[1] 中国汽车工程学会.节能与新能源汽车技术路线图[M].北京:机械工业出版社, 2016.China-SAE.Technology roadmap for energy saving and new energy vehicles[M]. Beijing: Mechanical Industry Press,2016
[2] McKinsey. McKinsey’s Electric Vehicle Index.[EB/OL](2019-10-31) [2021-05-01]. https://www.mckinsey.com/industries/automotive-and-assembly/our-insights/the-global-electric-vehicle-market-is-amped-up-and-on-the-rise
[3] 360发布《2019年智能网联汽车信息安全年度报告》[J].智能城市,2020,6(05):33
[4] Upstream .Upstream Security's 2021 Global Automotive Cybersecurity Report. [EB/OL](2021-04-13)[2021-05-01].https://upstream.auto/2021report/
[5] Gay K. Connected and automated vehicle research in the United States [R/OL]. US Department of Transportation[J]. 2014
[6] 王建强,王昕.智能网联汽车体系结构与关键技术[J].长安大学学报(社会科学版),2017,19(06):18-25
[7] 李岩松. 复杂网络环境下智能网联汽车安全威胁分析与远程入侵研究[D].西安电子科技大学,2019
[8] 王超. 基于关联规则的车载网络入侵检测研究[D].成都信息工程大学,2018
[9] Frassinelli D, Park S, Nürnberger S. I know where you parked last summer: Automated reverse engineering and privacy analysis of modern cars[C]//2020 IEEE Symposium on Security and Privacy (SP). IEEE, 2020: 1401-1415
[10] Pham M, Xiong K. A survey on security attacks and defense techniques for connected and autonomous vehicles[J]. arXiv preprint arXiv:2007.08041, 2020
[11] Kalmeshwar M, Prasad K S N. Development of On-Board Diagnostics for Car and it's Integration with Android Mobile[C]//2017 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS). IEEE, 2017: 1-6
[12] Qayyum A, Usama M, Qadir J, et al. Securing connected & autonomous vehicles: Challenges posed by adversarial machine learning and the way forward[J]. IEEE Communications Surveys & Tutorials, 2020, 22(2): 998-1026
[13] Chowdhury M, Islam M, Khan Z. Security of connected and automated vehicles[J]. arXiv preprint arXiv:2012.13464, 2020
[14] Dibaei M, Zheng X, Jiang K, et al. An overview of attacks and defences on intelligent connected vehicles[J]. arXiv preprint arXiv:1907.07455, 2019
[15] SOMANI G, GAUR M S, SANGHI D, et al. DDoS attacks in cloud computing: issues, taxonomy, and future directions[J]. Computer Communications, 2017, 107: 30-48
[16] RISTENPART T, TROMER E, SHACHAM H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds[C]//Proceedings of the 16th ACM conference on Computer and Communications Security. ACM, 2009: 199-212
[17] Georgiev M, Iyengar S, Jana S, et al. The most dangerous code in the world: validating SSL certificates in non-browser software[C]//Proceedings of the 2012 ACM conference on Computer and communications security. 2012: 38-49
[18] GARIP M T, GURSOY M E, REIHER P, et al. Congestion attacks to autonomous cars using vehicular botnets[C]//NDSS Workshop on Security of Emerging Networking Technologies (SENT). 2015
[19] 荀毅杰,刘家佳,赵静.智能网联汽车的安全威胁研究[J].物联网学报,2019,3(04):72-81
[20] HABERLE T, CHARISSIS L, FEHLING C, et al. The Connected Car in the Cloud: A Platform for Prototyping Telematics Services[J]. IEEE Software, 2015, 32(6):11–17
[21] 张德干,赵彭真,高瑾馨,等.面向车联网的智能数据传输新方法[J].物联网学报,2019, 3(2):89-99
[22] 余辰,张丽娟,金海.大数据驱动的智能交通系统研究进展与趋势[J].物联网学报,2018,2(1):56-63
[23] 王雪聪. 基于V2X安全芯片的5G车联网安全[J]. 信息安全研究, 2020, 6(8): 705-709
[24] 陈颖 钟成 李兴华 姜奇 张会林 景誉文. 自适应的车内CAN总线安全机制[J]. 信息安全研究, 2019, 5(12): 1076-1088
[25] Amjad M, Ahmad A, Rehmani M H, et al. A review of EVs charging: From the perspective of energy optimization, optimization approaches, and charging techniques[J]. Transportation Research Part D: Transport and Environment, 2018, 62: 386-417
[26] Kilari V T, Misra S, Xue G. Revocable anonymity based authentication for vehicle to grid (V2G) communications[C]//2016 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, 2016: 351-356
[27] Mousavian S, Erol-Kantarci M, Wu L, et al. A risk-based optimization model for electric vehicle infrastructure response to cyber attacks[J]. IEEE Transactions on Smart Grid, 2017, 9(6): 6160-6169
|