2023 IEEE International Conference on Cyber Security and Resilience (CSR)最新文献

筛选
英文 中文
Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices 资源受限设备中恶意软件移动目标防御策略选择
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224824
Jan von der Assen, Alberto Huertas Celdrán, Nicolas Huber, Gérôme Bovet, G. Pérez, B. Stiller
{"title":"Moving Target Defense Strategy Selection against Malware in Resource-Constrained Devices","authors":"Jan von der Assen, Alberto Huertas Celdrán, Nicolas Huber, Gérôme Bovet, G. Pérez, B. Stiller","doi":"10.1109/CSR57506.2023.10224824","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224824","url":null,"abstract":"Internet-of-Things (IoT) devices have become critical assets to be protected due to increased adoption for emerging use cases. As such, these devices are confronted with a myriad of malware-based threats. To combat malware in IoT, Moving Target Defense (MTD) is a viable defense layer, since MTD does not rely on a low breach probability - aiming to increase security in a dynamic way. Although evidence supports the usefulness of MTD for IoT, the current state of the art suffers from unrealistic deployments, including the problem of operating multiple MTD techniques. Especially, there is a commonly observed gap in determining and deploying one of a set of locally available MTD techniques. This paper addresses this gap by relying on a rule-based selection mechanism. For that, a risk-driven methodology to establish this selection agent with a well-defined architecture is followed. As an input, the device's behavior, as expressed through its resource consumption, serves as a selection criterion. This architecture was implemented for a Raspberry Pi and evaluated against seven malware, given four existing MTD techniques. The resulting prototype highlights that a rule-based system can efficiently mitigate the malware samples.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123936340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS Attack Detection in a Real Urban IoT Environment Using Federated Deep Learning 基于联邦深度学习的真实城市物联网环境中的DDoS攻击检测
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224916
Khatereh Ahmadi, R. Javidan
{"title":"DDoS Attack Detection in a Real Urban IoT Environment Using Federated Deep Learning","authors":"Khatereh Ahmadi, R. Javidan","doi":"10.1109/CSR57506.2023.10224916","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224916","url":null,"abstract":"today, alongside the opportunities provided by Internet of Things (IoT), Distributed Denial of Service (DDoS) attacks are one of the most significant attacks that target the overall availability and reliability of the network. Many researches have been devoted to propose new machine learning-based detection mechanisms. However, centralized learning models require the traffic data and learning process to be concentrated on a specific device, which leads to more computational complexity and privacy concerns. Consequently, in this paper, detection and prediction of such attacks is modeled as a distributed cooperative learning scheme, which is conducted based on federated deep learning implemented in a real smart city environment. The results compared with traditional centralized deep learning models indicate high performance and accuracy, while maintaining confidentiality of traffic data. More precisely, in terms of common learning metrics, our proposed model is capable of gaining 0.953 and 0.0369 accuracy and loss rates, respectively.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125141437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing and Smishing Detection Using Machine Learning 使用机器学习的网络钓鱼和欺骗检测
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224954
Hadi El Karhani, Riad Al Jamal, Yorgo Bou Samra, I. Elhajj, A. Kayssi
{"title":"Phishing and Smishing Detection Using Machine Learning","authors":"Hadi El Karhani, Riad Al Jamal, Yorgo Bou Samra, I. Elhajj, A. Kayssi","doi":"10.1109/CSR57506.2023.10224954","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224954","url":null,"abstract":"We propose the use of a hybridized machine learning model to detect phishing and smishing - phishing using SMS messages - attacks with the use of several extracted features related to domains, coupled with natural language processing (NLP) trained on actual smishing messages to accurately detect attacks. Moreover, we propose an integration of the detection system with the open-source threat intelligence platform, MISP (Malware Information Sharing Platform). This allows for more effective storage and use of flagged phishing domains. The model was trained and tested using publicly available data as well as data provided by TELUS Corp. The results show an accuracy of 99.40% and an Fl score in excess of 99%.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116445022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPAT: A Testbed for Automotive Cybersecurity Training 汽车网络安全培训的测试平台
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224967
Roberto Caviglia, G. Gaggero, Nicola Vincis, Omar Morando, Alessio Aceti, Mario Marchese
{"title":"SPAT: A Testbed for Automotive Cybersecurity Training","authors":"Roberto Caviglia, G. Gaggero, Nicola Vincis, Omar Morando, Alessio Aceti, Mario Marchese","doi":"10.1109/CSR57506.2023.10224967","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224967","url":null,"abstract":"With the increasing of cyber threats in cyber-physical systems, and especially in the automotive sector, companies need to train cybersecurity experts with vertical competencies in the field as described in the regulations R155 and R156 defined by UNECE (United Nations Economic Commission for Europe). Testbeds capable of simulating the control network, the sensors and the actuators of a vehicle represent a great tool for this purpose. This paper presents the first prototype of SPAT (Sababa Portable Automotive Testbed), a testbed for automotive cybersecurity training. SPAT includes, in a portable suitcase, all the control and network devices based on the CANBus technology of a real vehicle. We present the features of the functioning prototype, and we also discuss the next steps towards a testbed that will include the most recent communication technologies employed in the automotive sector.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116411036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms 基于联邦学习的信用卡欺诈检测:使用采样方法和深度学习算法的性能分析
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224978
Nahid Ferdous Aurna, Md. Delwar Hossain, Yuzo Taenaka, Y. Kadobayashi
{"title":"Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning Algorithms","authors":"Nahid Ferdous Aurna, Md. Delwar Hossain, Yuzo Taenaka, Y. Kadobayashi","doi":"10.1109/CSR57506.2023.10224978","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224978","url":null,"abstract":"The exponential technological advancement is turning everyone towards an easy and efficient way of financial transactions. Consequently, the use of credit cards is rising substantively, creating a more incredible opportunity for fraudsters which is an alarming concern nowadays since a fraudster may use several tools, techniques and tactics to make a fraudulent transaction. As a countermeasure, an effective fraud detection mechanism and highly sensitive data privacy preservation are imperative to detect fraudulent transactions. This paper proposes a Federated Learning (FL)-based fraud detection system since its key feature preserves the privacy of highly sensitive data, wherein the model could be trained without sharing the credit card data in the cloud. We contemplate three Deep Learning (DL) models: Convolutional Neural Network (CNN), Multi-Layer Perceptron (MLP), and Long Short-Term Memory (LSTM) regarding the FL approach. Subsequently, to overcome the data imbalance issue, four distinct sampling techniques are explored to inspect the impact on the traditional centralized and FL approaches. Finally, we further investigate and compare FL-based detection systems with diversified state-of-the-art models. Our experimental results demonstrate that the proposed method is superior compared with state-of-the-art methods and achieves high detection rate of 99.51%, 98.77% and 98.20% respectively for CNN, MLP and LSTM models.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122188197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain 现代供应链生态系统的持续安全保障及其在自动驾驶中的应用:安全自动驾驶领域的FISHY方法
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224971
George Hatzivasilis, S. Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, G. Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, C. Basile, J. F. Ruiz
{"title":"Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain","authors":"George Hatzivasilis, S. Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, G. Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, C. Basile, J. F. Ruiz","doi":"10.1109/CSR57506.2023.10224971","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224971","url":null,"abstract":"Cyber security always forms a significant aspect of ICT infrastructure, with threats on supply-chain networks gaining greater attention nowadays. The secure autonomous driving domain presents a unique set of challenges for supply-chain security. Autonomous vehicles rely on a complex ecosystem of hardware and software components, many of which are sourced from third-party suppliers. Ensuring the security and reliability of this supply-chain is essential to maintain the safety and viability of autonomous driving as a technology. To address these challenges, a continuous security assurance approach is necessary. This involves ongoing monitoring, assessment, and improvement of security measures to detect and mitigate potential vulnerabilities in the supply chain. Key measures may include regular vulnerability assessments, penetration testing, and security awareness training for employees and contractors, as well as the implementation of security controls such as secure communication protocols, access controls, and intrusion detection systems. By adopting a continuous security assurance approach for supply chain security in the secure autonomous driving domain, organizations can safeguard their operations and ensure the safety of passengers and other road users. This paper presents a security assurance and certification solution for supply-chain services. Security elements are continuously assessed based on AI operations. The proposal is implemented under the EU funded project FISHY and applied in the supply-chain of secure autonomous driving (SADE) pilot with REMOTIS smart vehicles. Nevertheless, it is a generic solution that can be applied in any domain.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132383108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Control-Implications-Based Side-Channel Monitoring for Embedded Systems 基于控制含义的嵌入式系统侧信道监控
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224942
Sandip Roy, Benjamin Drozdenko
{"title":"Control-Implications-Based Side-Channel Monitoring for Embedded Systems","authors":"Sandip Roy, Benjamin Drozdenko","doi":"10.1109/CSR57506.2023.10224942","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224942","url":null,"abstract":"Monitoring of embedded-system anomalies which influence the regulation of physical-world processes is examined. Specifically, detection of such anomalies using remote measurements of the controlled process itself - which we refer to as a controlled-process side channel - is studied. A physics-guided anomaly detection algorithm is proposed, which decomposes the measurement signal into patterned and ambient responses, and exploits sparsity in both components. Detailed simulations of two controlled-process side channels on an autonomous underwater vehicle, namely a motion guidance system and a sonar transmitter, are undertaken to assess the methodology. Our preliminary findings suggest that controlled process side channels may be sufficient for monitoring anomalies, when traditional side channel signals are difficult to measure.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132233308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies 海运业中的网络事件情景:风险评估和缓解策略
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224972
Mohamed Ben Farah, M. Al-Kadri, Yussuf Ahmed, Raouf Abouzariba, Mohamed. Benfarah, Omar. Alkadri, Yussuf Ahmed, X. Bellekens
{"title":"Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation Strategies","authors":"Mohamed Ben Farah, M. Al-Kadri, Yussuf Ahmed, Raouf Abouzariba, Mohamed. Benfarah, Omar. Alkadri, Yussuf Ahmed, X. Bellekens","doi":"10.1109/CSR57506.2023.10224972","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224972","url":null,"abstract":"The maritime industry is facing an escalating concern of cybersecurity threats, which can be attributed to the rapid growth of digital technologies and the recent adoption of autonomous and semi-autonomous shipping. To address this issue, various published papers have proposed cyberattack scenarios aiming to increase cybersecurity awareness and enhance the security of maritime systems. This research aims to assess the cybersecurity threats in the maritime sector by presenting three practical cyberattack scenarios and their corresponding risks and mitigation strategies. The first scenario involves the risks associated with utilizing the systems of a tug-boat as part of an attack vector, the second scenario examines the systems involved in vessel harbour manoeuvres using a laser docking system or Radar, and the third scenario examines an insider attack through malicious or unauthorized access to the Berthing Aid System (BAS).","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"36 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131754685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Membership Inference Attacks in Machine Learning as a Service 减少机器学习即服务中的成员推理攻击
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224960
Myria Bouhaddi, K. Adi
{"title":"Mitigating Membership Inference Attacks in Machine Learning as a Service","authors":"Myria Bouhaddi, K. Adi","doi":"10.1109/CSR57506.2023.10224960","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224960","url":null,"abstract":"The increasing use of Machine Learning as a Service (MLaaS) has raised privacy and security issues due to membership inference attacks. These attacks can extract sensitive information such as the identification of an individual's participation in a training dataset, by exploiting a binary classifier with limited access. The attacks exploit weaknesses in the decision boundaries of the model, and can lead to the disclosure of private information. However, the current defenses against such attacks, such as those based on differential privacy or regularization, have significant limitations. Therefore, further research is needed to develop effective defenses that maintain the utility of machine learning models while providing formal guarantees, even in the presence of strategic adversaries. In this paper, we focus on mitigating the risks of black-box inference attacks against machine learning models as a service. We propose a defense mechanism that brings the attacker's inference classifier into a zone of uncertainty, rendering it unable to classify a data point as a member or non-member. This mechanism takes into account the attacker's behavior by modeling the interaction between defense and attacker as a game, considering potential gains in confidentiality and costs. Our experiments on two datasets demonstrate the effectiveness of our approach in mitigating membership inference attacks. Furthermore, our defense mechanism outperforms existing defenses by offering superior privacy-utility-performance tradeoffs.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122795734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Patch Management: An Empirical Evaluation Study 自动化补丁管理:一个实证评估研究
2023 IEEE International Conference on Cyber Security and Resilience (CSR) Pub Date : 2023-07-31 DOI: 10.1109/CSR57506.2023.10224970
Vida Ahmadi Mehri, P. Arlos, E. Casalicchio
{"title":"Automated Patch Management: An Empirical Evaluation Study","authors":"Vida Ahmadi Mehri, P. Arlos, E. Casalicchio","doi":"10.1109/CSR57506.2023.10224970","DOIUrl":"https://doi.org/10.1109/CSR57506.2023.10224970","url":null,"abstract":"Vulnerability patch management is one of IT orga-nizations' most complex issues due to the increasing number of publicly known vulnerabilities and explicit patch deadlines for compliance. Patch management requires human involvement in testing, deploying, and verifying the patch and its potential side effects. Hence, there is a need to automate the patch management procedure to keep the patch deadline with a limited number of available experts. This study proposed and implemented an automated patch management procedure to address mentioned challenges. The method also includes logic to automatically handle errors that might occur in patch deployment and ver-ification. Moreover, the authors added an automated review step before patch management to adjust the patch prioritization list if multiple cumulative patches or dependencies are detected. The result indicated that our method reduced the need for human intervention, increased the ratio of successfully patched vulnerabilities, and decreased the execution time of vulnerability risk management.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"15 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124070094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信