[1] |
罗康. 医疗数据发布的隐私泄露风险评估系统设计与实现[D]. 贵阳: 贵州大学, 2022.
|
[2] |
ISO/SAE. ISO/SAE DIS 21434:2021; Road Vehicle-Cybersecurity Engineering[S]. ISO/SAE International: Geneva, Switzerland, 2021.
|
[3] |
MONTEUUIS J P, BOUDGUIGA A, ZHANG J, et al. SARA:Security Automotive Risk Analysis Method[C]// Proceedings of the 4th ACM Workshop on Cyber-Physical System Security. New York: ACM, 2018:3-14.
|
[4] |
LAUTENBACH A, ALMGREN M, OLOVSSON T. Proposing HEAVENS 2.0-An Automotive Risk Assessment Model[C]// Proceedings of the 5th ACM Computer Science in Cars Symposium. New York: ACM, 2021:1-12.
|
[5] |
RING M, FRKAT D, SCHMIEDECKER M. Cybersecurity Evaluation of Automotive E/E Architectures[C]// ACM Computer Science in Cars Symposium (CSCS 2018). New York: ACM, 2018:1-7.
|
[6] |
SION L, VAN LANDUYT D, WUYTS K, et al. Privacy Risk Assessment for Data Subject-Aware Threat Modeling[C]// 2019 IEEE Security and Privacy Workshops (SPW).Piscataway:IEEE, 2019:64-71.
|
[7] |
BORGAONKAR R, HIRSCHI L, PARK S, et al. New Privacy Threat on 3G,4G,and Upcoming 5G AKA Protocols[J]. Proceedings on Privacy Enhancing Technologies, 2019, 2019(3):108-127.
|
[8] |
NGUYEN T H, VU T G, TRAN H L, et al. Emerging Privacy and Trust Issues for Autonomous Vehicle Systems[C]// 2022 International Conference on Information Networking (ICOIN).Piscataway:IEEE, 2022:52-57.
|
[9] |
LI Z, PEI Q, MARKWOOD I, et al. Location Privacy Violation via GPS-Agnostic Smart Phone Car Tracking[J]. IEEE Transactions on Vehicular Technology, 2018, 67(6):5042-5053.
|
[10] |
宋成, 金彤, 倪水平, 等. 一种面向移动终端的K匿名位置隐私保护方案[J]. 西安电子科技大学学报, 2021, 48(3):138-145.
|
|
SONG Cheng, JIN Tong, NI Shuiping, et al. A K-Anonymity Location Privacy Protection Scheme for Mobile Terminals[J]. Journal of Xidian University, 2021, 48 (3):138-145.
|
[11] |
FRASSINELLI D, PARK S, NÜRNBERGER S. I Know Where You Parked Last Summer:Automated Reverse Engineering and Privacy Analysis of Modern Cars[C]// 2020 IEEE Symposium on Security and Privacy (SP).Piscataway:IEEE, 2020:1401-1415.
|
[12] |
YANG W, CHEN X, XIONG Z, et al. A Privacy-Preserving Aggregation Scheme Based on Negative Survey for Vehicle Fuel Consumption Data[J]. Information Sciences, 2021, 570:526-544.
doi: 10.1016/j.ins.2021.05.009
|
[13] |
ZAVVOS E, GERDING E H, YAZDANPANAH V, et al. Privacy and Trust in the Internet of Vehicles[J]. IEEE Transactions on Intelligent Transportation Systems, 2022, 23(8):10126-10141.
doi: 10.1109/TITS.2021.3121125
|
[14] |
XIONG W, LAGERSTRÖM R. Threat Modeling of Connected Vehicles:A Privacy Analysis and Extension of Vehiclelang[C]// 2019 International Conference on Cyber Situational Awareness,Data Analytics and Assessment (Cyber SA).Piscataway:IEEE, 2019:1-7.
|
[15] |
江秋情. 车联网隐私泄露检测系统的设计与实现[D]. 北京: 北京邮电大学, 2020.
|
[16] |
CRONK R J, SHAPIRO S S. Quantitative Privacy Risk Analysis[C]// 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).Piscataway:IEEE, 2021:340-350.
|
[17] |
SINGH V P, UJJWAL R L. Privacy Attack Modeling and Risk Assessment Method for Name Data Networking[C]// Advances in Computer Communication and Computational Sciences:Proceedings of IC4S 2018.Heidelberg:Springer, 2019:109-119.
|
[18] |
DI TIZIO G, MASSACCI F, ALLODI L, et al. An Experimental Approach for Estimating Cyber Risk:A Proposal Building upon Cyber Ranges and Capture the Flags[C]// 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).Piscataway:IEEE, 2020:56-65.
|
[19] |
WEI Y C, WU W C, LAI G H, et al. PISRA:Privacy Considered Information Security Risk Assessment Model[J]. The Journal of Supercomputing, 2020, 76(3):1468-1481.
doi: 10.1007/s11227-018-2371-0
|
[20] |
SION L, VAN L, JOOSEN W. The Never-Ending Story:On the Need for Continuous Privacy Impact Assessment[C]// 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).Piscataway:IEEE, 2020:314-317.
|
[21] |
申云成. 个人大数据定价方法研究[D]. 成都: 四川大学, 2021.
|
[22] |
互联网天地. 《中华人民共和国个人信息保护法》公布[J]. 互联网天地, 2021, 9:3-11.
|
|
Internet World. Personal Information Protection Law of the People’s Republic of China Promulgated[J]. Internet World, 2021, 9:3-11.
|
[23] |
SILVA P, GONÇALVES C, ANTUNES N, et al. Privacy Risk Assessment and Privacy-Preserving Data Monitoring. Expert Systems with Applications, 2022, 200:116867.
doi: 10.1016/j.eswa.2022.116867
|
[24] |
彭慧波. 数据交易中定价机制研究[D]. 北京: 北京邮电大学, 2019.
|
[25] |
SHERAZI H H R, KHAN Z A, IQBAL R, et al. A Heterogeneous IoV Architecture for Data Forwarding in Vehicle to Infrastructure Communication[J]. Mobile Information Systems, 2019, 2019:1-18.
|
[26] |
ASTRIDA D N, SAPUTRA A R, ASSAUFI A I. Analysis and Evaluation of Wireless Network Security with the Penetration Testing Execution Standard (PTES)[J]. Sinkron:Jurnal Dan Penelitian Teknik Informatika, 2022, 7(1):147-154.
|
[27] |
BHARATI S, PODDER P, MONDAL M, et al. Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems (2020)[J/OL].[2020-06-11]. https://arxiv.org/abs/2006.08723.
|
[28] |
KIM M, SHIN Y, SHON T. MitM Tool Analysis for TLS Forensics[C]// 2021 International Conference on Platform Technology and Service (PlatCon).Piscataway:IEEE, 2021:1-4.
|