Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence 2018
DOI: 10.1145/3297156.3297211
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Vulnerability Scanner for Digital Nuclear Power Plant Instrumentation and Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Kim et al [7] Digital assets Criteria for identifying digital assets. Kim et al [31] CS incident affecting the NPP I&C CS vulnerability checking system. Cho and Woo [27] Nuclear terror Study of twelve nuclear terror cases.…”
Section: Kim Et Al [29]mentioning
confidence: 99%
See 1 more Smart Citation
“…Kim et al [7] Digital assets Criteria for identifying digital assets. Kim et al [31] CS incident affecting the NPP I&C CS vulnerability checking system. Cho and Woo [27] Nuclear terror Study of twelve nuclear terror cases.…”
Section: Kim Et Al [29]mentioning
confidence: 99%
“…According to RG 5.71, periodic checking of the I&C systems should be conducted to identify any possible CS vulnerabilities. For this reason, CS vulnerability checking systems, such as the one proposed by [31], should be used to reduce the impact of vulnerabilities, as well as to ensure compliance with the automatic check regulatory guidelines. A fundamental requirement of these scanning tools is that they should not generate excessively high network traffic or overhead on the objects to be scanned.…”
Section: Risk Assessment and Threat Analysis For Nppsmentioning
confidence: 99%
“…V ulnerability analysis (or vulnerability assessment) is the process that defines, identifies and classifies the vulnerabilities (or security holes) in a computer, network or communications infrastructure. In addition vulnerability analysis can be used to forecast the effectiveness of countermeasures to those vulnerabilities as well as evaluate their effectiveness after they are put into use [1]- [6].…”
Section: Introductionmentioning
confidence: 99%