Systematic development of scenarios caused by cyber-attack-induced human errors in nuclear power plants
Tài liệu tham khảo
1997
Fovino, 2011, Cyber security assessment of a power plant, Electr Power Syst Res, 81, 518, 10.1016/j.epsr.2010.10.012
Kang, 2002, An analysis of safety-critical digital systems for risk-informed design, Reliab Eng Syst Safe., 78, 307, 10.1016/S0951-8320(02)00176-X
Kang, 2012, Risk Effect of Possible Cyber Terror to Nuclear Plants
Chen, 2011, Lessons from Stuxnet, Computer, 44, 91, 10.1109/MC.2011.115
USNRC, 2009. 10 CFR Part 73.54, Protection of digital computer and communication systems and networks.
USNRC, 2010. Regulatory Guide 5.71, Cyber security programs for nuclear facilities. January.
USNRC, 2006. Regulatory Guide 1.152 revision 2, criteria for use of computers in safety systems of nuclear power plants. January.
Nuclear Energy Institute. Identifying systems and assets subject to the cyber security rule. 2012.
Kondakci, 2015, Analysis of information security reliability: a tutorial, Reliab Eng Syst Safe, 133, 275, 10.1016/j.ress.2014.09.021
Lv, 2015, Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion, Reliab Eng Syst Safe, 142, 68, 10.1016/j.ress.2015.04.023
Hu, 2017, Multiple cyber attacks against a target with observation errors and dependent outcomes: characterization and optimization, Reliab Eng Syst Safe, 159, 119, 10.1016/j.ress.2016.10.025
Cherdantseva, 2016, A review of cyber security risk assessment methods for SCADA systems, Comput Secur, 56, 1, 10.1016/j.cose.2015.09.009
Shin, 2015, Development of a cyber security risk model using Bayesian networks, Reliab Eng Syst Safe, 134, 208, 10.1016/j.ress.2014.10.006
Piètre-Cambacédès, 2013, Cross-fertilization between safety and security engineering, Reliab Eng Syst Safe, 110, 110, 10.1016/j.ress.2012.09.011
Kriaa, 2015, A survey of approaches combining safety and security for industrial control systems, Reliab Eng Syst Safe, 139, 156, 10.1016/j.ress.2015.02.008
Rogovin, 1979
Swain, 1983
Creery, 2005, Industrial cybersecurity for power system and SCADA networks, 303
Keller N. NIST cybersecurity framework (CSF) reference tool. 2014.
Office UGA, America USo. Critical infrastructure protection: challenges and efforts to secure control systems. 2004.
Zhu, 2011, A taxonomy of cyber attacks on SCADA systems, 380
Song, 2013, An analysis of technical security control requirements for digital I&C systems in nuclear power plants, Nucl Eng Technol, 45, 637, 10.5516/NET.04.2012.091
Masood R. Assessment of cyber security challenges in nuclear power plants security incidents, threats, and initiatives. 2016.
Varnado, 1979
Stack, 1980
Park, 2003, A PSA-based vital area identification methodology development, Reliab Eng Syst Safe, 82, 133, 10.1016/S0951-8320(03)00139-X
2005
IEEE Standard Criteria for Accident Monitoring Instrumentation for Nuclear Power Generating Stations. IEEE Std 497-2010 (Revision of IEEE Std 497-2002). 2010:1–34.
KEPCO & KHNP. Safety I&C System for the APR1400. APR1400-Z-J-EC-13001-NP Rev.0, 2013.
Common Vulnerability and Exposures (CVE), http://cve.mitre.org.
Reer, 2007
Forester, 2007
2007
Kim, 2014, Dynamic sequence analysis for feed-and-bleed operation in an OPR1000, Ann Nucl Energy, 71, 361, 10.1016/j.anucene.2014.04.014
Dacier M, Deswarte Y, Kaâniche M. Quantitative assessment of operational security: models and tools. Information systems security, ed by S.K. Katsikas and D. Gritzalis, London, Chapman & Hall. 1996: 179–186.
Parry, 1992
Kim, 2005
Nuclear Energy Institute. Industry guideline for monitoring the effectiveness of maintenance at nuclear power plants. 1993.