JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2020, Vol. 55 ›› Issue (5): 95-104.doi: 10.6040/j.issn.1671-9352.2.2019.144
XU Jiang-pei, WANG Jin, LIU Chang, ZHOU Liang, LONG Feng
CLC Number:
[1] 刘振峰. 电动汽车充电桩安全风险评估方法设计研究[D]. 天津: 天津大学, 2017. LIU Zhenfeng. Design and research the method of safety risk assessment for electric vehicle charging pile[D]. Tianjin: Tianjin University, 2017. [2] 葛艳华. 大力有序推进充电基础设施建设-国务院办公厅印发《关于加快电动汽车充电基础设施建设的指导意见》[J]. 中国电业(发电版), 2015(11):6-6. GE Yanhua. Vigorously and orderly promote the construction of charging infrastructure-The General Office of the State Council issued the guidance on accelerating the construction of charging infrastructure for electric vehicles[J]. China Electricity Industry(Power Generation Edition), 2015(11):6-6. [3] 钱进. 国务院发布《加快电动汽车充电基础设施建设的指导意见》[J]. 工程建设标准化, 2015(10):39-39. QIAN Jin. The State Council issued guidance on accelerating the construction of electric vehicle charging infrastructure[J]. Standardization of Engineering Construction, 2015(10):39-39. [4] 邬宽明. CAN总线原理和应用系统设计[M]. 北京:北京航空航天大学出版社, 1996. WU Kuanming. CAN bus principle and application system design[M]. Beijing: Beihang University Press, 1996. [5] MILLER C, VALASEK C. Adventures in automotive networks and control units[J]. Def Con, 2013, 21:260-264. [6] NISHIMURA R, KURACHI R, ITO K, et al. Implementation of the CAN-FD protocol in the fuzzing toolbeSTORM[C] // 2016 IEEE International Conference on Vehicular Electronics and Safety(ICVES), July 10-12, 2016. Beijing, China: IEEE, 2016. [7] DAVIS R I, NAVET N. Controller area network(CAN)schedulability analysis for messages with arbitrary deadlines in FIFO and work-conserving queues[J]. Real-time Systems, 2007, 35(3):239-272. [8] GREENBERG A. Hackers remotely kill a jeep on the highway—with me in it[J]. Wired, 2015(7):21. [9] NOURELDEEN P, AZER M A, REFAAT A, et al. Replay attack on lightweight CAN authentication protocol[C] // 2017 12th International Conference on Computer Engineering and Systems(ICCES), December 19-20, 2017. Cairo: IEEE, 2017: 600-606. [10] 于赫, 秦贵和, 孙铭会, 等. 车载CAN总线网络安全问题及异常检测方法[J]. 吉林大学学报(工学版), 2016, 46(4):1246-1253. YU He, QIN Guihe, SUN Minghui, et al. Cyber security and anomaly detection method for in-vehicle CAN[J]. Journal of Jilin University(Engineering and Technology Edition), 2016, 46(4):1246-1253. [11] 吴玲云, 秦贵和, 于赫. 基于随机森林的车载CAN总线异常检测方法[J]. 吉林大学学报(理学版), 2018, 56(3):663-668. WU Lingyun, QIN Guihe, YU He. Anomaly detection method for in-vehicle CAN bus based on random forest[J]. Journal of Jilin University(Science Edition), 2018, 56(3):663-668. [12] ZHANG Y, CHEN M, GUIZANI N, et al. SOVCAN: safety-oriented vehicular controller area network[J]. IEEE Communications Magazine, 2017, 55(8):94-99. [13] WAGNER M, SCHILDT S, POEHNL M. Service-oriented communication for controller area networks[C] // 2016 IEEE 84th Vehicular Technology Conference(VTC-Fall), September 18-21, 2016. Montreal, QC, Canada: IEEE, 2016. [14] SUTTON M, GREENE A, AMINI P. Fuzzing: brute force vulnerability discovery[M]. [S.l.] : Pearson Education, 2007. [15] 段海滨, 王道波, 朱家强, 等. 蚁群算法理论及应用研究的进展[J]. 控制与决策, 2004, 19(12):1321-1326, 1340. DUAN Haibin, WANG Daobo, ZHU Jiaqiang, et al. Development on ant colony algorithm theory and its application[J]. Control and Decision, 2004, 19(12):1321-1326, 1340. [16] DORIGO M, BLUM C. Ant colony optimization theory: a survey[J]. Theoretical Computer Science, 2005, 344(2/3):243-278. [17] 孙骞, 张进, 王宇翔. 蚁群算法优化策略综述[J]. 信息安全与技术, 2014, 5(2):22-23, 27. SUN Qian, ZHANG Jin, WANG Yuxiang. Ant colony algorithm optimization strategy review[J]. Information Security and Technology, 2014, 5(2):22-23, 27. [18] DORIGO M, BIRATTARI M. Ant colony optimization[M]. [S.l.] : Springer, 2010. |
[1] | Ni LI,Huan-mei GUAN,Piao YANG,Wen-yong DONG. BERT-IDCNN-CRF for named entity recognition in Chinese [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2020, 55(1): 102-109. |
[2] | YE Xiao-ming, CHEN Xing-shu, YANG Li, WANG Wen-xian, ZHU Yi, SHAO Guo-lin, LIANG Gang. Anomaly detection model of host group based on graph-evolution events [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 1-11. |
[3] | DING Yi-tao, YANG Hai-bin, YANG Xiao-yuan, ZHOU Tan-ping. A reversible image data hiding scheme in Homomorphic encrypted domain [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 104-110. |
[4] | KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23. |
[5] | ZHUANG Zheng-mao, CHEN Xing-shu, SHAO Guo-lin, YE Xiao-ming. A time-relevant network traffic anomaly detection approach [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 68-73. |
[6] | WU Zhi-jun,SHEN Dan-dan. Architecture and key technologies of network-enabled next generation global flight tracking based on information integration and sharing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 1-6. |
[7] | ZHANG Jing, XUE Leng, CUI Yi, RONG Hui, WANG Jian-ping. Modeling and evaluation of a dual chaotic encryption algorithm for WSN [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(03): 1-5. |
[8] | KANG Hai-yan, YANG Kong-yu, CHEN Jian-ming. A method of personalized privacy preservation based on K-anonymization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 142-149. |
[9] | GUO Chen1, LIANG Jia-rong2, LUO Chao3, PENG Shuo1. Research on the DC algorithm for an anomaly detection system based on TLR [J]. J4, 2012, 47(5): 93-97. |
[10] | HUANG Jing-wen. uzzy group decision making for information security risk factors analysis [J]. J4, 2012, 47(11): 45-49. |
|