检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Mahdi Dibaei Xi Zheng Kun Jiang Robert Abbas Shigang Liu Yuexin Zhang Yang Xiang Shui Yu
机构地区:[1]Department of Computing,Macquarie University,Sydney,NSW,Australia [2]China State Key Lab of Automotive Safety and Energy,Tsinghua University,Beijing,China [3]School of Engineering,Macquarie University,Sydney,NSW,Australia [4]School of Software and Electrical Engineering,Swinburne University of Technology,Hawthorn,VIC,Australia [5]School of Software,University of Technology Sydney,Australia
出 处:《Digital Communications and Networks》2020年第4期399-421,共23页数字通信与网络(英文版)
基 金:Australia Research Council LP 190100676.
摘 要:Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity,which opens up new possibilities for different cyber-attacks,including in-vehicle attacks(e.g.,hijacking attacks)and vehicle-to-everything communicationattacks(e.g.,data theft).These problems are becoming increasingly serious with the development of 4G LTE and 5G communication technologies.Although many efforts are made to improve the resilience to cyber attacks,there are still many unsolved challenges.This paper first identifies some major security attacks on intelligent connected vehicles.Then,we investigate and summarize the available defences against these attacks and classify them into four categories:cryptography,network security,software vulnerability detection,and malware detection.Remaining challenges and future directions for preventing attacks on intelligent vehicle systems have been discussed as well.
关 键 词:Intelligent vehicles Vehicular networks Software vulnerabilities Deep learning 3GPP Software defined security
分 类 号:U46[机械工程—车辆工程] TP393.08[交通运输工程—载运工具运用工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7