作者: Yunchuan Sun , Lei Wu , Shizhong Wu , Shoupeng Li , Tao Zhang
DOI: 10.1007/S12243-016-0551-6
关键词: Engineering 、 Cloud computing 、 Internet privacy 、 Intelligent transportation system 、 Authentication 、 Computer security 、 Internet security 、 Cloud computing security 、 Attack model 、 Identification (information) 、 The Internet
摘要: … by comparing the signatures in the database with the IoV states. The IDS based on signature will … are integrated in vehicles, which makes signature-based detection invalid sometimes. …