{"id":"https://openalex.org/W2920477682","doi":"https://doi.org/10.1145/3297156.3297211","title":"Cybersecurity Vulnerability Scanner for Digital Nuclear Power Plant Instrumentation and Control Systems","display_name":"Cybersecurity Vulnerability Scanner for Digital Nuclear Power Plant Instrumentation and Control Systems","publication_year":2018,"publication_date":"2018-12-08","ids":{"openalex":"https://openalex.org/W2920477682","doi":"https://doi.org/10.1145/3297156.3297211","mag":"2920477682"},"language":"en","primary_location":{"id":"doi:10.1145/3297156.3297211","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3297156.3297211","pdf_url":null,"source":{"id":"https://openalex.org/S4306523626","display_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100374317","display_name":"Jae\u2010Hong Kim","orcid":"https://orcid.org/0000-0003-2224-3516"},"institutions":[{"id":"https://openalex.org/I88761825","display_name":"Korea University of Science and Technology","ror":"https://ror.org/000qzf213","country_code":"KR","type":"education","lineage":["https://openalex.org/I88761825"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jae-Hong Kim","raw_affiliation_strings":["University of Science and Technology (UST), Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"University of Science and Technology (UST), Daejeon, South Korea","institution_ids":["https://openalex.org/I88761825"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103554553","display_name":"Yangseo Choi","orcid":"https://orcid.org/0000-0002-6243-2111"},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yang-Seo Choi","raw_affiliation_strings":["Electronic and Telecommunications Research Institute (ETRI), Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Electronic and Telecommunications Research Institute (ETRI), Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069205059","display_name":"Jung-Chan Na","orcid":null},"institutions":[{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jung-Chan Na","raw_affiliation_strings":["Electronic and Telecommunications Research Institute (ETRI), Daejeon, South Korea"],"affiliations":[{"raw_affiliation_string":"Electronic and Telecommunications Research Institute (ETRI), Daejeon, South Korea","institution_ids":["https://openalex.org/I142401562"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100374317"],"corresponding_institution_ids":["https://openalex.org/I88761825"],"apc_list":null,"apc_paid":null,"fwci":0.6269,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.67868132,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"463","last_page":"467"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7665635347366333},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7064436674118042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6619971394538879},{"id":"https://openalex.org/keywords/nuclear-power-plant","display_name":"Nuclear power plant","score":0.6155681610107422},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.6001352667808533},{"id":"https://openalex.org/keywords/nuclear-power","display_name":"Nuclear power","score":0.5621715784072876},{"id":"https://openalex.org/keywords/instrumentation","display_name":"Instrumentation (computer programming)","score":0.4964945912361145},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4632381796836853},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.4622916877269745},{"id":"https://openalex.org/keywords/control-room","display_name":"Control room","score":0.46010127663612366},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.45110854506492615},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.44713306427001953},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.4381735324859619},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.33493202924728394},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.32509690523147583},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1920194923877716},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13406416773796082},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.12514498829841614},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08589237928390503}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7665635347366333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7064436674118042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6619971394538879},{"id":"https://openalex.org/C2779979336","wikidata":"https://www.wikidata.org/wiki/Q134447","display_name":"Nuclear power plant","level":2,"score":0.6155681610107422},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.6001352667808533},{"id":"https://openalex.org/C513653683","wikidata":"https://www.wikidata.org/wiki/Q12739","display_name":"Nuclear power","level":2,"score":0.5621715784072876},{"id":"https://openalex.org/C118530786","wikidata":"https://www.wikidata.org/wiki/Q1134732","display_name":"Instrumentation (computer programming)","level":2,"score":0.4964945912361145},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4632381796836853},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.4622916877269745},{"id":"https://openalex.org/C2779697362","wikidata":"https://www.wikidata.org/wiki/Q390516","display_name":"Control room","level":2,"score":0.46010127663612366},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.45110854506492615},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.44713306427001953},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4381735324859619},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.33493202924728394},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.32509690523147583},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1920194923877716},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13406416773796082},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.12514498829841614},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08589237928390503},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C185544564","wikidata":"https://www.wikidata.org/wiki/Q81197","display_name":"Nuclear physics","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3297156.3297211","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3297156.3297211","pdf_url":null,"source":{"id":"https://openalex.org/S4306523626","display_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W133503245","https://openalex.org/W770564814","https://openalex.org/W1576185228","https://openalex.org/W2004810532","https://openalex.org/W2006721546","https://openalex.org/W2261753215","https://openalex.org/W2295043193","https://openalex.org/W2545096116","https://openalex.org/W2810041373"],"related_works":["https://openalex.org/W2182597083","https://openalex.org/W1888970046","https://openalex.org/W2898333705","https://openalex.org/W2116998925","https://openalex.org/W2086336616","https://openalex.org/W2801806803","https://openalex.org/W2527435446","https://openalex.org/W2120542105","https://openalex.org/W6398245","https://openalex.org/W2197320605"],"abstract_inverted_index":{"Nuclear":[0],"Power":[1],"Plant":[2],"(NPP)":[3],"Instrumentation":[4],"and":[5,15,63],"Control":[6],"(I&C)":[7],"systems":[8,27,92,203],"have":[9,72],"been":[10],"introduced":[11],"for":[12,93,101,194],"operational":[13],"safety":[14],"accident":[16],"prevention":[17],"at":[18],"nuclear":[19,58,103],"facilities.":[20],"Though":[21],"the":[22,44,51,55,78,90,102,120,131,139,154,168,178,181,200,213],"efficiency":[23],"of":[24,46,57,80,89,122,199],"these":[25,84,207],"I&C":[26,53,82,91,133,202],"has":[28],"increased":[29],"through":[30],"digitalization,":[31],"digitalization":[32],"poses":[33],"a":[34,47,98,113],"threat":[35],"owing":[36],"to":[37,76,118,135,183],"cybersecurity":[38,48,94,114],"issues":[39],"that":[40,153],"might":[41],"occur.":[42],"In":[43,144,186],"event":[45],"incident":[49],"affecting":[50],"NPP":[52,81,132,201],"system,":[54],"stability":[56],"facilities":[59],"can":[60],"be":[61,67,184],"threatened,":[62],"power":[64],"supply":[65],"could":[66],"interrupted.":[68],"Therefore,":[69,107],"various":[70],"governments":[71],"established":[73],"regulatory":[74,142,214],"guidelines":[75,85],"improve":[77],"security":[79],"systems;":[83],"stipulate":[86],"periodic":[87],"checking":[88,116],"vulnerabilities.":[95],"Considering":[96],"this,":[97],"vulnerability":[99,115,128,161,205],"scanner":[100,162],"environment":[104],"is":[105],"required.":[106],"in":[108,212],"this":[109],"study,":[110],"we":[111,151],"propose":[112],"system":[117,134],"reduce":[119],"impact":[121],"such":[123],"vulnerabilities":[124],"as":[125,127,174,176],"well":[126,175],"checks":[129,193],"on":[130,147,180],"ensure":[136],"compliance":[137,192],"with":[138],"automatic":[140],"check":[141],"guidelines.":[143,215],"summary,":[145],"based":[146],"our":[148,159,188],"experimental":[149],"results,":[150],"observed":[152],"network":[155,165,171],"traffic":[156,166],"generated":[157,163],"by":[158],"proposed":[160,189],"lesser":[164],"than":[167],"existing":[169],"active":[170],"scanning":[172],"method":[173],"reduced":[177],"overhead":[179],"object":[182],"scanned.":[185],"addition,":[187],"approach":[190],"enabled":[191],"certain":[195],"automatically":[196],"scanned":[197],"elements":[198,209],"during":[204],"scans;":[206],"automatically-scanned":[208],"are":[210],"defined":[211]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
