[1]Xing X Y, Zhou T R, Chen J Y, et al. A hazard analysis approach based on STPA and finite state machine for autonomous vehicles[C] Proc of 2021 lEEE Intelligent Vehicles Symposium(lV). Piscataway, NJ: IEEE, 2021: 150156[2]Aliwa E, Rana O, Perera C, et al. Cyberattacks and countermeasures for invehicle networks[J]. ACM Computing Surveys, 2021, 54(1): 137[3]苗守帅. 基于微服务架构的源代码安全检测技术研究[J]. 无线互联科技, 2024, 21(3): 6668[4]Kim K, Kim J S, Jeong S, et al. Cybersecurity for autonomous vehicles: Review of attacks and defense[EBOL]. 2021 [20250820]. https:www.sciencedirect.comsciencearticleabspiiS0167404820304235?via%3Dihub[5]唐诗华, 刘冲, 唐旭. 智能网联汽车网络安全与防护方案研究[J]. 汽车测试报告, 2023, 11(23): 8587[6]刘强. 《网络产品安全漏洞管理规定》解读[N]. 人民邮电报,20210715(3)[7]Malik R Q, Alsattar H A, Ramli K N, et al. Mapping and deep analysis of vehicletoinfrastructure communication systems: Coherent taxonomy, datasets, evaluation and performance measurements, motivations, open challenges, recommendations, and methodological aspects[EBOL]. 2019 [20250820]. https:ieeexplore.ieee.orgdocument8758170[8]Li Q, Zuo J X, Cao R H, et al. A security evaluation framework for inteligent connected vehicles based on attack chains[J]. IEEE Network, 2023, 38(2): 148152 |