Information security vulnerability scoring model for intelligent vehicles

More and more electronic devices are integrated into the modern vehicles with the development of intelligent vehicles.There are various design flaws and vulnerabilities hidden in a large number of hardware, firmware and software.Therefore, the vulnerabilities of intelligent vehicles have become the...

Full description

Saved in:
Bibliographic Details
Main Authors: Haiyang YU, Xiuzhen CHEN, Jin MA, Zhihong ZHOU, Shuning HOU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021096
Tags: Add Tag
No Tags, Be the first to tag this record!