New Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants

Cited 9 time in webofscience Cited 7 time in scopus
  • Hit : 610
  • Download : 467
DC FieldValueLanguage
dc.contributor.authorSon, Junyoungko
dc.contributor.authorChoi, Jonggyunko
dc.contributor.authorYoon, Hyunsooko
dc.date.accessioned2019-07-22T04:50:08Z-
dc.date.available2019-07-22T04:50:08Z-
dc.date.created2019-06-26-
dc.date.created2019-06-26-
dc.date.created2019-06-26-
dc.date.issued2019-06-
dc.identifier.citationIEEE ACCESS, v.7, pp.78379 - 78390-
dc.identifier.issn2169-3536-
dc.identifier.urihttp://hdl.handle.net/10203/263677-
dc.description.abstractAs the importance of cyber security for nuclear power plants has recently increased, related organizations such as manufactures, operators, regulators, and research institutes have taken into consideration the many concerns for effective application of cyber security to critical digital assets at nuclear power plants. It is essential to analyze and research how to effectively apply nuclear cyber security requirements and what complementary factors are present in the overall process for a nuclear security technology system. The complementary points of nuclear cyber security technology could be analyzed through diverse cyber security methods such as cyber security assurance, assessments, and software development life cycle. It is necessary to apply nuclear cyber security technology effectively in accordance with the operation, assurance, and system development process of a nuclear facility. These analysis results could be applied to technical points for the cyber security of critical digital assets at nuclear power plants in the future and to technology that needs to be at the appropriate level of cyber security to ensure technical assurance. This paper is a new approach to compare and analyze various methods used in the cyber security field to discover complementary points for the application of cyber security to critical systems in nuclear power plants. Additionally, this paper also presents effective methods for developing and applying, evaluating, and regulating cyber security in nuclear digital critical systems using the complementary points of various cyber security methods identified in the analysis.-
dc.languageEnglish-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleNew Complementary Points of Cyber Security Schemes for Critical Digital Assets at Nuclear Power Plants-
dc.typeArticle-
dc.identifier.wosid000473784100001-
dc.identifier.scopusid2-s2.0-85068332251-
dc.type.rimsART-
dc.citation.volume7-
dc.citation.beginningpage78379-
dc.citation.endingpage78390-
dc.citation.publicationnameIEEE ACCESS-
dc.identifier.doi10.1109/ACCESS.2019.2922335-
dc.contributor.localauthorYoon, Hyunsoo-
dc.contributor.nonIdAuthorChoi, Jonggyun-
dc.description.isOpenAccessY-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorNuclear power plant-
dc.subject.keywordAuthorI&amp-
dc.subject.keywordAuthorC-
dc.subject.keywordAuthordigital system-
dc.subject.keywordAuthorcyber security-
dc.subject.keywordAuthorregulatory guide-
dc.subject.keywordAuthorsafety-
dc.subject.keywordAuthorassurance-
dc.subject.keywordAuthorCC-
dc.subject.keywordAuthorSDOE-
dc.subject.keywordAuthorV&amp-
dc.subject.keywordAuthorV-
dc.subject.keywordAuthorSDL-
dc.subject.keywordAuthorassessment-
dc.subject.keywordAuthorICS-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
논문.pdf(13.96 MB)Download
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 9 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0