Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuc...
With the application of digital technology to safety-critical infrastructures, cyber-attacks have em...
Due to the nature of software faults and the way they cause system failures new methods are needed f...
Due to the nature of software faults and the way they cause system failures new methods are needed f...
In the last couple of decades, analog instrumentation and control (I&C) systems have been replac...
In the last several decades, a nuclear power plant (NPP) which is one of the safety critical infrast...
As adoption of digital technology in instrument and control (I&C) systems of nuclear power plant...
Supervisory control and data acquisition (SCADA) systems are the key driver for critical infrastruct...
Supervisory control and data acquisition (SCADA) systems are the key driver for critical infrastruct...
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially...
By adopting digital technology in nuclear power plants (NPPs), the cyber-attack has been introduced ...
To maintain the cyber security, nuclear digital Instrumentation and Control (I&C) systems must b...
Before the tragedy of 9/11, the perception of risk in process plants was mainly focused on accidenta...
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially...
Before the tragedy of 9/11, the perception of risk in process plants was mainly focused on accidenta...
AbstractOver the last decade, Nuclear energy has become one of important energy. Nuclear power syste...
With the application of digital technology to safety-critical infrastructures, cyber-attacks have em...
Due to the nature of software faults and the way they cause system failures new methods are needed f...
Due to the nature of software faults and the way they cause system failures new methods are needed f...
In the last couple of decades, analog instrumentation and control (I&C) systems have been replac...
In the last several decades, a nuclear power plant (NPP) which is one of the safety critical infrast...
As adoption of digital technology in instrument and control (I&C) systems of nuclear power plant...
Supervisory control and data acquisition (SCADA) systems are the key driver for critical infrastruct...
Supervisory control and data acquisition (SCADA) systems are the key driver for critical infrastruct...
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially...
By adopting digital technology in nuclear power plants (NPPs), the cyber-attack has been introduced ...
To maintain the cyber security, nuclear digital Instrumentation and Control (I&C) systems must b...
Before the tragedy of 9/11, the perception of risk in process plants was mainly focused on accidenta...
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially...
Before the tragedy of 9/11, the perception of risk in process plants was mainly focused on accidenta...
AbstractOver the last decade, Nuclear energy has become one of important energy. Nuclear power syste...
With the application of digital technology to safety-critical infrastructures, cyber-attacks have em...
Due to the nature of software faults and the way they cause system failures new methods are needed f...
Due to the nature of software faults and the way they cause system failures new methods are needed f...