{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:53Z","timestamp":1755907733564,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3617184.3617187","type":"proceedings-article","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T14:41:42Z","timestamp":1703774502000},"page":"15-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Structure and key technologies of nuclear power plant network security situational awareness platform"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-0703-2080","authenticated-orcid":false,"given":"Junkai","family":"Wang","sequence":"first","affiliation":[{"name":"Network and Industrial Control System Information Security Department, China Nuclear Power Operation Technology Corporation, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6202-8867","authenticated-orcid":false,"given":"Deng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Network and Industrial Control System Information Security Department, China Nuclear Power Operation Technology Corporation, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6005-6837","authenticated-orcid":false,"given":"Hanjun","family":"Gao","sequence":"additional","affiliation":[{"name":"Network and Industrial Control System Information Security Department, China Nuclear Power Operation Technology Corporation, China"}]}],"member":"320","published-online":{"date-parts":[[2023,12,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"One for software definition of network security situational awareness methods. Journal of information technology and network security","author":"Zhongbin Zheng","year":"2020","unstructured":"Zheng Zhongbin, Li Cong, Wang Chaodong. One for software definition of network security situational awareness methods. Journal of information technology and network security, 2020, 33 (4) 6:5-12. DOI: 10.19358 \/ j.i SSN. 2096-5133.2020.04.002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.16184\/j.cnki.com.prg"},{"issue":"02","key":"e_1_3_2_1_3_1","first-page":"168","article-title":"Application of Network security situation awareness platform based on Big Data in private network field","volume":"5","author":"Lijun Bao","year":"2019","unstructured":"Bao Lijun. Application of Network security situation awareness platform based on Big Data in private network field. Information Security Research, 2019, 5(02):168-175.","journal-title":"Information Security Research"},{"key":"e_1_3_2_1_4_1","volume-title":"Network security situational awareness based on support vector machine (SVM) technology exploration and application. Journal of digital technology and applications","author":"Kongpeng Wei","year":"2022","unstructured":"Wei Kongpeng, Wang Ju, Gu Hongbin. Network security situational awareness based on support vector machine (SVM) technology exploration and application. Journal of digital technology and applications, 2022, 40 (7): 206-208. The DOI: 10.19695 \/ j.carol carroll nki cn12-1369.2022.07.65."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12317"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/2050-7038.12150"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119863663.ch36"},{"issue":"09","key":"e_1_3_2_1_8_1","first-page":"40","article-title":"Convolutional Neural network based image generation method classification","volume":"2","author":"Qiaoling Li","year":"2016","unstructured":"Li Qiaoling, Guan Qingxiao, Zhao Xianfeng. Convolutional Neural network based image generation method classification. Journal of Network and Information Security, 2016, 2(09):40-48.","journal-title":"Journal of Network and Information Security"},{"issue":"06","key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Research and implementation of Network traffic anomaly Detection based on unguided Learning Environment in Spark framework","volume":"2016","author":"Xiaoping Wu","unstructured":"Wu Xiaoping, Zhou Zhou, Li Hongcheng. Research and implementation of Network traffic anomaly Detection based on unguided Learning Environment in Spark framework. Information Network Security, 2016(06):1-7.","journal-title":"Information Network Security"},{"issue":"03","key":"e_1_3_2_1_10_1","first-page":"95","article-title":"Network attack detection method based on improved Hidden Markov Model","volume":"31","author":"Xiaofeng Yang","year":"2010","unstructured":"Yang Xiaofeng, Sun Mingming, Hu Xuelei Network attack detection method based on improved Hidden Markov Model. Journal of Communications, 2010, 31(03):95-101.","journal-title":"Journal of Communications"},{"key":"e_1_3_2_1_11_1","volume-title":"Wu Haijiang Research on Smart Grid Network Situation Assessment Model and perception prediction based on Situation awareness technology. Electronic design engineering","author":"Junyu Zhou","year":"2021","unstructured":"Zhou Junyu, Li Wei, Wu Haijiang Research on Smart Grid Network Situation Assessment Model and perception prediction based on Situation awareness technology. Electronic design engineering, 2021, 29 (10): 134-137 + 142. DOI: 10.14022 \/ j.i ssn1674-6236.2021.10.029."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.13334\/j.0258-8013.pcsee.201260"},{"key":"e_1_3_2_1_13_1","volume-title":"Ma Rui Bus load situation awareness based on k-means clustering and fuzzy neural network. Journal of electric power science and technology","author":"Tiezheng Jiang","year":"2020","unstructured":"Jiang Tiezheng, Yin Xiaobo, Ma Rui Bus load situation awareness based on k-means clustering and fuzzy neural network. Journal of electric power science and technology, 2020, 35 (3): 46-54. DOI: 10.19781 \/ j.i SSN. 1673-9140.2020.03.006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.16543\/2095-641"},{"key":"e_1_3_2_1_15_1","volume-title":"Youn\u00e9s El Bouzekri El Idrissi. Social Network's Security Related to Healthcare. Intelligent Pervasive Computing Systems for Smarter Healthcare","author":"Elmendili Fatna","year":"2019","unstructured":"Fatna Elmendili, Habiba Chaoui, Youn\u00e9s El Bouzekri El Idrissi. Social Network's Security Related to Healthcare. Intelligent Pervasive Computing Systems for Smarter Healthcare, 05 July 2019."},{"key":"e_1_3_2_1_16_1","volume-title":"Issue 1","author":"Bhavnani Harshit","year":"2021","unstructured":"Harshit Bhavnani, Shreyansh Bardia, Aniket Modi, Ujwal Shah. An extensive review of data security infrastructure and legislature. Security and PrivacyVolume 5, Issue 1, 19 September 2021."},{"key":"e_1_3_2_1_17_1","volume-title":"A context-aware internet of things-driven security scheme for smart homes. Security and Privacy","author":"Khanpara Pimal","year":"2022","unstructured":"Pimal Khanpara, Kruti Lavingia, Rajvi Trivedi, Sudeep Tanwar, Amit Verma, Ravi Sharma. A context-aware internet of things-driven security scheme for smart homes. Security and Privacy Volume 6, Issue 1, 30 September 2022."}],"event":{"name":"ICCSIE 2023: 8th International Conference on Cyber Security and Information Engineering","acronym":"ICCSIE 2023","location":"Putrajaya Malaysia"},"container-title":["Proceedings of the 8th International Conference on Cyber Security and Information Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617184.3617187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617184.3617187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:57:29Z","timestamp":1755899849000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617184.3617187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":17,"alternative-id":["10.1145\/3617184.3617187","10.1145\/3617184"],"URL":"https:\/\/doi.org\/10.1145\/3617184.3617187","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2023-12-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}