{"id":"https://openalex.org/W4390321040","doi":"https://doi.org/10.1145/3617184.3617187","title":"Structure and key technologies of nuclear power plant network security situational awareness platform","display_name":"Structure and key technologies of nuclear power plant network security situational awareness platform","publication_year":2023,"publication_date":"2023-09-22","ids":{"openalex":"https://openalex.org/W4390321040","doi":"https://doi.org/10.1145/3617184.3617187"},"language":"en","primary_location":{"id":"doi:10.1145/3617184.3617187","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3617184.3617187","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072649753","display_name":"J.Z. Wang","orcid":"https://orcid.org/0009-0003-0703-2080"},"institutions":[{"id":"https://openalex.org/I4210139507","display_name":"State Nuclear Power Technology Company (China)","ror":"https://ror.org/03pydjx38","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210139507"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junkai Wang","raw_affiliation_strings":["Network and Industrial Control System Information Security Department, China Nuclear Power Operation Technology Corporation, China"],"raw_orcid":"https://orcid.org/0009-0003-0703-2080","affiliations":[{"raw_affiliation_string":"Network and Industrial Control System Information Security Department, China Nuclear Power Operation Technology Corporation, China","institution_ids":["https://openalex.org/I4210139507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100617477","display_name":"Deng Zhang","orcid":"https://orcid.org/0000-0001-6202-8867"},"institutions":[{"id":"https://openalex.org/I4210139507","display_name":"State Nuclear Power Technology Company (China)","ror":"https://ror.org/03pydjx38","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210139507"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deng Zhang","raw_affiliation_strings":["Network and Industrial Control System Information Security Department, China Nuclear Power Operation Technology Corporation, China"],"raw_orcid":"https://orcid.org/0000-0001-6202-8867","affiliations":[{"raw_affiliation_string":"Network and Industrial Control System Information Security Department, China Nuclear Power Operation Technology Corporation, China","institution_ids":["https://openalex.org/I4210139507"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013515442","display_name":"Hanjun Gao","orcid":"https://orcid.org/0009-0001-6005-6837"},"institutions":[{"id":"https://openalex.org/I4210139507","display_name":"State Nuclear Power Technology Company (China)","ror":"https://ror.org/03pydjx38","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210139507"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanjun Gao","raw_affiliation_strings":["Network and Industrial Control System Information Security Department, China Nuclear Power Operation Technology Corporation, China"],"raw_orcid":"https://orcid.org/0009-0001-6005-6837","affiliations":[{"raw_affiliation_string":"Network and Industrial Control System Information Security Department, China Nuclear Power Operation Technology Corporation, China","institution_ids":["https://openalex.org/I4210139507"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072649753"],"corresponding_institution_ids":["https://openalex.org/I4210139507"],"apc_list":null,"apc_paid":null,"fwci":0.1968,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.54707688,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.8686406016349792},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.6554012894630432},{"id":"https://openalex.org/keywords/nuclear-power-plant","display_name":"Nuclear power plant","score":0.6157588958740234},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6059511303901672},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.548105001449585},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5260208249092102},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.4877703785896301},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.4795398712158203},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.4778461158275604},{"id":"https://openalex.org/keywords/nuclear-power","display_name":"Nuclear power","score":0.4720105826854706},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.4627397656440735},{"id":"https://openalex.org/keywords/situation-analysis","display_name":"Situation analysis","score":0.42807137966156006},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3146234154701233},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.30532440543174744},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.30342596769332886},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21546924114227295},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12245234847068787},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.10218921303749084},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09981566667556763}],"concepts":[{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.8686406016349792},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.6554012894630432},{"id":"https://openalex.org/C2779979336","wikidata":"https://www.wikidata.org/wiki/Q134447","display_name":"Nuclear power plant","level":2,"score":0.6157588958740234},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6059511303901672},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.548105001449585},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5260208249092102},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.4877703785896301},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.4795398712158203},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.4778461158275604},{"id":"https://openalex.org/C513653683","wikidata":"https://www.wikidata.org/wiki/Q12739","display_name":"Nuclear power","level":2,"score":0.4720105826854706},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.4627397656440735},{"id":"https://openalex.org/C14911803","wikidata":"https://www.wikidata.org/wiki/Q7532148","display_name":"Situation analysis","level":2,"score":0.42807137966156006},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3146234154701233},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.30532440543174744},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.30342596769332886},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21546924114227295},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12245234847068787},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.10218921303749084},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09981566667556763},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C185544564","wikidata":"https://www.wikidata.org/wiki/Q81197","display_name":"Nuclear physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3617184.3617187","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3617184.3617187","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 8th International Conference on Cyber Security and Information Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2964448428","https://openalex.org/W2972094743","https://openalex.org/W3111991419","https://openalex.org/W3200322033","https://openalex.org/W4298625459","https://openalex.org/W4383498939"],"related_works":["https://openalex.org/W2368931217","https://openalex.org/W2379389012","https://openalex.org/W3015787821","https://openalex.org/W2744631404","https://openalex.org/W2093477862","https://openalex.org/W1519114293","https://openalex.org/W2389213063","https://openalex.org/W2378885848","https://openalex.org/W2081253120","https://openalex.org/W2382223981"],"abstract_inverted_index":{"With":[0],"the":[1,22,40,52,59,83,98,102,109,119,136],"rapid":[2],"development":[3],"of":[4,11,25,44,101,138,142],"network":[5,12,23,31,41,60,74,84,121,139],"and":[6,17,58,91,107,131],"information":[7],"technology,":[8],"various":[9],"types":[10],"attacks":[13],"have":[14],"brought":[15],"more":[16,18],"serious":[19],"threats":[20],"to":[21],"security":[24,32,42,61,75,85,122,140],"nuclear":[26,45,71,143],"power":[27,46,72,144],"plants.":[28,47,145],"The":[29,114],"conventional":[30],"situational":[33,62,76,86,123],"awareness":[34,63,77,87,124],"system":[35],"can":[36],"no":[37],"longer":[38],"meet":[39],"requirements":[43],"When":[48],"processing":[49],"multi-user":[50],"requests,":[51],"user":[53],"response":[54,129],"delay":[55],"is":[56,65,80,111],"high,":[57],"performance":[64],"poor.":[66],"In":[67],"this":[68],"paper,":[69],"a":[70],"plant":[73],"platform":[78,88,125],"model":[79,89,103,110,126],"designed.":[81],"First,":[82],"architecture":[90],"its":[92],"functional":[93],"modules":[94],"are":[95,105],"described,":[96],"then":[97],"key":[99],"technologies":[100],"application":[104],"studied,":[106],"finally":[108],"tested":[112],"experimentally.":[113],"experimental":[115],"results":[116],"show":[117],"that":[118],"designed":[120],"has":[127],"short":[128],"time":[130],"good":[132],"performance,":[133],"which":[134],"meets":[135],"needs":[137],"protection":[141]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
