International Journal of Computer Network and Information Security最新文献

筛选
英文 中文
An Enhancement of Identity Based Conditional Privacy-preserving Authentication Process in Vehicular Ad Hoc Networks 增强车载 Ad Hoc 网络中基于身份的条件式隐私保护认证流程
International Journal of Computer Network and Information Security Pub Date : 2024-02-08 DOI: 10.5815/ijcnis.2024.01.09
K. L. Narayanan, R. Naresh
{"title":"An Enhancement of Identity Based Conditional Privacy-preserving Authentication Process in Vehicular Ad Hoc Networks","authors":"K. L. Narayanan, R. Naresh","doi":"10.5815/ijcnis.2024.01.09","DOIUrl":"https://doi.org/10.5815/ijcnis.2024.01.09","url":null,"abstract":"In general, Vehicular Ad hoc Networks (VANETs) are permitting the communication between one vehicle with neighboring vehicles, infrastructure, and Road-Side Unit (RSU). In this, vehicle platoon is commonly known as the vehicle driving pattern it categorizes the batching of the vehicle in the on the trot fashion. It has been reviewed as an effective resolution to mitigate the reduction in traffic blockage and to widen the opulence of the travel. However, the malicious activities of any unauthorized person in VANET are increased the damage to authorized vehicles. In this manuscript, the Identity based Conditional Privacy-Preserving Authentication (ID-CPPA) signature scheme is proposed to detect the malignant command vehicle very efficiently by the consumer vehicle. In this, the proposed ID-CPPA method uses one-way hash functions for improving the efficiency of Road-Side Unit (RSU) signing and verification of a messages. In order to provide better concealment to the vehicle, Phase Truncated Fourier Transform based asymmetric encryption algorithm (PTFT-AE) is proposed. Thus, the proposed ID-CPPA-PTFT-AE approach has achieved 28.96%, 37.58%, 31.36% higher security rate and 25.8%, 37.9%, 42.6% lower delay than the existing MPDC-LPNS, PPSR-GS, and WCAA-TST methods respectively.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":" 35","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139792478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Auto-metric Graph Neural Network based Blockchain Technology for Secured Dynamic Optimal Routing in MANET 基于区块链技术的自动计量图神经网络,用于城域网中的安全动态优化路由选择
International Journal of Computer Network and Information Security Pub Date : 2024-02-08 DOI: 10.5815/ijcnis.2024.01.10
Francis H. Shajin, Muthusamy Palaniappan, P. Rajesh
{"title":"Auto-metric Graph Neural Network based Blockchain Technology for Secured Dynamic Optimal Routing in MANET","authors":"Francis H. Shajin, Muthusamy Palaniappan, P. Rajesh","doi":"10.5815/ijcnis.2024.01.10","DOIUrl":"https://doi.org/10.5815/ijcnis.2024.01.10","url":null,"abstract":"Mobile ad hoc network (MANET) routing is a generous tactic used for allocating packets to the base station (BS). During the operations of routing, occurrence of malicious node embellishes the mobile ad hoc network operations. For that reason, a trusted distributed routing protocol is obliged that maintains the routing buttressing and the proficiency of mobile ad hoc network. To overcome these challenging issues, Auto-Metric Graph Neural Network based Blockchain technology is proposed in this manuscript for Secured Dynamic Optimal Routing in MANET (BC-SDOR-MANET-AGNN). The proposed approach is simulated in NS-2 tool. The proposed BC-SDOR-MANET-AGNN approach attains 76.26%, 65.57%, 42.9% minimal delay during 25% malicious routing environment, 73.06%, 63.82%, 38.84% less delay during 50% malicious routing environment when analyzed to the existing models, like enhanced hybrid secure multipath routing protocol for MANET (BC-SDOR-MANET-GAHC), an improved ad hoc on-demand distance vector routing security approach based on BC technology in MANET (BC-SDOR-MANET-AODV-MQS) and block chain-based better approach for the mobile ad-hoc networking protocol using ensemble algorithm (BC-SDOR-MANET-E-BATMAN) methods.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":"13 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139854358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Spider Monkey Optimization Mechanism with Simulated Annealing for Resource Provisioning in Cloud Environment 用于云环境资源调配的混合蜘蛛猴优化机制与模拟退火法
International Journal of Computer Network and Information Security Pub Date : 2024-02-08 DOI: 10.5815/ijcnis.2024.01.03
A. Archana, N. Kumar, Z. Khan
{"title":"Hybrid Spider Monkey Optimization Mechanism with Simulated Annealing for Resource Provisioning in Cloud Environment","authors":"A. Archana, N. Kumar, Z. Khan","doi":"10.5815/ijcnis.2024.01.03","DOIUrl":"https://doi.org/10.5815/ijcnis.2024.01.03","url":null,"abstract":"Cloud computing is an emerging concept that makes better use of a large number of distributed resources. The most significant issue that affects the cloud computing environment is resource provisioning. Better performance in the shortest amount of time is an important goal in resource provisioning. Create the best solution for dynamically provisioning resources in the shortest time possible. This paper aims to perform resource provisioning with an optimal performance solution in the shortest time. Hybridization of two Meta-heuristics techniques, such as HSMOSA (Hybrid Spider Monkey Optimization with Simulated Annealing), is proposed in resource provisioning for cloud environment. Finds the global and local value using Spider Monkey Optimization's (SMO) social behavior and then utilizes Simulated Annealing (SA) to search around the global value in each iteration. As a result, the proposed approach aids in enhancing their chances of improving their position. The CloudSimPlus Simulator is used to test the proposed approach. The fitness value, execution time, throughput, mean, and standard deviation of the proposed method were calculated over various tasks and execution iterations. These performance metrics are compared with the PSO-SA algorithm. Simulation results validate the better working of the proposed HSMOSA algorithm with minimum time compared to the PSO-SA algorithm.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":" 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139793191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Container-to-fog Service Integration using the DIS-LC Algorithm 使用 DIS-LC 算法整合集装箱到雾化服务
International Journal of Computer Network and Information Security Pub Date : 2024-02-08 DOI: 10.5815/ijcnis.2024.01.07
A. K, Pradeep. G.
{"title":"Container-to-fog Service Integration using the DIS-LC Algorithm","authors":"A. K, Pradeep. G.","doi":"10.5815/ijcnis.2024.01.07","DOIUrl":"https://doi.org/10.5815/ijcnis.2024.01.07","url":null,"abstract":"Containers have newly emerged as a potential way to encapsulate and execute programs. In contrast to virtual machines, each container does not have its own kernel and instead shares the host systems. Containers on the other hand are more lightweight, need fewer data to be sent between network nodes and boot up faster than VM. This makes containers a feasible choice, particularly for hosting and extending the services across the fog computing architecture. The major purpose of this paper is to describe the Distributed Intelligent Scheduling based Lightweight Container algorithm (DIS-LC), which is a revolutionary way for container to fog-services integration and resource optimization. In this proposed algorithm is compared to the least connection algorithm, round-robin algorithm and Ant Colony Optimization-based Light Weight Container (ACO-LWC). Operating cost and traffic cost are used to validate the suggested algorithm. Fog node running costs are divided into two categories: CPU and memory. When compared to current algorithms, quantitative research demonstrates that the proposed DIS-LC scheme gets the greatest performance in terms of all metrics. This demonstrate the algorithm is efficient. Finally, the performance of containerized services and resource management systems is evaluated using the iFogSim simulator.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":" 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139793467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Performing Operations on the Elements of GF(2m) Using a Sparse Table 使用稀疏表对 GF(2m) 元素进行运算的方法
International Journal of Computer Network and Information Security Pub Date : 2024-02-08 DOI: 10.5815/ijcnis.2024.01.05
Ivan Dychka, M. Onai, Andrii Severin, Cennuo Hu
{"title":"Method of Performing Operations on the Elements of GF(2m) Using a Sparse Table","authors":"Ivan Dychka, M. Onai, Andrii Severin, Cennuo Hu","doi":"10.5815/ijcnis.2024.01.05","DOIUrl":"https://doi.org/10.5815/ijcnis.2024.01.05","url":null,"abstract":"For the implementation of error-correcting codes, cryptographic algorithms, and the construction of homomorphic methods for privacy-preserving, there is a need for methods of performing operations on elements GF(2m) that have low computational complexity. This paper analyzes the existing methods of performing operations on the elements GF(2m) and proposes a new method based on the use of a sparse table of elements of this field. The object of research is the processes of operations in information security systems. The subject of research is methods and algorithms for performing operations on elements GF(2m). The purpose of this research is to develop and improve methods and algorithms for performing operations on elements GF(2m) to reduce their computational complexity. Empirical methods and methods of mathematical and software modeling are used in the research. Existing and proposed algorithms are implemented using the C# programming language in the Visual Studio 2015 development environment. Experimental research of existing and developed algorithms was carried out according to the proposed method, which allows to level the influence of additional parameters on the results of the research. The conducted research on methods for performing operations on the elements GF(2m) shows the expediency of using a sparse table of field elements. This approach makes it possible to reduce the amount of RAM required for the software and hardware implementation of the developed method compared to the classical tabular method, which requires storage of a full table of correspondence of the polynomial and index representation of the field elements. In addition, the proposed method gives an increase in speed of more than 4 times for the operations of calculating the multiplicative inverse element and exponentiation. As a result, the proposed method allows to reduce the computational complexity of error-correcting codes, cryptographic algorithms, and the homomorphic methods for privacy-preserving.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":" 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139792054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Risk Assessment of Cyber Threats Based on Average and Fuzzy Set Theory 基于平均数和模糊集理论的网络威胁风险比较评估
International Journal of Computer Network and Information Security Pub Date : 2024-02-08 DOI: 10.5815/ijcnis.2024.01.02
Oleksandr Evgeniyovych Korystin, Oleksandr Korchenko, Svitlana Kazmirchuk, Serhii Demediuk, Oleksandr Korystin
{"title":"Comparative Risk Assessment of Cyber Threats Based on Average and Fuzzy Set Theory","authors":"Oleksandr Evgeniyovych Korystin, Oleksandr Korchenko, Svitlana Kazmirchuk, Serhii Demediuk, Oleksandr Korystin","doi":"10.5815/ijcnis.2024.01.02","DOIUrl":"https://doi.org/10.5815/ijcnis.2024.01.02","url":null,"abstract":"Applied results of scientific analysis should be the key focus of modern security research. A comparative analysis of research results obtained using different methods, as an applied task, forms a broader basis for interpreting the results and substantiating the conclusions. A social survey and expert opinion research were conducted to implement the general concept of strategic analysis of cybersecurity in Ukraine. Using the method based on determining the average value in a certain set of estimates, as well as the method based on the theory of fuzzy sets, the risks of spreading certain cyber threats in Ukraine were assessed. The results were compared. Although the use of different measurement methods led to some differences in quantitative risk indicators, the comparative analysis of the ratio of the level of different cyber threats did not change significantly. At the same time, the fuzzy set method provided more flexible interpretation of the results to characterize cyber threats in terms of their upward or downward trend. In general, the combined approach to cyber threat risk assessment can become an important risk management tool, as it takes advantage of different methods and allows for a deeper understanding of the current situation and the formation of more informed management decisions.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139794589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhancement of Identity Based Conditional Privacy-preserving Authentication Process in Vehicular Ad Hoc Networks 增强车载 Ad Hoc 网络中基于身份的条件式隐私保护认证流程
International Journal of Computer Network and Information Security Pub Date : 2024-02-08 DOI: 10.5815/ijcnis.2024.01.09
K. L. Narayanan, R. Naresh
{"title":"An Enhancement of Identity Based Conditional Privacy-preserving Authentication Process in Vehicular Ad Hoc Networks","authors":"K. L. Narayanan, R. Naresh","doi":"10.5815/ijcnis.2024.01.09","DOIUrl":"https://doi.org/10.5815/ijcnis.2024.01.09","url":null,"abstract":"In general, Vehicular Ad hoc Networks (VANETs) are permitting the communication between one vehicle with neighboring vehicles, infrastructure, and Road-Side Unit (RSU). In this, vehicle platoon is commonly known as the vehicle driving pattern it categorizes the batching of the vehicle in the on the trot fashion. It has been reviewed as an effective resolution to mitigate the reduction in traffic blockage and to widen the opulence of the travel. However, the malicious activities of any unauthorized person in VANET are increased the damage to authorized vehicles. In this manuscript, the Identity based Conditional Privacy-Preserving Authentication (ID-CPPA) signature scheme is proposed to detect the malignant command vehicle very efficiently by the consumer vehicle. In this, the proposed ID-CPPA method uses one-way hash functions for improving the efficiency of Road-Side Unit (RSU) signing and verification of a messages. In order to provide better concealment to the vehicle, Phase Truncated Fourier Transform based asymmetric encryption algorithm (PTFT-AE) is proposed. Thus, the proposed ID-CPPA-PTFT-AE approach has achieved 28.96%, 37.58%, 31.36% higher security rate and 25.8%, 37.9%, 42.6% lower delay than the existing MPDC-LPNS, PPSR-GS, and WCAA-TST methods respectively.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":"358 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139852132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Optimized Authentication Mechanism for Mobile Agents by Using Machine Learning 利用机器学习优化移动代理认证机制
International Journal of Computer Network and Information Security Pub Date : 2023-12-08 DOI: 10.5815/ijcnis.2023.06.03
Pradeep Kumar, N. Singhal, Mohammad Asim, Avimanyou K. Vatsa
{"title":"An Optimized Authentication Mechanism for Mobile Agents by Using Machine Learning","authors":"Pradeep Kumar, N. Singhal, Mohammad Asim, Avimanyou K. Vatsa","doi":"10.5815/ijcnis.2023.06.03","DOIUrl":"https://doi.org/10.5815/ijcnis.2023.06.03","url":null,"abstract":"A mobile agent is a small piece of software which works on direction of its source platform on a regular basis. Because mobile agents roam around wide area networks autonomously, the protection of the agents and platforms is a serious worry. The number of mobile agents-based software applications has increased dramatically over the past year. It has also enhanced the security risks associated with such applications. Most of the security mechanisms in the mobile agent architecture focus solely on platform security, leaving mobile agent safety to be a significant challenge. An efficient authentication scheme is proposed in this article to address the situation of protection and authentication of mobile agent at the hour of migration of across multiple platforms in malicious environment. An authentication mechanism for the mobile agent based on the Hopfield neural network proposed. The mobile agent’s identity and password are authenticate using the specified mechanism at the moment of execution of assigned operation. An evaluative assessment has been offered, along with their complex character, in comparison to numerous agent authentication approaches. The proposed method has been put into practice, and its different aspects have been put to the test. In contrasted to typical client-server and code-on-demand approaches, the analysis shows that computation here is often more safe and simpler.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":"29 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138587725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvising QoS through Cross-Layer Optimization in MANETs 通过城域网跨层优化提高服务质量
International Journal of Computer Network and Information Security Pub Date : 2023-12-08 DOI: 10.5815/ijcnis.2023.06.05
Surabhi Patel, Heman Pathak
{"title":"Improvising QoS through Cross-Layer Optimization in MANETs","authors":"Surabhi Patel, Heman Pathak","doi":"10.5815/ijcnis.2023.06.05","DOIUrl":"https://doi.org/10.5815/ijcnis.2023.06.05","url":null,"abstract":"In Mobile Adhoc Networks (MANETs), nodes are mobile and interact through wireless links. Mobility is a significant advantage of MANETs. However, due to the unpredictable nature of mobility, the link may fail frequently, degrading the Quality of Service (QoS) of MANETs applications. This paper outlines a novel Ad hoc On-Demand Distance Vector with Proactive Alternate Route Discovery (AODV-PARD) routing protocol that uses signal strength-based link failure time estimation. The node predicts the link failure time and warns the upstream node through a warning message about the failure. On the basis of this information, a mechanism for identifying alternate routes is started in order to reroute traffic to the alternate route prior to the link failure. It significantly reduces packet loss and improves all the QoS parameters. The suggested protocol is compared to the traditional Ad hoc On-Demand Distance Vector (AODV) routing protocol and shows that the outlined protocol results in an improvement in QoS.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":"15 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138587880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Security of Blockchain-based Electronic Health Record: A Systematic Review 基于区块链的电子健康记录的安全性:系统回顾
International Journal of Computer Network and Information Security Pub Date : 2023-12-08 DOI: 10.5815/ijcnis.2023.06.09
C. E. Exceline, Sivakumar Nagarajan
{"title":"The Security of Blockchain-based Electronic Health Record: A Systematic Review","authors":"C. E. Exceline, Sivakumar Nagarajan","doi":"10.5815/ijcnis.2023.06.09","DOIUrl":"https://doi.org/10.5815/ijcnis.2023.06.09","url":null,"abstract":"The healthcare industry makes rampant strides in sharing electronic health records with upgraded efficiency and delivery. Electronic health records comprise personal and sensitive information of patients that are confidential. The current security mechanism in cloud computing to store and share electronic health records results in data breaches. In the recent era, blockchain is introduced in storing and accessing electronic health records. Blockchain is utilized for numerous applications in the healthcare industry, such as remote patient tracking, biomedical research, collaborative decision making and patient-centric data sharing with multiple healthcare providers. In all circumstances, blockchain guarantees immutability, data privacy, data integrity, transparency, interoperability, and user privacy that are strictly required to access electronic health records. This review paper provides a systematic study of the security of blockchain-based electronic health records. Moreover, based on thematic content analysis of various research literature, this paper provides open challenges in the blockchain-based electronic health record.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138588421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信