Journal of Discrete Mathematical Sciences and Cryptography最新文献

筛选
英文 中文
A novel intrusion detection system in cloud infrastructure using deep learning technique 基于深度学习技术的云基础设施入侵检测系统
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1739
Dharani Kumar Talapula, Adarsh Kumar, Kiran Kumar Ravulakollu, Manoj Kumar
{"title":"A novel intrusion detection system in cloud infrastructure using deep learning technique","authors":"Dharani Kumar Talapula, Adarsh Kumar, Kiran Kumar Ravulakollu, Manoj Kumar","doi":"10.47974/jdmsc-1739","DOIUrl":"https://doi.org/10.47974/jdmsc-1739","url":null,"abstract":"One of the business strategies for selling computer resources with services and technology for better use of computing infrastructures is Cloud computing (CC). Nowadays, every IT company prefers cloud computing because it provides consumers with flexible, pay-per-use services. Due to its open and distributed structure, which is susceptible to attackers, thereby, privacy and security is a key obstacle to its sustainability. The most prevalent approach for detecting assaults on the cloud is known to be Intrusion Detection System (IDS). This article aims to propose a novel intrusion pattern detection system (IPDS) in cloud computing that includes three stages: (1) pre-processing, (2) feature extraction, and (3) classification. At first, pre-processing is performed on the input data via Z-score normalization and then feature extraction is performed along with statistical and higher-order statistical features. Subsequently, the extracted features are given to the classification phases that use the Optimized Quantum Neural Network (QNN) classifier. The hidden neuron optimization is performed by Cubic Chaotic Map integrated Cat and Mouse Based Optimization (CC-CMBO) Algorithm to make the classification more exact. Finally, the results of the proposed work are assessed to those of standard systems with respect to various measures.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient approach to secure smart contract of Ethereum blockchain using hybrid security analysis approach 一种使用混合安全分析方法来保护以太坊区块链智能合约的有效方法
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1815
Satpal Singh Kushwaha, Sandeep Joshi, Amit Kumar Gupta
{"title":"An efficient approach to secure smart contract of Ethereum blockchain using hybrid security analysis approach","authors":"Satpal Singh Kushwaha, Sandeep Joshi, Amit Kumar Gupta","doi":"10.47974/jdmsc-1815","DOIUrl":"https://doi.org/10.47974/jdmsc-1815","url":null,"abstract":"The technology behind blockchain is quickly becoming one of the most crucial innovations in recent years. The Smart contracts are digital agreements, made in between two untrusted parties. Smart contracts are self-executable small piece of code that gets executed due to some predefined triggering conditions. Smart contracts store cryptocurrencies as their balances and deal in cryptocurrencies on network transactions. Because of this, smart contracts are constantly open to the possibility of being attacked. A single security vulnerability can make the smart contract very much insecure. The immutability property of the blockchain ensures that, once a smart contract has been placed on the blockchain, cannot be modified in any way. So, the smart contract must be analyzed for any kind of security vulnerability before its deployment on the blockchain. Existing analysis approaches detect vulnerabilities with high false positive rates. Our proposed approach analyses the smart contracts using a hybrid combination of pattern matching and symbolic execution, which produces results with a low false positive rate. We have performed a comparative analysis of our proposed approach to prove its efficiency with the existing research approaches on a data set of 453 smart contracts with tagged vulnerabilities.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135356590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An advanced cloud based framework for privacy and security in medical data using cryptographic method 一种先进的基于云的框架,用于使用加密方法的医疗数据的隐私和安全
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1826
Rashmi Welekar, Farhadeeba Shaikh, Abhijit Chitre, Kirti Wanjale, Shabana Pathan, Anil Kumar
{"title":"An advanced cloud based framework for privacy and security in medical data using cryptographic method","authors":"Rashmi Welekar, Farhadeeba Shaikh, Abhijit Chitre, Kirti Wanjale, Shabana Pathan, Anil Kumar","doi":"10.47974/jdmsc-1826","DOIUrl":"https://doi.org/10.47974/jdmsc-1826","url":null,"abstract":"The exchange of medical information has been drastically altered by patient-centered developments such as personal health records (PHR). By giving patients a place to handle their own PHR on a unified transactional platform, personal health record (PHR) services increase the efficiency with which medical information may be kept, accessed, and transferred. With the ultimate objective of providing patients with total surveillance under data, our findings is focused on creating a state-of-the-art infrastructure for the safe transfer of personal health data via cloud computing. Patients have the option of encrypting their PHR files, which provides an additional layer of security and allows them to set access control limits such as who has access to their files and to what degree. When data is encrypted in the cloud, only approved users may access it. Using cloud-based platforms to share health records raises concerns over confidentiality and privacy, which are addressed by the proposed method. Patients may still benefit from data interchange for the goal of better healthcare thanks to the framework’s provision of an encrypted PHR file option. This framework may accommodate attribute-based encryption (ABE) and other kinds of granular security. These measures ensure that people may continue to have access to, and make changes to, their own medical data, even when they are stored on the cloud. This article presents research that attempts to meet the demands of patients while also providing a safe method of transferring individual health information through cloud computing.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135358397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The inclusion subsemimodule graph of a semimodule 半模的包含子半模图
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1636
Ahmed H Alwan, Zahraa A. Nema
{"title":"The inclusion subsemimodule graph of a semimodule","authors":"Ahmed H Alwan, Zahraa A. Nema","doi":"10.47974/jdmsc-1636","DOIUrl":"https://doi.org/10.47974/jdmsc-1636","url":null,"abstract":"Let R be an abelian semiring with unity, U be an R-semimodule. The inclusion subsemimodule graph of U, indicated IS(U), is a graph with nodes that all non-trivial subsemimodules of U and two different nodes N and L are adjacent if and only if N ⊂ L or L ⊂ N. In this worke, proved that if U is subtractive semimodule then IS(U) is not connected if is a direct sum of two simple R-semimodules. Besides, it has been proved that IS(U) is a complete graph if and only if U is a uniserial semimodule. girth, diameter, chromatic and clique numbers of IS(U) have been studied. and only if U.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud computing security in health cyber physical systems 卫生网络物理系统中的云计算安全
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1821
Mamoqenelo P. Morolong, Fungai Bhunu Shava, Attlee M. Gamundani
{"title":"Cloud computing security in health cyber physical systems","authors":"Mamoqenelo P. Morolong, Fungai Bhunu Shava, Attlee M. Gamundani","doi":"10.47974/jdmsc-1821","DOIUrl":"https://doi.org/10.47974/jdmsc-1821","url":null,"abstract":"The health industry as one of the Critical Infrastructures has rapidly grown in adopting the use of new ubiquitous technologies in advancing its critical services. The industry because of its high need and usage of new technologies is encountering a myriad of challenges including cyber-attacks. Among the technologies adopted by the health industry is the use of cloud computing services for managing Electronic Medical Records (EMR) on the cloud environment. Today’s medical devices use sensors that collect data from the diverse environments such as the human heart and such data is sent to the cloud for better analysis, monitoring, or management. However, attackers exploit every single development to advance health or medical services like all the other cyber systems. The scope of this paper is to investigate how cloud computing services adopted in Health Cyber Physical Systems can be secured from the prevalent cybersecurity challenges. The study followed a systematic literature review, where data was collected from online databases with set search constraints such as language, date of publication and specific keywords. This paper presents how cloud computing integrated with the medical cyber physical systems can impeccably securely manage the health systems. More specifically the collection, monitoring, and management of real-time data and as a result of this integration, different cyber-attacks are escalating.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiplayer reputation-based coalition game model (MRCGM) with dominant strategy analysis for detecting malicious attacks in wireless sensor networks 基于声誉的多玩家联盟博弈模型(MRCGM)及其优势策略分析用于无线传感器网络恶意攻击检测
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1772
Amara S. A. L. G. Gopala Gupta, Syam Prasad Gudapati, Praveen Tumuluru
{"title":"Multiplayer reputation-based coalition game model (MRCGM) with dominant strategy analysis for detecting malicious attacks in wireless sensor networks","authors":"Amara S. A. L. G. Gopala Gupta, Syam Prasad Gudapati, Praveen Tumuluru","doi":"10.47974/jdmsc-1772","DOIUrl":"https://doi.org/10.47974/jdmsc-1772","url":null,"abstract":"Wireless Sensor Networks (WSNs) are turning into an essential portion of our lives. Devoid of assuring WSNs security (WS), there remain no broad implementations of WSNs. Because of sensor nodes’ constrained capacities concerning computation, communication, and energy, giving protection to WSNs remains competitive. Indeed, the procedure of applying WS remains adaptable and vibrant that develops consistently. Attack-defend’s crux in WS could be conveyed by collaborative schemes of interdependency when Game Theory (GT) could be employed to consider communications amidst schemes of logical decision-makers. Hence, learning WS alongside GT possesses greater logic. This study proffers a Multiplayer Reputation-based Coalition Game Model (MRCGM) for seeking the false data injection amidst the nodes. An attacker attempts to sustain an ideal level of belief by correlating the identifications within the network (NW) to initiate a victorious transfer. Concurrently, the attacker should acquire a few charges for sustaining the trustability of its identifications. This proffered procedure employs this notion and turns the attack expensive by fixing a global threshold for nodes or identifications to be trustable and functional within the NW. Additionally, the beneficial function of the attacker and defender is as well described. The MRCGM has been correlated with 2 advanced methodologies like security-aware routing scheme employing repeated game (SARSRGM) paradigm and a Game-based Fuzzy Q-learning (GBFQL) scheme concerning diverse criteria. Consequently, the proffered MRCGM attains 124 kbps of Packet Drop Rate, 76.14% of energy efficiency, 96.1% of detection accuracy, 25.45% of energy consumption, and 102.45 ms of routing latency.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135356591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy visible submodules in the class of fuzzy faithful multiplication modules 模糊忠实乘法模类中的模糊可见子模
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1635
Sajda K. Mohammed, Buthyna N. Shihab
{"title":"Fuzzy visible submodules in the class of fuzzy faithful multiplication modules","authors":"Sajda K. Mohammed, Buthyna N. Shihab","doi":"10.47974/jdmsc-1635","DOIUrl":"https://doi.org/10.47974/jdmsc-1635","url":null,"abstract":"In this paper, the behavior of fuzzy visible submodules and its effect of it in the class of fuzzy faithful multiplication modules have been studied. Some relationship between fuzzy visible modules and fuzzy residual quotient ideals has been presented. Also, other properties with important results have been studied.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135845174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operating system security with discrete mathematical structure for secure round robin scheduling method with intelligent time quantum 基于离散数学结构的操作系统安全智能时间量子轮循调度方法
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1816
Anil Kumar, Amit Kumar Gupta, Deepak Panwar, Sandeep Chaurasia, Dinesh Goyal
{"title":"Operating system security with discrete mathematical structure for secure round robin scheduling method with intelligent time quantum","authors":"Anil Kumar, Amit Kumar Gupta, Deepak Panwar, Sandeep Chaurasia, Dinesh Goyal","doi":"10.47974/jdmsc-1816","DOIUrl":"https://doi.org/10.47974/jdmsc-1816","url":null,"abstract":"These days, the problems of scheduling and security are increasingly pressing as a result of the rapidly growing number of implementations that are operated in operating systems. Process scheduling and scheduling security is the most effective methodology of operating a system which can improve and degrade the performance of the computer system. The performance of scheduling algorithm in operating system can be measured by scheduling principles like average waiting time, average turnaround time, response time, throughput etc. Much research carried out over operating system security and round robin scheduling used in time sharing operating system in previous years to resolve the issues regarding to improvement in the performance of round robin (RR) scheduling and improving the security in the scheduling approach. This study discussed the security issues in operating systems, scheduling security and discrete structure of a new approach for RR scheduling. The researcher has suggested a list of policy for scheduling method security and proposed a new approach for RR scheduling and investigated the scheduling principles. The proposed methodology covers distinctive strategy for selection manner of process from ready queue than RR and used diverges time quantum. The proposed methodology has been validated experimentally by comparing with a numerous scheduling algorithm namely as Round Robin (RR), Adaptive Round Robin (ARR), Round Robin Remaining time (RRRT), improved Round Robin (IRR), an additional improvement on the improved Round Robin (AAAIRR), and an Enhanced Round Robin (ERR). Numerous simulations have been conducted to validate the effectiveness of the proposed algorithm to compelling the performance of system. At the conclusion the performance of computing system is dependent on security of operating system as well as secluding methods.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135356174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based framework for secure and efficient exchange of electronic medical records on mobile cloud environments 基于区块链的框架,用于在移动云环境中安全有效地交换电子病历
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1817
Vaibhav Nivrutti Patil, Vijay H. Kalmani
{"title":"Blockchain-based framework for secure and efficient exchange of electronic medical records on mobile cloud environments","authors":"Vaibhav Nivrutti Patil, Vijay H. Kalmani","doi":"10.47974/jdmsc-1817","DOIUrl":"https://doi.org/10.47974/jdmsc-1817","url":null,"abstract":"The maintenance of Electronic Medical Records (EMRs) on mobile cloud platforms, in which mobile devices are incorporated with cloud computing to ease healthcare information exchange between healthcare providers and patients, has become a paradigm shift in latest days. This cutting-edge strategy makes it possible to provide medical care at a low overhead expense, with a high level of flexibility, and with electronic health record access. Furthermore, this new approach also expresses concern over the confidentiality of patient data and the safety of the networks that support e-health systems. It is a tough problem to figure out a way to effectively share EMRs amongst mobile users while also maintaining maximum security measures in mobile cloud environments. In this research, a novel framework is presented for the sharing of EMRs that integrates blockchain technology and the decentralized Interplanetary File System (DIFS) on a mobile cloud. The empirical results suggest that the concept offers a useful method for ensuring the reliability of data transfers on mobile clouds, while also preserving important patient data from any potential dangers that may arise. Comparing the results of this performance assessment and security analysis to those of previously implemented data sharing models reveals significant performance enhancements in areas such as lightweight access control method, minimal network latency, maximum security levels, and data privacy protections.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135356589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of an IoT-based smart healthcare eco system for precise ageing illness detection and prognosis 基于物联网的智能医疗生态系统设计,实现老年疾病的精准检测与预测
Journal of Discrete Mathematical Sciences and Cryptography Pub Date : 2023-01-01 DOI: 10.47974/jdmsc-1746
Kamlesh Mani, Kamlesh Kumar Singh, Ratnesh Litoriya
{"title":"Design of an IoT-based smart healthcare eco system for precise ageing illness detection and prognosis","authors":"Kamlesh Mani, Kamlesh Kumar Singh, Ratnesh Litoriya","doi":"10.47974/jdmsc-1746","DOIUrl":"https://doi.org/10.47974/jdmsc-1746","url":null,"abstract":"The article aims to provide a comprehensive review of the current state of smart healthcare systems, focusing on important topics such as the use of wearables and smartphones for health monitoring, the application of AI and machine learning for illness detection, and the integration of assistive frameworks like social robots for ambient-supported living. One of the key aspects discussed in the study is the software integration architectures required for the development of smart healthcare systems and the seamless integration of data. Analytics and various AI technologies are utilized in conjunction to create these systems. The article examines the different approaches employed in the development of these systems, highlighting the contributions of each framework, the overall functioning methodology, performance outputs, and comparative advantages and limitations. Moreover, the article also addresses current research challenges and identifies prospective future directions. It emphasizes the shortcomings of existing smart healthcare systems and proposes strategies for introducing innovative frameworks to overcome these limitations. The analysis aims to provide detailed insights into recent advancements in smart healthcare systems, enabling specialists to contribute to the field with their expertise. Overall, the article serves as a valuable resource for understanding the current landscape of smart healthcare systems, shedding light on recent breakthroughs, and encouraging further research and development in this rapidly evolving field.","PeriodicalId":193977,"journal":{"name":"Journal of Discrete Mathematical Sciences and Cryptography","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135355362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信