Journal of Cyber Security, Privacy Issues and Challenges最新文献

筛选
英文 中文
Wireless Networking: Smart Agriculture 无线网络:智能农业
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2024-04-20 DOI: 10.46610/jcspic.2024.v03i01.005
V. B. Vijayan, Abdul Haleem, Abdullah Irbaz, Ali Abdul Rehman, Farhan Pasha
{"title":"Wireless Networking: Smart Agriculture","authors":"V. B. Vijayan, Abdul Haleem, Abdullah Irbaz, Ali Abdul Rehman, Farhan Pasha","doi":"10.46610/jcspic.2024.v03i01.005","DOIUrl":"https://doi.org/10.46610/jcspic.2024.v03i01.005","url":null,"abstract":"Modern agriculture has found Wireless Sensor Networks (WSNs) to be a crucial technology, providing real time monitoring and control capabilities to maximize crop productivity and resource utilization. In smart agriculture, wireless sensor networks (WSNs) have become a game changer because they make it possible to monitor and manage environmental elements in real time that are crucial for crop development and output. Wireless Sensor Networks (WSNs) have emerged as a transformative technology in smart agriculture, facilitating real time monitoring and control of environmental parameters critical for crop growth and productivity. This study provides a thorough overview of WSN applications in agriculture, emphasizing how they might improve crop output and resource management. WSNs gather information on soil moisture, temperature, humidity, light intensity, and other significant variables by placing sensor nodes around the farm. These data are wirelessly transferred to a central server or cloud platform, where they are processed by sophisticated analytics, and machine learning algorithms to give farmers useful information. Through the integration of WSN technology, farmers can implement precision agriculture techniques, tailoring irrigation schedules, fertilizer application, and pest control measures based on real time environmental conditions. Moreover, WSNs enable early detection of plant stressors and diseases, allowing for timely interventions to mitigate crop losses. Through case studies and field experiments, we demonstrate the effectiveness of WSNs in optimizing resource usage, reducing environmental impact, and improving overall farm productivity. As the agricultural industry continues to face challenges related to population growth, climate change, and resource scarcity, the adoption of WSNs offers a sustainable solution to enhance food production while minimizing inputs and preserving natural resources.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"1 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140681126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Perspectives in Artificial IoT: Current Trends, Research Directions 人工物联网的新视角:当前趋势与研究方向
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2024-04-16 DOI: 10.46610/jcspic.2024.v03i01.004
Aiswarya Dwarampudi, Manas Kumar Yogi
{"title":"Novel Perspectives in Artificial IoT: Current Trends, Research Directions","authors":"Aiswarya Dwarampudi, Manas Kumar Yogi","doi":"10.46610/jcspic.2024.v03i01.004","DOIUrl":"https://doi.org/10.46610/jcspic.2024.v03i01.004","url":null,"abstract":"Artificial Internet of Things (AIoT) amalgamates Artificial Intelligence (AI) technologies with the Internet of Things (IoT), creating a paradigm that promises transformative impacts across various domains. This paper presents an exploration of novel perspectives in AIoT, focusing on current trends and emerging research directions. We begin by providing an overview of the evolving landscape of AIoT, highlighting recent advancements and applications. Subsequently, we delve into the challenges encountered in AIoT systems, encompassing issues such as scalability, security, privacy, and interoperability. The core of this paper lies in delineating promising research directions that offer innovative solutions to address these challenges. We discuss the role of edge and fog computing, security enhancement techniques, AI driven analytics, autonomous systems, human computer interaction, resilient networks, and ethical considerations in shaping the future of AIoT. Through case studies and real world examples, we illustrate the practical implications of embracing novel perspectives in AIoT. Additionally, we forecast emerging trends and provide recommendations for researchers, practitioners, and policymakers to capitalize on the opportunities presented by AIoT. This paper serves as a comprehensive guide for understanding the current state, identifying challenges, and envisioning the future of AIoT research and practice.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"348 12‐13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140698338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Probabilistic Data Structures for detecting distributed denial of service (DDoS) attacks 应用概率数据结构检测分布式拒绝服务(DDoS)攻击
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2024-03-30 DOI: 10.46610/jcspic.2024.v03i01.002
Mangadevi Atti, Manas Kumar Yogi
{"title":"Application of Probabilistic Data Structures for detecting distributed denial of service (DDoS) attacks","authors":"Mangadevi Atti, Manas Kumar Yogi","doi":"10.46610/jcspic.2024.v03i01.002","DOIUrl":"https://doi.org/10.46610/jcspic.2024.v03i01.002","url":null,"abstract":"This paper investigates the utilization of probabilistic data structures as a novel approach for enhancing the detection and mitigation of DDoS attacks. Traditional methods often struggle to keep pace with the evolving nature of DDoS attacks, leading to high false positive rates and scalability challenges. In contrast, probabilistic data structures offer efficient, scalable, and memory efficient solutions for analyzing large volumes of network traffic and identifying DDoS related patterns and anomalies. Key probabilistic data structures include Bloom filters, Count Min Sketches, and HyperLogLog, each providing unique capabilities for detecting DDoS attacks based on set membership, frequency estimation, and cardinality approximation, respectively. This paper examines the strengths, limitations, and practical considerations of leveraging probabilistic data structures for DDoS detection through a comprehensive analysis of methodology, experimental results, case studies, challenges, and future directions. By exploring the application of probabilistic data structures, this research aims to provide valuable insights and recommendations for cybersecurity practitioners, researchers, and stakeholders involved in combating DDoS attacks and safeguarding critical digital assets.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"45 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140362083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CP-ABE Unveiled: A Path to Fine-Tuned Cloud Data Security CP-ABE揭秘:优化云数据安全之路
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2023-08-21 DOI: 10.46610/jcspic.2023.v02i02.004
Keerti Naregal, Vijay Kalman
{"title":"CP-ABE Unveiled: A Path to Fine-Tuned Cloud Data Security","authors":"Keerti Naregal, Vijay Kalman","doi":"10.46610/jcspic.2023.v02i02.004","DOIUrl":"https://doi.org/10.46610/jcspic.2023.v02i02.004","url":null,"abstract":"Cloud computing has revolutionized data storage and processing, but it has also introduced significant challenges in ensuring data privacy and access control. In this research paper, we explore and understand the potential of Ciphertext Policy Attribute-Based Encryption (CP-ABE) as a cryptographic solution for enhancing cloud security through fine-grained access control. Our exploration begins with a comprehensive analysis of CP-ABE, including its architecture, components, and encryption/decryption processes. We delve into the security aspects of CP-ABE, evaluating its strengths, advantages, and vulnerabilities. We conduct a thorough performance evaluation, analyzing its computational overhead and comparingits efficiency with other encryption techniques commonly used in the cloud. Our findings indicate that CP-ABE offers fine-grained access control and data confidentiality, empowering data owners to enforce complex access policies. However, challenges related to attribute authority trust, key escrow, and policy complexity must be addressed to ensure its robustness in real-world deployments.Ciphertext Policy Attribute-Based Encryption (CP-ABE) introduces a hopeful method for dealing with the challenges related to controlling who can access information and keeping data private in cloud computing.Our research contributes valuable insights into CP-ABE's security, performance, and practical applications.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Computing –Security Issues and Threats 云计算-安全问题和威胁
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2023-06-01 DOI: 10.46610/jcspic.2023.v02i02.001
Yash Tembhare, Lokesh Kachhi, Amber Agey
{"title":"Cloud Computing –Security Issues and Threats","authors":"Yash Tembhare, Lokesh Kachhi, Amber Agey","doi":"10.46610/jcspic.2023.v02i02.001","DOIUrl":"https://doi.org/10.46610/jcspic.2023.v02i02.001","url":null,"abstract":"One of the most exciting topics in the IT business nowadays is cloud computing. The cloud computing resource paradigm has changed the geography of computing. Computing's promises of cost reductions, enormous scalability, lower dependency on third parties, and increased trust have attracted both businesses and individuals. This increases the power of information technology. Cloud computing has grown significantly recently in the field of information technology. Concerns over information security are growing as more and more people and businesses store information in the cloud. Many companies, including Microsoft, which is considered a software development powerhouse, are working on developing cloud services. Customers are reluctant to change their business practices ignoring the excitement around it, to the cloud. Protection is one of them. All three aspects are covered by a comprehensive cloud security plan to ensure the foundation is solid. Each can be viewed through a different lens or perspective on cloud security. For your company to use the cloud to grow securely, a solid plan must decrease risk (security controls), defend against threats (secure coding and deployment), and overcome obstacles (adopt cultural and technical solutions).","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Military Grade FPV Drone for Enemy Recognition 军用级FPV无人机敌情识别
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2023-02-13 DOI: 10.46610/jcspic.2023.v02i01.002
J. Kumari, Ravishankar M, M. Jatkar, Prajjwal Kumar, Poornima Arya, Ankit Garg
{"title":"Military Grade FPV Drone for Enemy Recognition","authors":"J. Kumari, Ravishankar M, M. Jatkar, Prajjwal Kumar, Poornima Arya, Ankit Garg","doi":"10.46610/jcspic.2023.v02i01.002","DOIUrl":"https://doi.org/10.46610/jcspic.2023.v02i01.002","url":null,"abstract":"The drone is self-made using raspberry pi and different drone components like a flight controller, gold plated motors, jio-fi Router, battery, camera, and much more equipment. The raspberry-pi present in the drone is equipped with ML-Algos which uses the camera to detect and recognize enemies and the operator using an android application which remotely controls all these. It will render real-time video from the Raspberry-pi with the help of a jio-fi router and will show which enemies are detected. Moreover, due to the first-person view, the operator will be able to know the expected position of the enemies too far planning his/her prior approaches. Moreover, the drone is equipped with a modern Network Jammer, made using the knowledge of cybersecurity, which will disable all the networks in the area so that there cannot be any reinforcement from the target enemy side. Drone helps in the surveillance process by rendering over an area and providing us with information about the place. The use of CNN and some more algorithms of machine learning helps the drone to function well in regards to recognizing any object and especially the faces of the person. Rendering of the video will be done through the android base application which will provide the rendering of the environment. The drone can be controlled in two ways. One of which is through manual use and the other way is by being fully controlled by the application that is the software. In this process, the control is given in the hand of the software where it would be controlled by the android-based application. Drones are of two types civil drones and Military drones and both them can be different in their usage as well as the manufacturing process in civil drones the payload will be less because it is not used for the officials' purpose, in the military grade FPV drone, the payload should be of the few measurements so that it can be used for the officials' purposes and others.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124544056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Simplified Panic App for Women Security in Android Based Devices 开发一个基于Android设备的女性安全简化恐慌应用程序
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2023-01-24 DOI: 10.46610/jcspic.2023.v02i01.001
B. Begum, J. Manickavasagam, B. Naveen, P. Pandeeswaran, M. Panish Kanth
{"title":"Developing a Simplified Panic App for Women Security in Android Based Devices","authors":"B. Begum, J. Manickavasagam, B. Naveen, P. Pandeeswaran, M. Panish Kanth","doi":"10.46610/jcspic.2023.v02i01.001","DOIUrl":"https://doi.org/10.46610/jcspic.2023.v02i01.001","url":null,"abstract":"Women’s safety is the biggest issue in society which, until has been the most significant subject. Women's safety is crucial, whether it be at work, at home, or elsewhere. Only a small number of crimes against women, particularly rape incidents, cause considerable panic and fear. Most women, regardless of age, experience violence, domestic abuse, and rape. It's crucial to be cautious and safe when traveling at night, which is when women should typically do so. Even if the government is taking the necessary safeguards for their protection, there are free safety applications for women that can help them stay secure. The majority of the women have their smartphones on them. Therefore, it is vital to install at least one personal safety app. This work is centered on the creation of an intuitive mobile application that anyone with a smartphone with the app loaded can access. Its goal is to offer the quickest and easiest method of getting in touch with the closest source of assistance. Press the power button twice to call the nearest contact using the GPS during an emergency. The phone begins to vibrate, and a siren begins to ring. This functionality makes it an ideal tool for everyone by assisting with genuine crises and everyday safety. Anyone can utilize this smart program 24 hours a day, 7 days a week, for free.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123966039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Distancing Using YOLOv3 Model 使用YOLOv3模型保持社交距离
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2022-08-17 DOI: 10.46610/jcspic.2022.v01i02.005
Alok Barddhan, Sansar Singh Chauhan, Anurag Gupta
{"title":"Social Distancing Using YOLOv3 Model","authors":"Alok Barddhan, Sansar Singh Chauhan, Anurag Gupta","doi":"10.46610/jcspic.2022.v01i02.005","DOIUrl":"https://doi.org/10.46610/jcspic.2022.v01i02.005","url":null,"abstract":"Social isolation has been found to be a successful strategy for preventing the coronavirus from spreading around the world. In order to stop the virus from spreading as possible, the system is designed to analyses social distance by measuring the space between individuals. To lessen the impact of the epidemic, this technology uses input from camera frames to calculate the distance between people. By analyzing a video stream collected from a security camera, this is accomplished. The video is adjusted for a higher perspective and sent in to the prepared item discovery model YOLOv3 as input. The Common Object in Context is used to train the YOLOv3 model (COCO). A previously shot video supported the suggested system. The system's results and consequences demonstrate how to assess the space between different people and decide whether rules are being broken. People are addressed by a red jumping box if the distance is below the minimal threshold value and a green jumping box otherwise. This technique can be improved to recognize social exclusion in a real time setting.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128320804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach Towards Development of News App 新闻App开发的新途径
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2022-08-04 DOI: 10.46610/jcspic.2022.v01i02.004
Anju Gera, Jitendra Singh
{"title":"A New Approach Towards Development of News App","authors":"Anju Gera, Jitendra Singh","doi":"10.46610/jcspic.2022.v01i02.004","DOIUrl":"https://doi.org/10.46610/jcspic.2022.v01i02.004","url":null,"abstract":"Modern devices like smart phones and tablets have become increasingly powerful in recent years. This generation of mobile technology is opening the gates to the android apps; the websites are being phased out and the mobile phones and apps are appearing very fast. As mobile devices are becoming more like PCs, they came to replace objects we tend to carry around, such as checkbooks, credit cards, planners, mp3-mp4 players, etc.; in short, we are all using them to accomplish our daily tasks and for learning. Our application that falls into this category is the ‘News App’. The OS (operating system) of this app is ‘Android’, which is most dominating operating system in modern day smart phones and tablets. The main motive of this work is to provide people a handy and simple android application through which they can access all type of news and information. This project (apk file) is developed by using the Java programming language and mark-up language XML (Extensible Markup Language) by using Android Studio, which contains a number of tools that help to develop mobile applications for the Android Platform.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121336588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Transaction System Using Face Recognition 使用人脸识别的安全交易系统
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2022-07-08 DOI: 10.46610/jcspic.2022.v01i02.003
Saksham Gupta, Sanchit Tomar, Ritu Bansal, Sameer Choudhary, Pardeep Kaur
{"title":"Secure Transaction System Using Face Recognition","authors":"Saksham Gupta, Sanchit Tomar, Ritu Bansal, Sameer Choudhary, Pardeep Kaur","doi":"10.46610/jcspic.2022.v01i02.003","DOIUrl":"https://doi.org/10.46610/jcspic.2022.v01i02.003","url":null,"abstract":"The use of online payment is increasing dramatically in today's environment. As a result, this initiative was created to protect payments against internet scams. The project's main goal is to create a secure payment system that uses face recognition and Open CV in Python. It makes use of the confidence level, which is defined as the value generated by the system and used to determine the forecast's accuracy. Several graphic modules were combined with a pattern mirror to create this piece. Before entering a PIN, the system in this project uses face detection and a proxy. Because it embeds elements of the users' faces to increase system accuracy, the algorithm employed in this research will improve the security and efficiency of face recognition. To strengthen security, we have introduced three-fold encryption while the data is being transmitted for authentication. The user's bank balance is confirmed and the work is completed after the system has completed its verification. The suggested system outperforms existing functions, and its user-friendly interface makes it simple to use.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134405477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信