Cyber-Security Threats and Response Models in Nuclear Power PlantsExperimental Testbeds and Design of Experiments
Cyber-Security Threats and Response Models in Nuclear Power Plants: Experimental Testbeds and...
Smidts, Carol; Ray, Indrajit; Zhu, Quanyan; Vaddi, Pavan Kumar; Zhao, Yunfei; Huang, Linan; Diao, Xiaoxu; Talukdar, Rakibul; Pietrykowski, Michael C.
2022-10-11 00:00:00
[With the computerization of control and management systems deployed in nuclear power plants (NPPs), new requirements for cybersecurity assessment are emerging, which motivate the studies on new methodologies and technologies for analyzing the impacts and consequences of cyber-attacks that potentially target the instrumentation and control systems in NPPs. These analyses can also evaluate the reliability and robustness of various system designs of the NPP environment in the resistance to cyber-attacks. Several testing platforms that can emulate cyber-attacks and deduce their impacts on NPPs have recently been studied and developed. This chapter compares these platforms from the perspectives of system structures and the supported attack scenarios.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/cyber-security-threats-and-response-models-in-nuclear-power-plants-69n0pDiWsK
Cyber-Security Threats and Response Models in Nuclear Power PlantsExperimental Testbeds and Design of Experiments
[With the computerization of control and management systems deployed in nuclear power plants (NPPs), new requirements for cybersecurity assessment are emerging, which motivate the studies on new methodologies and technologies for analyzing the impacts and consequences of cyber-attacks that potentially target the instrumentation and control systems in NPPs. These analyses can also evaluate the reliability and robustness of various system designs of the NPP environment in the resistance to cyber-attacks. Several testing platforms that can emulate cyber-attacks and deduce their impacts on NPPs have recently been studied and developed. This chapter compares these platforms from the perspectives of system structures and the supported attack scenarios.]
Published: Oct 11, 2022
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.