MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)最新文献

筛选
英文 中文
A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things 基于基尼指数的物联网网络攻击防范对策
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9021050
Bryan N. Groves, Cong Pu
{"title":"A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things","authors":"Bryan N. Groves, Cong Pu","doi":"10.1109/MILCOM47813.2019.9021050","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021050","url":null,"abstract":"As an essential ingredient of Internet of Things (IoT), IPv6-based Low Power and Lossy Networks (LLNs) largely consisting of various resource-constrained devices are expeditiously proliferating and playing an important role in the realization of ubiquitous computing and communication infrastructure. In order to provide efficient and reliable communication between resource-constrained devices and connect them to the Internet, a novel routing protocol for LLNs, a.k.a. RPL, has been proposed. However, due to wide distribution, openness, and instinctive resource constraints of IoT devices, IoT and its applications become an ideal target for cyber attacks. Thus, investigating potential attacks against IoT-related routing protocol is a top priority to improve the security of the future IoT systems. In this paper, we propose a Gini index-based countermeasure to effectively detect and mitigate sybil attack in RPL- based LLNs, where the malicious node multicasts an excessive number of DODAG Information Solicitation (DIS) messages with different fictitious identities to cause the legitimate nodes to restart the Trickle algorithm frequently and broadcast a large number of DODAG Information Object (DIO) messages to quickly drain the limited energy resource of legitimate nodes. We conduct extensive simulation experiments for performance evaluation and comparison using OMNeT++, and the simulation results show that the proposed countermeasure can accurately detect and effectively mitigate sybil attack, indicating a viable approach against cyber attack in the Internet of Things.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Wideband Automated Planning Tool (WAPT) Prototype Development 宽带自动规划工具(WAPT)原型开发
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020751
R. Gobbi, J. Hay, Nathaniel A Tanner, Larry Lipke, Scot Miller, J. A. Kirk
{"title":"Wideband Automated Planning Tool (WAPT) Prototype Development","authors":"R. Gobbi, J. Hay, Nathaniel A Tanner, Larry Lipke, Scot Miller, J. A. Kirk","doi":"10.1109/MILCOM47813.2019.9020751","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020751","url":null,"abstract":"Major focus in this software prototype development is the application of automated algorithmic techniques to the planning of communications services on military and commercial satellite systems. The emphasis to date is on priority-based military systems, but the flexibility to accommodate commercial systems with varied service access mechanisms is built in. The overall goal is to decrease scenario planning times from days-to-weeks to minutes on standard, but, capable laptop computers. This level of performance has been met in developmental testing, and will enable resilient operations of satellite networks by supporting fast reallocation of terminal resources. The types of algorithms employed depend on the application. For service planning when terminal endpoints are within antenna beam coverage areas, a deterministic linear programming algorithm is employed. When beam coverage is not provided for new services, i.e., when many uncovered terminal endpoints exist, a probabilistic approach using a genetic algorithm is employed to heuristically search for antenna beam configurations meeting prioritized access requests. Alternatively, when lower volumes of new, uncovered endpoints exist, specialized beam adjustment algorithms are applied. Additionally, a framework has been developed to enable operations in an enterprise environment with automated service access request (SAR) processes, which further advances resilient satellite network operations.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116058737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving Crowd-sensing for Dynamic Spectrum Access 保护隐私的动态频谱接入人群感知
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020713
Erald Troja, Joshua Gitter
{"title":"Privacy-preserving Crowd-sensing for Dynamic Spectrum Access","authors":"Erald Troja, Joshua Gitter","doi":"10.1109/MILCOM47813.2019.9020713","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020713","url":null,"abstract":"Dynamic spectrum access (DSA) is a well established paradigm which addresses the spectrum shortage caused by the rapid growth of connected wireless devices. In contrast to the legacy fixed spectrum allocation policies, DSA allows license-exempt users to access the licensed spectrum bands when not in use by their respective owners. While the database-driven DSA model is well suited for the TV white-space databases, other more fluid spectrum opportunities, such as the NOAA spectrum bands, remain exploreable only by either a solitary cyclostationary or multinodal cooperative signal detection and classification. While the multinodal, cooperative method offers improved signal detection and classification over solitary cyclostationary sensing, it does not provide any means of preserving the user's location privacy. Furthermore, both sensing methods suffer from very large delay due in part from the quiet periods they need to undergo in order to identify incumbent signal. To this end, we propose a location privacy-preserving crowd-sensing scheme for the DSA paradigm. Our proposed method provides location privacy for the crowd-sensing workers by leveraging the ElGamal cryptographic primitive, and it provides query obfuscation for the querying user through the $k{-}$anonymity paradigm. Through extensive experimentation, we show that our method is efficient for a realistic deployment.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124671182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation Warder:基于多特征建模和基于图的相关性的在线内部威胁检测系统
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020931
Jianguo Jiang, Jiuming Chen, Tianbo Gu, K. Choo, Chao Liu, Min Yu, Wei-qing Huang, P. Mohapatra
{"title":"Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation","authors":"Jianguo Jiang, Jiuming Chen, Tianbo Gu, K. Choo, Chao Liu, Min Yu, Wei-qing Huang, P. Mohapatra","doi":"10.1109/MILCOM47813.2019.9020931","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020931","url":null,"abstract":"Existing insider threat detection models and frameworks generally focus on characterizing and detecting malicious insiders, for example by fusing behavioral analysis, machine learning, psychological characters, management measures, etc. However, it remains challenging to design a practical insider threat detection scheme that can be efficiently implemented and deployed in a real-world system. For example, existing approaches focus on extracting features from user behavioral activities but they lack in-depth correlation and decision making for suspected alerts; thus, resulting in high false positives and low detection accuracy. In this work, we propose a novel online insider threat detection system, Warder, which leverages diverse feature dimensions (using neural language processing) and fuses content and behavior features to create a user's daily profile to facilitate threat detection. Besides, hypergraph-based threat scenario feature tree is designed to correlate suspicious users' activities with threat scenarios to further screen the users. In practice, Warder can also be constantly updated using newly discovered features and threat scenarios. We evaluate the performance of Warder using the public CMU CERT dataset, as well as that of approaches from the Oxford group and CMU group. Findings from the evaluation demonstrate that Warder outperforms the other two competing approaches.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123896830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Coalition C3 Information Exchange Using Binary Symbolic Vectors 使用二进制符号向量的联盟C3信息交换
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020950
Christopher Simpkin, I. Taylor, A. Preece, G. Bent, Richard J. Tomsett, R. Ganti, O. Worthington
{"title":"Coalition C3 Information Exchange Using Binary Symbolic Vectors","authors":"Christopher Simpkin, I. Taylor, A. Preece, G. Bent, Richard J. Tomsett, R. Ganti, O. Worthington","doi":"10.1109/MILCOM47813.2019.9020950","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020950","url":null,"abstract":"Communicating information between entities requires there to be a common understanding of the language and the concepts being exchanged. Where information has to be rapidly conveyed, or where the communications are limited, the use of specialized language or symbols is often used but this requires the various parties to know the precise meaning of the terminology (i.e. the parties can correctly interpret the language or symbols used). In this paper we propose a new potential approach for information exchange that makes use of binary symbolic vectors to semantically represent the information to be exchanged. We show how such vector representations can be used to semantically convey large amounts information between coalition partners in a compact representation that can be interpreted at different levels of semantic abstraction. In this paper we illustrate the concept by showing how a complex text (in this case Shakespeare's play Hamlet) can be represented using symbolic vectors. We discuss how such representations can be efficiently communicated between coalition partners and how this can significantly reduce the communications requirements. We develop the concept to illustrate how symbolic vectors could be used to perform command and control functions in distributed decentralized coalition operations.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125541886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
QFloor: Queue Delay Reduction in Dynamic Backpressure Networks 动态背压网络中队列延迟的减少
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020717
Laura Poplawski Ma, S. Zabele, C. Merlin, G. Lauer, S. Dabideen
{"title":"QFloor: Queue Delay Reduction in Dynamic Backpressure Networks","authors":"Laura Poplawski Ma, S. Zabele, C. Merlin, G. Lauer, S. Dabideen","doi":"10.1109/MILCOM47813.2019.9020717","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020717","url":null,"abstract":"QFloor addresses the high queuing delays inherent in backpressure forwarding, including in dynamic or oscillatory networks. QFloor is purely local and reactionary: it adds placeholder bytes to the advertised queue values with the explicit goal of keeping the minimum queue depth at a static pre-configured number of bytes. QFloor deals with queue depth dynamics by looking at the queue depth over a dynamically-sized observation window of time, adding placeholder bytes if that minimum depth is too high, and removing placeholder bytes whenever the backpressure algorithm dictates a dequeue from a queue with only placeholder bytes. Experimentation in a fully-implemented backpressure forwarding system shows that QFloor can reduce the end-to-end latency by more than 90% even in a network with only one and two-hop paths.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128633077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense 当自主智能软件将对抗自主智能恶意软件:网络防御的可能未来
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9021038
P. Théron, A. Kott
{"title":"When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense","authors":"P. Théron, A. Kott","doi":"10.1109/MILCOM47813.2019.9021038","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9021038","url":null,"abstract":"In the coming years, the future of military combat will include, on one hand, artificial intelligence-optimized complex command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and networks and, on the other hand, autonomous intelligent Things fighting autonomous intelligent Things at a fast pace. Under this perspective, enemy forces will seek to disable or disturb our autonomous Things and our complex infrastructures and systems. Autonomy, scale and complexity in our defense systems will trigger new cyber-attack strategies, and autonomous intelligent malware (AIM) will be part of the picture. Should these cyber-attacks succeed while human operators remain unaware or unable to react fast enough due to the speed, scale or complexity of the mission, systems or attacks, missions would fail, our networks and C4ISR would be heavily disrupted, and command and control would be disabled. New cyber-defense doctrines and technologies are therefore required. Autonomous cyber defense (ACyD) is a new field of research and technology driven by the defense sector in anticipation of such threats to future military infrastructures, systems and operations. It will be implemented via swarms of autonomous intelligent cyber-defense agents (AICAs) that will fight AIM within our networks and systems. This paper presents this cyber-defense technology of the future, the current state of the art in this field and its main challenges. First, we review the rationale of the ACyD concept and its associated AICA technology. Then, we present the current research results from NATO's IST-152 Research Task Group on the AICA Reference Architecture. We then develop the 12 main technological challenges that must be resolved in the coming years, besides ethical and political issues.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116001486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Data Augmentation for Blind Signal Classification 盲信号分类中的数据增强
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020842
Peng Wang, Manuel M. Vindiola
{"title":"Data Augmentation for Blind Signal Classification","authors":"Peng Wang, Manuel M. Vindiola","doi":"10.1109/MILCOM47813.2019.9020842","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020842","url":null,"abstract":"The Army Rapid Capabilities Office (RCO) sponsored a Blind Signal Classification Competition seeking Artificial Intelligence/Machine Learning (AI/ML) algorithms to automatically identify the modulation schemes of RF signal from complex-valued IQ (in-phase quadrature) symbols. Our team, dubbed “Deep Dreamers”, participated in the competition and placed 3rd out of 42 active teams across industry, academia, and government. Deep learning methods such as CNN, Residual Neural Network (ResNet), and Long Short-Term Memory (LSTM) are the fundamental neural network models we used to develop a multi-class classifier. The key to our success was to use ensemble learning to average the outputs of multiple diverse classifiers. In this following study, we apply Data Augmentation (DA) to the data set in order to further increase the performance of our models. The goal of data augmentation is to push the decision boundary learned from the data set toward a better decision boundary by adding more meaningful data points. An effective data augmentation method for RF signals is to add white Gaussian noise to the existing RF signals. Individual DL models and ensemble learning methods such as blending trained over the augmented data set significantly improve the prediction accuracies for weak RF signals and achieve comparable results to the two leading teams in the competition.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122384147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Very High Throughput Internet of Things Networks with $K$ access points and $K$ devices 具有K美元接入点和K美元设备的极高吞吐量物联网网络
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020725
Anil Kumar Yerrapragada, B. Kelley
{"title":"Very High Throughput Internet of Things Networks with $K$ access points and $K$ devices","authors":"Anil Kumar Yerrapragada, B. Kelley","doi":"10.1109/MILCOM47813.2019.9020725","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020725","url":null,"abstract":"This paper presents an Internet of Things (IoT) model with extremely high multi-user capacity. The IoT model has $K$ access points communicating with $K$ devices in an all-to-all configuration, generally referred to as $K$ -User MIMO. To the author's awareness, the combination of multi-user IoT within a $K$ -User MIMO framework has not been previously analyzed. The IoT $K$ -User MIMO networks described improve upon prior multi-user capacity results through the application of a new beamformer modality. This paper also derives a new theorem for the upper bound $K$ -user MIMO capacity as a function of $K$ and illustrates its application in realistic scenarios. The analytical results are compared with 5G Massive MIMO with an equivalent number of network antennas. Under this framework, an upper bound multi-user capacity of 2500 bits/sec/Hz for a $K$ = 7 IoT network in Rayleigh fading is illustrated. This represents a 10 $X$ higher upper bound capacity compared to 5G Massive MIMO. Finally, realistic $K$ = 3 network performance is analyzed in Rayleigh Fading environments with LTE Typical Urban power delay profiles. The cumulative distribution of the capacity is presented for 100, 500, and 1000 meter cell geometries.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122697471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phase Noise, SATCOM and MIL-STD-188-165B 相位噪声,SATCOM和MIL-STD-188-165B
MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) Pub Date : 2019-11-01 DOI: 10.1109/MILCOM47813.2019.9020818
L. Gonzalez, J. Rippon, J. Besse
{"title":"Phase Noise, SATCOM and MIL-STD-188-165B","authors":"L. Gonzalez, J. Rippon, J. Besse","doi":"10.1109/MILCOM47813.2019.9020818","DOIUrl":"https://doi.org/10.1109/MILCOM47813.2019.9020818","url":null,"abstract":"The purpose of this paper is to describe how Phase Noise effects SHF Satellite Communications (SATCOM), and the consequences of the current specifications in MIL-STD-188-165B. This paper leverages the definitions codified in IEEE Std 1139™ − 2008 to show that the impact of Phase Noise on an M-ary phase shift key (PSK) carrier cannot be treated as additive white Gaussian Noise (AWGN) when SATCOM links have realistic energy- per-symbol to noise power spectral density ratio $E_{s}/N_{0}$.","PeriodicalId":371812,"journal":{"name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信