[1] |
田野 . 11部门联合发布《智能汽车创新发展战略》[J]. 智能网联汽车, 2020(2): 6-7.
|
|
TIAN Y . 11 departments jointly released intelligent vehicle innovation and development strategy[J]. Intelligent Connected Vehicles, 2020(2): 6-7.
|
[2] |
ZHAO F , HUANG H Q , JIN H ,et al. A hybrid ranking approach to estimate vulnerability for dynamic attacks[J]. Computers & Mathematics with Applications, 2011,62(12): 4308-4321.
|
[3] |
KERAMATI M , . New vulnerability scoring system for dynamic security evaluation[C]// Proceedings of 2016 8th International Symposium on Telecommunications (IST). 2016: 746-751.
|
[4] |
李舟, 唐聪, 胡建斌 ,等. 面向SaaS云平台的安全漏洞评分方法研究[J]. 通信学报, 2016,37(8): 157-166.
|
|
LI Z , TANG C , HU J B ,et al. Vulnerabilities scoring approach for cloud SaaS[J]. Journal on Communications, 2016,37(8): 157-166.
|
[5] |
LIU Q X , ZHANG Y Q . VRSS:a new system for rating and scoring vulnerabilities[J]. Computer Communications, 2011,34(3): 264-273.
|
[6] |
SPANOS G , SIOZIOU A , ANGELIS L . WIVSS:a new methodology for scoring information systems vulnerabilities[C]// Proceedings of the 17th Panhellenic Conference on Informatics. 2013: 83-90.
|
[7] |
UR-REHMAN A , GONDAL I , KAMRUZZUMAN J ,et al. Vulnerability modelling for hybrid IT systems[C]// Proceedings of 2019 IEEE International Conference on Industrial Technology. 2019: 1186-1191.
|
[8] |
UR-REHMAN A , GONDAL I , KAMRUZZAMAN J ,et al. Vulnerability modelling for hybrid industrial control system networks[J]. Journal of Grid Computing, 2020,18(4): 863-878.
|
[9] |
BOZORGI M , SAUL L K , SAVAGE S ,et al. Beyond heuristics:learning to classify vulnerabilities and predict exploits[C]// Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. 2010: 105-114.
|
[10] |
ISO 26262. Road vehicles-functional safety[S]. 2011.
|
[11] |
EVITA. E-safety vehicle intrusion protected applications[S]. 2011.
|
[12] |
LE V H , DEN-HARTOG J , ZANNONE N . Security and privacy for innovative automotive applications:a survey[J]. Computer Communications, 2018,132: 17-41.
|
[13] |
郭亚军 . 综合评价理论与方法[M]. 北京: 科学出版社, 2002.
|
|
GUO Y J . Theory and method of comprehensive evaluation[M]. Beijing: Science Press, 2002.
|
[14] |
刘琼 . 基于层次分析法的风险评估系统的研究与设计[D]. 西安:西安电子科技大学, 2009.
|
|
LIU Q . Study and design of the risk assessment system based on analytic hierarchy process[D]. Xi'an:Xidian University, 2009.
|
[15] |
ZHANG Y J , DENG X Y , WEI D J ,et al. Assessment of E-commerce security using AHP and evidential reasoning[J]. Expert Systems with Applications, 2012,39(3): 3611-3623.
|
[16] |
陈秀真, 吴越, 李建华 . 车载信息系统的安全测评体系及方法[J]. 信息安全学报, 2017,2(2): 15-23.
|
|
CHEN X Z , WU Y , LI J H . System and approach of security testing and evaluation for invehicle information systems[J]. Journal of Cyber Security, 2017,2(2): 15-23.
|
[17] |
WANG R Y , GAO L , SUN Q ,et al. An improved CVSS-based vulnerability scoring mechanism[C]// Proceedings of 2011 Third International Conference on Multimedia Information Networking and Security. 2011: 352-355.
|
[18] |
MELL P , SCARFONE K . Improving the common vulnerability scoring system[J]. IET Information Security, 2007,1(3): 119.
|
[19] |
谢丽霞, 徐伟华 . 改进漏洞基础评分指标权重分配方法[J]. 计算机应用, 2017,37(6): 1630-1635.
|
|
XIE L X , XU W H . Improved weight distribution method of vulnerability basic scoring index[J]. Journal of Computer Applications, 2017,37(6): 1630-1635.
|