ANS is committed to advancing, fostering, and promoting the development and application of nuclear sciences and technologies to benefit society.
Explore the many uses for nuclear science and its impact on energy, the environment, healthcare, food, and more.
Explore membership for yourself or for your organization.
Conference Spotlight
2026 ANS Annual Conference
May 31–June 3, 2026
Denver, CO|Sheraton Denver
Latest Magazine Issues
Mar 2026
Jan 2026
Latest Journal Issues
Nuclear Science and Engineering
March 2026
Nuclear Technology
February 2026
Fusion Science and Technology
April 2026
Latest News
DOE secretary and New York congressman call for reopening of Indian Point
Department of Energy Secretary Chris Wright joined U.S. Rep. Mike Lawler (R., N.Y.) at the site of the closed Indian Point nuclear power plant on Friday, March 6, as Lawler called for the reopening of the facility. He emphasized that the shutdown of the plant in 2021 has led to higher electricity costs for the people of New York state and increased strain on the state’s electric grid.
Chanyoung Lee, Poong Hyun Seong (KAIST)
Proceedings | Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technolgies (NPIC&HMIT 2019) | Orlando, FL, February 9-14, 2019 | Pages 1095-1101
In the nuclear industry, regulatory guidelines of cyber security have focused on managing auditory records and blocking physical access. Most of the research in the nuclear cyber security field also has proposed technology applications. However, the possibility of operator’s wrong actions caused by cyber-attack has not been considered yet. Although MCR (Main Control Room) operators should play critical roles in response to cyber-attack, the operator factor has been regarded as an unimportant factor. Operator’s roles and tasks are even not defined specifically during cyber attacks. In order to help operators to comprehend the cyber-attacked situation and to respond effectively, this study analyzes which information should be given to MCR operators and how the information should be provided. In addition, based on results of the analysis, basic design concepts of cyber-SA support system are suggested.