Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 197-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-29
王峥1宁玉桥2俞彦辉3陈阳2薛世豪2
1(工业和信息化部装备工业发展中心北京100846) 2(中汽智联技术有限公司天津300300) 3(中汽智能科技(天津)有限公司天津300300)
通讯作者:
王峥
硕士,高级工程师.主要研究方向为新能源汽车产品安全.
sjzwangzheng@163.com
作者简介:王峥
硕士,高级工程师.主要研究方向为新能源汽车产品安全.
sjzwangzheng@163.com
宁玉桥
高级工程师.主要研究方向为智能网联汽车信息安全.
ningyuqiao@catarc.ac.cn
俞彦辉
硕士,工程师.主要研究方向为智能网联汽车安全测试.
yuyanhui@catarc.ac.cn
陈阳
硕士,工程师.主要研究方向为智能网联汽车信息安全.
chenyang2022@catarc.ac.cn
薛世豪
助理工程师.主要研究方向为智能网联汽车信息安全.
xueshihao@catarc.ac.cn
[1]Xing X Y, Zhou T R, Chen J Y, et al. A hazard analysis approach based on STPA and finite state machine for autonomous vehicles[C] Proc of 2021 lEEE Intelligent Vehicles Symposium(lV). Piscataway, NJ: IEEE, 2021: 150156[2]Aliwa E, Rana O, Perera C, et al. Cyberattacks and countermeasures for invehicle networks[J]. ACM Computing Surveys, 2021, 54(1): 137[3]苗守帅. 基于微服务架构的源代码安全检测技术研究[J]. 无线互联科技, 2024, 21(3): 6668[4]Kim K, Kim J S, Jeong S, et al. Cybersecurity for autonomous vehicles: Review of attacks and defense[EBOL]. 2021 [20250820]. https:www.sciencedirect.comsciencearticleabspiiS0167404820304235?via%3Dihub[5]唐诗华, 刘冲, 唐旭. 智能网联汽车网络安全与防护方案研究[J]. 汽车测试报告, 2023, 11(23): 8587[6]刘强. 《网络产品安全漏洞管理规定》解读[N]. 人民邮电报,20210715(3)[7]Malik R Q, Alsattar H A, Ramli K N, et al. Mapping and deep analysis of vehicletoinfrastructure communication systems: Coherent taxonomy, datasets, evaluation and performance measurements, motivations, open challenges, recommendations, and methodological aspects[EBOL]. 2019 [20250820]. https:ieeexplore.ieee.orgdocument8758170[8]Li Q, Zuo J X, Cao R H, et al. A security evaluation framework for inteligent connected vehicles based on attack chains[J]. IEEE Network, 2023, 38(2): 148152 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||