alzheimer's Disease using clinical data.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130385392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Security Analysis of Shadowsocks(R) Protocol Shadowsocks(R)协议安全性分析
Secur. Commun. Networks Pub Date : 2022-01-19 DOI: 10.1155/2022/4862571
Qingbing Ji, Zhihong Rao, Man Chen, Jie Luo
{"title":"Security Analysis of Shadowsocks(R) Protocol","authors":"Qingbing Ji, Zhihong Rao, Man Chen, Jie Luo","doi":"10.1155/2022/4862571","DOIUrl":"https://doi.org/10.1155/2022/4862571","url":null,"abstract":"Shadowsocks(R) is a proxy software based on Socks5, which is the collective name of shadowsocks and shadowsocksR. Shadowsocks(R) is a private protocol without a handshake negotiation mechanism. Peng broke the confidentiality of shadowsocks by exploiting vulnerability in the shadowsocks protocol and decrypted the shadowsocks packets encrypted with none-AEAD encryption options using a redirection attack. Chen et al. started with the cryptographic algorithm used by shadowsocks(R) and preliminarily discussed the confidentiality of user data under the protection of shadowsocks(R) in theory. Based on Chen’s work, this paper further clarifies the shadowsocks(R) protocol format and studies the encryption mechanism of shadowsocks(R) from the perspective of protocol analysis. The vulnerability of the shadowsocks(R) encryption mechanism is found, and an attack method of shadowsocks(R) is proposed. The attack method is a passive attack and can decrypt the shadowsocks packets encrypted with any encryption option. Compared with Peng’s attack method, the method is more effective and more suitable for actual attacks. Finally, some methods to improve the protocol security of shadowsocks(R) are proposed.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132033950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Application and Teaching of Digital Technology in Printmaking 数字技术在版画制作中的应用与教学
Secur. Commun. Networks Pub Date : 2022-01-19 DOI: 10.1155/2022/3271860
Hao Zhang, Hongyan Zheng
{"title":"The Application and Teaching of Digital Technology in Printmaking","authors":"Hao Zhang, Hongyan Zheng","doi":"10.1155/2022/3271860","DOIUrl":"https://doi.org/10.1155/2022/3271860","url":null,"abstract":"Along with the popularization of digital technology, artists began to use digital technology as a technological means to make more attempts in the creation of print art, thereby breaking through the formal constraints. The diversity of information technology inspires artists’ creative inspiration and makes the development of art move in a more varied and diversified direction. The new vision brought by digital technology, digital printmaking, comprehensive printmaking, and digital technology in the creation of comprehensive printmaking and its positive influence on the future development of printmaking provide favorable conditions for the development of diversified art. This paper takes the application of digital technology in the creation of comprehensive prints as a research point and separately expounds the development and application background of digital computer technology and the development history of traditional prints, thereby extending to the modern combination of these two techniques and then transitioning to today’s synthesis print. Based on the background of modernity and history, this article analyzes the classical language forms and characteristics of traditional printmaking to comprehensive printmaking from the theory and practice. And based on the techniques of software plate-making technology, it has been expanded to a series of specific measures such as materials and mechanisms. The research in this paper shows that artists can use digital prints to create high-impact works of art with higher quality and more artistic content.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122766919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Tripartite Evolutionary Game Model for Misinformation Propagation in Social Networks 一种新的社会网络中错误信息传播的三方进化博弈模型
Secur. Commun. Networks Pub Date : 2022-01-19 DOI: 10.1155/2022/1136144
Xianyong Li, Qizhi Li, Yajun Du, Yongquan Fan, Xiaoliang Chen, Fashan Shen, Yunxia Xu
{"title":"A Novel Tripartite Evolutionary Game Model for Misinformation Propagation in Social Networks","authors":"Xianyong Li, Qizhi Li, Yajun Du, Yongquan Fan, Xiaoliang Chen, Fashan Shen, Yunxia Xu","doi":"10.1155/2022/1136144","DOIUrl":"https://doi.org/10.1155/2022/1136144","url":null,"abstract":"Misinformation has brought great challenges to the government and network media in social networks. To clarify the influences of behaviors of the network media, government, and netizen on misinformation propagation, a large number of influence parameters are proposed for the three participants. Then, a tripartite evolutionary game model for misinformation propagation is constructed. According to the proposed game model, the expected payoffs of three participants are analyzed when they adopt different strategies. The evolutionary stabilities of the game model are also analyzed theoretically. Finally, the impacts of different parameters on expected payoffs of three participants are analyzed experimentally. Meanwhile, coping strategies of three participants under different conditions are given. The experimental results show that the proposed tripartite evolutionary game model can properly describe the influence of network media, government, and netizen on misinformation propagation.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134024975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lag Secure Consensus for Second-Order Nonlinear Multiagent Systems with Event-Triggered Control Strategy under DoS Attacks DoS攻击下具有事件触发控制策略的二阶非线性多智能体系统的滞后安全一致性
Secur. Commun. Networks Pub Date : 2022-01-19 DOI: 10.1155/2022/4451304
Qi Han, Ao Zhang, Tengfei Weng, Yan Xie, Liping Feng, Guorong Chen, Yuan Tian
{"title":"Lag Secure Consensus for Second-Order Nonlinear Multiagent Systems with Event-Triggered Control Strategy under DoS Attacks","authors":"Qi Han, Ao Zhang, Tengfei Weng, Yan Xie, Liping Feng, Guorong Chen, Yuan Tian","doi":"10.1155/2022/4451304","DOIUrl":"https://doi.org/10.1155/2022/4451304","url":null,"abstract":"Compared with previous studies, this paper focuses on the time delay phenomenon in the consensus state between the leader and followers and considers that the DoS attack occurs nonperiodically. First, a new event-triggered mechanism and lag consensus control strategy are proposed. Then, through the Lyapunov stability theory, algebraic knowledge, and graph theory, it is proved that followers and leader can achieve lag consistent under the DoS attack, and the trigger interval is designed to ensure that Zeno behavior does not occur. Finally, the correctness and effectiveness of the proposed theory and method are verified by numerical simulation.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123233681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信