ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
2026 ANS Annual Conference
May 31–June 3, 2026
Denver, CO|Sheraton Denver
Latest Magazine Issues
Mar 2026
Jan 2026
Latest Journal Issues
Nuclear Science and Engineering
April 2026
Nuclear Technology
February 2026
Fusion Science and Technology
Latest News
Webinar highlights Gen IV reactors
The American Nuclear Society recently hosted a new webinar in its ongoing Educator Training series titled “Perspectives on Generation IV Reactors.” It was led by Edward A. Friedman, professor emeritus of technology management at Stevens Institute of Technology and the author of Nuclear Energy: Boom, Bust, and Emerging Renaissance.
Yong Sik Kim, Ho Sun Ryu, Hyun Ki Kim (KHNP), Moon Kyoung Choi, Chan Young Lee, Poong Hyun Seong (KAIST)
Proceedings | Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technolgies (NPIC&HMIT 2019) | Orlando, FL, February 9-14, 2019 | Pages 1078-1087
The cyber security of nuclear power plants (NPPs) recently has become a big issue, and a utility is requested to comply with cyber security controls and to perform cyber security risk management. However, it is practically difficult to fully implement the security controls with limited resources. The ultimate goal of implementing cyber security controls is to reduce risk. Since it is almost impossible to reduce risk by implementing all of the controls, it is necessary to follow them in order of priority for efficiency. This means that it is required to find which cyber security controls are relatively more important and effective than the others. The goal of this study is to quantify the relative importance of NPP cyber attack probability variables. The cyber attack probability variables were investigated by a literature survey, and they were classified into two types: (1) attacker-related variables and (2) target-related variables. The factor analysis (FA) method was applied to confirm the validity of the rearrangement and classification results, and the analytical hierarchy process (AHP) method was applied to evaluate the relative importance among the variables.