ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
2026 ANS Annual Conference
May 31–June 3, 2026
Denver, CO|Sheraton Denver
Latest Magazine Issues
Feb 2026
Jul 2025
Latest Journal Issues
Nuclear Science and Engineering
March 2026
Nuclear Technology
February 2026
Fusion Science and Technology
January 2026
Latest News
Mirion announces appointments
Mirion Technologies has announced three senior leadership appointments designed to support its global nuclear and medical businesses while advancing a company-wide digital and AI strategy. The leadership changes come as Mirion seeks to advance innovation and maintain strong performance in nuclear energy, radiation safety, and medical applications.
Lee T. Maccarone, Daniel G. Cole (Univ of Pittsburgh), Nageswara S.V. Rao, Alexander M. Melin, Sacit M. Cetiner (ORNL)
Proceedings | Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technolgies (NPIC&HMIT 2019) | Orlando, FL, February 9-14, 2019 | Pages 411-421
Cyber-physical systems consist of interconnected physical processes and computational re- sources. Because the cyber and physical worlds are integrated, vulnerabilities in both the cyber and physical domains can result in damage to the physical system. As cyber-physical systems, nuclear power plants must be secure in both domains in order to maintain operational safety. Nuclear power plants may be targeted by a variety of threat actors such as state actors, hack- tivists, and disgruntled employees|each with a unique motivation and set of resources. This work predicts the outcome of a cyber-physical attack on a nuclear power plant by examining the interaction between a threat actor and a plant defender. A game-theoretic approach is presented to analyze attacks on cyber-physical systems. The cyber-physical attack is analyzed as a two-player strategic-form game. The two players are an attacker and a defender: the defender attempts to maintain plant operation while the attacker attempts to disrupt it. The attacker's strategy set consists of a cyber attack, physical attack, cyber-physical attack, and abstaining from an attack. The defender's strategy set consists of a cyber reinforcement, physical reinforcement, cyber-physical reinforcement, and abstaining from reinforcement. Each player incurs a cost from either attacking or defending. If an attack is successful, the attacker incurs a gain and the defender incurs a loss. A mixed strategy Nash equilibrium is identi ed. Under the mixed Nash equilibrium conditions, the expected utility of the attacker is zero, and the expected utility of the defender is the cost of cyber-physical reinforcement.