The Bayesian Network Methodology for Industrial Control System with Digital Technology
|
|
|
- Norma Hicks
- 10 years ago
- Views:
Transcription
1 , pp The Bayesian Network Methodology for Industrial Control System with Digital Technology Jinsoo Shin 1, Hanseong Son 2, Soongohn Kim 2, and Gyunyoung Heo 1 1 Kyung Hee University, 1732 Deogyeong-daero, Giheung-gu, Yongin-si, Gyeonggi-do , Republic of Korea {bigjoyan, gheo}@khu.ac.kr 2 Joongbu University, 201 Daehak-ro,Chubu-Myeon, Geumsan-gun, Chungnam, , Republic of Korea {hsson, sgkim}@joongbu.ac.kr *Corresponding Author: [email protected] Abstract. Issues like cost optimization, system safety and cyber-attack are newly introduced due to development in technology. Although sufficient information is required to solve these mentioned issues, generally there is lack of information. We introduce the Bayesian network that is one of the most popular probabilistic methodologies to overcome the limitation of the issues. This paper presents two Bayesian network models related to system optimization and cyber security for specific industry control system to prepare the mobile environment. Keywords: Bayesian network; System Optimization; Cyber Security 1 Introduction Industries or workers have been greatly influenced by the development of technology related to mobile systems such as personal digital assistant (PDA), mobile phone and laptop. The characteristic of mobile device provides mobility and spacious working environment to users by using it [1-2]. There are a few common concerns between nuclear industry and mobile device such as standardization and cost optimization with advent of new technology, safety and cyber threats. Cost optimization is important from business point of view and has equal importance in both industries. In nuclear safety, one is particularly interested in the safety of critical assets and safe operation to keep public, worker and environment safe from hazardous radiation. Using the devices based on digital technology can introduce issues such as cyber security to industrial system, especially critical infrastructure like nuclear power plant. The system optimization issue is to find out the optimal configuration of the system, caused by modernization from analog to digital system or changing the system configuration, by comparison reliability of system with cost of system. The cyber security is very important issue on industrial facilities, especially critical infrastructure control system, because it is hazardous to the public safety as well as the finance loss. We need sufficient information to solve these issues, but generally ISSN: ASTL Copyright 2013 SERSC
2 there is lack of information since it is difficult to perform the penetration test for the critical infrastructure control system. In order to overcome these problems, we introduce the Bayesian network methodology which is one of the most popular probabilistic methodologies based on Bayesian theory (in Chapter 2). The problem about lack of information can be overcome by using Bayesian network (BN). In this paper, we propose two models used the BN to represent that the BN methodology can be applied to these issues (in Chapter 3). One is the optimization model by using the BN to find out the optimal point between reliability and cost of system. And other is the cyber security evaluation model to find out vulnerability and optimal mitigation measure of cyber threat. 2 Bayesian Network (BN) Bayesian network (BN) is a directed acyclic graph (DAG) of arc to represent the dependencies between nodes, which represent the variables, using the Bayesian theory. BN is composed of node, arc and node probability table (NPT) [3]. The node is a variable, the arc represents the cause-and-effect relationship and NPT means the probability table that summarizes the occur probability between the causal relationship nodes. BN methodology can solve problems such as lack of information, posterior inference and changing from the qualitative to quantitative problem by learning new information on the conditional probability with calculation of the relationship between the posterior and prior probability. 3 Modeling by using BN In Chapter 3, we propose two represent models to find out optimal system configuration, and measure of vulnerability and optimal mitigation for cyber-attacks caused by mobile device, which applies to industrial control system (ICS) with BN for solving the lack of information issue or cyber security issue. In this paper, the subject of application is restricted to an ICS of critical infrastructure like nuclear reactor protection system (RPS). RPS in nuclear industry is important to retain the safety state when abnormal state since an accident occurs to a nuclear facility. Then, two models are developed by using BN. These models are significant with the introduction of digital, like mobile, I&C system. 3.1 Optimal Model for RPS Architecture To find out optimal configuration of system, we make several configuration of nuclear reactor protection system (RPS) as one of ICS and an optimization model to determine optimal instrumentation and control (I&C) architecture configuration in terms of availability and cost. The four cases with different architecture formation for RPS were developed with single and double redundancy of bi-stable modules, coincidence processor module, and safety or 158 Copyright 2013 SERSC
3 protection circuit actuation logic. The architecture configurations are transformed to reliability block diagram based on logical operation and function of modules. The BN models for four configurations were developed to get the availability analysis by using AND gate, OR gate and N-out-of-M gate as BN functions [4]. Cost estimation model was proposed for the architecture configurations, respectively. The BN model can be used to calculate the system reliability. For cost estimation, a numeric multiplier of X arbitrary units was assigned to each component based on experts and designers judgment and cost for each configuration was calculated. Reliability index, which means the increase of reliability per unit of cost, is proposed by calculation of cost and availability with each configuration and a configuration of architecture that gives highest availability with maintaining low cost of manufacturing can be identified. It was found that reliability can be enhanced at the rate of 5E -05 per X unit of cost for this study. 3.2 Cyber Security Risk Model for RPS Architecture Mobile like PDA, mobile phone and laptop technology give usability to user during maintain period of component, device and system. The cyber-attack is emphasized as new critical threat caused by applying digital device into ICS. Cyber security against cyber-attack is difficult to analysis and modelling due to lack of information like penetration test data. We suggest the cyber security risk model for RPS I&C system with the BN, it is shown in Fig. 1, to overcome these problems by calculating of the relationship between the posterior and prior probability [5-6]. The model utilizing the benefit of BN can analyze the risk that cyber-attack occurs at RPS. It can be utilized for the quantitative analysis by the proposed measure, cyber security risk as well as for various qualitative analyses. Cyber security risk model is composed of the activityquality analysis model and the architecture analysis model. The activity-quality analysis model was proposed to check how people and/or organization comply with the cyber security regulatory guide. It helps to analyze the relationships of the activity-quality checklists and their influences to cyber security. The architecture analysis model was also developed for the RPS as an illustrative purpose. For the definition of the critical cyber-attack scenarios on RPS of nuclear industry, the vulnerabilities and mitigation measures were analyzed. Then, the two models, activity-quality and architecture analysis models, were integrated to cyber security risk model by using BN. Then, several analyses were performed by using the cyber security risk model for confirming the model. The analysis of the vulnerability and optimal mitigation measure against the vulnerability was performed with the assumption that a cyber-attack occurs to a maintenance and test processor in the RPS. In this analysis, prioritizing the order of vulnerabilities and reinforcing the mitigation measures were analyzed with the assumed cyber-attack to maintenance and test processor. If a cyberattack occurs at a system scale, it is important to have confidence on which component is the key element corresponding to the attack situation. This analysis proved that the developed model could provide this kind of information Copyright 2013 SERSC 159
4 through the back propagation feature of the BN such as that Coincidence Processor and Intra-Channel are more risk significant than other subsystems of RPS and prioritized vulnerabilities order for RPS. Finally, the analysis of the cyber security risk and the optimal mitigation measures regarding vulnerabilities was performed on RPS. This analysis infers that the use of the cyber security risk model makes it possible to create simulated penetration test scenarios for future directions. Activityquality Mitigation Measure Vulnerability Architecture Component Cause Situation Accident Case Cyber Security Risk Fig. 1. The simplified cyber security risk model for RPS with Bayesian network 4 Conclusions For preparing the introduction of the latest devices based on digital interface like mobile on critical infrastructure facilities, we suggest the BN methodology and the two models based on the methodology to demonstrate the usefulness of the BN for specific ICSs. One is the model for the optimization of system configuration in view of reliability and cost. This model was developed for RPS and demonstrated the usefulness of the BN. Using this model, we could find out an optimal configuration by analyzing the reliability and cost of each changing configuration. The other is the cyber security evaluation model, which is also based on the BN, to analyze the vulnerabilities and the optimal mitigation measures for RPS architecture. The model found out the critical vulnerabilities and the optimal mitigation measures against the vulnerabilities for several assumed scenarios by using the BN function of back propagation calculation. The studies using these two models infer that the BN methodology can be applied to other systems like mobile systems for the same purposes. References 1. Lee, H.C., Lee G.B.: Prototype of Operator Interface for Monitoring and Controlling in the Mobile Control Room. Proceedings of the 2013 ACM international conference on interactive tabletops and surfaces, pp (2013) 2. Kai Ji, Tian-Jian Li: Detection and Analysis of Unidirectional Licks in Mobile Ad Hoc Network Under Nuclear Power Plants Environment. Emerging Technologies for Information Systems, Computing, and Management Lecture Notes in Electrical Engineering Volume 236, pp (2013) 3. Heckerman, D.: A tutorial on learning with Bayesian networks (1996) 160 Copyright 2013 SERSC
5 4. Rahman, K., Shin, J.S., Heo, G.Y., Son, H.S.: Reliability Analysis of I&C Architecture of Research Reactors Using Bayesian Networks, Korean Nuclear Society Autumn Meeting (2013) 5. Shin, J.S., Son, H.S., Rahman, K., Heo, G.Y.: Development of Cyber Security Evaluation Model Using Bayesian Networks, Reliability Engineering and System Safety (submission, 2013) 6. Shin, J.S., Son, H.S., and Heo, G.Y.: Cyber Security Risk Analysis Model Composed with Activity-quality and Architecture Model. International Conference on Computer, Networks and Communication Engineering, p (2013) Copyright 2013 SERSC 161
How To Write A Cyber Security Risk Analysis Model For Research Reactor
MODEL BASED CYBER SECURITY ANALYSIS FOR RESEARCH REACTOR PROTECTION SYSTEM JINSOO SHIN, RAHMAN KHALIL UR, GYUNYOUNG HEO Kyung Hee University, Seogyeong-daero, Giheung-gu, Gyeonggi-do, 446-701, Republic
AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS
http://dx.doi.org/10.5516/net.04.2012.091 AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG *, JUNG-WOON LEE, GEE-YONG PARK, KEE-CHOON KWON,
Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one
Studying an Edutainment Applying Information Security Damage Cases for Adolescents
, pp.13-17 http://dx.doi.org/10.14257/astl.2014.52.03 Studying an Edutainment Applying Information Security Damage Cases for Adolescents Ryu-Hui Kim 1, Kyeong-Bin Moon 1 and Seong Baeg Kim 1,1, 1 Dept.
Development and Application of POSAFE-Q PLC Platform
Development and Application of POSAFE-Q PLC Platform MyeongKyun Lee a, SeungWhan Song a, DongHwa Yun a a POSCO ICT Co. R&D center, Korea Techno-complex 126-16, 5-ka, Anam-dong, Sungbuk, Seoul, Republic
An Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology
Vol.63 (NT 2014), pp.1-5 http://dx.doi.org/10.14257/astl.2014.63.01 An Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology Hojae Lee 1, Junkwon Jung 1, Taeyoung
A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario
, pp. 55-64 http://dx.doi.org/10.14257/ijseia.2015.9.9.06 A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario Yong-Hyeon Gwon 1, Seung-Kwon Jung 2, Su-Won Lee 2 and
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator
Vol.8, No.3 (2014), pp.107-118 http://dx.doi.org/10.14257/ijsh.2014.8.3.10 The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator Woon-Yong
A Study of Key management Protocol for Secure Communication in Personal Cloud Environment
, pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer
A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS
http://dx.doi.org/10.5516/net.04.2011.065 A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG, JUNG-WOON LEE *, CHEOL-KWON LEE, KEE-CHOON KWON, and DONG-YOUNG
Integrating Cyber Security into Nuclear Power Plant Safety Systems Design
Integrating Cyber Security into Nuclear Power Plant Safety Systems Design Deanna Zhang U.S. Nuclear Regulatory Commission Document Date: 05/21/2010 Objectives To provide methods for utilizing safety features,
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES JAEKWAN PARK * and YONGSUK SUH Korea Atomic Energy Research Institute
Research Institute (KAERI) 989-111 Daedeok-daero, Yuseong-gu, Daejeon, Republic of Korea 305-353
, pp.233-242 http://dx.doi.org/10.14257/ijseia.2014.8.4.24 Methods of Software Qualification for a Safety-grade Optical Modem to be used Core Protection Calculator (CPC) in Korea Standard Nuclear Power
A Digital Door Lock System for the Internet of Things with Improved Security and Usability
, pp.33-38 http://dx.doi.org/10.14257/astl.2015.109.08 A Digital Door Lock System for the Internet of Things with Improved Security and Usability Ohsung Doh 1, Ilkyu Ha 1 1 Kyungil University, Gyeongsan,
Vibration Measurement of Wireless Sensor Nodes for Structural Health Monitoring
, pp.18-22 http://dx.doi.org/10.14257/astl.2015.98.05 Vibration Measurement of Wireless Sensor Nodes for Structural Health Monitoring Surgwon Sohn, Seong-Rak Rim, In Jung Lee Div. of Computer and Information
How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis
, pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security
Success factors for the implementation of ERP to the Agricultural Products Processing Center
, pp.61-66 http://dx.doi.org/10.14257/astl.2015.95.12 Success factors for the implementation of ERP to the Agricultural Products Processing Center Jung Rock Do 1, Jin Hyeung Kim 2, Young Chan Choe 3 1
Effects of Simulation based Training on the Learning Outcome of Nursing Students
, pp.251-255 http://dx.doi.org/10.14257/astl.2015.88.53 Effects of Simulation based Training on the Learning Outcome of Nursing Students Hye-Kyung Oh 1 1 Department of Nursing, Division of Health-Nursing,
Research and Performance Analysis of HTML5 WebSocket for a Real-time Multimedia Data Communication Environment
Vol.46 (Multimedia 2014), pp.307-312 http://dx.doi.org/10.14257/astl.2014.46.64 Research and Performance Analysis of HTML5 WebSocket for a Real-time Multimedia Data Communication Environment Jin-tae Park
AN APPLICATION STUDY FOR THE CLASS IE DIGITAL CONTROL AND
- 39 - AN APPLICATION STUDY FOR THE CLASS IE DIGITAL CONTROL AND MONITORING SYSTEM m,,,.,.., HIROYUKIFUKUMITSU Nuclear Power Plant Department, EISC MITSUBISHI ELECTRIC CORPORATION Kobe, Japan XA9846493
INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS
INFORMATION SECURITY RISK ASSESSMENT UNDER UNCERTAINTY USING DYNAMIC BAYESIAN NETWORKS R. Sarala 1, M.Kayalvizhi 2, G.Zayaraz 3 1 Associate Professor, Computer Science and Engineering, Pondicherry Engineering
Intelligent Decision Support System (DSS) Software for System Operation and Multiple Water Resources Blending in Water Treatment Facilities
, pp.204-209 http://dx.doi.org/10.14257/astl.2015.99.49 Intelligent Decision Support System (DSS) Software for System Operation and Multiple Water Resources Blending in Water Treatment Facilities Dal-sik
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver
, pp.161-165 http://dx.doi.org/10.14257/astl.205.98.41 Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver Jeong MyeongSu 1, Moon ChangSoo 1, Gwon DaeHyeok 1 and Cho
Design of automatic testing tool for railway signalling systems software safety assessment
Risk Analysis VI 513 Design of automatic testing tool for railway signalling systems software safety assessment J.-G. Hwang 1, H.-J. Jo 1 & H.-S. Kim 2 1 Train Control Research Team, Korea Railroad Research
Estimating Software Reliability In the Absence of Data
Estimating Software Reliability In the Absence of Data Joanne Bechta Dugan ([email protected]) Ganesh J. Pai ([email protected]) Department of ECE University of Virginia, Charlottesville, VA NASA OSMA SAS
Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices
, pp.28-32 http://dx.doi.org/10.14257/astl.2015.109.07 Design of Micro-payment to Strengthen Security by 2 Factor Authentication with Mobile & Wearable Devices Byung-Rae Cha 1, Sang-Hun Lee 2, Soo-Bong
Efficient Data Replication Scheme based on Hadoop Distributed File System
, pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,
A Study on UNIX Server Consolidation by Virtualization
, pp.43-47 http://dx.doi.org/10.14257/astl.2014.46.10 A Study on UNIX Server Consolidation by Virtualization Lee Yong Hui 1, Kim Hyun Gi 2 1 Shinsung University, Chief of Information Service Center, DaehackRo1
A Research on Security Awareness and Countermeasures for the Single Server
, pp.31-42 http://dx.doi.org/10.14257/ijsia.2013.7.6.04 A Research on Security Awareness and Countermeasures for the Single Server Hyuk-Jin Son 1 and Seungdo Jeong 2,* 1 IT MBA, Graduate School of Business
PROJECT RISK MANAGEMENT
PROJECT RISK MANAGEMENT http://www.tutorialspoint.com/pmp-exams/project_risk_management.htm Copyright tutorialspoint.com Here is a list of sample questions which would help you to understand the pattern
MVC Architecture Driven Design and Implementation of Java Framework for Developing Desktop Application
, pp.317-322 http://dx.doi.org/10.14257/ijhit.2014.7.5.29 MVC Architecture Driven Design and Implementation of Java Framework for Developing Desktop Application Iqbal H. Sarker and K. Apu Department of
Effects of Blended Learning on Nursing Students Learning Outcomes
, pp.260-265 http://dx.doi.org/10.14257/astl.2015.88.55 Effects of Blended Learning on Nursing Students Learning Outcomes Hye-Kyung Oh 1 1 Dept. of Nursing, Division of Health-Nursing, Daegu University
Effective Use of Android Sensors Based on Visualization of Sensor Information
, pp.299-308 http://dx.doi.org/10.14257/ijmue.2015.10.9.31 Effective Use of Android Sensors Based on Visualization of Sensor Information Young Jae Lee Faculty of Smartmedia, Jeonju University, 303 Cheonjam-ro,
ESKISP6055.01 Manage security testing
Overview This standard covers the competencies concerning with managing security testing activities. Including managing resources activities and deliverables. This includes planning, conducting and reporting
Effects of Emergency Nursing Simulation-based Education Program for Self-directed learning ability and Confidence in performance
, pp.146-150 http://dx.doi.org/10.14257/astl.2015.103.32 Effects of Emergency Nursing Simulation-based Education Program for Self-directed learning ability and Confidence in performance In-hye Song 1,
Modern Accounting Information System Security (AISS) Research Based on IT Technology
, pp.163-170 http://dx.doi.org/10.14257/astl.2016. Modern Accounting Information System Security (AISS) Research Based on IT Technology Jiamin Fang and Liqing Shu Accounting Branch, Jilin Business and
DETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS
Hacettepe Journal of Mathematics and Statistics Volume 33 (2004), 69 76 DETERMINING THE CONDITIONAL PROBABILITIES IN BAYESIAN NETWORKS Hülya Olmuş and S. Oral Erbaş Received 22 : 07 : 2003 : Accepted 04
Bayesian Networks and Classifiers in Project Management
Bayesian Networks and Classifiers in Project Management Daniel Rodríguez 1, Javier Dolado 2 and Manoranjan Satpathy 1 1 Dept. of Computer Science The University of Reading Reading, RG6 6AY, UK [email protected],
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Mathematical models to estimate the quality of monitoring software systems for electrical substations
Mathematical models to estimate the quality of monitoring software systems for electrical substations MIHAIELA ILIESCU 1, VICTOR URSIANU 2, FLORICA MOLDOVEANU 2, RADU URSIANU 2, EMILIANA URSIANU 3 1 Faculty
Security Assessment through Google Tools -Focusing on the Korea University Website
, pp.9-13 http://dx.doi.org/10.14257/astl.2015.93.03 Security Assessment through Google Tools -Focusing on the Korea University Website Mi Young Bae 1,1, Hankyu Lim 1, 1 Department of Multimedia Engineering,
Quantification of Security and Survivability
Quantification of Security and Survivability ITI Workshop on Dependability and Security Urbana, Illinois Kishor Trivedi Department of Electrical and Computer Engineering Duke University Durham, NC 27708-0291
The Digital Signage System Supporting Multi-Resources Schedule on an Elevator
, pp. 219-228 http://dx.doi.org/10.14257/ijsh.2015.9.8.23 The Digital Signage System Supporting Multi-Resources Schedule on an Elevator Woon-Yong Kim and SoonGohn Kim (Corresponding Author) Department
Flood inundation prediction model on spatial characteristics with utilization of OLAP-based multidimensional cube information
, pp.162-166 http://dx.doi.org/10.14257/astl.2015.99.40 Flood inundation prediction model on spatial characteristics with utilization of OLAP-based multidimensional cube information Hye-Jin Jo, Yoon-Ju
An Analysis on the Factors affecting Standardization of e-government System Development and Management Methodology 1
, pp.12-16 http://dx.doi.org/10.14257/astl.2015.95.03 An Analysis on the Factors affecting Standardization of e-government System Development and Management Methodology 1 Seung Young Shin 1, Mi Ryang Kim
Options for Cyber Security. Reactors. April 9, 2015
Options for Cyber Security Design Requirements for Power Reactors April 9, 2015 Scope Discuss options for including cyber security design requirements for power reactors into NRC regulations Scope does
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Chapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants
Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants Sooill Lee a*, Yong Sik Kim a, Song Hae Ye a a Central Research Institute, Korea Hydro and
Developing a Video-based Smart Mastery Learning through Adaptive Evaluation
, pp. 101-114 http://dx.doi.org/10.14257/ijseia.2014.8.11.09 Developing a Video-based Smart Mastery Learning through Adaptive Evaluation Jeongim Kang 1, Moonhee Kim 1 and Seong Baeg Kim 1,1 1 Department
IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER NETWORKS. Received May 2010; accepted July 2010
ICIC Express Letters Part B: Applications ICIC International c 2010 ISSN 2185-2766 Volume 1, Number 1, September 2010 pp. 71 76 IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER
Cyber Security in a Nuclear Context
Cyber Security in a Nuclear Context Mitchell Hewes & Nick Howarth UNCLASSIFIED Who are we? Our Facilities Synchrotron Accelerators Cyclotron OPAL Lucas Heights Campus Some Considerations We have an interesting
The Stock Trading System Using X-DBaaS in Cloud Environment
, pp.188-193 http://dx.doi.org/10.14257/astl.2015.99.46 The Stock Trading System Using X-DBaaS in Cloud Environment Hyung-Jin Kim 1, Seok-Jae Moon 2, 1 Department of IT Applied System Engineering, Chonbuk
Hazard Identification and Risk Assessment in Foundry
Hazard Identification and Risk Assessment in Foundry M.SaravanaKumar 1, Dr.P.SenthilKumar 2 1 (Industrial Safety Engineering, K.S.R, College of Engineering / Anna University, Chennai, India) 2 (Department
Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service
, pp. 195-204 http://dx.doi.org/10.14257/ijsh.2015.9.5.19 Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service Ju-Su Kim, Hak-Jun
A Study on Problem Solving Ability of Nursing Students
, pp.357-361 http://dx.doi.org/10.14257/astl.2014.47.81 A Study on Problem Solving Ability of Nursing Students Kyung-Sook Kim 1, Jung-Hyun Choi 2 1 Department of Nursing, Namseoul University, 21 Maeju-ri
A Critical Juncture and an Emerging New Paradigm of Health Insurance Policy in Korea: A Theoretical Review
, pp.36-41 http://dx.doi.org/10.14257/astl.2015.88.08 A Critical Juncture and an Emerging New Paradigm of Health Insurance Policy in Korea: A Theoretical Review JongEun Yim 1, MyungHee Kim 2* 1 Department
The Study on the Graphic Design of Media art: Focusing on Projection Mapping
, pp.14-18 http://dx.doi.org/10.14257/astl.2015.113.04 The Study on the Graphic Design of Media art: Focusing on Projection Mapping Jihun Lee 1, Hyunggi Kim 1 1 Graduate School of Advanced Imaging Science,
Radiated emission measurement of a cell phone processor module using TEM cell
, pp.48-53 http://dx.doi.org/10.14257/astl.2013.28.09 Radiated emission measurement of a cell phone processor module using TEM cell Fayu Wan 1,2*, Qi Liu 3, Jian Shen 3, Jin Wang 3 and Nigel Linge 4 1
A Study on User Access Control Method using Multi-Factor Authentication for EDMS
, pp.327-334 http://dx.doi.org/10.14257/ijsia.2013.7.6.33 A Study on User Access Control Method using Multi-Factor Authentication for EDMS Keunwang Lee 1* 1 Dept.of Multimedia Science, Chungwoon University
A Study on Power Generation Analysis of Floating PV System Considering Environmental Impact
, pp.75-84 http://dx.doi.org/10.14257/ijseia.2014.8.1.07 A Study on Power Generation Analysis of Floating PV System Considering Environmental Impact Young-Kwan Choi * K-water(Korea Water Resources Corporation),
COMPUTER SECURITY OF INSTRUMENTATION AND CONTROL SYSTEMS AT NUCLEAR FACILITIES
1 1 1 1 1 1 1 1 0 1 0 1 0 1 NUCLEAR SECURITY SERIES NO. XX NST0 DRAFT, November 01 STEP : Submission to MS for comment COMPUTER SECURITY OF INSTRUMENTATION AND CONTROL SYSTEMS AT NUCLEAR FACILITIES DRAFT
Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications
, pp.71-80 http://dx.doi.org/10.14257/ijsia.2014.8.1.07 Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications Kyung-Soo Joo 1 and Jung-Woong Woo 2 1 Department of Computer
Nuclear Plant Information Security A Management Overview
Nuclear Plant Information Security A Management Overview The diagram above is a typical (simplified) Infosec Architecture Model for a nuclear power plant. The fully-developed model would, for example,
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,
Integration of Hadoop Cluster Prototype and Analysis Software for SMB
Vol.58 (Clound and Super Computing 2014), pp.1-5 http://dx.doi.org/10.14257/astl.2014.58.01 Integration of Hadoop Cluster Prototype and Analysis Software for SMB Byung-Rae Cha 1, Yoo-Kang Ji 2, Jong-Won
Fault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
Safety Analysis for Nuclear Power Plants
Regulatory Document Safety Analysis for Nuclear Power Plants February 2008 CNSC REGULATORY DOCUMENTS The Canadian Nuclear Safety Commission (CNSC) develops regulatory documents under the authority of paragraphs
Techniques for Supporting Prediction of Security Breaches in. Critical Cloud Infrastructures Using Bayesian Network and. Markov Decision Process
Techniques for Supporting Prediction of Security Breaches in Critical Cloud Infrastructures Using Bayesian Network and Markov Decision Process by Vinjith Nagaraja A Thesis Presentation in Partial Fulfillment
Education for Job Performance and Attitude of Receptionists in General Hospital Front Desk
, pp.119-124 http://dx.doi.org/10.14257/astl.2015.92.25 Education for Job Performance and Attitude of Receptionists in General Hospital Front Desk Yeon Suk Oh 1, Mi Joon Lee 2, Bum Jeun Seo 3 1 Manager,
Component Based Development for Mobile Enterprise Application
Vol.35(Software 2013), pp.31-35 http://dx.doi.org/10.14257/astl.2013.35.08 Component Based Development for Mobile Enterprise Application Yvette E. Gelogo 1 and Haeng-Kon Kim 1* 1 School of Information
Information Security Risk Management
Information Security Risk Management Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA [email protected]
Lumension Endpoint Management and Security Suite
Lumension Endpoint Management and Security Suite Patch and Remediation Module Evaluation Guide July 2012 Version 1.1 Copyright 2009, Lumension L.E.M.S.S:LPR - Table of Contents Introduction... 3 Module
N.K. Srivastava GM-R&M-Engg.Services NTPC- CC/Noida [email protected]
N.K. Srivastava GM-R&M-Engg.Services NTPC- CC/Noida [email protected] JULY 2012 ARC- Transforming Industry and Infrastructure through New Processes and Technologies Presentation Road Map Introduction
Design of Expanded Assessment Management System for Open-Source Moodle LMS Module
2012 3rd International Conference on e-education, e-business, e-management and e-learning IPEDR vol.27 (2012) (2012) IACSIT Press, Singapore Design of Expanded Assessment Management System for Open-Source
Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements
, pp.144-148 http://dx.doi.org/10.14257/astl.2015.95.27 Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements Hongseok Chae 1, AAmir Shahzad 1, Muhammad Irfan 2, HyangRan
