[1]Koscher K,Czeskis A, Roesner F, et al. Experimental security analysis of a modern automobile[C] Proc of 2010 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2010: 447462[2]Checkoway S, McCoy D, Kantor B, et al. Comprehensive experimental analyses of automotive attack surfaces[C] Proc of the 20th USENIX Security Symp (USENIX Security 11). Berkeley,CA:USENIX Association, 2011 [20230924]. https:www.usenix.orgconferenceusenixsecurity11comprehensiveexperimentalanalysesautomotiveattacksurfaces[3]Miller C, Valasek C. A survey of remote automotive attack surfaces[EBOL]. Black Hat USA, 2014 [20230924]. https:ioactive.compdfsIOActive_Remote_Attack_Surfaces.pdf[4]于明明, 宁玉桥, 沈诗雯, 等. 汽车网络安全实践性探索与研究[J]. 信息安全研究, 2023, 9(5): 476481[5]Sun Y, Wu L, Wu S, et al. Attacks and countermeasures in the Internet of vehicles[J]. Annals of Telecommunications, 2017, 72: 283295[6]Petit J,Shladover S E. Potential cyberattacks on automated vehicles[J]. IEEE Trans on Intelligent Transportation Systems, 2014, 16(2): 546556[7]Frschle S, Stühring A. Analyzing the capabilities of the CAN attacker[C] Proc of the 22nd European Symp on Research in Computer Security. Berlin: Springer, 2017: 464482[8]Miller C, Valasek C. Remote exploitation of an unaltered passenger vehicle[EBOL]. Black Hat USA, 2015 [20230924]. https:ioactive.compdfsIOActive_Remote_Car_Hacking.pdf[9]Hoppe T, Kiltz S, Dittmann J. Security threats to automotive CAN networks—Practical examples and selected shortterm countermeasures[J]. Reliability Engineering & System Safety, 2011, 96(1): 1125[10]Woo S, Jo H J, Lee D H. A practical wireless attack on the connected car and security protocol for invehicle CAN[J]. IEEE Trans on Intelligent Transportation Systems, 2014, 16(2): 9931006[11]Kang M J, Kang J W. Intrusion detection system using deep neural network for invehicle network security[J]. PloS One, 2016, 11(6): e0155781[12]Amato F, Coppolino L, Mercaldo F, et al. CANbus attack detection with deep learning[J]. IEEE Trans on Intelligent Transportation Systems, 2021, 22(8): 50815090[13]Wasicek A, Pesé M D, Weimerskirch A, et al. Contextaware intrusion detection in automotive control systems[C] Proc of the 5th ESCAR USA Conf. 2017: 2122 [20230925]. http:www.weimerskirch.orgfilesWasicekEtAl_CAIDS.pdf[14]Taylor A, Leblanc S,Japkowicz N. Anomaly detection in automobile control network data with long shortterm memory networks[C] Proc of 2016 IEEE Int Conf on Data Science and Advanced Analytics (DSAA). Piscataway, NJ: IEEE, 2016: 130139[15]Hossain M D, Inoue H, Ochiai H, et al. LSTMbased intrusion detection system for invehicle CAN bus communications[J]. IEEE Access, 2020, 8: 185489185502[16]Hanselmann M, Strauss T, Dormann K, et al.CANet: An unsupervised intrusion detection system for high dimensional CAN bus data[J]. IEEE Access, 2020, 8: 5819458205[17]Kang H, Kwak B I, Lee Y H, et al. Car hacking: Attack & defense challenge 2020 dataset[EBOL]. [20230821]. https:dx.doi.org10.21227qvr7n418 |