2023
DOI: 10.1016/j.pnucene.2023.104738
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security in the nuclear industry: A closer look at digital control systems, networks and human factors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…Recognizing the power of social media influencers and online communities, collaborations with credible digital personalities can be instrumental in reaching diverse demographics, particularly the younger generation. This approach demands a proactive stance in monitoring online discussions, responding to queries and concerns in real time, and countering misinformation with scientifically backed data [ 63 ]. In essence, harnessing the potential of digital platforms necessitates a concerted effort to engage in meaningful online dialogs, fostering an informed and balanced public discourse on nuclear technology.…”
Section: The Comprehensive Scope Of Nuclear Isotopes: From Applicatio...mentioning
confidence: 99%
“…Recognizing the power of social media influencers and online communities, collaborations with credible digital personalities can be instrumental in reaching diverse demographics, particularly the younger generation. This approach demands a proactive stance in monitoring online discussions, responding to queries and concerns in real time, and countering misinformation with scientifically backed data [ 63 ]. In essence, harnessing the potential of digital platforms necessitates a concerted effort to engage in meaningful online dialogs, fostering an informed and balanced public discourse on nuclear technology.…”
Section: The Comprehensive Scope Of Nuclear Isotopes: From Applicatio...mentioning
confidence: 99%
“…As a result, these systems are more flexible, allowing for the integration of new nodes, which has contributed to having more computing capacity, hedge, and application adaptability. Nevertheless, it also proposes new challenges related to security and application reliability derived from vulnerability presented against cyberattacks, which can generate affectations on the physical infrastructure, negative environmental impacts and input costs, modify product costs within the process, and even go against human life, generating critical affectations [1,2,[15][16][17]. It is imperative to address these vulnerabilities to mitigate the risks posed by cyber threats, which have the potential to inflict significant damage.…”
Section: Introductionmentioning
confidence: 99%