共 21 条
- [1] Biryukov A., 2005, DATA ENCRYPTION STAN
- [2] [程克非 CHENG Kefei], 2006, [计算机仿真, Computer Simulation], V23, P92
- [3] Greedy function approximation: A gradient boosting machine [J]. ANNALS OF STATISTICS, 2001, 29 (05) : 1189 - 1232
- [4] Hamid Y., 2016, INT C INF AN
- [5] Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2008, 5219 : 235 - 248
- [6] A self-adaptive system for vehicle information security applications [J]. PROCEEDINGS IEEE/IFIP 13TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING 2015, 2015, : 188 - 192
- [7] A large scale distributed intrusion detection framework based on attack strategy analysis [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (23-24): : 2465 - 2475
- [8] Ibáñez JAG, 2015, IEEE WIREL COMMUN, V22, P122
- [9] Iqbal M. R. A., 2012, 2012 7th International Conference on Electrical & Computer Engineering (ICECE), P659, DOI 10.1109/ICECE.2012.6471636
- [10] Larson Ulf E., 2008, 2008 IEEE Intelligent Vehicles Symposium (IV), P220, DOI 10.1109/IVS.2008.4621263