2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)最新文献

筛选
英文 中文
Russian Invasion of Ukraine 2022: Time to Reconsider Small Drones? 2022年俄罗斯入侵乌克兰:是时候重新考虑小型无人机了?
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/cycon58705.2023.10181494
A. Kajander
{"title":"Russian Invasion of Ukraine 2022: Time to Reconsider Small Drones?","authors":"A. Kajander","doi":"10.23919/cycon58705.2023.10181494","DOIUrl":"https://doi.org/10.23919/cycon58705.2023.10181494","url":null,"abstract":"In May 2022, an Estonian-Russian man was arrested at the Estonian border with Russia for attempting to supply the Russian armed forces with crowdfunded drones. The case had two intertwined striking aspects: the law under which the individual was prosecuted and the drones themselves. While it is no revelation that drones are dual-use goods, the drones in question were three DJI Mini 2, which, owing to their small size and features, are exempt from the current European Union (EU) restrictions on the export of dual-use goods. Such small commercial drones have proven to be excellent for aerial surveillance and indirect fire correction on the battlefield. Consequently, the individual was prosecuted for ‘knowingly supporting a foreign act of aggression’ based on a newly added provision to the Estonian Penal Code.This paper discusses the growing importance of commercial small drones on the battlefield, which are not included in Annex I of the EU Dual-Use Regulation, as well as the implications of this on the EU’s dual-use goods export restrictions, and the legal framework that is available to EU member states for preventing the delivery of such drones to support a war of aggression. The paper is divided into three sections, the first dedicated to the role of small drones on the battlefield in Ukraine, the second to the EU’s dual-use export restrictions and the third to the role of domestic legal frameworks that may prohibit exports of such drones through laws criminalizing aggression.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125083195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weaponizing Cross-Border Data Flows: An Opportunity for NATO? 将跨境数据流武器化:北约的机会?
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/cycon58705.2023.10181730
Matt Malone
{"title":"Weaponizing Cross-Border Data Flows: An Opportunity for NATO?","authors":"Matt Malone","doi":"10.23919/cycon58705.2023.10181730","DOIUrl":"https://doi.org/10.23919/cycon58705.2023.10181730","url":null,"abstract":"On July 12, 2022, following the Russian invasion of Ukraine, the European Data Protection Board (EDPB) issued a warning to data exporters, reminding them Russia did not have an adequacy agreement governing cross-border data flows of Europeans’ personal data to Russia. As such, blanket transfers of personal data were not permissible under European data protection law; instead, compliance needed to be assessed by data exporters on a case-by-case basis, and, where it could not be ensured, transfers should be suspended. This article views the EDPB declaration as a shot across the bow and extrapolates it to a future where cross-border data flow restrictions are deployed as an instrument of cooperative security as well as deterrence and defense. Given the potential sensitivity of personal information being transferred across borders, along with the economic value inherent in data flows in the digital economy, restrictions on cross-border data flows have the potential to inflict serious harm. This article explores the broader implications of this potential practice, assessing its security opportunities and drawbacks. The article advocates for reforming North Atlantic Treaty Organization (NATO) members’ divergent approaches to the regulation of processing of cross-border data transfers; it suggests these member states can and should overcome their splintered approaches by establishing a “safe data zone” to facilitate cross-border data flows among members, where NATO retains the power to issue embargoes on cross-border data flows to specific jurisdictions while otherwise leaving decisional authority for transfers to supranational entities like the European Union (EU) or sovereign states. This approach would increase cross-border data flows between allies while permitting restrictions with adversaries where doing so achieves security objectives.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114432553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CyCon 2023 Cover Page CyCon 2023封面
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/cycon58705.2023.10182009
{"title":"CyCon 2023 Cover Page","authors":"","doi":"10.23919/cycon58705.2023.10182009","DOIUrl":"https://doi.org/10.23919/cycon58705.2023.10182009","url":null,"abstract":"","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114460117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Diplomacy: NATO/EU Engaging with the Global South 网络外交:北约/欧盟与全球南方的接触
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/cycon58705.2023.10182095
E. Izycki, B. V. Niekerk, Trishana Ramluckan
{"title":"Cyber Diplomacy: NATO/EU Engaging with the Global South","authors":"E. Izycki, B. V. Niekerk, Trishana Ramluckan","doi":"10.23919/cycon58705.2023.10182095","DOIUrl":"https://doi.org/10.23919/cycon58705.2023.10182095","url":null,"abstract":"Since the end of the Cold War, there has been a movement towards a multipolar world as the geopolitical tectonic plates shift. The Russian invasion of Ukraine is likely to be treated by future historians as the turning point ushering in this new multipolar era. In this new context, (cyber) neutrality seems challenging for regions such as Latin America and Africa. These countries, which sit outside the geopolitical fault lines, naturally tend to strive for a balanced, neutral position. Both regions have strong economic ties with China, while maintaining cultural and historical connections with Europe and the US, despite the complex legacy of the colonial and Cold War eras. However, this equilibrium might lean towards the Chinese and Russian positions regarding cyber policy. It is particularly relevant to address this question given that the regions contain numerous swing states. We will present evidence that NATO and the EU are losing ground to China and Russia’s views on cyberspace, based on three subjects of study: (i) Global South voting patterns in the UN; (ii) the absence of Global South countries in the roster of like-minded countries in the collaborative attribution of advanced persistent threats and recent Russian cyber campaigns against Ukraine; (iii) the use of offensive cyber capabilities by Global South countries to exert information control and surveillance (mostly enabled by Western companies). This paper argues that NATO and the EU must face reality and engage with the Global South – particularly Africa and Latin America – to maintain a competitive advantage in cyber policy. We suggest a more straightforward values-based approach that involves NATO and the EU engaging in capacity-building and information-sharing with the Global South.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125970847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveling the Playing Field: Equipping Ukrainian Freedom Fighters with Low-Cost Drone Detection Capabilities 平衡竞争环境:装备乌克兰自由战士低成本无人机探测能力
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/CyCon58705.2023.10181421
Conner Bender, Jason Staggs
{"title":"Leveling the Playing Field: Equipping Ukrainian Freedom Fighters with Low-Cost Drone Detection Capabilities","authors":"Conner Bender, Jason Staggs","doi":"10.23919/CyCon58705.2023.10181421","DOIUrl":"https://doi.org/10.23919/CyCon58705.2023.10181421","url":null,"abstract":"The unprecedented conflict in Ukraine has seen heavy use of asymmetric warfare tactics and techniques, including the use of drones. In particular, Da-Jiang Innovations (DJI) drones have played a major role in the conflict, supporting tactical military operations for both opponents by providing reconnaissance and explosive ordnance across the battlefield. The same drones have also been leveraged to provide humanitarian aid across Ukraine. However, Ukraine has publicly accused DJI of helping Russia target Ukrainian civilians by allowing Russian military forces to acquire and use a proprietary DJI drone-tracking system called AeroScope. This system has allowed Russian forces to geolocate and target Ukrainian civilians piloting DJI drones, which has often led to kinetic strikes against drone operators. Modern DJI drones beacon telemetry and remote identification information that allows the AeroScope system to identify and track the drone and operator at ranges of up to 30 miles away. Cost and ease of access are the primary factors that have hindered Ukraine’s ability to counter this threat with AeroScope systems of their own to identify and locate DJI drones and operators used by Russia. This has provided an asymmetric advantage to Russia on the battlefield. Although cybersecurity researchers have demonstrated that DJI drone identification wireless datalinks are unencrypted, it remains a mystery how to collect and decode these signals over the air in real time using low-cost and widely available software-defined radios. This paper addresses the problem by reverse engineering DJI drone identification signals and message structures to detect drone IDs over OcuSync and Enhanced Wi-Fi datalinks. A functioning open-source prototype is detailed that can detect DJI OcuSync drones using two HackRF One software-defined radios. The methodology can easily be adopted by others to rapidly assemble and deploy low-cost DJI drone and operator detection and geolocation systems that are functionally similar to the AeroScope system.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"227 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113997708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling 5G Threat Scenarios for Critical Infrastructure Protection 关键基础设施防护的5G威胁场景建模
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/CyCon58705.2023.10182173
G. Holtrup, William Blonay, Martin Strohmeier, Alain Mermoud, Jean-Pascal Chavanne, Vincent Lenders
{"title":"Modeling 5G Threat Scenarios for Critical Infrastructure Protection","authors":"G. Holtrup, William Blonay, Martin Strohmeier, Alain Mermoud, Jean-Pascal Chavanne, Vincent Lenders","doi":"10.23919/CyCon58705.2023.10182173","DOIUrl":"https://doi.org/10.23919/CyCon58705.2023.10182173","url":null,"abstract":"Fifth-generation cellular networks (5G) are currently being deployed by mobile operators around the globe. 5G is an enabler for many use cases and improves security and privacy over 4G and previous network generations. However, as recent security research has revealed, the 5G standard still has technical security weaknesses for attackers to exploit. In addition, the migration from 4G to 5G systems takes place by first deploying 5G solutions in a non-standalone (NSA) manner, where the first step of the 5G deployment is restricted to the new radio aspects of 5G. At the same time, the control of user equipment is still based on 4G protocols; that is, the core network is still the legacy 4G evolved packet core (EPC) network. As a result, many security vulnerabilities of 4G networks are still present in current 5G deployments. To stimulate the discussion about the security risks in current 5G networks, particularly regarding critical infrastructures, we model possible threats according to the STRIDE threat classification model. We derive a risk matrix based on the likelihood and impact of eleven threat scenarios (TS) that affect the radio access and the network core. We estimate that malware or software vulnerabilities on the 5G base station constitute the most impactful threat scenario, though not the most probable. In contrast, a scenario where compromised cryptographic keys threaten communications between network functions is both highly probable and highly impactful. To improve the 5G security posture, we discuss possible mitigations and security controls. Our analysis is generalizable and does not depend on the specifics of any particular 5G network vendor or operator.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"2 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120999324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business@War: The IT Companies Helping to Defend Ukraine Business@War:帮助保卫乌克兰的IT公司
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/cycon58705.2023.10181980
Bilyana Lilly, Kenneth Geers, Gregory J. Rattray, R. Koch
{"title":"Business@War: The IT Companies Helping to Defend Ukraine","authors":"Bilyana Lilly, Kenneth Geers, Gregory J. Rattray, R. Koch","doi":"10.23919/cycon58705.2023.10181980","DOIUrl":"https://doi.org/10.23919/cycon58705.2023.10181980","url":null,"abstract":"During Russia’s invasion of Ukraine, foreign private-sector information technology (IT) firms have provided hardware, software, and cyber intelligence to Kyiv. This assistance has helped Ukraine to stay online during the war by providing stronger network architecture and enhanced security. This paper examines the specific companies involved, the products and services they have offered, and the risks and opportunities associated with their assistance. The authors compile a list of lessons learned and offer actionable policy recommendations so that governments and IT firms are better able to navigate this crisis and similar crises in the future.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122156183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts 非参加国在其领土上的黑客参与武装冲突时的义务
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/CyCon58705.2023.10182021
Marie Thøgersen
{"title":"Obligations of Non-participating States When Hackers on Their Territory Engage in Armed Conflicts","authors":"Marie Thøgersen","doi":"10.23919/CyCon58705.2023.10182021","DOIUrl":"https://doi.org/10.23919/CyCon58705.2023.10182021","url":null,"abstract":"One of the most striking aspects of cyberspace is the diffusion of power to the individual. Even a single person can, from the comfort of their own home, cause considerable harm to States on the other side of the globe. Since the Russian invasion of Ukraine, both belligerent States have successfully deployed novel techniques for the mobilization of individuals in cyberspace. The absence of geographical boundaries in cyberspace triggers important questions regarding the international legal implications for States whose territories are being used for such operations. To assess how the legal framework stands the test of reality, this article examines the possible international legal obligations of non-participating States hosting individuals conducting malicious cyber operations against Russia orchestrated by the IT Army of Ukraine. After a legal characterization of the activities of the IT Army, this article scrutinizes the legal norms conferring obligations on territorial States and accounts for the prevailing ambiguities surrounding their application. The principle of due diligence entails an obligation for States to not allow their territories to be used for cyber operations affecting the rights of, and producing serious adverse consequences for, other States. Special challenges surround the assessment in the context of an armed conflict; the status of a State as an aggressor entails important nuances to the prima facie rights of the State. Based on an analysis of how the legal framework applies to the activities of the IT Army of Ukraine, the article concludes that for non-participating States, the legality of refraining from exercising due diligence will often be contingent on contentious legal questions regarding countermeasures and self-defence.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130574911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Request for a Surveillance Tower: Evasive Tactics in Cyber Defense Exercises 对监视塔的请求:网络防御演习中的规避战术
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/CyCon58705.2023.10182014
Young-Jun Maeng, Mauno Pihelgas
{"title":"Request for a Surveillance Tower: Evasive Tactics in Cyber Defense Exercises","authors":"Young-Jun Maeng, Mauno Pihelgas","doi":"10.23919/CyCon58705.2023.10182014","DOIUrl":"https://doi.org/10.23919/CyCon58705.2023.10182014","url":null,"abstract":"The cyber defense exercise (CDX) is an emerging live-fire exercise that enables diverse teams with different roles to train in one game. To evaluate the cyber defense capabilities of the training audience, organizers prepare various scores using different scoring methods ranging from technical to non-technical. The technical scores in Locked Shields, for example, consist of an availability check, a usability check, the success of the red team (RT) attack, and forensics.Immersed in scores due to excessive competition, a blue team (BT) may unnecessarily focus on the scoring process, aiming to perform evasive tactics (ET), which boosts scores unfairly by abusing the weaknesses of the scoring system. ET has occurred in various forms in existing CDXs, and similar cases have been found in the recent iteration of CDXs, meaning that ET is becoming BT’s selectable strategy.Such a phenomenon is undesirable since it will reduce the reliability of the evaluation and the effectiveness of the training. In this paper, we provide an overview of an availability check and examine ET that appeared in both the availability check and RT’s evidence-obtaining process, followed by several mitigations to them. We also discuss evidence and usability issues of ET in CDX and conclude by emphasizing the importance of supporting the green team (GT) in researching and implementing a robust scoring system.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133757729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sharpening the Spear: China’s Information Warfare Lessons from Ukraine 磨砺长矛:从乌克兰学到的中国信息战经验
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon) Pub Date : 2023-05-29 DOI: 10.23919/cycon58705.2023.10181559
Nate Beach-Westmoreland
{"title":"Sharpening the Spear: China’s Information Warfare Lessons from Ukraine","authors":"Nate Beach-Westmoreland","doi":"10.23919/cycon58705.2023.10181559","DOIUrl":"https://doi.org/10.23919/cycon58705.2023.10181559","url":null,"abstract":"This paper examines the lessons about information warfare (IW) that the People’s Republic of China (PRC) is likely to be drawing from the war in Ukraine. To do so, it first analyzes how the People’s Liberation Army (PLA) has developed its conception of states contesting the information environment (IE), formed by studying wars and protest movements since the Gulf War. The paper describes the PLA’s evolving assessment of the growing importance, scope, and features of this contest. Because PRC strategic analysts typically frame the war in Ukraine as a proxy conflict between the United States (U.S.) and Russia, the paper then briefly compares all three states’ doctrinal beliefs about IW. Second, the paper analyzes PRC theorists’ assessments of the information conflict dimension of the Russia–Ukraine war. Principally, these insights concern narrative setting around conflicts, the initial war’s long-term impact on the IE, and the role of cyberattacks in IW. Finally, the paper offers recommendations to a strategic-level NATO audience concerning IE engagement with the PRC from defensive and offensive perspectives. This paper’s main sources are journal and newspaper articles by leading PLA-affiliated IW theorists written for an internal national security audience.","PeriodicalId":391972,"journal":{"name":"2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122289213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信