{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:04Z","timestamp":1755882604292,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1145\/3672919.3672925","type":"proceedings-article","created":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T12:39:43Z","timestamp":1721824783000},"page":"26-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of network security protection network architecture for intelligent networked vehicles"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8997-6426","authenticated-orcid":false,"given":"Xiaoping","family":"Gao","sequence":"first","affiliation":[{"name":"Anhui Institute of Information Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7043-3237","authenticated-orcid":false,"given":"Yue","family":"Pan","sequence":"additional","affiliation":[{"name":"Anhui Institute of Information Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7744-6954","authenticated-orcid":false,"given":"Jinjin","family":"Li","sequence":"additional","affiliation":[{"name":"Anhui Institute of Information Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2869-9675","authenticated-orcid":false,"given":"Tao","family":"Ji","sequence":"additional","affiliation":[{"name":"Anhui Institute of Information Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0550-2303","authenticated-orcid":false,"given":"Yin","family":"Yuan","sequence":"additional","affiliation":[{"name":"Anhui Institute of Information Engineering, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4762-4610","authenticated-orcid":false,"given":"Zhengnan","family":"Liu","sequence":"additional","affiliation":[{"name":"Anhui Institute of Information Engineering, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"16","article-title":"Research on Network Security threat Modeling Platform of intelligent Connected Vehicle [J]","volume":"23","author":"Pingping Fan","year":"2023","unstructured":"Fan Pingping, Liu Yijing, Hou Yaling. Research on Network Security threat Modeling Platform of intelligent Connected Vehicle [J]. Times Automobile, 2023, (23):16-18.","journal-title":"Times Automobile"},{"key":"e_1_3_2_1_2_1","first-page":"69","volume":"11","author":"Authoritative Interpretation","year":"2023","unstructured":"Interpretation of Authoritative Guide on Intelligent Vehicle Network Security [J]. China Industry and Information Technology, 2023, (11):69. (in Chinese)","journal-title":"China Industry and Information Technology"},{"key":"e_1_3_2_1_3_1","first-page":"8","volume":"05","author":"Kai SONG","year":"2023","unstructured":"SONG Kai, Wei Fanxing, Fu Shan Research on Software Defined Automobile Network Security [J]. Communication Management and Technology, 2023, (05):8-11.","journal-title":"Communication Management and Technology"},{"key":"e_1_3_2_1_4_1","first-page":"90","article-title":"Network Security Analysis of Intelligent Connected Vehicle [J]","volume":"04","author":"Junsheng Chen","year":"2023","unstructured":"Chen Junsheng. Network Security Analysis of Intelligent Connected Vehicle [J]. Mechanical and Electrical Technology, 2023, (04):90-92.","journal-title":"Mechanical and Electrical Technology"},{"issue":"05","key":"e_1_3_2_1_5_1","first-page":"19","article-title":"Construction of Network security detection Platform for intelligent Connected vehicle [J]","volume":"44","author":"Keyi Zhu","year":"2023","unstructured":"Zhu Keyi, Long Weiwei, Zou Bosong. Construction of Network security detection Platform for intelligent Connected vehicle [J]. Software, 2023, 44, (05):19-22.","journal-title":"Software"},{"key":"e_1_3_2_1_6_1","volume-title":"Sensors","author":"Dini","year":"2023","unstructured":"Dini P,Saponara S.Design and Experimental Assessment of Real-Time Anomaly Detection Techniques for Automotive Cybersecurity [J]. Sensors, 2023, 23 (22)."},{"issue":"06","key":"e_1_3_2_1_7_1","first-page":"51","article-title":"Analysis on Network Security of driverless Vehicles [J]","volume":"5","author":"Jing LI","year":"2022","unstructured":"LI Jing. Analysis on Network Security of driverless Vehicles [J]. Automotive and New Power, 2022, 5, (06):51-53.","journal-title":"Automotive and New Power"},{"key":"e_1_3_2_1_8_1","volume-title":"Research and Optimization of Vehicle Gateway Firewall based on CAN Bus [D]","author":"Zhenwei Chen","year":"2021","unstructured":"Chen Zhenwei. Research and Optimization of Vehicle Gateway Firewall based on CAN Bus [D]. Guangdong University of Technology, 2021."},{"key":"e_1_3_2_1_9_1","first-page":"38","volume":"11","author":"Xufang Wang","year":"2020","unstructured":"Wang Xufang, Du Jianke, HAO Yaodong Uncertainty Analysis and Optimization of Sound Insulation Performance of Automotive Firewall Assembly [J]. Automotive Technology, 2020, (11): 38-42.","journal-title":"Automotive Technology"},{"key":"e_1_3_2_1_10_1","volume-title":"Research and Application of Key Technologies of Network Security of Intelligent Connected Vehicle [D]","author":"Haitao Zhang","year":"2023","unstructured":"Zhang Haitao. Research and Application of Key Technologies of Network Security of Intelligent Connected Vehicle [D]. University of Electronic Science and Technology of China, 2023."},{"key":"e_1_3_2_1_11_1","first-page":"73","article-title":"Network security Risk analysis of intelligent Connected Vehicle System [J]","volume":"04","author":"Duan Li","year":"2022","unstructured":"Li Duan, Xu Jie. Network security Risk analysis of intelligent Connected Vehicle System [J]. Industrial Information Security, 2022, (04): 73-80.","journal-title":"Industrial Information Security"},{"key":"e_1_3_2_1_12_1","volume-title":"Sensors","author":"Kyere","year":"2023","unstructured":"Kyere AA,Nigussie E,Isoaho J. Self-Aware Cybersecurity Architecture for Autonomous Vehicles: Security through System-Level Accountability [J]. Sensors, 2023, 23 (21)."},{"key":"e_1_3_2_1_13_1","volume-title":"Research and implementation of on-board Bus Data Analysis Method based on Intelligent Connected Vehicle [D]","author":"The","year":"2022","unstructured":"The sun is shining. Research and implementation of on-board Bus Data Analysis Method based on Intelligent Connected Vehicle [D]. Beijing University of Posts and Telecommunications, 2022."},{"issue":"09","key":"e_1_3_2_1_14_1","first-page":"14","article-title":"Security analysis of in-vehicle Network Communication for Connected vehicles [J]","volume":"46","author":"Xianfeng Jia","year":"2021","unstructured":"Jia Xianfeng, Ning Yuqiao, Wu Zhi. Security analysis of in-vehicle Network Communication for Connected vehicles [J]. Automotive Practical Technology, 2021, 46 (09): 14-19.","journal-title":"Automotive Practical Technology"}],"event":{"name":"CSAIDE 2024: 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","acronym":"CSAIDE 2024","location":"Nanjing China"},"container-title":["Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672925","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672919.3672925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:36:57Z","timestamp":1755880617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672919.3672925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":14,"alternative-id":["10.1145\/3672919.3672925","10.1145\/3672919"],"URL":"https:\/\/doi.org\/10.1145\/3672919.3672925","relation":{},"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"2024-07-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}