{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:06Z","timestamp":1750308906882,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T00:00:00Z","timestamp":1669334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,25]]},"DOI":"10.1145\/3573834.3574528","type":"proceedings-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T03:29:17Z","timestamp":1674012557000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent Connected Vehicles Cybersecurity Vulnerability Rating Methodology Based on Multiple Factors"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0187-3669","authenticated-orcid":false,"given":"Chen","family":"Yang","sequence":"first","affiliation":[{"name":"China Automobile Data of Tianjin Co., Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9110-673X","authenticated-orcid":false,"given":"Guo","family":"Zhen","sequence":"additional","affiliation":[{"name":"China Automobile Data of Tianjin Co., Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2666-8917","authenticated-orcid":false,"given":"Chenya","family":"Bian","sequence":"additional","affiliation":[{"name":"China Automobile Data of Tianjin Co., Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9368-0185","authenticated-orcid":false,"given":"Yuqiao","family":"Ning","sequence":"additional","affiliation":[{"name":"China Automobile Data of Tianjin Co., Ltd, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7909-0349","authenticated-orcid":false,"given":"Shihao","family":"Xue","sequence":"additional","affiliation":[{"name":"China Automobile Data of Tianjin Co., Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2023,1,17]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Comparing vulnerability severity and exploits using [J]","volume":"2014","author":"ALLODI L, MASSACCI","unstructured":"ALLODI L, MASSACCI F . Comparing vulnerability severity and exploits using [J] . ACM Transactions on Information and System Security , 2014 ( 1 ): 1 - 20 . ALLODI L, MASSACCI F. Comparing vulnerability severity and exploits using [J]. ACM Transactions on Information and System Security, 2014(1):1-20.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"117","article-title":"Intrusion detection system for automotive controller area network (can) bus system: a review[J]","volume":"2019","author":"LOKMAN S F, OTHMAN A T, ABUBAKAR M","year":"2019","unstructured":"LOKMAN S F, OTHMAN A T, ABUBAKAR M H . Intrusion detection system for automotive controller area network (can) bus system: a review[J] . EURASIP Journal on Wireless Communications and Networking , 2019 , 2019 ( 1 ): 117 . LOKMAN S F, OTHMAN A T, ABUBAKAR M H. Intrusion detection system for automotive controller area network (can) bus system: a review[J]. EURASIP Journal on Wireless Communications and Networking, 2019, 2019(1): 117.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2019.1628325"},{"key":"e_1_3_2_1_4_1","first-page":"111","volume-title":"Security Trend Analysis with CVE Topic Models.\u00a02010 IEEE 21st International Symposium on Software Reliability Engineering","author":"Neuhaus S.","year":"2010","unstructured":"S. Neuhaus and T. Zimmermann , Security Trend Analysis with CVE Topic Models.\u00a02010 IEEE 21st International Symposium on Software Reliability Engineering , 2010 , pp. 111 - 120 . S. Neuhaus and T. Zimmermann, Security Trend Analysis with CVE Topic Models.\u00a02010 IEEE 21st International Symposium on Software Reliability Engineering, 2010, pp. 111-120."},{"volume-title":"Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. 2010: 105-114","author":"BOZORGI M, SAUL L K, SAVAGE S","key":"e_1_3_2_1_5_1","unstructured":"BOZORGI M, SAUL L K, SAVAGE S , Beyond heuristics : learning to classify vulnerabilities and predict exploits[C] . Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. 2010: 105-114 . BOZORGI M, SAUL L K, SAVAGE S, Beyond heuristics: learning to classify vulnerabilities and predict exploits[C]. Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. 2010: 105-114."},{"key":"e_1_3_2_1_6_1","first-page":"80","volume-title":"Combinatorial Code Classification & Vulnerability Rating. 2020 Second International Conference on Transdisciplinary AI (TransAI)","author":"Barr J. R.","year":"2020","unstructured":"J. R. Barr , P. Shaw , F. N. Abu-Khzam , S. Yu , H. Yin and T. Thatcher , Combinatorial Code Classification & Vulnerability Rating. 2020 Second International Conference on Transdisciplinary AI (TransAI) , 2020 , pp. 80 - 83 . J. R. Barr, P. Shaw, F. N. Abu-Khzam, S. Yu, H. Yin and T. Thatcher, Combinatorial Code Classification & Vulnerability Rating. 2020 Second International Conference on Transdisciplinary AI (TransAI), 2020, pp. 80-83."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Gauchia A. Diaz V. Boada M.J.L.\u00a0et al.\u00a0Torsional stiffness and weight optimization of a real bus structure.\u00a0Int.J Automot. Technol.\u00a011 41\u201347 (2010).  Gauchia A. Diaz V. Boada M.J.L.\u00a0et al.\u00a0Torsional stiffness and weight optimization of a real bus structure.\u00a0Int.J Automot. Technol.\u00a011 41\u201347 (2010).","DOI":"10.1007\/s12239-010-0006-4"},{"key":"e_1_3_2_1_8_1","volume-title":"Subjective Quantitative Studies of Human Agency.\u00a0Soc Indic Res\u00a074, 217\u2013260","author":"S.","year":"2005","unstructured":"Alkire, S. Subjective Quantitative Studies of Human Agency.\u00a0Soc Indic Res\u00a074, 217\u2013260 ( 2005 ). Alkire, S. Subjective Quantitative Studies of Human Agency.\u00a0Soc Indic Res\u00a074, 217\u2013260 (2005)."},{"key":"e_1_3_2_1_9_1","first-page":"2429826","article-title":"Dynamic Evaluation of Intensive Land Use Based on Objective Empowerment by Entropy Method and Neural Network Algorithm","volume":"2022","author":"Yang Ting","year":"2022","unstructured":"Ting Yang , Hanlie Cheng , Hailian Zhao , David Cadasse , \" Dynamic Evaluation of Intensive Land Use Based on Objective Empowerment by Entropy Method and Neural Network Algorithm \", \u00a0Computational Intelligence and Neuroscience , vol. 2022 , Article ID 2429826 , 7 pages, 2022 . Ting Yang, Hanlie Cheng, Hailian Zhao, David Cadasse, \"Dynamic Evaluation of Intensive Land Use Based on Objective Empowerment by Entropy Method and Neural Network Algorithm\",\u00a0Computational Intelligence and Neuroscience, vol. 2022, Article ID 2429826, 7 pages, 2022.","journal-title":"\u00a0Computational Intelligence and Neuroscience"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.09.051"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.04.028"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Gao Cl. Li Sc. Wang J.\u00a0et al.\u00a0The Risk Assessment of Tunnels Based on Grey Correlation and Entropy Weight Method.\u00a0Geotech Geol Eng\u00a036 1621\u20131631 (2018).  Gao Cl. Li Sc. Wang J.\u00a0et al.\u00a0The Risk Assessment of Tunnels Based on Grey Correlation and Entropy Weight Method.\u00a0Geotech Geol Eng\u00a036 1621\u20131631 (2018).","DOI":"10.1007\/s10706-017-0415-5"},{"key":"e_1_3_2_1_13_1","volume-title":"Effectiveness of Entropy Weight Method in Decision-Making,\u00a0Mathematical Problems in Engineering","author":"Zhu Yuxin","year":"2020","unstructured":"Yuxin Zhu , Dazuo Tian , Feng Yan , Effectiveness of Entropy Weight Method in Decision-Making,\u00a0Mathematical Problems in Engineering , vol. 2020 , Article ID 3564835, 5 pages, 2020 . Yuxin Zhu, Dazuo Tian, Feng Yan, Effectiveness of Entropy Weight Method in Decision-Making,\u00a0Mathematical Problems in Engineering, vol. 2020, Article ID 3564835, 5 pages, 2020."},{"key":"e_1_3_2_1_14_1","first-page":"15","article-title":"Based on the Optimization of the Length of Intervals","author":"New Approach Erol A","year":"2011","unstructured":"Egrioglu, Erol A New Approach Based on the Optimization of the Length of Intervals in Fuzzy Time Series. 1 Jan. 2011 : 15 \u2013 19 . Egrioglu, Erol A New Approach Based on the Optimization of the Length of Intervals in Fuzzy Time Series. 1 Jan. 2011 : 15 \u2013 19.","journal-title":"Fuzzy Time Series."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2010.09.011"}],"event":{"name":"AISS 2022: 2022 4th International Conference on Advanced Information Science and System","acronym":"AISS 2022","location":"Sanya China"},"container-title":["Proceedings of the 4th International Conference on Advanced Information Science and System"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573834.3574528","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573834.3574528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:26:12Z","timestamp":1750281972000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573834.3574528"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,25]]},"references-count":15,"alternative-id":["10.1145\/3573834.3574528","10.1145\/3573834"],"URL":"https:\/\/doi.org\/10.1145\/3573834.3574528","relation":{},"subject":[],"published":{"date-parts":[[2022,11,25]]},"assertion":[{"value":"2023-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}