734
Views
8
CrossRef citations to date
0
Altmetric
Article

Proposal of an insider sabotage detection method for nuclear security using deep learning

&
Pages 599-607 | Received 23 Nov 2018, Accepted 22 Apr 2019, Published online: 03 May 2019

References

  • Akiyama N. The Fukushima nuclear accident and crisis management-lessons for Japan-US alliance cooperation. Tokyo, Japan: The Sasakawa Peace Foundation; 2012. https://www.spf.org/jpus/img/investigation/book_fukushima.pdf
  • Garcia ML. Design and evaluation of physical protection systems. Burlington (MA): Butterworth-Heinemann; 2007.
  • Leventhal PL, Hoenig MM. Nuclear terrorism: reactor sabotage and weapons proliferation risks. Contemp Econ Policy. 1990;8:106–121.
  • International Atomic Energy Agency. Nuclear security recommendations on physical protection of nuclear material and nuclear facilities. Vienna, Austria: International Atomic Energy Agency; 2011. (INFCIRC/225/Revision 5).
  • International Atomic Energy Agency. Engineering Safety Aspects of the Protection of Nuclear Power Plants against Sabotage. Vienna, Austria: International Atomic Energy Agency; 2007; (IAEA Nuclear Security Series No. 4).
  • Singh GK, Shukla V, Patil S, et al. Automatic detection of abnormal event using smart video surveillance system in a nuclear power plant. 55th Annual Meeting of the Institute of Nuclear Materials Management; 2014 July 20–24; (Atlanta USA). Vol. 1, p. 3139–3146.
  • Ishii T, Murakami H, Koike A Human behavior detection method with direction change invariant features. Proceedings of 7th International Symposium on Medical Information and Communication Technology ISMICT; 2013 Mar 6-8; Tokyo (Japan). p. 257–261.
  • Iwata K, Satoh Y, Sakaue K, et al. Development of software for real-time unusual motions detection by using CHLAC. Bio-inspired Learn Intell Syst Secur. 2008;34–39.
  • Oikonomidis I, Kyriazis N, Argyros AA Markerless and efficient 26-DOF hand pose recovery. 10th Asian Conference on Computer Vision; 2010 Nov 8–12; Queenstown (New Zealand). p.744–757.
  • Chen S, Demachi K, Fujita T, et al. Insider malicious behaviors detection and prediction technology for nuclear security. E-J Adv Maint. 2017;9:66–71.
  • MacQueen J. Some methods for classification and analysis of multivariate observations. Proc fifth Berkeley symp math stat probab. 1967;1(14):281–297.
  • Zill D, Wright WS, Cullen MR. Advanced engineering mathematics. Burlington (MA): Jones & Bartlett Learning; 2011.
  • Hinton GE, Salakhutdinov RR. Reducing the dimensionality of data with neural networks. Science. 2006;313(5786):504–507.
  • Bengio Y, Lamblin P, Popovici D, et al. Greedy layer-wise training of deep networks. Adv Neural Inf Process Syst. vol. 19, 2007;153–160.
  • Vincent P, Larochelle H, Lajoie I, et al. Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion. J Mach Learn Res. 2010;11(Dec):3371–3408.
  • Ng AY Feature selection, L 1 vs. L 2 regularization, and rotational invariance. Proc. the twenty-first international conference on Machine learning; 2004 Jul 4; New York (USA). p. 78. ACM

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.