2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)最新文献

筛选
英文 中文
A Distributed MAPE-K Framework for Self-Protective IoT Devices 面向物联网设备自我保护的分布式MAPE-K框架
Michael Riegler, J. Sametinger, Michael Vierhauser
{"title":"A Distributed MAPE-K Framework for Self-Protective IoT Devices","authors":"Michael Riegler, J. Sametinger, Michael Vierhauser","doi":"10.1109/SEAMS59076.2023.00034","DOIUrl":"https://doi.org/10.1109/SEAMS59076.2023.00034","url":null,"abstract":"Internet of Things (IoT) devices have become ubiquitous in our everyday life, with security becoming an ever-growing issue as more and more cyber-attack incidents being reported, primarily due to deficiencies in existing security mechanisms. However, while, for example, cloud-based applications, or industrial automation systems of systems possess significant resources for monitoring health, and determining their status and correct behavior at runtime, IoT devices operate with limited hardware capabilities and under tight resource constraints, making monitoring, analysis, and response activities a challenging endeavor. Following the NIST Cybersecurity Framework, IoT devices need to identify, protect, detect, respond, and recover from cyber-attacks, unauthorized access, and other security threats. A common way to provide self-adaptation to changing conditions is the MAPE-K loop with four pivotal phases: Monitor, Analyze, Plan, and Execute. This paper presents DSec4IoT, a “Distributed MAPE-K Framework for Self-Protective IoT Devices”. Our framework leverages the idea of distributed MAPE-K patterns and establishes a model for managing and controlling Self-Protective IoT Devices. We evaluate our approach by simulating port scans and performing adaptation activities. Results have confirmed that DSec4IoT can be easily applied to detect and mitigate them.","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134499849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Optimizing Agents Using Mixed Initiative Behavior Trees 基于混合主动行为树的自优化代理
Mohamed H. Behery, Minh Trinh, C. Brecher, G. Lakemeyer
{"title":"Self-Optimizing Agents Using Mixed Initiative Behavior Trees","authors":"Mohamed H. Behery, Minh Trinh, C. Brecher, G. Lakemeyer","doi":"10.1109/SEAMS59076.2023.00023","DOIUrl":"https://doi.org/10.1109/SEAMS59076.2023.00023","url":null,"abstract":"Fast paced industry requirements call for fast and easy robot programming, especially for Small and Medium sized Enterprises (SME) that often lack robot programming experience. Even with the advancement of graphical activity representation languages such as Behaviour Trees (BTs), it can still be time consuming to program robots for new behaviors due to the shifting product specifications and the dynamic production environments. This paper presents an extension of BTs that offers more flexibility as well as higher reactivity and robustness by introducing Mixed Initiative Planning (MIP) to BTs using Dynamic Sequence Nodes (DSNs). DSNs reduce the human effort needed to design a BT as well as the number of nodes to achieve a certain task while maintaining robustness, readability, and modularity of the tree. Additionally, it introduces run-time optimization to BTs, as opposed to tree synthesis approaches that guarantee convergence but overlook performance.","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131250873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SeMaFoR - Self-Management of Fog Resources with Collaborative Decentralized Controllers SeMaFoR -基于协同分散控制器的雾资源自我管理
Abdelghani Alidra, H. Brunelière, Hélène Coullon, T. Ledoux, Charles Prud’homme, Jonathan Lejeune, Pierre Sens, Julien Sopena, Jonathan Rivalan
{"title":"SeMaFoR - Self-Management of Fog Resources with Collaborative Decentralized Controllers","authors":"Abdelghani Alidra, H. Brunelière, Hélène Coullon, T. Ledoux, Charles Prud’homme, Jonathan Lejeune, Pierre Sens, Julien Sopena, Jonathan Rivalan","doi":"10.1109/SEAMS59076.2023.00014","DOIUrl":"https://doi.org/10.1109/SEAMS59076.2023.00014","url":null,"abstract":"Fog Computing is a paradigm aiming to decentralize the Cloud by geographically distributing away computation, storage and network resources as well as related services. This notably reduces bottlenecks and data movement. However, managing Fog resources is a major challenge because the targeted systems are large, geographically distributed, unreliable and very dynamic. Cloud systems are generally managed via centralized autonomic controllers automatically optimizing both application QoS and resource usage. To leverage the self-management of Fog resources, we propose to orchestrate a fleet of autonomic controllers in a decentralized manner, each with a local view of its own resources. In this paper, we present our SeMaFoR (Self-Management of Fog Resources) vision that aims at collaboratively operating Fog resources. SeMaFoR is a generic approach made of three cornerstones: an Architecture Description Language for the Fog, a collaborative and consensual decision-making process, and an automatic coordination mechanism for reconfiguration.","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132252904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preference Adaptation: user satisfaction is all you need! 偏好适应:用户满意就是你所需要的!
Nianyu Li, Mingyue Zhang, Jialong Li, Eunsuk Kang, K. Tei
{"title":"Preference Adaptation: user satisfaction is all you need!","authors":"Nianyu Li, Mingyue Zhang, Jialong Li, Eunsuk Kang, K. Tei","doi":"10.1109/SEAMS59076.2023.00027","DOIUrl":"https://doi.org/10.1109/SEAMS59076.2023.00027","url":null,"abstract":"Decision making in self-adaptive systems often involves trade-offs between multiple quality attributes, with user preferences that indicate the relative importance and priorities among the attributes. However, eliciting such preferences accurately from users is a difficult task, as they may find it challenging to specify their preference in a precise, mathematical form. Instead, they may have an easier time expressing their displeasure when the system does not exhibit behaviors that satisfy their internal preferences. Furthermore, the user’s preference may change over time depending on the environmental context; thus, the system may be required to continuously adapt its behavior to satisfy this change in preference. However, existing self-adaptive frameworks do not explicitly consider dynamic human preference as one of the sources of uncertainty. In this paper, we propose a new adaptation framework that is specifically designed to support self-adaptation to user preference. Our framework takes a human-on-the-loop approach where the user is given an ability to intervene and indicate dissatisfaction and corrections with the current behavior of the system; in such a scenario, the system automatically updates the existing preference values so that the new, resulting behavior of the system is consistent with the user’s notion of satisfactory behavior. To perform this adaptation, we propose a novel similarity analysis to produce changes in the preference that are optimal with respect to the system utility. We illustrate our approach in a case study involving a delivery robot system. Our preliminary results indicate that our approach can effectively adapt its behavior to changing human preference.","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130670055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecture-Based Uncertainty Impact Analysis to Ensure Confidentiality 基于体系结构的不确定性影响分析以确保机密性
Sebastian Hahner, R. Heinrich, R. Reussner
{"title":"Architecture-Based Uncertainty Impact Analysis to Ensure Confidentiality","authors":"Sebastian Hahner, R. Heinrich, R. Reussner","doi":"10.1109/SEAMS59076.2023.00026","DOIUrl":"https://doi.org/10.1109/SEAMS59076.2023.00026","url":null,"abstract":"Today’s software systems are neither built nor operated in isolation and have to adapt to their environment. Uncertainty in the software and its context is inherently unavoidable and should be actively analyzed and managed already at design time. This includes analyzing the impact of uncertainty on a system’s quality properties, which quickly becomes critical, e.g., regarding confidentiality. When not handled comprehensively, confidentiality violations can occur due to uncertainty that void previous analysis results. There exist many approaches to classify and handle uncertainty. However, without locating the impact of uncertainty, precise mitigation is often impossible. In this paper, we present an uncertainty impact analysis that shows potential confidentiality violations induced by different uncertainty types like structural, behavioral, or environmental uncertainty. This is achieved by combining software-architectural and data flow-based propagation of uncertainty. Our tool-supported approach is a first step towards predicting the impact of uncertainty without laborious modeling and testing of what-if scenarios. The case study-based evaluation shows that our impact analysis accurately predicts confidentiality violations with a high F1-score of 0.94 while reducing the effort of manual analysis by 82%.","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130520976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Runtime Resolution of Feature Interactions through Adaptive Requirement Weakening 基于自适应需求弱化的特征交互运行时解析
Simon Chu, Emma Shedden, Changjian Zhang, Rômulo Meira-Góes, Gabriel A. Moreno, D. Garlan, Eunsuk Kang
{"title":"Runtime Resolution of Feature Interactions through Adaptive Requirement Weakening","authors":"Simon Chu, Emma Shedden, Changjian Zhang, Rômulo Meira-Góes, Gabriel A. Moreno, D. Garlan, Eunsuk Kang","doi":"10.1109/SEAMS59076.2023.00025","DOIUrl":"https://doi.org/10.1109/SEAMS59076.2023.00025","url":null,"abstract":"The feature interaction problem occurs when two or more independently developed components interact with each other in unanticipated ways, resulting in undesirable system behaviors. Feature interaction problems remain a challenge for emerging domains in cyber-physical systems (CPS), such as the Internet of Things and autonomous drones. Existing techniques for resolving feature interactions take a “winner-takes-all” approach, where one out of the conflicting features is selected as the most desirable one, and the rest are disabled. However, when multiple of the conflicting features fulfill important system requirements, being forced to select one of them can result in an undesirable system outcome. In this paper, we propose a new resolution approach that allows all of the conflicting features to continue to partially fulfill their requirements during the resolution process. In particular, our approach leverages the idea of adaptive requirement weakening, which involves one or more features temporarily weakening their level of performance in order to co-exist with the other features in a consistent manner. Given feature requirements specified in Signal Temporal Logic (STL), we propose an automated method and a runtime architecture for automatically weakening the requirements to resolve a conflict. We demonstrate our approach through case studies on feature interactions in autonomous drones","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133724272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adapting Specifications for Reactive Controllers 适应响应式控制器的规范
Titus Buckworth, Dalal Alrajeh, J. Kramer, Sebastián Uchitel
{"title":"Adapting Specifications for Reactive Controllers","authors":"Titus Buckworth, Dalal Alrajeh, J. Kramer, Sebastián Uchitel","doi":"10.1109/SEAMS59076.2023.00012","DOIUrl":"https://doi.org/10.1109/SEAMS59076.2023.00012","url":null,"abstract":"For systems to respond to scenarios that were unforeseen at design time, they must be capable of safely adapting, at runtime, the assumptions they make about the environment, the goals they are expected to achieve, and the strategy that guarantees the goals are fulfilled if the assumptions hold. Such adaptation often involves the system degrading its functionality, by weakening its environment assumptions and/or the goals it aims to meet, ideally in a graceful manner. However, finding weaker assumptions that account for the unanticipated behaviour and of goals that are achievable in the new environment in a systematic and safe way remains an open challenge. In this paper, we propose a novel framework that supports assumption and, if necessary, goal degradation to allow systems to cope with runtime assumption violations. The framework, which integrates into the MORPH reference architecture, combines symbolic learning and reactive synthesis to compute implementable controllers that may be deployed safely. We describe and implement an algorithm that illustrates the working of this framework. We further demonstrate in our evaluation its effectiveness and applicability to a series of benchmarks from the literature. The results show that the algorithm successfully learns realizable specifications that accommodate previously violating environment behaviour in almost all cases. Exceptions are discussed in the evaluation.","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129721289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Self-adaptation and Industry: Blame MAPE-K 软件自适应与产业:归咎于MAPE-K
R. Lemos
{"title":"Software Self-adaptation and Industry: Blame MAPE-K","authors":"R. Lemos","doi":"10.1109/SEAMS59076.2023.00021","DOIUrl":"https://doi.org/10.1109/SEAMS59076.2023.00021","url":null,"abstract":"If software self-adaptation has to be widely adopted by industry, we need to think big, embrace complexity, provide easily deployed and cost-effective solutions, and justify trust. On fairness, MAPE-K should not solely take the blame. MAPE-K is one of the many interpretations of feedback loops apply to systems for which mathematical models - mostly based on control theory, are difficult to be synthesised. MAPE-K has provided a basic and widely accepted framework for justifying the deployment of feedback loops in software systems. Undoubtedly, it has helped to promote and advance the whole area, but now more concrete and resilient solutions are necessary. This position paper argues that, first, industry has been adopting software self-adaptation, perhaps in a way that may not be recognised by the academic community, second, generic solutions are unfeasible since every software system brings its own challenges, and thirdly, the generic stages associated with a feedback loop, like MAPE-K, are insufficient to solve specific challenges.","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the chairs 来自椅子的信息
R. Cigno, P. Felber, Adriana Iamnitchi
{"title":"Message from the chairs","authors":"R. Cigno, P. Felber, Adriana Iamnitchi","doi":"10.1109/P2P.2013.6688692","DOIUrl":"https://doi.org/10.1109/P2P.2013.6688692","url":null,"abstract":"Dag allemaal! On behalf of the SCAM 2013 Conference and Program Committee, we would like to welcome you to the capital of Dutch industrial design, i.e., Eindhoven, the Netherlands, for the 13th IEEE International Working Conference on Source Code Analysis and Manipulation, co-located with the 29th IEEE International Conference on Software Maintenance (ICSM 2013). Some of you might ask whether, after 12 highly successful editions chock-full of innovative ideas, case studies and tools, one still needs a 13th edition: isn’t SCAM a solved problem? Of course, the chairs of the conference and (more importantly) the SCAM community will answer NO to that question. It is true that more and more attention in the wider software engineering community is being directed towards other aspects of systems development and evolution, such as specification, requirements engineering, design, evolution and maintenance. However, a fundamental artefact in all these domains is still the source code, which contains the precise, and sometimes only, definitive description of the behaviour of a system. Hence, even in a world of mobile applications, web services, model-driven engineering and cloud computing, new and innovative SCAM techniques will still be required, even essential. So, for the 13th time in a row, the SCAM working conference aims to bring together researchers and practitioners working on theory, techniques and applications for the analysis and manipulation of the source code of computer systems, in order to help researchers tackle the software engineering challenges and problems of today and tomorrow. SCAM focuses on the techniques and tools themselves what they can achieve, how they can be improved, refined and combined. It does this through a highly interactive format: paper presentations are kept short and focused, with ample time reserved for general discussion of challenges and controversial opinions raised during each session. An important side-effect of these discussions is that it helps the community to stay focused and become a tighter group. This year we received 29 research papers and 15 tool papers, from which we have selected 14 excellent research papers and 10 amazing tool papers for presentation and inclusion in the proceedings. The papers cover a broad range of topics including: static analysis, dynamic analysis, source code transformation, metrics, software mining, databases/ontologies and source code visualization. We want to thank the authors of all submissions for sharing their research with the SCAM community. Every paper was fully reviewed by three or more program committee members for relevance, soundness and originality, and discussed openly by the entire program committee before a unanimous, final decision was made. Hence, a big thank you to the program committee and external reviewers for their timely and constructive reviews, and special thanks to those who actively participated in the discussions of the final selections. This year’s","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128989391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hazard Analysis for Self-Adaptive Systems Using System-Theoretic Process Analysis 基于系统理论过程分析的自适应系统危害分析
Simon Diemert, J. Weber
{"title":"Hazard Analysis for Self-Adaptive Systems Using System-Theoretic Process Analysis","authors":"Simon Diemert, J. Weber","doi":"10.1109/SEAMS59076.2023.00028","DOIUrl":"https://doi.org/10.1109/SEAMS59076.2023.00028","url":null,"abstract":"Self-adaptive systems are able to change their behaviour at run-time in response to changes. Self-adaptation is an important strategy for managing uncertainty that is present during the design of modern systems, such as autonomous vehicles. However, assuring the safety of self-adaptive systems remains a challenge, particularly when the adaptations have an impact on safety-critical functions. The field of safety engineering has established practices for analyzing the safety of systems. System Theoretic Process and Analysis (STPA) is a hazard analysis method that is well-suited for self-adaptive systems. This paper describes a design-time extension of STPA for self-adaptive systems. Then, it derives a reference model and analysis obligations to support the STPA activities. The method is applied to three self-adaptive systems described in the literature. The results demonstrate that STPA, when used in the manner described, is an applicable hazard analysis method for safety-critical self-adaptive systems.","PeriodicalId":262204,"journal":{"name":"2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129486431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信