{"id":"https://openalex.org/W2504851784","doi":"https://doi.org/10.3233/jcm-160636","title":"Analysis on in-vehicle information security defense","display_name":"Analysis on in-vehicle information security defense","publication_year":2016,"publication_date":"2016-07-26","ids":{"openalex":"https://openalex.org/W2504851784","doi":"https://doi.org/10.3233/jcm-160636","mag":"2504851784"},"language":"en","primary_location":{"id":"doi:10.3233/jcm-160636","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcm-160636","pdf_url":null,"source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101457873","display_name":"Yue Huang","orcid":"https://orcid.org/0000-0002-8625-7944"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Huang Yue","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014335730","display_name":"Qin Gui He","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qin Gui He","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100392628","display_name":"Tong Liu","orcid":"https://orcid.org/0000-0001-9555-7511"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu Tong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074656335","display_name":"Rui Zhao","orcid":"https://orcid.org/0009-0004-7898-6831"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhao Rui","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5071895912","display_name":"Bo Zhao","orcid":"https://orcid.org/0000-0003-4307-9380"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhao Bo","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101457873"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.15952202,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.58445538,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"16","issue":"3","first_page":"527","last_page":"535"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12406","display_name":"IoT and GPS-based Vehicle Safety Systems","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/2210","display_name":"Mechanical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.705045223236084},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6542402505874634},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5581214427947998},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5192601680755615},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5161556005477905},{"id":"https://openalex.org/keywords/information-protection-policy","display_name":"Information protection policy","score":0.46666353940963745},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.42706534266471863},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.4225486218929291},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.27707797288894653},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.21391472220420837},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.17076537013053894}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.705045223236084},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6542402505874634},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5581214427947998},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5192601680755615},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5161556005477905},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.46666353940963745},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.42706534266471863},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.4225486218929291},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.27707797288894653},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.21391472220420837},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.17076537013053894},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcm-160636","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcm-160636","pdf_url":null,"source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W27630839","https://openalex.org/W185923122","https://openalex.org/W254843598","https://openalex.org/W625928923","https://openalex.org/W1488839644","https://openalex.org/W1550064664","https://openalex.org/W1881909614","https://openalex.org/W1985858614","https://openalex.org/W1990798399","https://openalex.org/W1993180463","https://openalex.org/W2036700596","https://openalex.org/W2041978772","https://openalex.org/W2056207325","https://openalex.org/W2061076057","https://openalex.org/W2070645909","https://openalex.org/W2096279841","https://openalex.org/W2116520617","https://openalex.org/W2121206583","https://openalex.org/W2129309489","https://openalex.org/W2149254819","https://openalex.org/W2152373297","https://openalex.org/W2185892188","https://openalex.org/W2267138975","https://openalex.org/W2325060691","https://openalex.org/W2493732967","https://openalex.org/W4238625289","https://openalex.org/W6701278617"],"related_works":["https://openalex.org/W2388321897","https://openalex.org/W2997683334","https://openalex.org/W4379157849","https://openalex.org/W1504444186","https://openalex.org/W3088288257","https://openalex.org/W4293561755","https://openalex.org/W2393679754","https://openalex.org/W3115821625","https://openalex.org/W3021353024","https://openalex.org/W2616133087"],"abstract_inverted_index":{"With":[0],"the":[1,8,18,35,57,64,80,93,97,108],"continuous":[2],"infiltration":[3],"of":[4,20,37,45,60,84],"in-vehicle":[5,10,21,38,67,74,85,88,98],"smart":[6],"devices,":[7],"once-closed":[9],"network":[11,86],"has":[12],"become":[13],"an":[14],"opening":[15],"environment":[16],"and":[17,55,78,87,103],"problem":[19],"information":[22,39,68,75,81,99],"security":[23,40,76,100],"becomes":[24],"increasingly":[25],"prominent":[26],"day":[27],"by":[28],"day.":[29],"In":[30],"this":[31],"paper,":[32],"we":[33,47,70,91],"analyzed":[34],"harm":[36],"pro":[41],"blem":[42],"on":[43,51,73],"basis":[44],"which":[46],"further":[48],"conducted":[49,71],"study":[50],"corresponding":[52],"defense":[53,77],"demands":[54],"summarized":[56,79],"suitable":[58],"method":[59],"analysis;":[61],"directed":[62],"against":[63],"demand":[65],"for":[66],"security,":[69],"analysis":[72,106],"defending":[82],"strategies":[83],"field":[89],"bus;":[90],"studied":[92],"technologies":[94],"used":[95],"in":[96],"encryption":[101],"mechanism":[102],"made":[104],"comparative":[105],"towards":[107],"main":[109],"algorithm.":[110]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
