Journal of Web Engineering最新文献

筛选
英文 中文
Enhancing Security in Low-Power Wide-Area (LPWA) IoT Environments: The Role of HSM, Tamper-Proof Technology, and Quantum Cryptography 增强低功耗广域 (LPWA) 物联网环境的安全性:HSM、防篡改技术和量子密码学的作用
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2363
Hyung-Sub Han;Tae-hyuk Choi;Jong-Seong Yoon
{"title":"Enhancing Security in Low-Power Wide-Area (LPWA) IoT Environments: The Role of HSM, Tamper-Proof Technology, and Quantum Cryptography","authors":"Hyung-Sub Han;Tae-hyuk Choi;Jong-Seong Yoon","doi":"10.13052/jwe1540-9589.2363","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2363","url":null,"abstract":"Low-power wide-area (LPWA) networks are integral to expanding Internet of Things (IoT) applications, offering extensive coverage with low power consumption. However, these networks face significant security challenges due to their widespread deployment and inherent constraints. In order to provide secure services in an LPWA IoT environment, important information stored in IoT devices (encryption keys, device unique numbers, etc.) must be safely protected from external hacking or theft by physical access, and it is necessary to develop tamper-proof technology to enhance physical security. Meanwhile, with so many ruggedized IoT devices processing and transmitting sensitive information, security systems are essential to protect the integrity and privacy of IoT data. This paper explores the critical role of hardware security modules (HSMs), tamper-proof technology, and quantum cryptography in enhancing the physical, network, and data security of LPWA IoT environments. We propose operational strategies for HSMs, tamper-proof technology in ruggedized LPWA IoT settings, and a quantum key distribution (QKD)-based IPsec solution for robust network and data security.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"787-800"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747167","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Path Calculation for Multi-Ring Based Packet-Optical Transport Networks 基于多环的分组-光传输网络的最优路径计算
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2364
Hyuncheol Kim
{"title":"Optimal Path Calculation for Multi-Ring Based Packet-Optical Transport Networks","authors":"Hyuncheol Kim","doi":"10.13052/jwe1540-9589.2364","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2364","url":null,"abstract":"Multi-domain optical transport networks are inherently non-interoperable and require integrated orchestration and path provisioning mechanisms at the network-wide level. Moreover, ensuring the network's survivability is a critical issue. While the MPLS-TP (multi-protocol label switching-transport profile) defines various protection and recovery mechanisms as standards, it does not address methods for calculating and selecting protection and recovery paths. Therefore, an algorithm is needed to calculate and set up paths to ensure quick protection and recovery across the entire integrated network, minimizing conflicts in protection and recovery at the packet optical integrated network level. In this paper, we proposed an algorithm that calculates and sets a path that enables rapid protection and recovery in an MPLS-TP network composed of a multi-ring-mesh topology. To this end, this study proposes the concept of a transparent node (T-node) for calculating link-disjoint SPF (shortest path first) in a multi-ring network with dual or more rings. A T-node is a node in a ring with more than a dual ring and indicates that the node has been used once in route calculation. Therefore, during path calculation, a T-node can be used as a source node and an intermediate node but not as a destination node.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"801-812"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747169","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Functional Requirements and Inspection Items for AI System Change Management and Model Improvement on the Web Platform 网络平台上人工智能系统变更管理和模型改进的功能要求和检查项目研究
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2366
Dongsoo Moon;Seongjin Ahn
{"title":"A Study on Functional Requirements and Inspection Items for AI System Change Management and Model Improvement on the Web Platform","authors":"Dongsoo Moon;Seongjin Ahn","doi":"10.13052/jwe1540-9589.2366","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2366","url":null,"abstract":"The rapid adoption of artificial intelligence (AI) on the web platform across multiple sectors has highlighted not only its inherent technical hurdles, such as unpredictability and lack of transparency, but also significant societal concerns. These include the misuse of AI technology, invasions of privacy, discrimination fueled by biased data, and infringements of copyright. Such challenges jeopardize the sustainable growth of AI and risk the erosion of societal trust, industry adoption and financial investment. This analysis explores the AI system's lifecycle, emphasizing the essential continuous monitoring and the need for creating trustworthy AI technologies. It advocates for an ethically oriented development process to mitigate adverse effects and support sustainable progress. The dynamic and unpredictable nature of AI, compounded by variable data inputs and evolving distributions, requires consistent model updates and retraining to preserve the integrity of services. Addressing the ethical aspects, this paper outlines specific guidelines and evaluation criteria for AI development, proposing an adaptable feed-back loop for model improvement. This method aims to detect and rectify performance declines through prompt retraining, thereby cultivating robust, ethically sound AI systems. Such systems are expected to maintain performance while ensuring user trust and adhering to data science and web technology standards. Ultimately, the study seeks to balance AI's technological advancements with societal ethics and values, ensuring its role as a positive, reliable force across different industries. This balance is crucial for harmonizing innovation with the ethical use of data and science, thereby facilitating a future where AI contributes significantly and responsibly to societal well-being.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"831-848"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747166","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Estimating Theme Park Attendance Using the AdaBoost Algorithm Based on Weather Information from the Korea Meteorological Administration Web 基于韩国气象局网络天气信息,使用 AdaBoost 算法估算主题公园入园人数的研究
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2368
Jinkook Kim;Soohyun Kim
{"title":"A Study on Estimating Theme Park Attendance Using the AdaBoost Algorithm Based on Weather Information from the Korea Meteorological Administration Web","authors":"Jinkook Kim;Soohyun Kim","doi":"10.13052/jwe1540-9589.2368","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2368","url":null,"abstract":"The purpose of this study is to propose an efficient machine learning model based on five years of data for Seoul Grand Park in Republic of Korea, depending on the weather and day characteristics, and to increase its effectiveness as a strategic foundation for national theme park management and marketing. To this end, the AdaBoost model, which reflects the characteristics of the weather and the day of the week, was recently compared with the actual number of visitors and the predicted number of visitors to analyze the accuracy. The analysis showed 30 days of abnormal cases, and the overall annual distribution was found to show similar patterns. Abnormal cases required details of wind speed, average relative humidity, and fine dust concentration for weather information, and it was derived that more accurate predictions would be possible considering variables such as group visitors, new events, and unofficial holidays.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"869-884"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747165","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Attacks on Pre-Trained Deep Learning Models for Encrypted Traffic Analysis 对用于加密流量分析的预训练深度学习模型的对抗性攻击
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2361
Byoungjin Seok;Kiwook Sohn
{"title":"Adversarial Attacks on Pre-Trained Deep Learning Models for Encrypted Traffic Analysis","authors":"Byoungjin Seok;Kiwook Sohn","doi":"10.13052/jwe1540-9589.2361","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2361","url":null,"abstract":"For web security, it's essential to accurately classify traffic across various web applications to detect malicious activities lurking within network traffic. However, the encryption protocols for privacy protection, such as TLS 1.3 and IPSec, make it difficult to apply traditional traffic classification methods like deep packet inspection (DPI). Recently, the advent of deep learning has significantly advanced the field of encrypted traffic analysis (ETA), outperforming traditional traffic analysis approaches. Notably, pre-trained deep learning based ETA models have demonstrated superior analytical capabilities. However, the security aspects of these deep learning models are often overlooked during the design and development process. In this paper, we conducted adversarial attacks to evaluate the security of pre-trained ETA models. We targeted ET-BERT, a state-of-the-art model demonstrating superior performance, to generate adversarial traffic examples. To carry out the adversarial example generation, we drew inspiration from adversarial attacks on discrete data, such as natural language, defining fluency from a network traffic perspective and proposing a new attack algorithm that can preserve this fluency. Finally, in our experiments, we showed our target model is vulnerable to the proposed adversarial attacks.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"749-768"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747168","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Priority-Based QoS Extensions and IAM Improvements 基于优先级的 QoS 扩展和 IAM 改进
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-09-01 DOI: 10.13052/jwe1540-9589.2362
Gyudong Park;Hyoek Jin Choi
{"title":"Priority-Based QoS Extensions and IAM Improvements","authors":"Gyudong Park;Hyoek Jin Choi","doi":"10.13052/jwe1540-9589.2362","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2362","url":null,"abstract":"The command and control system operates in a harsh and dynamic environment with limited resources and have a very high risk of failure or malfunction. In the case of military information systems, including the com-mand and control system, the efficiency and effectiveness of system resource management are very important and required. Therefore, the application of a QoS-like approach is necessary to improve the operational effectiveness of all command and control system resources. However, supporting QoS at the entire command and control system level incurs additional costs and burdens for implementation and operation. This paper describes the necessity and possibility of collaboration with QoS and IAM (identity and access management) among the collaboration between core functions within the command and control system. This paper proposes an extended QoS approach to improve the operational effectiveness of the entire command and control system resources. As a result of this research, expanded concepts, structures, standards, and methods of collaboration between QoS and IAM are developed and presented, and their feasibility is demonstrated through prototype development and experiments.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"769-786"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747170","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Run-Time Application Migration Using Checkpoint/Restore In Userspace 在用户空间使用检查点/还原进行运行时应用程序迁移
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-07-01 DOI: 10.13052/jwe1540-9589.2357
Aleksandar Tošić
{"title":"Run-Time Application Migration Using Checkpoint/Restore In Userspace","authors":"Aleksandar Tošić","doi":"10.13052/jwe1540-9589.2357","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2357","url":null,"abstract":"This paper presents an empirical study on the feasibility of using Checkpoint/Restore In Userspace (CRIU) for run-time application migration between hosts, with a particular focus on edge computing and cloud infrastructures. The paper provides experimental support for CRIU in Docker and offers insights into the impact of application memory usage on checkpoint size, time, and resources. Through a series of tests, we establish that the time to checkpoint is linearly proportional to the size of the memory allocation of the container, while the restore is significantly lower. Our findings contribute to the understanding of CRIU's performance and its potential use in edge computing scenarios. To obtain accurate and meaningful findings, we monitored system telemetry while using CRIU to observe its impact on the host machine's CPU and RAM utilization. Although our results may not be groundbreaking, they offer a good overview and a technical report on the feasibility of using CRIU on edge devices, which are typically resource constrained. This study's findings and experimental support for CRIU in Docker could serve as a useful reference for future research on performance optimization and application migration using CRIU.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 5","pages":"735-748"},"PeriodicalIF":0.7,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10654692","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142091058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ethereum Smart Contract Account Classification and Transaction Prediction Using the Graph Attention Network 使用图形注意力网络进行以太坊智能合约账户分类和交易预测
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-07-01 DOI: 10.13052/jwe1540-9589.2353
Hankyeong Ko;Sangji Lee;Jungwon Seo
{"title":"Ethereum Smart Contract Account Classification and Transaction Prediction Using the Graph Attention Network","authors":"Hankyeong Ko;Sangji Lee;Jungwon Seo","doi":"10.13052/jwe1540-9589.2353","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2353","url":null,"abstract":"This study explores the application of a Graph Attention Networks version 2 (GATv2) model in analyzing the Ethereum blockchain network, addressing the challenge posed by its inherent anonymity. We constructed a heterogeneous graph representation of the network to categorize contract accounts (CAs) into different decentralized application (DApp) categories, such as DeFi, gaming, and NFT markets, using transaction history data. Additionally, we developed a link prediction model to forecast transactions between externally owned accounts (EOAs) and CAs. Our results demonstrated the effectiveness of the heterogeneous graph model in improving node embedding expressiveness and enhancing transaction prediction accuracy. The study offers practical tools for analyzing DApp flows within the Web3 ecosystem, facilitating the automatic prediction of CA service categories and identifying active DApp usage. While currently focused on the Ethereum network, future research could expand to include layer 2 networks like Arbitrum One, Optimism, and Polygon, thereby broadening the scope of analysis in the evolving blockchain landscape.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 5","pages":"657-680"},"PeriodicalIF":0.7,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10654715","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Authentication Techniques Using a Dynamic SoulBound Token 使用动态灵魂令牌的用户身份验证技术
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-07-01 DOI: 10.13052/jwe1540-9589.2356
Yunjae Joo;Jungwon Seo
{"title":"User Authentication Techniques Using a Dynamic SoulBound Token","authors":"Yunjae Joo;Jungwon Seo","doi":"10.13052/jwe1540-9589.2356","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2356","url":null,"abstract":"This paper introduces a user authentication technique that utilizes a dynamic SoulBound Token (SBT) to tackle challenges associated with the oracle problem in decentralized environments. The approach uses dual smart contracts - local and global - along with blockchain tokens, removing the need for intermediary verification processes. The proposed method improves security by allowing users direct control over their authentication data, thus mitigating risks associated with centralized authorities and man-in-the-middle attacks. The feasibility and efficacy of this approach are demonstrated through a location-based prototype, indicating significant potential for application in Web 3.0 ecosystems. This paper also provides a comprehensive security analysis, underscoring the robustness of the proposed system against cyber threats.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 5","pages":"717-733"},"PeriodicalIF":0.7,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10654716","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142091056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Task Offloading in Edge Computing Enabled Web 3.0 支持边缘计算的 Web 3.0 中的协作任务卸载
IF 0.7 4区 计算机科学
Journal of Web Engineering Pub Date : 2024-07-01 DOI: 10.13052/jwe1540-9589.2354
Mohammed Alkhathami
{"title":"Collaborative Task Offloading in Edge Computing Enabled Web 3.0","authors":"Mohammed Alkhathami","doi":"10.13052/jwe1540-9589.2354","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2354","url":null,"abstract":"Web 3.0 is an evolved version of the Web that enables the integration of applications such as the Internet of Things (IoT) with the Web. It involves the storage of large data generated by different users and efficient computation of application and web-related tasks. With the help of edge nodes installed near the users, the computation load of Web 3.0 will be efficiently managed. Thus, efficient task offloading and computation become a key concern in edge computing-enabled Web 3.0. In this paper, a novel algorithm is proposed that solves the challenges of load imbalance at the edge nodes resulting in large queue sizes and increased task delays. The proposed technique identifies the edge nodes with a large network load and pairs them with a lightly loaded edge node that can handle some of their network load. The edge node pairing is based on the Gale-Shapley stable matching algorithm. The preference profile of edge nodes is developed based on factors such as task computation delay and task transmission delay. Once the pairing is done, the number of tasks is offloaded as per the computing capacity of the lightly loaded edge nodes. A detailed simulation-based performance evaluation of the proposed technique is presented showing a reduction in task delay by 20% and task deadline miss ratio by 68%.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 5","pages":"681-697"},"PeriodicalIF":0.7,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10654717","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信