{"id":"https://openalex.org/W4391550286","doi":"https://doi.org/10.1145/3637494.3638728","title":"Research on Real-time Detection Method of Distributed Setpoint Anomaly in Nuclear Power Industrial Control System Based on Stream Computing","display_name":"Research on Real-time Detection Method of Distributed Setpoint Anomaly in Nuclear Power Industrial Control System Based on Stream Computing","publication_year":2023,"publication_date":"2023-11-17","ids":{"openalex":"https://openalex.org/W4391550286","doi":"https://doi.org/10.1145/3637494.3638728"},"language":"en","primary_location":{"id":"doi:10.1145/3637494.3638728","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3637494.3638728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 International Conference on Electronics, Computers and Communication Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083088556","display_name":"Hanjun Gao","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hanjun Gao","raw_affiliation_strings":["Simulation Center, CNNC Wuhan Nuclear Power Operation Technology Co., China"],"raw_orcid":"https://orcid.org/0009-0001-7010-0985","affiliations":[{"raw_affiliation_string":"Simulation Center, CNNC Wuhan Nuclear Power Operation Technology Co., China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060702758","display_name":"Wei Feng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei Feng","raw_affiliation_strings":["Simulation Center, CNNC Wuhan Nuclear Power Operation Technology Co., China"],"raw_orcid":"https://orcid.org/0009-0003-2552-189X","affiliations":[{"raw_affiliation_string":"Simulation Center, CNNC Wuhan Nuclear Power Operation Technology Co., China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032546544","display_name":"Hang Tong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hang Tong","raw_affiliation_strings":["Simulation Center, CNNC Wuhan Nuclear Power Operation Technology Co., China"],"raw_orcid":"https://orcid.org/0009-0003-3466-0621","affiliations":[{"raw_affiliation_string":"Simulation Center, CNNC Wuhan Nuclear Power Operation Technology Co., China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5083088556"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20182937,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"196","last_page":"202"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10876","display_name":"Fault Detection and Control Systems","score":0.9488999843597412,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.941100001335144,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/setpoint","display_name":"Setpoint","score":0.9680196046829224},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6362284421920776},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.629664957523346},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5875680446624756},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4701428711414337},{"id":"https://openalex.org/keywords/nuclear-power","display_name":"Nuclear power","score":0.4584578573703766},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.42005282640457153},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3898754119873047},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3828956186771393},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.23130598664283752},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.14821204543113708}],"concepts":[{"id":"https://openalex.org/C12302492","wikidata":"https://www.wikidata.org/wiki/Q1752097","display_name":"Setpoint","level":2,"score":0.9680196046829224},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6362284421920776},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.629664957523346},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5875680446624756},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4701428711414337},{"id":"https://openalex.org/C513653683","wikidata":"https://www.wikidata.org/wiki/Q12739","display_name":"Nuclear power","level":2,"score":0.4584578573703766},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.42005282640457153},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3898754119873047},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3828956186771393},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.23130598664283752},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.14821204543113708},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3637494.3638728","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3637494.3638728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 International Conference on Electronics, Computers and Communication Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1975081465","https://openalex.org/W2020754036","https://openalex.org/W2049163162","https://openalex.org/W2088340225","https://openalex.org/W2092335550","https://openalex.org/W2152183345"],"related_works":["https://openalex.org/W1495927848","https://openalex.org/W4205962020","https://openalex.org/W2620138946","https://openalex.org/W1527771352","https://openalex.org/W90946887","https://openalex.org/W191702426","https://openalex.org/W4255293822","https://openalex.org/W2994131054","https://openalex.org/W3161403725","https://openalex.org/W4223615774"],"abstract_inverted_index":{"The":[0,115],"nuclear":[1,20,29],"industry":[2],"as":[3,24,100],"a":[4,52,56,62,106,166,176,181],"national":[5],"important":[6],"basic":[7],"support":[8],"industry,":[9,30],"its":[10,31],"safety":[11],"is":[12,36,249],"more":[13,15,45,47],"and":[14,33,46,104,139,160,188,194,210,231,237],"attention":[16],"by":[17],"the":[18,25,28,40,59,70,79,90,95,101,122,125,130,134,141,146,150,158,185,207,221,224,238,243],"state,":[19],"power":[21],"control":[22],"system":[23],"core":[26,151],"of":[27,42,49,65,136,149,179,190,212,223],"safe":[32],"stable":[34],"operation":[35,137],"particularly":[37],"important.":[38],"With":[39],"development":[41],"attack":[43,50,54,60,73,81,99],"technology,":[44],"forms":[48],"from":[51],"single":[53,63],"to":[55,87,129,145,156,205,219],"distributed":[57,96,167],"attack,":[58],"has":[61],"flow":[64],"normal":[66,191],"characteristics,":[67],"so":[68],"that":[69,242],"existing":[71],"single-point":[72],"detection":[74,83,108,199,209],"methods":[75],"can":[76],"not":[77],"meet":[78,157],"malicious":[80],"behavior":[82],"requirements.":[84],"In":[85],"order":[86,155,218],"cope":[88],"with":[89],"challenge,":[91],"this":[92,228,247],"paper":[93,164,248],"takes":[94],"setpoint":[97,192],"anomaly":[98,208],"research":[102],"object,":[103],"proposes":[105],"real-time":[107,161,198],"method":[109,116,225,244],"security-Setpointer":[110],"based":[111,170],"on":[112,171,175],"stream":[113,172],"computing.":[114],"constructs":[117],"an":[118],"aggregation":[119],"model":[120],"for":[121,133,201],"setpoints":[123],"in":[124,154,217,227,246],"time":[126],"window":[127],"according":[128],"controlled":[131],"objects":[132],"sequence":[135],"aggregation,":[138],"at":[140],"same":[142],"time,":[143],"due":[144],"large":[147,177],"scale":[148],"monitoring":[152,203,214],"point,":[153],"timeliness":[159],"detection.":[162],"This":[163],"implements":[165],"DTW":[168,197],"algorithm":[169],"computing,":[173],"trains":[174],"amount":[178],"historical":[180],"priori":[182],"data,":[183],"realizes":[184],"feature":[186],"learning":[187],"characterization":[189],"sequences,":[193],"adopts":[195],"different":[196,202,213],"tasks":[200],"points":[204],"realize":[206],"analysis":[211],"points.":[215],"Finally,":[216],"verify":[220],"effectiveness":[222],"proposed":[226,245],"paper,":[229],"functional":[230],"performance":[232],"tests":[233],"are":[234],"carried":[235],"out,":[236],"test":[239],"results":[240],"show":[241],"effective.":[250]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
