{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T02:00:50Z","timestamp":1773021650079,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T00:00:00Z","timestamp":1712966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T00:00:00Z","timestamp":1712966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Deanship of Scientific Research at Imam Mohammad Ibn Saud Islamic University","award":["IMSIU-RG23072"],"award-info":[{"award-number":["IMSIU-RG23072"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-024-00841-z","type":"journal-article","created":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T20:10:05Z","timestamp":1713039005000},"page":"2377-2394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard"],"prefix":"10.1007","volume":"23","author":[{"given":"Abdullah Hamad N.","family":"Almoqbil","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,13]]},"reference":[{"key":"841_CR1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2187\/1\/012048","author":"J Peng","year":"2022","unstructured":"Peng, J., Chen, X., Li, M., Zhang, Y.: Torque anomaly detection of nuclear power electric valve actuator based on DAE-WDSVVD. J. Phys. Conf. Ser. (2022). https:\/\/doi.org\/10.1088\/1742-6596\/2187\/1\/012048","journal-title":"J. Phys. Conf. Ser."},{"key":"841_CR2","doi-asserted-by":"crossref","unstructured":"Farber, J. et al.: Process anomaly detection for sparsely labeled events in nuclear power plants. Idaho Natl. Lab. Extern. Rep., no. September 2021 (2021)","DOI":"10.2172\/2332982"},{"key":"841_CR3","unstructured":"Subekti, M.: The improvement of neuro-expert method for anomaly the improvement of neuro-expert method for anomaly detection in nuclear reactor (2015)"},{"key":"841_CR4","unstructured":"\u201cPhD_Schoonewelle.pdf.\u201d"},{"issue":"3","key":"841_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/en15031082","volume":"15","author":"M Ibrahim","year":"2022","unstructured":"Ibrahim, M., Alsheikh, A., Awaysheh, F.M., Alshehri, M.D.: Machine learning schemes for anomaly detection in solar power plants. Energies 15(3), 1\u201317 (2022). https:\/\/doi.org\/10.3390\/en15031082","journal-title":"Energies"},{"key":"841_CR6","unstructured":"Katser, I., Raspopov, D., Kozitsin, V., Mezhov, M.: Machine learning methods for anomaly detection in nuclear power plant power transformers (2022). http:\/\/arxiv.org\/abs\/2211.11013"},{"key":"841_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2022.109293","volume":"177","author":"S Kollias","year":"2022","unstructured":"Kollias, S., et al.: Machine learning for analysis of real nuclear plant data in the frequency domain. Ann. Nucl. Energy 177, 109293 (2022). https:\/\/doi.org\/10.1016\/j.anucene.2022.109293","journal-title":"Ann. Nucl. Energy"},{"key":"841_CR8","unstructured":"Water, L., Sustainability, R.: Light water reactor sustainability program subtle process-anomalies detection using machine-learning methods (2019)"},{"key":"841_CR9","doi-asserted-by":"publisher","unstructured":"Ioannou, G., Tagaris, T., Alexandridis, G., Stafylopatis, A.: Intelligent techniques for anomaly detection in nuclear reactors. Int. Conf. Phys. React. Transit. to a Scalable Nucl. Futur. PHYSOR 2020, vol. 2020-March, pp. 2972\u20132979 (2020). https:\/\/doi.org\/10.1051\/epjconf\/202124721011","DOI":"10.1051\/epjconf\/202124721011"},{"key":"841_CR10","doi-asserted-by":"publisher","DOI":"10.3390\/app13052894","author":"K Lee","year":"2023","unstructured":"Lee, K., Lee, J., Yim, K.: Classification and analysis of malicious code detection techniques based on the APT attack. Appl. Sci. (2023). https:\/\/doi.org\/10.3390\/app13052894","journal-title":"Appl. Sci."},{"key":"841_CR11","unstructured":"\u00c5. \u00d4. \u00ca\u00f4, \u00d4. \u00c1. \u00cb\u00f2\u00e7\u00f4, and \u00c2. \u00c2\u00f2\u00e5\u00f1, \u201c\u00c5\u00d4 \u00a2 \u00ca\u00d4 \u00b7 \u00b8 \u00d4 \u00ec \u00c1 \u00cb\u00d2\u00c7\u00d4 \u00b7 \u00c2\u00d2\u00c5\u00d1 \u00c2 \u00e0a\u00d5 \u00c2 \u00a7 \u00e3\u00cb\u00c1\u00e8 Copyright \u00a9 by,\u201d no. August, p. 2711 (2006)"},{"key":"841_CR12","unstructured":"Sj\u00f6gren, S.: Anomaly detection with machine learning (2023)"},{"key":"841_CR13","unstructured":"Memory, L.S., Autoencoder, B.: Anomaly detection of power plant equipment using (2020)"},{"issue":"1 Part 2","key":"841_CR14","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1109\/TNS.2010.2088138","volume":"58","author":"X Jin","year":"2011","unstructured":"Jin, X., Guo, Y., Sarkar, S., Ray, A., Edwards, R.M.: Anomaly detection in nuclear power plants via symbolic dynamic filtering. IEEE Trans. Nucl. Sci. 58(1 Part 2), 277\u2013288 (2011). https:\/\/doi.org\/10.1109\/TNS.2010.2088138","journal-title":"IEEE Trans. Nucl. Sci."},{"key":"841_CR15","doi-asserted-by":"publisher","unstructured":"Maurya, C.K., Toshniwal, D.: Anomaly detection in nuclear power plant data using support vector data description. IEEE TechSym 2014 - 2014 IEEE Students\u2019 Technol. Symp., pp. 82\u201386 (2014). https:\/\/doi.org\/10.1109\/TechSym.2014.6807919","DOI":"10.1109\/TechSym.2014.6807919"},{"key":"841_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/s23031352","author":"K DeMedeiros","year":"2023","unstructured":"DeMedeiros, K., Hendawi, A., Alvarez, M.: A survey of AI-based anomaly detection in IoT and sensor networks. Sensors (2023). https:\/\/doi.org\/10.3390\/s23031352","journal-title":"Sensors"},{"issue":"3","key":"841_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e13883","volume":"9","author":"Q Huang","year":"2023","unstructured":"Huang, Q., et al.: A review of the application of artificial intelligence to nuclear reactors: Where we are and what\u2019s next. Heliyon 9(3), e13883 (2023). https:\/\/doi.org\/10.1016\/j.heliyon.2023.e13883","journal-title":"Heliyon"},{"key":"841_CR18","doi-asserted-by":"publisher","first-page":"4137","DOI":"10.1109\/IJCNN.2018.8489130","volume":"2018","author":"F Caliv\u00e1","year":"2018","unstructured":"Caliv\u00e1, F., et al.: A deep learning approach to anomaly detection in nuclear reactors. Proc. Int. Jt. Conf. Neural Netw. 2018, 4137\u20134144 (2018). https:\/\/doi.org\/10.1109\/IJCNN.2018.8489130","journal-title":"Proc. Int. Jt. Conf. Neural Netw."},{"key":"841_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/info14020103","author":"T Talaei Khoei","year":"2023","unstructured":"Talaei Khoei, T., Kaabouch, N.: A comparative analysis of supervised and unsupervised models for detecting attacks on the intrusion detection systems. Information (2023). https:\/\/doi.org\/10.3390\/info14020103","journal-title":"Information"},{"key":"841_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489130","author":"F Caliv\u00e1","year":"2018","unstructured":"Caliv\u00e1, F., et al.: A deep learning approach to anomaly detection in nuclear reactors. Proc. Int. Jt. Conf. Neural Netw. (2018). https:\/\/doi.org\/10.1109\/IJCNN.2018.8489130","journal-title":"Proc. Int. Jt. Conf. Neural Netw."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00841-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00841-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00841-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T02:16:55Z","timestamp":1716776215000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00841-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,13]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["841"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00841-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,13]]},"assertion":[{"value":"18 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares no conflict of interest. \u201cI confirm that I am the only Solo\/Single author of this research manuscript, and the above-mentioned funding (Grant Number # IMSIU-RG23072) is the faculty research grant to support\/finance the publication fee (APC)\u201d.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}