Cyber-Security Threats and Response Models in Nuclear Power Plants

Cyber-Security Threats and Response Models in Nuclear Power Plants

Carol Smidts / Indrajit Ray / Quanyan Zhu

54,81 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2022
Materia
Energía nuclear e ingeniería
ISBN:
9783031127106
54,81 €
IVA incluido
Disponible
Añadir a favoritos

This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well.A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well.This SpringerBrief  is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.

Artículos relacionados

  • Video Surveillance Techniques and Technologies
    Vesna Zeljkovic
    Security video surveillance systems, such as homeland security and national defense, rely on specific mathematical algorithms in order to run effectively. It is essential for these parameters to be understood in order to design and create a successful system. Video Surveillance Techniques and Technologies presents empirical research and acquired experience on the original solut...
    Disponible

    282,11 €

  • Swarm Intelligence for Electric and Electronic Engineering
    With growing developments in artificial intelligence and focus on swarm behaviors; algorithms have been utilized in solving a variety of problems in the field of engineering. This approach has been specifically suited to face the challenges in electric and electronic engineering. Swarm Intelligence for Electric and Electronic Engineering provides an exchange of knowledge on the...
    Disponible

    256,15 €

  • Multirate Systems
    Gordana Jovanovic-Dolecek
    ...
    Disponible

    98,97 €

  • Advanced Instrument Engineering
    Lay-Ekuakille
    Measurement technologies and instrumentation have a multidisciplinary impact in the field of applied sciences. These engineering technologies are necessary in processing information required for renewable energy, biotechnology, power quality, and nanotechnology. Advanced Instrument Engineering: Measurement, Calibration, and Design presents theoretical and practical aspects on t...
    Disponible

    255,95 €

  • Rectenna for RF Energy Harvesting
    Rashmi Pandey
    As we become more dependent on electricity to accomplish our daily needs, the world has been facing challenging issues related to the supply of energy for energy­ based appliances. As we know, the greenhouse effect and industrialization expansion cause Ozone layer depletion, climate change, changes in weather patterns, and continuous release of carbon dioxide (CO2). An importan...
  • Numerical Study of Mixed Convection in a Cavity
    Lyes Bordja
    Convection is a way of transporting energy by means of potential gradients and fluid movement. Convection is the most important mechanism for transferring energy between a solid surface and a liquid or gas at a different temperature. Energy transfer by convection from a surface whose temperature is higher than that of the surrounding fluid takes place in several stages. The ess...

Otros libros del autor

  • Cyber-Security Threats and Response Models in Nuclear Power Plants
    Carol Smidts / Indrajit Ray / Quanyan Zhu
    This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security resea...
    Disponible

    48,66 €