{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:40:03Z","timestamp":1755909603679,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,17]]},"DOI":"10.1145\/3637494.3638728","type":"proceedings-article","created":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T12:06:23Z","timestamp":1707134783000},"page":"196-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Real-time Detection Method of Distributed Setpoint Anomaly in Nuclear Power Industrial Control System Based on Stream Computing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-7010-0985","authenticated-orcid":false,"given":"Hanjun","family":"Gao","sequence":"first","affiliation":[{"name":"Simulation Center, CNNC Wuhan Nuclear Power Operation Technology Co., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2552-189X","authenticated-orcid":false,"given":"Wei","family":"Feng","sequence":"additional","affiliation":[{"name":"Simulation Center, CNNC Wuhan Nuclear Power Operation Technology Co., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3466-0621","authenticated-orcid":false,"given":"Hang","family":"Tong","sequence":"additional","affiliation":[{"name":"Simulation Center, CNNC Wuhan Nuclear Power Operation Technology Co., China"}]}],"member":"320","published-online":{"date-parts":[[2024,2,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-014-1416-y"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281210"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110809"},{"key":"e_1_3_2_1_4_1","unstructured":"Lei Fan. 2019. A Program Protocol Whitelist Linkage Method and Device for Industrial Control Hosts."},{"key":"e_1_3_2_1_5_1","volume-title":"Application of DCS in Nuclear Power Plants. Technology Perspective2","author":"Tiannan Hu.","year":"2019","unstructured":"Tiannan Hu. 2019. Application of DCS in Nuclear Power Plants. Technology Perspective2 (2019), 212\u2013213."},{"key":"e_1_3_2_1_6_1","first-page":"5","article-title":"Application layer protocol recognition method based on classification and feature matching","volume":"33","author":"Liu Qiuju","year":"2012","unstructured":"Qiuju Liu, Shulun Liu, and Yanru Feng. 2012. Application layer protocol recognition method based on classification and feature matching. Computer Engineering and Design 33, 7 (2012), 5.","journal-title":"Computer Engineering and Design"},{"key":"e_1_3_2_1_7_1","first-page":"4","article-title":"Research on the Information Security Management System of Nuclear Power Plant DCS System from the Perspective of Science and Technology","volume":"29","author":"Liu Xueke","year":"2022","unstructured":"Xueke Liu and Ping Tan. 2022. Research on the Information Security Management System of Nuclear Power Plant DCS System from the Perspective of Science and Technology. Instrumentation Users 29, 4 (2022), 4.","journal-title":"Instrumentation Users"},{"key":"e_1_3_2_1_8_1","volume-title":"Electronics and Mobile Communication Conference (IEMCON). IEEE, 1\u20135.","author":"Manzoor Muhammad\u00a0Asif","year":"2016","unstructured":"Muhammad\u00a0Asif Manzoor and Yasser Morgan. 2016. Real-time support vector machine based network intrusion detection system using Apache Storm. In 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 1\u20135."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.016"},{"key":"e_1_3_2_1_10_1","volume-title":"Real-time hybrid intrusion detection system using apache storm. In 2015 IEEE 17th international conference on high performance computing and communications","author":"Mylavarapu Goutam","year":"2015","unstructured":"Goutam Mylavarapu, Johnson Thomas, and Ashwin\u00a0Kumar TK. 2015. Real-time hybrid intrusion detection system using apache storm. In 2015 IEEE 17th international conference on high performance computing and communications, 2015 IEEE 7th international symposium on cyberspace safety and security, and 2015 IEEE 12th international conference on embedded software and systems. IEEE, 1436\u20131441."},{"volume-title":"Hadoop based real-time intrusion detection for high-speed networks. In 2016 IEEE global communications conference (GLOBECOM)","author":"Rathore M\u00a0Mazhar","key":"e_1_3_2_1_11_1","unstructured":"M\u00a0Mazhar Rathore, Anand Paul, Awais Ahmad, Seungmin Rho, Muhammad Imran, and Mohsen Guizani. 2016. Hadoop based real-time intrusion detection for high-speed networks. In 2016 IEEE global communications conference (GLOBECOM). IEEE, 1\u20136."},{"key":"e_1_3_2_1_12_1","unstructured":"Mark Shaneck Varun Chandola Haiyang Liu Changho Choi Gyorgy Simon Eric Eilertson Yongdae Kim Zhi-Li Zhang Jaideep Srivastava and Vipin Kumar. 2006. A multi-step framework for detecting attack scenarios. (2006)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522981"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCAS.2006.284911"}],"event":{"name":"CECCT 2023: 2023 International Conference on Electronics, Computers and Communication Technology","acronym":"CECCT 2023","location":"Guilin China"},"container-title":["Proceedings of the 2023 International Conference on Electronics, Computers and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637494.3638728","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637494.3638728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:06:50Z","timestamp":1755907610000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637494.3638728"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":14,"alternative-id":["10.1145\/3637494.3638728","10.1145\/3637494"],"URL":"https:\/\/doi.org\/10.1145\/3637494.3638728","relation":{},"subject":[],"published":{"date-parts":[[2023,11,17]]},"assertion":[{"value":"2024-02-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}