ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Division Spotlight
Young Members Group
The Young Members Group works to encourage and enable all young professional members to be actively involved in the efforts and endeavors of the Society at all levels (Professional Divisions, ANS Governance, Local Sections, etc.) as they transition from the role of a student to the role of a professional. It sponsors non-technical workshops and meetings that provide professional development and networking opportunities for young professionals, collaborates with other Divisions and Groups in developing technical and non-technical content for topical and national meetings, encourages its members to participate in the activities of the Groups and Divisions that are closely related to their professional interests as well as in their local sections, introduces young members to the rules and governance structure of the Society, and nominates young professionals for awards and leadership opportunities available to members.
Meeting Spotlight
ANS Student Conference 2025
April 3–5, 2025
Albuquerque, NM|The University of New Mexico
Standards Program
The Standards Committee is responsible for the development and maintenance of voluntary consensus standards that address the design, analysis, and operation of components, systems, and facilities related to the application of nuclear science and technology. Find out What’s New, check out the Standards Store, or Get Involved today!
Latest Magazine Issues
Apr 2025
Jan 2025
Latest Journal Issues
Nuclear Science and Engineering
May 2025
Nuclear Technology
April 2025
Fusion Science and Technology
Latest News
Norway’s Halden reactor takes first step toward decommissioning
The government of Norway has granted the transfer of the Halden research reactor from the Institute for Energy Technology (IFE) to the state agency Norwegian Nuclear Decommissioning (NND). The 25-MWt Halden boiling water reactor operated from 1958 to 2018 and was used in the research of nuclear fuel, reactor internals, plant procedures and monitoring, and human factors.
Lee T. Maccarone, Daniel G. Cole (Univ of Pittsburgh), Nageswara S.V. Rao, Alexander M. Melin, Sacit M. Cetiner (ORNL)
Proceedings | Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technolgies (NPIC&HMIT 2019) | Orlando, FL, February 9-14, 2019 | Pages 411-421
Cyber-physical systems consist of interconnected physical processes and computational re- sources. Because the cyber and physical worlds are integrated, vulnerabilities in both the cyber and physical domains can result in damage to the physical system. As cyber-physical systems, nuclear power plants must be secure in both domains in order to maintain operational safety. Nuclear power plants may be targeted by a variety of threat actors such as state actors, hack- tivists, and disgruntled employees|each with a unique motivation and set of resources. This work predicts the outcome of a cyber-physical attack on a nuclear power plant by examining the interaction between a threat actor and a plant defender. A game-theoretic approach is presented to analyze attacks on cyber-physical systems. The cyber-physical attack is analyzed as a two-player strategic-form game. The two players are an attacker and a defender: the defender attempts to maintain plant operation while the attacker attempts to disrupt it. The attacker's strategy set consists of a cyber attack, physical attack, cyber-physical attack, and abstaining from an attack. The defender's strategy set consists of a cyber reinforcement, physical reinforcement, cyber-physical reinforcement, and abstaining from reinforcement. Each player incurs a cost from either attacking or defending. If an attack is successful, the attacker incurs a gain and the defender incurs a loss. A mixed strategy Nash equilibrium is identi ed. Under the mixed Nash equilibrium conditions, the expected utility of the attacker is zero, and the expected utility of the defender is the cost of cyber-physical reinforcement.