期刊文献+
共找到134篇文章
< 1 2 7 >
每页显示 20 50 100
Risks behind Device Information Permissions in Android OS
1
作者 Ali Alshehri Anthony Hewins +3 位作者 Maria McCulley Hani Alshahrani Huirong Fu Ye Zhu 《Communications and Network》 2017年第4期219-234,共16页
In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blac... In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sensitive data without user’s consent. This paper investigates each element of system information permissions and illustrates how cybercriminals can harm users’ privacy. It presents some attack scenarios using READ_PHONE_STATE permission and the risks behind it. In addition, this paper refers to possible attacks that can be performed when additional permissions are combined with READ_PHONE_STATE permission. It also discusses a proposed solution to defeat these types of attacks. 展开更多
关键词 ANDROID SECURITY PRIVACY DEVICE Identifiers permissions
下载PDF
Associated Risks in Mobile Applications Permissions
2
作者 Mohammed Al Jutail Mousa Al-Akhras Abdulaziz Albesher 《Journal of Information Security》 2019年第2期69-90,共22页
Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permi... Mobile applications affect user’s privacy based on the granted application’s permissions as attackers exploit mobile application permissions in Android and other mobile operating systems. This research divides permissions based on Google’s classification of dangerous permissions into three groups. The first group contains the permissions that can access user’s private data such as reading call log. The second group contains the permissions that can modify user’s data such as modifying the numbers in contacts. The third group contains the remaining permissions which can track the location, and use the microphone and other sensitive issues that can spy on the user. This research is supported by a study that was conducted on 100 participants in Saudi Arabia to show the level of users’ awareness of associated risks in mobile applications permissions. Associations among the collected data are also analyzed. This research fills the gap in user’s awareness by providing best practices in addition to developing a new mobile application to help users decide whether an application is safe to be installed and used or not. This application is called “Sparrow” and is available in Google Play Store. 展开更多
关键词 Mobile PERMISSION Android PRIVACY ATTACK Security Association APRIORI
下载PDF
Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs
3
作者 Rahul Gupta Kapil Sharma R.K.Garg 《Computers, Materials & Continua》 SCIE EI 2024年第3期4283-4301,共19页
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and... The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and access information.Among the many smartphones available,those operating on the Android platform dominate,being the most widely used type.This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years.Therefore,there is an urgent need to develop new methods for detecting Android malware.The literature contains numerous works related to Android malware detection.As far as our understanding extends,we are the first ones to identify dangerous combinations of permissions and system calls to uncover malicious behavior in Android applications.We introduce a novel methodology that pairs permissions and system calls to distinguish between benign and malicious samples.This approach combines the advantages of static and dynamic analysis,offering a more comprehensive understanding of an application’s behavior.We establish covalent bonds between permissions and system calls to assess their combined impact.We introduce a novel technique to determine these pairs’Covalent Bond Strength Score.Each pair is assigned two scores,one for malicious behavior and another for benign behavior.These scores serve as the basis for classifying applications as benign or malicious.By correlating permissions with system calls,the study enables a detailed examination of how an app utilizes its requested permissions,aiding in differentiating legitimate and potentially harmful actions.This comprehensive analysis provides a robust framework for Android malware detection,marking a significant contribution to the field.The results of our experiments demonstrate a remarkable overall accuracy of 97.5%,surpassing various state-of-the-art detection techniques proposed in the current literature. 展开更多
关键词 ANDROID MALWARE android security hybrid analysis permission and system call pairs
下载PDF
Investigation of Android Malware Using Deep Learning Approach
4
作者 V.Joseph Raymond R.Jeberson Retna Raj 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2413-2429,共17页
In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many mor... In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more applications.The android stack is more vulnerable compared to other mobile plat-forms like IOS,Windows,or Blackberry because of the open-source platform.In the Existing system,malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth malware.The attackers target the victim with various attacks like adware,backdoor,spyware,ransomware,and zero-day exploits and create threat hunts on the day-to-day basics.In the existing approach,there are various tradi-tional machine learning classifiers for building a decision support system with limitations such as low detection rate and less feature selection.The important contents taken for building model from android applications like Intent Filter,Per-mission Signature,API Calls,and System commands are taken from the manifestfile.The function parameters of various machine and deep learning classifiers like Nave Bayes,k-Nearest Neighbors(k-NN),Support Vector Machine(SVM),Ada Boost,and Multi-Layer Perceptron(MLP)are done for effective results.In our pro-posed work,we have used an unsupervised learning multilayer perceptron with multiple target labels and built a model with a better accuracy rate compared to logistic regression,and rank the best features for detection of applications and clas-sify as malicious or benign can be used as threat model by online antivirus scanners. 展开更多
关键词 Android application permissions multilayer perception relief scoring
下载PDF
China to Issue Permissions for New Synthetic Ammonia Project
5
作者 Peter Zong 《China Chemical Reporter》 2010年第6期24-24,共11页
China Nitrogenous Fertilizer Industry Association(CNFIA) disclosed on March 12th thatthe drafted permission conditions for the syntheticammonia will soon be submitted to theMinistry of Industry and Information Technol... China Nitrogenous Fertilizer Industry Association(CNFIA) disclosed on March 12th thatthe drafted permission conditions for the syntheticammonia will soon be submitted to theMinistry of Industry and Information Technologyof China for approval.The draftedpermissions, drawn by CFNIA, proposedprimarily the minimum capacity for new syntheticammonia project is 300 000 t/a, mean- 展开更多
关键词 approval PERMISSION submitted AMMONIA SHANDONG SEC
全文增补中
Research on Multi-Blockchain Electronic Archives Sharing Model
6
作者 Fang Yu Wenbin Bi +4 位作者 Ning Cao Jun Luo Diantang An Liqiang Ding Russell Higgs 《Computers, Materials & Continua》 SCIE EI 2023年第9期3921-3931,共11页
The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contr... The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption.Aiming at the problem of dynamic permission management in common access control methods,a new access control method based on smart contract under blockchain is proposed,which improves the intelligence level under blockchain technology.Firstly,the Internet attribute access control model based on smart contract is established.For the dynamic access of heterogeneous devices,the management contract,permission judgment contract and access control contract are designed;Secondly,the access object credit evaluation algorithm based on particle swarm optimization radial basis function(PSO-RBF)neural network is used to dynamically generate the access node credit threshold combined with the access policy,so as to realize the intelligent access right management method.Finally,combined with the abovemodels and algorithms,the workflow of electronic archives sharing and utilization model of multi blockchain is constructed.The experimental results show that the timeconsuming of the process increases linearly with the number of continuous access to electronic archives blocks,and the secure access control of sharing and utilization is feasible,secure and effective. 展开更多
关键词 Sharing and utilization of electronic archives dynamic permission management PSO-RBF neural network credit evaluation
下载PDF
Assessing the Occurrence of Heavy Metals in Edible Fruits Grown around Mine Tailings Dam in Kitwe
7
作者 Hildah Musole Chiyangi Ngoy Mwanabute +1 位作者 Elisha Ncube Jhonnah Mundike 《Journal of Environmental Protection》 CAS 2023年第2期83-95,共13页
Mining activities in the Copperbelt province of Zambia have been of great environmental concern, despite recorded improvements in the socio-economic sector. Heavy metal contamination of soils resulting from depositing... Mining activities in the Copperbelt province of Zambia have been of great environmental concern, despite recorded improvements in the socio-economic sector. Heavy metal contamination of soils resulting from depositing mine tailings and rock waste has posed possible health risks for communities nearer such facilities. The current study was conducted around residential homes surrounding Kitwe slimes (TD25). This work investigated levels of Co, Cu, Fe, Mn and Pb in the soils, and avocado and lemons fruits, growing near TD25. Heavy metals were analyzed using Atomic Absorption Spectrophotometer. The work further assessed the estimated daily intake (EDI) associated with potential health risks to humans. In the soil, concentration levels of heavy metals showed a trend in the order: Fe > Cu > Mn > Co > Pb. Heavy metal contents in avocado and lemon fruits at 200 and 400 m away from TD25, all had p-values < 0.05. The distances from the suspect source (TD25) to where the fruit trees were grown, had no influence on their concentration in the fruit samples. Fruit sample results showed that Fe had the highest EDI of 0.22 mg·kg<sup>-1</sup> (avocado) and 0.14 mg·kg<sup>-1</sup> (lemon), though both results were far below the FAO/WHO standard range (12.5 - 19.6 mg·kg<sup>-1</sup>). For both fruits, Co and Pb results were negligible. The concentration of the five heavy metals in avocado and lemon fruits grown around Kitwe slimes did not pose any health risks to the consumers. 展开更多
关键词 AVOCADO Concentration LEMON Mining Permissible Limits
下载PDF
Android Permission机制的实现与安全分析 被引量:6
8
作者 张中文 雷灵光 王跃武 《信息网络安全》 2012年第8期3-6,共4页
Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permis... Permission机制作为Android安全的重要组成部分,受到了越来越多的关注,已有的研究主要集中在对应用程序申请的Permission进行静态分析上。文章从分析Permission机制的实现过程入手,分析了Permission机制自身的安全问题,发现了一个Permission机制漏洞。应用程序利用该漏洞可以绕过权限管理,主动提升应用程序的访问权限,为后续攻击提供支持。同时文章也对Permission机制其它方面的安全特性进行了分析。 展开更多
关键词 ANDROID系统 PERMISSION 安全 漏洞
下载PDF
一种增强的Android安全机制模型 被引量:9
9
作者 陈伟鹤 邱道龙 《无线通信技术》 2014年第1期37-41,共5页
随着Android系统的日益流行,其安全问题受到了越来越多的关注。尽管Android Permission机制能在一定程度上保证安全性,但在实际应用中却缺乏灵活性,基于此提出了一种与Apex相兼容的策略模型。该方法主要针对Apex的安装程序包Poly。在Plo... 随着Android系统的日益流行,其安全问题受到了越来越多的关注。尽管Android Permission机制能在一定程度上保证安全性,但在实际应用中却缺乏灵活性,基于此提出了一种与Apex相兼容的策略模型。该方法主要针对Apex的安装程序包Poly。在Ploy安装程序之前先对应用程序和权限进行分析检测,然后将检测分析后的权限呈现给用户。实验结果表明在造成一定性能损失的情况下,新的框架可以有效减少用户所需设置的权限。 展开更多
关键词 ANDROID ANDROID PERMISSION 安全 策略模型
下载PDF
Android操作系统的安全机制研究 被引量:2
10
作者 朱长江 杨一平 《电脑知识与技术》 2013年第9期5628-5629,共2页
Android系统自推出以来,就以明显的优势逐渐扩大市场占有份额。Android是一个开放性的系统,备受开发者的青睐,其安全性至关重要。研究了Android系统的用户ID机制、应用程序签名机制、沙箱隔离机制等安全策略,分析了它在硬件方面、Li... Android系统自推出以来,就以明显的优势逐渐扩大市场占有份额。Android是一个开放性的系统,备受开发者的青睐,其安全性至关重要。研究了Android系统的用户ID机制、应用程序签名机制、沙箱隔离机制等安全策略,分析了它在硬件方面、Linux内核方面及Android自身权限机制方面存在的安全隐患。 展开更多
关键词 ANDROID 安全机制 PERMISSION
下载PDF
浅谈司法公证材料的英译
11
作者 周永秀 毕研韬 《语言教育》 2002年第3期35-36,共2页
司法公证翻译因关系到当事人在境内外的权利和义务而应格外严谨准确。笔者近年来受有关部门及当事人的委托承担了部分公证材料的翻译,从各国签证官和国外机构获得了大量有益的信息反馈,现不揣冒昧从文体特征。
关键词 机构名称 信息反馈 语法方面 thereafter translated 语义模糊 大学外国语 WISDOM PERMISSION 发证日期
下载PDF
一类SCO OpenServer 5中远程访问故障的分析和处理
12
作者 黄宁 李岚 《江西科学》 2007年第1期79-80,85,共3页
提出一类SCO OpenServer 5中远程访问常见的问题,分析其原因,提出解决方法,找到了解决这类问题的关键。
关键词 远程访问 对等用户 Rcmd Rlogin PERMISSION Denied
下载PDF
基于权限管理的Android应用行为检测 被引量:8
13
作者 刘智伟 孙其博 《信息网络安全》 2014年第6期72-77,共6页
随着智能移动终端数量的增加,越来越多的安全问题成为困扰终端进一步发展的障碍。当前市场大部分安全软件不能够实现对应用行为的实时监控,极少安全软件需要root权限才能实现应用行为实时的监控。文章基于Android应用框架层的定制,利用A... 随着智能移动终端数量的增加,越来越多的安全问题成为困扰终端进一步发展的障碍。当前市场大部分安全软件不能够实现对应用行为的实时监控,极少安全软件需要root权限才能实现应用行为实时的监控。文章基于Android应用框架层的定制,利用Android系统Permission机制的动态检查模式实现应用运行时行为的检测。Android应用通过<user-permission>申请所需权限,在运行过程中需要调用对应的API或者访问系统数据时,会发生系统权限检查,从而实现对应用行为的监控。相对在应用层进行应用行为的监控要更简洁有效,通过在框架层的定制更好地实现了对应用行为的监控,同时带给系统的损耗更小。 展开更多
关键词 应用行为 Permission机制 权限动态检查
下载PDF
基于API和Permission的Android恶意软件静态检测方法研究 被引量:2
14
作者 杨鸣坤 罗锦光 +1 位作者 欧跃发 慕德俊 《计算机应用与软件》 北大核心 2020年第4期53-58,104,共7页
当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态... 当前大量的Android恶意软件在后台收集用户的位置信息、通话记录、电话号码及短信等信息并将其上传至指定服务器,造成了难以估量的危害。为解决此问题,提出一种Android恶意软件静态检测方法。对收集到的训练集中的所有APK文件进行静态反编译,提取其中的静态信息;对静态信息中的API和Permission进行统计学分析,得到API和Permission在恶意APK和正常APK中的使用率;根据它们的使用率确定基准API和Permission集合,将每一个APK转换成可参与计算的关于API和Permission的特征向量;利用改进的k-NN分类器,对待检测的APK进行分类判定。实验结果表明,该方法可以有效地对APK进行恶意分类。 展开更多
关键词 ANDROID 恶意软件 静态检测 PERMISSION 机器学习
下载PDF
POLLUTION TREND IN THE TUMEN RIVER AND ITS INFLUENCE ON REGIONAL DEVELOPMENT 被引量:2
15
作者 田卫 俞穆清 +1 位作者 王国平 郭传新 《Chinese Geographical Science》 SCIE CSCD 1999年第2期50-54,共5页
1INTRODUCTIONSeverewaterpolutionandwaterresourcesshortageshavebecometwokeyobstructionstorealizesustainable... 1INTRODUCTIONSeverewaterpolutionandwaterresourcesshortageshavebecometwokeyobstructionstorealizesustainableutilizationofwate... 展开更多
关键词 water POLLUTION environmental capacity permissible AMOUNT of WASTEWATER DISCHARGE the Tumen RIVER
下载PDF
Is glial heme oxygenase-1 suppression in neurodegenerative disorders permissive for neural repair? 被引量:2
16
作者 Hyman M. Schipper 《Neural Regeneration Research》 SCIE CAS CSCD 2015年第2期208-210,共3页
'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, ... 'Core' neuropathology of degenerative central nervous system (CNS) disorders The common human neurodegenerative disorders (Alzheimer's disease (AD), Parkinson's disease (PD), amyotrophic lateral sclerosis, etc.) vary with respect to risk factors, ages of onset, sex predilections, neuraxial regions affected, hallmark cellular inclusions, behavioral and neurological symptoms, and responses to treatment. Despite these differences, there appears to be a set of 'core' neuropathological features shared among these and related entities. Common to these conditions are 1) pathological deposition of non-transferrin bound iron, 2) oxidative stress and associated protein, lipid and nucleic acid modifications, 3) mitochondrial membrane damage and bioenergetic failure, and 4) macroautophagy in the affected neural tissues. 展开更多
关键词 GENE HO Is glial heme oxygenase-1 suppression in neurodegenerative disorders permissive for neural repair GFAP
下载PDF
PermissibleWind Conditions for Optimal Dynamic Soaring with a Small Unmanned Aerial Vehicle 被引量:1
17
作者 Liu Duo-Neng Hou Zhong-Xi +2 位作者 Guo Zheng Yang Xi-Xiang Gao Xian-Zhong 《Computer Modeling in Engineering & Sciences》 SCIE EI 2016年第6期531-565,共35页
Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well a... Dynamic soaring is a flight maneuver to exploit gradient wind field to extend endurance and traveling distance.Optimal trajectories for permissible wind conditions are generated for loitering dynamic soaring as well as for traveling patterns with a small unmanned aerial vehicle.The efficient direct collection approach based on the Runge-Kutta integrator is used to solve the optimization problem.The fast convergence of the optimization process leads to the potential for real-time applications.Based on the results of trajectory optimizations,the general permissible wind conditions which involve the allowable power law exponents and feasible reference wind strengths supporting dynamic soaring are proposed.Increasing the smallest allowable wingtip clearance to trade for robustness and safety of the vehicle system and improving the maximum traveling speed results in shrunken permissible domain of wind conditions for loitering and traveling dynamic soaring respectively.Sensitivity analyses of vehicle model parameters show that properly reducing the wingspan and increasing the maximum lift-to-drag ratio and the wing loading can enlarge the permissible domain.Permissible domains for different traveling directions show that the downwind dynamic soaring benefitting from the drift is more efficient than the upwind traveling pattern in terms of permissible domain size and net traveling speed. 展开更多
关键词 DYNAMIC SOARING Permissible WIND CONDITIONS TRAJECTORY optimization Unmanned AERIAL vehicle(UAV)
下载PDF
Hyperledger Fabric Blockchain: Secure and Efficient Solution for Electronic Health Records 被引量:1
18
作者 Mueen Uddin M.S.Memon +4 位作者 Irfana Memon Imtiaz Ali Jamshed Memon Maha Abdelhaq Raed Alsaqour 《Computers, Materials & Continua》 SCIE EI 2021年第8期2377-2397,共21页
Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare ind... Background:Electronic Health Record(EHR)systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally.However,the existing EHR systems mostly lack in providing appropriate security,entrusted access control and handling privacy and secrecy issues and challenges in current hospital infrastructures.Objective:To solve this delicate problem,we propose a Blockchain-enabled Hyperledger Fabric Architecture for different EHR systems.Methodology:In our EHR blockchain system,Peer nodes from various organizations(stakeholders)create a ledger network,where channels are created to enable secure and private communication between different stakeholders on the ledger network.Individual patients and other stakeholders are identified and registered on the network by unique digital certificates issued by membership service provider(MSP)component of the fabric architecture.Results:We created and implemented different Chaincodes to handle the business logic for executing separate EHR transactions on the network.The proposed fabric architecture provides a secure,transparent and immutable mechanism to store,share and exchange EHRs in a peer-to-peer network of different healthcare stakeholders.It ensures interoperability,scalability and availability in adapting the existing EHRs for strengthening and providing an effective and secure method to integrate and manage patient records among medical institutions in the healthcare ecosystem. 展开更多
关键词 Electronic health records blockchain hyperledger fabric patient data privacy private permissioned blockchain healthcare ecosystem
下载PDF
Irrigation erosion of irrigated soils in the foothills of southern Kazakhstan 被引量:1
19
作者 Abdulla S SAPAROV Enadiy K МIRZAKEEV +2 位作者 Tatyana M SHARYPOVA Galymzhan A SAPAROV Jilili ABUDUWAILI 《Journal of Arid Land》 SCIE CSCD 2013年第2期166-171,共6页
Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and t... Abstract: This paper presented the results from the study of irrigation erosion of irrigated lands in southern Ka- zakhstan. The main purpose of the work is the conservation of the fertility of irrigated soils, and then the soils of the upper, middle and lower sections of the slopes at the experimental site were studied. Based on field investigations, authors studied the water resistance of aggregates of gray-brown soils and light gray soils before and after irrigation and qualitative indicators of changes in physical and chemical properties of structured soils in irrigation were de- termined by conventional methods of soil research. The results indicated that the changes in the physical properties of soils by using polymeric compounds created a fundamentally new opportunity to control water erosion of soils. 展开更多
关键词 irrigation erosion furrow irrigation structure-forming polymers deformation of furrows permissible water speed aggregate water stability
下载PDF
Defluoridation of Water by a Biomass: <i>Tinospora cordifolia</i> 被引量:1
20
作者 Piyush Kant Pandey Madhurima Pandey Rekha Sharma 《Journal of Environmental Protection》 2012年第7期610-616,共7页
This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to redu... This research is focused on the search of a biomass for the sequestration of fluoride from drinking water. Defluoridation of water was studied by batch experiments in biosorption process. The biomass was found to reduce fluoride to permissible limit 1.5 mg/L as prescribed by WHO. The efficiency of the sorption process was investigated under different experimental parameters such as pH 7, standing time 120 min and biomass doses 7.0 g with 5 mg/L concentration of fluoride. Neutral pH was identified as the optimum condition of the medium and 120 minutes was the best contact time for maximum fluoride adsorption. The experimental data was found good fitting to Langmuir and Freundlich isotherm models. In interference study tolerable effect was found with 50 mg/L concentration of co-ions, whereas increasing the concentration of co-ions retarded the fluoride removal capacity in some extent. FT-IR spectrum analysis showed fluoride binding in the different frequency ranges of the biomass. Eventually, this plant biomass is recommended as a suitable and low cost adsorbent to reduce fluoride into standard permissible limit. 展开更多
关键词 SEQUESTRATION DEFLUORIDATION BIOSORPTION FT-IR Spectrum Permissible
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部