{"id":"https://openalex.org/W4307346297","doi":"https://doi.org/10.1145/3558819.3565231","title":"Research on Information Security Protection System of Intelligent Networked Vehicles under Computer Artificial Intelligence Technology","display_name":"Research on Information Security Protection System of Intelligent Networked Vehicles under Computer Artificial Intelligence Technology","publication_year":2022,"publication_date":"2022-09-23","ids":{"openalex":"https://openalex.org/W4307346297","doi":"https://doi.org/10.1145/3558819.3565231"},"language":"en","primary_location":{"id":"doi:10.1145/3558819.3565231","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3558819.3565231","pdf_url":null,"source":{"id":"https://openalex.org/S4363608855","display_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080462500","display_name":"Yunhui Jia","orcid":"https://orcid.org/0009-0001-8019-1585"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yunhui Jia","raw_affiliation_strings":["China Auto Information, Technology Co., Ltd., China"],"affiliations":[{"raw_affiliation_string":"China Auto Information, Technology Co., Ltd., China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062886344","display_name":"Shilan Hu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shilan Hu","raw_affiliation_strings":["China Auto Information, Technology Co., Ltd., China"],"affiliations":[{"raw_affiliation_string":"China Auto Information, Technology Co., Ltd., China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100597515","display_name":"Yuchen Ma","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuchen Ma","raw_affiliation_strings":["China Auto Information, Technology Co., Ltd., China"],"affiliations":[{"raw_affiliation_string":"China Auto Information, Technology Co., Ltd., China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004321189","display_name":"Shunkai Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shunkai Wang","raw_affiliation_strings":["China Auto Information, Technology Co., Ltd., China"],"affiliations":[{"raw_affiliation_string":"China Auto Information, Technology Co., Ltd., China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023254912","display_name":"Zonghao Ma","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zonghao Ma","raw_affiliation_strings":["China Auto Information, Technology Co., Ltd., China"],"affiliations":[{"raw_affiliation_string":"China Auto Information, Technology Co., Ltd., China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100513558","display_name":"Hongyu Niu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hongyu Niu","raw_affiliation_strings":["China Auto Information, Technology Co., Ltd., China"],"affiliations":[{"raw_affiliation_string":"China Auto Information, Technology Co., Ltd., China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5080462500"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.2616,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75704225,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"991","last_page":"996"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14139","display_name":"E-commerce and Technology Innovations","score":0.8791000247001648,"subfield":{"id":"https://openalex.org/subfields/1403","display_name":"Business and International Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14139","display_name":"E-commerce and Technology Innovations","score":0.8791000247001648,"subfield":{"id":"https://openalex.org/subfields/1403","display_name":"Business and International Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13475","display_name":"Digital Transformation in Law","score":0.7720999717712402,"subfield":{"id":"https://openalex.org/subfields/2000","display_name":"General Economics, Econometrics and Finance"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7169468402862549},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6399487853050232},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6305851936340332},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5758833885192871},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.4991567134857178},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.498917818069458},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4709435701370239},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4588608741760254},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.4474831819534302},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4315982460975647},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.41841238737106323},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.4115052819252014},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3270267844200134},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.17762801051139832},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07521137595176697}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7169468402862549},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6399487853050232},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6305851936340332},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5758833885192871},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4991567134857178},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.498917818069458},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4709435701370239},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4588608741760254},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.4474831819534302},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4315982460975647},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.41841238737106323},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.4115052819252014},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3270267844200134},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.17762801051139832},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07521137595176697},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3558819.3565231","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3558819.3565231","pdf_url":null,"source":{"id":"https://openalex.org/S4363608855","display_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2359433753","https://openalex.org/W2302023226","https://openalex.org/W4389145688","https://openalex.org/W2364064694","https://openalex.org/W4401554836","https://openalex.org/W2887687989","https://openalex.org/W2376415031","https://openalex.org/W2379720728","https://openalex.org/W2109774386","https://openalex.org/W805142288"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2,28,38,133],"fully":[3],"understand":[4],"the":[5,16,31,41,69,75,78,85,95,125,128,145,148],"information":[6,17,82,99,109,129,150],"security":[7,18,67,83,100,110,117,120,130,151],"risks":[8,46],"faced":[9],"by":[10,74],"intelligent":[11,22,34,96],"networked":[12,23,35,50,97],"vehicles":[13,36,51],"and":[14,44,63,81,106,118,137],"improve":[15],"protection":[19,111,131],"level":[20],"of":[21,33,54,59,77,84,127,147],"vehicles,":[24],"it":[25],"is":[26,72,104,141],"necessary":[27],"start":[29],"from":[30],"characteristics":[32,76],"architecture":[37],"comprehensively":[39],"analyze":[40],"threats,":[42],"challenges":[43],"potential":[45],"they":[47],"face.":[48],"Intelligent":[49],"are":[52],"composed":[53,58],"multiple":[55],"complex":[56],"subsystems":[57],"multi-function,":[60],"loose":[61],"coupling":[62],"dynamic.":[64],"The":[65],"interaction":[66],"between":[68],"component":[70],"systems":[71],"affected":[73],"availability,":[79],"reliability":[80],"subsystems.":[86],"Traditional":[87],"analysis":[88,121],"methods":[89],"cannot":[90],"meet":[91],"these":[92],"needs.":[93],"Therefore,":[94],"vehicle":[98],"risk":[101,152],"control":[102,153],"system":[103,112],"designed":[105],"implemented,":[107],"including":[108],"security,":[113],"mobile":[114],"application":[115],"APP":[116],"server":[119],"platform.":[122],"Through":[123],"experiments,":[124],"ability":[126],"prototype":[132],"resist":[134],"DoS":[135],"attacks":[136,140],"network":[138],"SYN":[139],"tested,":[142],"which":[143],"verifies":[144],"effectiveness":[146],"proposed":[149],"system.":[154]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
