{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T09:14:51Z","timestamp":1722417291869},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,7,4]],"date-time":"2018-07-04T00:00:00Z","timestamp":1530662400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Research Foundation of Korea (NRF) grant funded by the Korea government","award":["No.2017R1C1B5077157"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11227-018-2440-4","type":"journal-article","created":{"date-parts":[[2018,7,4]],"date-time":"2018-07-04T10:13:27Z","timestamp":1530699207000},"page":"4267-4294","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["An effective security measures for nuclear power plant using big data analysis approach"],"prefix":"10.1007","volume":"75","author":[{"given":"Sangdo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jun-Ho","family":"Huh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"2440_CR1","unstructured":"Lee S, Huh JH (2017) An efficient nuclear power plant security measure using big data analysis approach. In: The 2017 international conference on future information technology, applications and services, IFIT 2017, p 1"},{"key":"2440_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2342-5","author":"JH Huh","year":"2018","unstructured":"Huh JH, Kim TJ (2018) A location-based mobile health care facility search system for senior citizens. J Supercomput. \n https:\/\/doi.org\/10.1007\/s11227-018-2342-5","journal-title":"J Supercomput"},{"key":"2440_CR3","first-page":"5","volume":"7","author":"C Tankard","year":"2012","unstructured":"Tankard C (2012) Big data security. Netw Secur 7:5\u20138","journal-title":"Netw Secur"},{"issue":"3","key":"2440_CR4","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/2500873","volume":"57","author":"GH Kim","year":"2014","unstructured":"Kim GH, Trimi S, Chung JH (2014) Big-data applications in the government sector. Commun ACM 57(3):78\u201385","journal-title":"Commun ACM"},{"key":"2440_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0698-2","author":"S Eom","year":"2018","unstructured":"Eom S, Huh JH (2018) Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment. J Ambient Intell Human Comput. \n https:\/\/doi.org\/10.1007\/s12652-018-0698-2","journal-title":"J Ambient Intell Human Comput"},{"key":"2440_CR6","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.jenvrad.2011.09.003","volume":"111","author":"K Hirose","year":"2012","unstructured":"Hirose K (2012) 2011 Fukushima Dai-ichi nuclear power plant accident: summary of regional radioactive deposition monitoring results. J Environ Radioactivity 111:13\u201317","journal-title":"J Environ Radioactivity"},{"key":"2440_CR7","first-page":"241","volume-title":"Resource management for big data platforms","author":"A Jak\u00f3bik","year":"2016","unstructured":"Jak\u00f3bik A (2016) Big data security. In: Pop F, Ko\u0142odziej J, Di Martino B (eds) Resource management for big data platforms. Springer, Cham, pp 241\u2013261"},{"key":"2440_CR8","unstructured":"NIST Special Publication 1500-4 NIST big data interoperability. In: Security and privacy. NIST Big Data Public Working Group"},{"issue":"3","key":"2440_CR9","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/TC.2011.258","volume":"62","author":"D He","year":"2013","unstructured":"He D, Jiajun B, Chan S (2013) Handauth: efficient handover authentication with conditional privacy for wireless networks. IEEE Trans Comput IEEE 62(3):616\u2013622","journal-title":"IEEE Trans Comput IEEE"},{"key":"2440_CR10","first-page":"1","volume-title":"Applied cryptography protocols, algorithms, and source code in C","author":"B Schneier","year":"2007","unstructured":"Schneier B (2007) Applied cryptography protocols, algorithms, and source code in C. Wiley, New York, pp 1\u201334"},{"key":"2440_CR11","first-page":"1","volume-title":"Cryptography and network security: principles and practice","author":"W Stallings","year":"2003","unstructured":"Stallings W (2003) Cryptography and network security: principles and practice. Pearson, London, pp 1\u201316"},{"issue":"1","key":"2440_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10708-013-9516-8","volume":"79","author":"R Kitchin","year":"2014","unstructured":"Kitchin R (2014) The real-time city? Big data and smart urbanism. GeoJournal 79(1):1\u201314","journal-title":"GeoJournal"},{"issue":"3","key":"2440_CR13","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1109\/23.589532","volume":"44","author":"J Sola","year":"1997","unstructured":"Sola J, Sevilla J (1997) Importance of input data normalization for the application of neural networks to complex industrial problems. IEEE Trans Nuclear Sci 44(3):1464\u20131468","journal-title":"IEEE Trans Nuclear Sci"},{"key":"2440_CR14","unstructured":"Pazhanirajaa N, Victer Paula P, Saleem Bashab MS, Dhavachelvanc P (2015) Big data and hadoop\u2014a study in security perspective. In: Procedia computer science, 2nd International Symposium on Big Data and Cloud Computing (ISBCC\u201915), vol 50. Elsevier, pp 596\u2013601"},{"key":"2440_CR15","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-7643-8742-6_6","volume-title":"Modules and comodules","author":"GF Birkenmeier","year":"2008","unstructured":"Birkenmeier GF, Park JK, Rizvi ST (2008) Ring hulls of semi prime homomorphic images. In: Brzezi\u0144ski T, G\u00f3mez Pardo JL, Shestakov I, Smith PF (eds) Modules and comodules. Springer, New York, pp 101\u2013111"},{"key":"2440_CR16","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-0346-0286-0_4","volume-title":"Advances in ring theory","author":"GF Birkenmeier","year":"2010","unstructured":"Birkenmeier GF, Park JK, Rizvi ST (2010) Principally quasi-Baer ring hulls. In: Van Huynh D, L\u00f3pez-Permouth SR (eds) Advances in ring theory. Springer, Verlag Basel\/Switzerland, pp 47\u201361"},{"key":"2440_CR17","volume-title":"Machine learning with R","author":"B Lantz","year":"2013","unstructured":"Lantz B (2013) Machine learning with R. Packt Publishing Ltd., Birmingham"},{"issue":"4","key":"2440_CR18","first-page":"711","volume":"12","author":"F Hao","year":"2016","unstructured":"Hao F, Park DS, Woo SY, Min SD, Park S (2016) Treatment planning in smart medical: a sustainable strategy. J Inf Process Syst 12(4):711\u2013723","journal-title":"J Inf Process Syst"},{"key":"2440_CR19","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1038\/nature16961","volume":"529","author":"David Silver","year":"2016","unstructured":"Silver David et al (2016) Mastering the game of Go with deep neural networks and tree search. Nature 529:484\u2013489","journal-title":"Nature"},{"key":"2440_CR20","first-page":"1","volume":"6","author":"JW Joo","year":"2015","unstructured":"Joo JW, Lee JK, Park JH (2015) Security considerations for a connected car. J Converg 6:1\u20139","journal-title":"J Converg"},{"key":"2440_CR21","first-page":"184","volume":"13","author":"PK Sharma","year":"2017","unstructured":"Sharma PK, Moon SY, Park JH (2017) Block-VN: a distributed blockchain based vehicular network architecture in smart city. J Inf Process Syst 13:184\u2013195","journal-title":"J Inf Process Syst"},{"issue":"7","key":"2440_CR22","first-page":"1","volume":"7","author":"MT Gonz\u00e1lez-Aparicio","year":"2017","unstructured":"Gonz\u00e1lez-Aparicio MT, Ogunyadeka A, Younas M, Tuya J, Casado R (2017) Transaction processing in consistency-aware user\u2019s applications deployed on NoSQL databases. Hum Centric Comput Inf Sci 7(7):1\u201312","journal-title":"Hum Centric Comput Inf Sci"},{"key":"2440_CR23","unstructured":"Ngu HCV, Huh J-H (2016) B\u2009+\u2009-tree construction on massive data with Hadoop. In: Hariri S (ed) Cluster computing. Springer, New York, pp 1\u201311"},{"key":"2440_CR24","doi-asserted-by":"crossref","unstructured":"Lu T, Guo X, Xu B, Zhao L, Peng Y, Yang H (2013) Next big thing in big data: the security of the ICT supply chain. In: International Conference on Social Computing (SocialCom). IEEE, pp 1066\u20131073","DOI":"10.1109\/SocialCom.2013.172"},{"issue":"6","key":"2440_CR25","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MSP.2013.138","volume":"11","author":"AA Cardenas","year":"2013","unstructured":"Cardenas AA, Manadhata PK, Rajan SP (2013) Big data analytics for security. IEEE Secur Priv 11(6):74\u201376","journal-title":"IEEE Secur Priv"},{"issue":"1","key":"2440_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-016-0060-7","volume":"6","author":"Jun-Ho Huh","year":"2016","unstructured":"Huh Jun-Ho, Seo Kyungryong (2016) Design and test bed experiments of server operation system using virtualization technology. Hum Centric Comput Inf Sci 6(1):1\u201321","journal-title":"Hum Centric Comput Inf Sci"},{"issue":"2","key":"2440_CR27","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11227-010-0460-9","volume":"61","author":"G Zhao","year":"2012","unstructured":"Zhao G, Rong Ch, Gilje Jaatun M, Sandnes FE (2012) Reference deployment models for eliminating user concerns on cloud security. J Supercomput 61(2):337\u2013352","journal-title":"J Supercomput"},{"issue":"20","key":"2440_CR28","first-page":"1","volume":"7","author":"J-H Huh","year":"2017","unstructured":"Huh J-H (2017) PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum Centric Comput Inf Sci 7(20):1\u201319","journal-title":"Hum Centric Comput Inf Sci"},{"key":"2440_CR29","unstructured":"Patil HK, Seshadri R (2014) Big data security and privacy issues in healthcare. In: 2014 IEEE International Congress on Big Data (BigData Congress). IEEE, pp 762\u2013765"},{"issue":"4","key":"2440_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1550147718767630","volume":"14","author":"JH Huh","year":"2018","unstructured":"Huh JH (2018) Implementation of lightweight intrusion detection model for security of smart green house and vertical farm. Int J Distrib Sens Netw 14(4):1\u201311","journal-title":"Int J Distrib Sens Netw"},{"key":"2440_CR31","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi S, Roy D, Aral S (2018) The spread of true and false news online. Science 359:1146\u20131151","journal-title":"Science"},{"key":"2440_CR32","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1126\/science.aaa8415","volume":"349","author":"MI Jordan","year":"2015","unstructured":"Jordan MI, Mitchell TM (2015) Machine learning: trends, perspectives, and prospects. Science 349:255\u2013260","journal-title":"Science"},{"issue":"4","key":"2440_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym10040093","volume":"10","author":"Jun-Ho Huh","year":"2018","unstructured":"Huh Jun-Ho (2018) Big data analysis for personalized health activities: machine learning processing for automatic keyword extraction approach. Symmetry 10(4):1\u201330","journal-title":"Symmetry"},{"key":"2440_CR34","first-page":"1","volume":"7","author":"Seo Yeon Moon","year":"2016","unstructured":"Moon Seo Yeon, Park Jong Hyuk (2016) Efficient hardware-based code convertor of a quantum computer. J Converg 7:1\u20139","journal-title":"J Converg"},{"key":"2440_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-23696-4","volume-title":"Rule based systems for big data a machine learning approach","author":"H Liu","year":"2016","unstructured":"Liu H, Gegov A, Cocea A (2016) Rule based systems for big data a machine learning approach. Springer, New York, pp 1\u201343"},{"issue":"4","key":"2440_CR36","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.anucene.2007.08.013","volume":"35","author":"J Medeiros","year":"2008","unstructured":"Medeiros J, Schirru R (2008) Identification of nuclear power plant transients using the Particle Swarm Optimization algorithm. Ann Nucl Energy 35(4):576\u2013582","journal-title":"Ann Nucl Energy"},{"issue":"5","key":"2440_CR37","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1007\/s11227-016-1672-4","volume":"72","author":"J-H Huh","year":"2016","unstructured":"Huh J-H, Otgonchimeg S, Seo K (2016) Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system. J Supercomput 72(5):1862\u20131877","journal-title":"J Supercomput"},{"issue":"1","key":"2440_CR38","first-page":"246","volume":"37","author":"D Feng","year":"2014","unstructured":"Feng D, Zhang M, Li H (2014) Big data security and privacy protection. Chin J Comput 37(1):246\u2013258","journal-title":"Chin J Comput"},{"key":"2440_CR39","unstructured":"Huh J-H (2017) Smart grid test bed using OPNET and power line communication. In: Naumann F, Shasha D, Vossen G (eds) Advances in computer and electrical engineering. IGI Global, Pennsylvania, pp 1\u2013425"},{"key":"2440_CR40","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"IAT Hashem","year":"2015","unstructured":"Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of \u201cbig data\u201d on cloud computing: review and open research issues. Inf Syst 47:98\u2013115","journal-title":"Inf Syst"},{"issue":"1\u20133","key":"2440_CR41","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/0004-3702(91)90051-K","volume":"47","author":"C Hewitt","year":"1991","unstructured":"Hewitt C (1991) Open information systems semantics for distributed artificial intelligence. Artif Intell 47(1\u20133):79\u2013106","journal-title":"Artif Intell"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2440-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2440-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2440-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T15:24:29Z","timestamp":1568215469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2440-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,4]]},"references-count":41,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["2440"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2440-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,4]]},"assertion":[{"value":"4 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}