Fourteen lessons learned from the successful nuclear power program of the Republic of Korea

Energy Policy ◽  
2009 ◽  
Vol 37 (12) ◽  
pp. 5494-5508 ◽  
Author(s):  
Sungyeol Choi ◽  
Eunju Jun ◽  
IlSoon Hwang ◽  
Anne Starz ◽  
Tom Mazour ◽  
...  
Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1467
Author(s):  
Sangdo Lee ◽  
Jun-Ho Huh ◽  
Yonghoon Kim

The Republic of Korea also suffered direct and indirect damages from the Fukushima nuclear accident in Japan and realized the significance of security due to the cyber-threat to the Republic of Korea Hydro and Nuclear Power Co., Ltd. With such matters in mind, this study sought to suggest a measure for improving security in the nuclear power plant. Based on overseas cyber-attack cases and attacking scenario on the control facility of the nuclear power plant, the study designed and proposed a nuclear power plant control network traffic analysis system that satisfies the security requirements and in-depth defense strategy. To enhance the security of the nuclear power plant, the study collected data such as internet provided to the control facilities, network traffic of intranet, and security equipment events and compared and verified them with machine learning analysis. After measuring the accuracy and time, the study proposed the most suitable analysis algorithm for the power plant in order to realize power plant security that facilitates real-time detection and response in the event of a cyber-attack. In this paper, we learned how to apply data for multiple servers and apply various security information as data in the security application using logs, and match with regard to application of character data such as file names. We improved by applying gender, and we converted to continuous data by resetting based on the risk of non-continuous data, and two optimization algorithms were applied to solve the problem of overfitting. Therefore, we think that there will be a contribution in the connection experiment of the data decision part and the optimization algorithm to learn the security data.


Risk Analysis ◽  
2020 ◽  
Vol 40 (11) ◽  
pp. 2373-2389
Author(s):  
Seunghoo Jeong ◽  
Byeong Je Kim ◽  
Young‐Joo Lee ◽  
Ji‐Bum Chung ◽  
Sung‐Han Sim

2020 ◽  
Vol 6 (1) ◽  
pp. e1753464 ◽  
Author(s):  
Juhwan Oh ◽  
Jong-Koo Lee ◽  
Dan Schwarz ◽  
Hannah L. Ratcliffe ◽  
Jeffrey F. Markuns ◽  
...  

2022 ◽  
pp. 100214
Author(s):  
Yong-kyun Kim ◽  
Wanchul Yoon ◽  
Jaekyung Lee ◽  
Jean-Luc Poncelet ◽  
Glenn Dolcemascolo ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document