2018
DOI: 10.1016/j.pnucene.2017.08.006
|View full text |Cite
|
Sign up to set email alerts
|

Insider threats of Physical Protection Systems in nuclear power plants: Prevention and evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 2 publications
0
15
0
Order By: Relevance
“…The first addresses the physical protection of a system, whereas the second focuses on cyber protection. Another study by Zou et al [175] used the door and sensor data features to explore the use of the failure mode and effect analysis method. Mavroeidis et al [176] presented an ontological framework to improve physical security and insider threat detection using door access.…”
Section: Physical Behaviorsmentioning
confidence: 99%
“…The first addresses the physical protection of a system, whereas the second focuses on cyber protection. Another study by Zou et al [175] used the door and sensor data features to explore the use of the failure mode and effect analysis method. Mavroeidis et al [176] presented an ontological framework to improve physical security and insider threat detection using door access.…”
Section: Physical Behaviorsmentioning
confidence: 99%
“…Other than that, [30] has proposed the method that is based on finding the possible failure threats and define the effect of each error on the Physical Protection System (PPS) effectiveness. Along with that, the features used was at the source of Estimate of Adversary Sequence Interruption (EASI) technique, the technique of Estimate and Prevention of the Insider Threats (EPIT) recommended for the best approximation of insider threats.…”
Section: 2insider Threats Cause By System Factormentioning
confidence: 99%
“…Other than that, author [41] reported one of the contributing factors of system failure when employee frequently gives respond to any phishing email. For example, from the review of research papers above, we can relate to the framework as an employee might have conceptualizing problem on how the production works which involve operational procedure [42] with the system and next resulting in the documentation or production failure [43] because employee give respond to the malicious email.…”
Section: Framework Of Automated Manufacturing Execution Systemmentioning
confidence: 99%
“…To keep the system in a reliable condition and to ensure that there is continuous power without any interruption to industries, telecommunication networks, and at the consumer level, there is a need for a fast, stable, and reliable system that can handle such a problem in a quick manner without any delay. In a power system, the protection system is one of the counteragents that detects and clears a fault as soon as possible [4,5].…”
Section: Introductionmentioning
confidence: 99%