ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
2026 ANS Annual Conference
May 31–June 3, 2026
Denver, CO|Sheraton Denver
Latest Magazine Issues
Feb 2026
Jul 2025
Latest Journal Issues
Nuclear Science and Engineering
March 2026
Nuclear Technology
February 2026
Fusion Science and Technology
January 2026
Latest News
Mirion announces appointments
Mirion Technologies has announced three senior leadership appointments designed to support its global nuclear and medical businesses while advancing a company-wide digital and AI strategy. The leadership changes come as Mirion seeks to advance innovation and maintain strong performance in nuclear energy, radiation safety, and medical applications.
Yong Sik Kim, Ho Sun Ryu, Hyun Ki Kim (KHNP), Moon Kyoung Choi, Chan Young Lee, Poong Hyun Seong (KAIST)
Proceedings | Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technolgies (NPIC&HMIT 2019) | Orlando, FL, February 9-14, 2019 | Pages 1078-1087
The cyber security of nuclear power plants (NPPs) recently has become a big issue, and a utility is requested to comply with cyber security controls and to perform cyber security risk management. However, it is practically difficult to fully implement the security controls with limited resources. The ultimate goal of implementing cyber security controls is to reduce risk. Since it is almost impossible to reduce risk by implementing all of the controls, it is necessary to follow them in order of priority for efficiency. This means that it is required to find which cyber security controls are relatively more important and effective than the others. The goal of this study is to quantify the relative importance of NPP cyber attack probability variables. The cyber attack probability variables were investigated by a literature survey, and they were classified into two types: (1) attacker-related variables and (2) target-related variables. The factor analysis (FA) method was applied to confirm the validity of the rearrangement and classification results, and the analytical hierarchy process (AHP) method was applied to evaluate the relative importance among the variables.