Technical Paper Vulnerability analysis of DoIP implementation based on model learning 2024-04-09 2024-01-2807 It is essential to note that cybersecurity threats not only arise from inherent protocol defects but also consider software implementation vulnerabilities.