1 |
李馥娟,王群,钱焕延.车联网安全威胁综述[J].电子技术应用,2017,43(5):29-33,37.
|
|
LI F J, WANG Q, QIAN H Y. Overview of internet of vehicles security threats[J]. Application of Electronic Technique,2017,43(5):29-33,37.
|
2 |
王喜文.汽车信息安全问题不容忽视[J].汽车工业研究, 2013(11):34-39.
|
|
WANG X W. The problem of automobile information security cannot be ignored[J]. Automotive Industry Research,2013(11):34-39.
|
3 |
KIM K, KIM J, JEONG S, et al. Cybersecurity for autonomous vehicles: review of attacks and defense[J]. Computers & Security, 2021, 103: 102150.
|
4 |
MARTÍNEZ-CRUZ A, RAMÍREZ-GUTIÉRREZ K, FEREGRINO-URIBE C, et al. Security on in-vehicle communication protocols: issues, challenges, and future research directions[J]. Computer Communications, 2021, 180: 1-20.
|
5 |
OTOUM Y, NAYAK A. AS-IDS: anomaly and signature based ids for the internet of things[J]. Journal of Network and Systems Management, 2021, 29(3).
|
6 |
HOPPE T, KILTZ S, DITTMANN J. Security threats to automotive CAN networks—practical examples and selected short-term countermeasures[J]. Reliability Engineering & System Safety, 2011, 96(1): 11-25.
|
7 |
MÜTER M, GROLL A, FREILING F C. A structured approach to anomaly detection for in-vehicle networks[C]. 2010 6th International Conference on Information Assurance and Security, IAS 2010, 2010: 92-98.
|
8 |
GMIDEN M, GMIDEN M H, TRABELSI H. An intrusion detection method for securing in-vehicle CAN bus[C]. 2016 17th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering, STA 2016-Proceedings, 2017: 176-180.
|
9 |
MOORE M R, BRIDGES R A, COMBS F L, et al. Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection[C]. ACM International Conference Proceeding Series, 2017.
|
10 |
HYUN M S, HA R K, HUY K K. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network[C]. International Conference on Information Networking, 2016-March, 2016: 63-68.
|
11 |
MILLER C, VALASEK C. Remote exploitation of an unaltered passenger vehicle[J]. Black Hat USA, 2015,2015:1-91.
|
12 |
KYONG-TAK C, KANG G S. Fingerprinting electronic control units for vehicle intrusion detection[C]. Proceedings of the 25th USENIX Security Symposium,2016: 911-927.
|
13 |
LEE H, JEONG S H, KIM H K. OTIDS: a novel intrusion detection system for in-vehicle network by using remote frame[C]. 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017, 2018: 57-66.
|
14 |
MEE L H, BYUNG I K, HUY K K. Anomaly intrusion detection method for vehicular networks based on survival analysis[J]. Vehicular Communications, 2018,14: 52-63.
|
15 |
MIN-JOO K, JE-WON K. Intrusion detection system using deep neural network for in-vehicle network security[J]. Communications in Computer and Information Science, 2022,1557: 255-267.
|
16 |
LOUKAS G, VUONG T, HEARTFIELD R, et al. Cloud-based cyber-physical intrusion detection for vehicles using deep learning[J]. IEEE Access, 2017,6: 3491-3508.
|
17 |
TYREE Z, BRIDGES R A, COMBS F L, et al. Exploiting the shape of CAN data for in-vehicle intrusion detection[J]. arXiv, 2018.
|
18 |
ARUN G, JAYANTHI R, KANG S. Exploiting consistency among heterogeneous sensors for vehicle anomaly detection [C]. SAE Paper 2017-01-1654.
|
19 |
程彭洲. 基于深度学习的车载网络入侵检测及隐私安全防护研究[D]. 镇江: 江苏大学, 2022.
|
20 |
陈力. 基于深度学习的车载总线网络入侵检测方法研究[D]. 杭州: 浙江科技学院, 2020.
|
21 |
YU Z, et al. TCE-IDS: time interval conditional entropy based intrusion detection system for automotive controller area networks[J]. IEEE Transactions on Industrial Informatics, 2022: 1-10.
|
22 |
PINCUS S M. Assessing serial irregularity and its implications for health[J]. Ann. N. Y. Acad. Sci,2002,954: 245 - 267.
|
23 |
SONG H M, KIM H K. CAN network intrusion datasets [DB/OL]. (2018-12-30) https://ocslab.hksecurity.net/Datasets/CAN-intrusion-dataset.
|