References
- R. LANGNER, “Stuxnet: Dissecting a Cyberwarfare Weapon,” IEEE Secur. Priv., 9, 3, 49 (2011); https://doi.org/https://doi.org/10.1109/MSP.2011.67.
- “Monju Power Plant Facility PC Infected with Virus,” Japan Today (2014); https://japantoday.com/category/national/monju-power-plant-facility-pc-infected-with-virus (current as of Apr. 19, 2021).
- C. STEITZ and E. AUCHARD, “German Nuclear Plant Infected with Computer Viruses, Operator Says,” Reuters (2016); https://www.reuters.com/article/us-nuclearpower-cyber-germany/german-nuclear-plant-infected-with-computer-viruses-operator-says-idUSKCN0XN2OS (current as of Apr. 19, 2021).
- “2017 Cyberattacks on Ukraine,” Wikipedia; https://en.wikipedia.org/wiki/2017_cyberattacks_on_Ukraine (current as of Apr. 19, 2021).
- “ North Korean Hacks on India Seek Data, Not Disruption,” in “Expert Briefings,” Oxford Analytica (2019); https://doi.org/https://doi.org/10.1108/OXAN-ES247614.
- J. PEISER, “A Hacker Broke into a Florida Town’s Water Supply and Tried to Poison It with Lye, Police Said,” The Washington Post (2021); https://www.washingtonpost.com/nation/2021/02/09/oldsmar-water-supply-hack-florida/ (current as of Apr. 19, 2021).
- J. LARSEN, “Miniaturization” (2014); https://www.blackhat.com/docs/us-14/materials/us-14-Larsen-Miniturization-WP.pdf.
- Y. LI and H. S. ABDEL-KHALIK, “Data Trustworthiness Signatures for Nuclear Reactor Dynamics Simulation,” Prog. Nucl. Energy, 133, 103612 (2021); https://doi.org/https://doi.org/10.1016/j.pnucene.2020.103612.
- A. SUNDARAM, H. S. ABDEL-KHALIK, and O. ASHY, “A Data Analytical Approach for Assessing the Efficacy of Operational Technology Active Defenses Against Insider Threats,” Prog. Nucl. Energy, 124, 103339 (2020); https://doi.org/https://doi.org/10.1016/j.pnucene.2020.103339.
- Y. ZHAO and C. SMIDTS, “A Control-Theoretic Approach to Detecting and Distinguishing Replay Attacks from Other Anomalies in Nuclear Power Plants,” Prog. Nucl. Energy, 123, 103315 (2020); https://doi.org/https://doi.org/10.1016/j.pnucene.2020.103315.
- A. SUNDARAM, H. S. ABDEL-KHALIK, and O. ASHY, “Exploratory Study into the Effectiveness of Active Monitoring Techniques,” Trans. Am. Nucl. Soc., 121, 198 (2019); https://doi.org/https://doi.org/10.13182/T31258.
- A. SUNDARAM and H. ABDEL-KHALIK, “Covert Cognizance: A Novel Predictive Modeling Paradigm,” Nucl. Technol., 207, 1163 (2021); https://doi.org/https://doi.org/10.1080/00295450.2020.1812349.
- S. L. EGGERS, “Adapting Anomaly Detection Techniques for Online Intrusion Detection in Nuclear Facilities,” PhD Dissertation, University of Florida (2018); https://ufdcimages.uflib.ufl.edu/UF/E0/05/21/34/00001/EGGERS_S.pdf (current as of Apr. 19, 2021).
- F. ZHANG and J. B. COBLE, “Robust Localized Cyber-Attack Detection for Key Equipment in Nuclear Power Plants,” Prog. Nucl. Energy, 128, 103446 (2020); https://doi.org/https://doi.org/10.1016/j.pnucene.2020.103446.
- W. WANG, F. DI MAIO, and E. ZIO, “A Non-Parametric Cumulative Sum Approach for Online Diagnostics of Cyber Attacks to Nuclear Power Plants,” Resilience of Cyber-Physical Systems, Springer (2019).
- H. L. GAWAND, A. K. BHATTACHARJEE, and K. ROY, “Securing a Cyber Physical System in Nuclear Power Plants Using Least Square Approximation and Computational Geometric Approach,” Nucl. Eng. Technol., 49, 3, 484 (2017); https://doi.org/https://doi.org/10.1016/j.net.2016.10.009.
- Y. ZHAO et al., “Finite-Horizon Semi-Markov Game for Time-Sensitive Attack Response and Probabilistic Risk Assessment in Nuclear Power Plants,” Reliab. Eng. Syst. Saf., 201, 106878 (2020); https://doi.org/https://doi.org/10.1016/j.ress.2020.106878.
- P. K. VADDI et al., “Dynamic Bayesian Networks Based Abnormal Event Classifier for Nuclear Power Plants in Case of Cyber Security Threats,” Prog. Nucl. Energy, 128, 103479 (2020); https://doi.org/https://doi.org/10.1016/j.pnucene.2020.103479.
- J. LI and X. HUANG, “Cyber Attack Detection of I&C Systems in NPPS Based on Physical Process Data,” Proc. 24th Int. Conf. Nuclear Engineering (ICONE), Charlotte, North Carolina, June 26–30, 2016, Vol. 2, ASME (2016); https://doi.org/https://doi.org/10.1115/ICONE24-60773.
- Y. LIU, P. NING, and M. K. REITER, “False Data Injection Attacks Against State Estimation in Electric Power Grids,” ACM Trans. Information and Systems Security, 14, 1, 1 (2011); https://doi.org/https://doi.org/10.1145/1952982.1952995.
- Y. LI et al., “ROM-Based Surrogate Systems Modeling of EBR-II,” Nucl. Sci. Eng., 195, 520 (2021); https://doi.org/https://doi.org/10.1080/00295639.2020.1840238.
- Y. LI and H. ABDEL-KHALIK, “ROM-Based Subset Selection Algorithm for Efficient Surrogate Modeling,” Trans. Am. Nucl. Soc., 115, 1740 (2016).
- D. HUANG et al., “Dimensionality Reducibility for Multi-Physics Reduced Order Modeling,” Ann. Nucl. Energy, 110, 526 (2017); https://doi.org/https://doi.org/10.1016/j.anucene.2017.06.045.
- C. CORTES and V. VAPNIK, “A Fast SVD for Multilevel Block Hankel Matrices with Minimal Memory Storage,” Numer. Algorithms, 69, 875 (2015); https://doi.org/https://doi.org/10.1007/s11075-014-9930-0.
- A. SUNDARAM, Y. LI, and H. S. ABDEL-KHALIK, “A Multi-Level Feature Extraction and Denoising Approach to Detect Subtle Variations in Industrial Control Systems,” Proc. Int. Conf. Mathematics and Computational Methods Applied to Nuclear Science and Engineering (M&C 2021), Virtual Conference, October 3–7, 2021, American Nuclear Society (2021).
- “RELAP5/MOD3.3 Code Manual Volume III: Developmental Assessment,” Vol. III, Idaho National Laboratory (2006).
- M. P. PETERSON and C. E. PAULSEN, “An Implicit Steady-State Initialization Package for the RELAP5 Computer Code,” NUREG/CR-6325, U.S. Nuclear Regulatory Commission (1995).