Information security vulnerability scoring model for intelligent vehicles
More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the...
Saved in:
Main Authors: | Haiyang YU, Xiuzhen CHEN, Jin MA, Zhihong ZHOU, Shuning HOU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2022-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021096 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Vulnerabilities scoring approach for cloud SaaS
by: Zhou LI, et al.
Published: (2016-08-01) -
Research on 5G MEC security assessment system and method
by: Qiucheng LU, et al.
Published: (2023-08-01) -
Research on IoT security situation awareness method based on evidence theory
by: Jian LI, et al.
Published: (2022-04-01) -
Advanced groundwater potential and contamination vulnerability assessment using integrated GIS-based AHP techniques: A case study from the Bizerte watershed, Tunisia
by: Cyrine Belhadj, et al.
Published: (2025-06-01) -
Application of artificial intelligence technology in the field of security vulnerability
by: Hongyu SUN, et al.
Published: (2018-08-01)