Framework for evaluating cyber incident response capabilities of nuclear facility operators through operation-based exercises

Cyberattacks on nuclear facilities can cause unauthorized information leakage and critical impacts on nuclear safety, making an effective cyber incident response system essential. The International Atomic Energy Agency (IAEA) emphasizes the protection of computer-based systems for physical security,...

Full description

Saved in:
Bibliographic Details
Published inNuclear engineering and technology Vol. 57; no. 11; p. 103772
Main Authors Choi, Heewon Aneka, Park, Cheonho, Lee, JuHyeon, Jeon, Seungho, Seo, Jung Taek
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.11.2025
Elsevier
한국원자력학회
Subjects
Online AccessGet full text
ISSN1738-5733
2234-358X
2234-358X
DOI10.1016/j.net.2025.103772

Cover

Abstract Cyberattacks on nuclear facilities can cause unauthorized information leakage and critical impacts on nuclear safety, making an effective cyber incident response system essential. The International Atomic Energy Agency (IAEA) emphasizes the protection of computer-based systems for physical security, nuclear safety, and nuclear material control from cyber threats. Nuclear facility operators must possess the capability to detect and respond to cyber incidents, and this capability can be evaluated through cyber incident response exercises. This study proposes a framework for evaluating nuclear operators' incident response capabilities. The framework analyzes and builds upon IAEA's cyber incident response phases, breaking them down into six phases, defines key activities and evaluation requirements for each phase, and incorporates existing cyber response evaluation technologies. It also presents criteria and performance indicators to evaluate whether these requirements are met. To examine the applicability and practical relevance of the framework, a cyberattack scenario tailored for nuclear facilities is applied to a simulator replicating real-world conditions. The findings of this study provide a systematic and objective way to evaluate response exercises, offering a foundation for effective cyber incident management and minimizing impacts on nuclear facilities.
AbstractList Cyberattacks on nuclear facilities can cause unauthorized information leakage and critical impacts on nuclear safety, making an effective cyber incident response system essential. The International Atomic Energy Agency (IAEA) emphasizes the protection of computer-based systems for physical security, nuclear safety, and nuclear material control from cyber threats. Nuclear facility operators must possess the capability to detect and respond to cyber incidents, and this capability can be evaluated through cyber incident response exercises. This study proposes a framework for evaluating nuclear operators' incident response capabilities. The framework analyzes and builds upon IAEA's cyber incident response phases, breaking them down into six phases, defines key activities and evaluation requirements for each phase, and incorporates existing cyber response evaluation technologies. It also presents criteria and performance indicators to evaluate whether these requirements are met. To examine the applicability and practical relevance of the framework, a cyberattack scenario tailored for nuclear facilities is applied to a simulator replicating real-world conditions. The findings of this study provide a systematic and objective way to evaluate response exercises, offering a foundation for effective cyber incident management and minimizing impacts on nuclear facilities.
Cyberattacks on nuclear facilities can cause unauthorized information leakage and critical impacts on nuclear safety, making an effective cyber incident response system essential. The International Atomic Energy Agency (IAEA) emphasizes the protection of computer-based systems for physical security, nuclear safety, and nuclear material control from cyber threats. Nuclear facility operators must possess the capability to detect and respond to cyber incidents, and this capability can be evaluated through cyber incident response exercises. This study proposes a framework for evaluating nuclear operators’ incident response capabilities. The framework analyzes and builds upon IAEA’s cyber incident response phases, breaking them down into six phases, defines key activities and evaluation requirements for each phase, and incorporates existing cyber response evaluation technologies. It also presents criteria and performance indicators to evaluate whether these requirements are met. To examine the applicability and practical relevance of the framework, a cyberattack scenario tailored for nuclear facilities is applied to a simulator replicating real-world conditions. The findings of this study provide a systematic and objective way to evaluate response exercises, offering a foundation for effective cyber incident management and minimizing impacts on nuclear facilities. KCI Citation Count: 0
ArticleNumber 103772
Author Park, Cheonho
Seo, Jung Taek
Jeon, Seungho
Choi, Heewon Aneka
Lee, JuHyeon
Author_xml – sequence: 1
  givenname: Heewon Aneka
  orcidid: 0009-0007-4938-8359
  surname: Choi
  fullname: Choi, Heewon Aneka
  email: chw1226@gachon.ac.kr
  organization: Department of Information Security, Gachon University, Seongnam, Republic of Korea
– sequence: 2
  givenname: Cheonho
  surname: Park
  fullname: Park, Cheonho
  email: pch3467@gachon.ac.kr
  organization: Department of Information Security, Gachon University, Seongnam, Republic of Korea
– sequence: 3
  givenname: JuHyeon
  surname: Lee
  fullname: Lee, JuHyeon
  email: 202240226@gachon.ac.kr
  organization: Department of Information Security, Gachon University, Seongnam, Republic of Korea
– sequence: 4
  givenname: Seungho
  orcidid: 0000-0002-7116-6062
  surname: Jeon
  fullname: Jeon, Seungho
  email: shjeon90@gachon.ac.kr
  organization: Department of Smart Security, Gachon University, Seongnam, Republic of Korea
– sequence: 5
  givenname: Jung Taek
  surname: Seo
  fullname: Seo, Jung Taek
  email: seojt@gachon.ac.kr
  organization: Department of Smart Security, Gachon University, Seongnam, Republic of Korea
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART003229464$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNqNkU9r20AQxUVJoU7aD9Dbngty969WoqcQmtYQKJQUeltWo5GztrIrZuWkPvS7V7ZCj6WnYR7ze8zMuywuYopYFO8FXwsuqo-7dcRpLbk0c6-sla-KlZRKl8rUPy-KlbCqLo1V6k1xmfOO80pry1fF71vyj_icaM_6RAyf_HDwU4hbBscWiYUIocM4McI8ppiRgR99G4YwBcws9SweYEBPrPdwUo8sjUh-SpTZ9EDpsH14UUKKZeszdgx_IUHImN8Wr3s_ZHz3Uq-KH7ef72--lnffvmxuru9KUI2ZSt2o-RTe6Z73TW-NQABobQXc666xVYsCalvXErWFGqzWWjZGtWgrz7Ux6qr4sPhG6t0egks-nOs2uT256-_3Gye4VU0tqnl4swx3ye_cSOHR0_FMnIVEW-dpCvPVjneVVmhr6Tul247XCFJho1ptGmGEnL3k4nWIoz8--2H4ayi4OyXndm5Ozp2Sc0tyMyQWCCjlTNj_F_NpYXB-41NAchkCRsAuEMI0rx7-Qf8BWyC0oQ
Cites_doi 10.1016/j.ijcip.2021.100505
10.1016/j.promfg.2018.07.148
10.1016/j.net.2019.11.001
10.1007/s11227-024-06273-9
10.3390/app142411836
10.1016/j.pnucene.2023.104738
10.3390/electronics13193867
10.1016/j.net.2022.02.024
10.1109/MSP.2011.67
ContentType Journal Article
Copyright 2025 Korean Nuclear Society
Copyright_xml – notice: 2025 Korean Nuclear Society
DBID 6I.
AAFTH
AAYXX
CITATION
ADTOC
UNPAY
DOA
ACYCR
DOI 10.1016/j.net.2025.103772
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Unpaywall for CDI: Periodical Content
Unpaywall
DOAJ Directory of Open Access Journals
Korean Citation Index
DatabaseTitle CrossRef
DatabaseTitleList


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2234-358X
ExternalDocumentID oai_kci_go_kr_ARTI_10739816
oai_doaj_org_article_0d643e782ad34bd08ec23e93b4591512
10.1016/j.net.2025.103772
10_1016_j_net_2025_103772
S1738573325003407
GroupedDBID 0R~
123
4.4
457
5VS
6I.
9ZL
AAEDW
AAFTH
AALRI
AAXUO
AAYWO
ABMAC
ACGFS
ACVFH
ACYCR
ADBBV
ADCNI
ADEZE
ADVLN
AENEX
AEUPX
AEXQZ
AFPUW
AFTJW
AGHFR
AIGII
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
BCNDV
EBS
EJD
FDB
GROUPED_DOAJ
IPNFZ
JDI
KQ8
KVFHK
M41
O9-
OK1
RIG
ROL
SSZ
AAYXX
CITATION
ADTOC
UNPAY
ID FETCH-LOGICAL-c395t-4932340d4f0f9f751ecccb76c0a4d976be1c87882e47c8c74442953be76a04553
IEDL.DBID UNPAY
ISSN 1738-5733
2234-358X
IngestDate Thu Aug 21 03:14:00 EDT 2025
Fri Oct 03 12:53:28 EDT 2025
Tue Aug 19 23:42:24 EDT 2025
Wed Oct 01 05:18:43 EDT 2025
Sun Oct 19 01:36:41 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 11
Keywords Evaluation
Cybersecurity
Exercise
Response capability
Cyber incident response
Cyber-attack
Language English
License This is an open access article under the CC BY-NC-ND license.
cc-by-nc-nd
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c395t-4932340d4f0f9f751ecccb76c0a4d976be1c87882e47c8c74442953be76a04553
ORCID 0000-0002-7116-6062
0009-0007-4938-8359
OpenAccessLink https://proxy.k.utb.cz/login?url=https://doi.org/10.1016/j.net.2025.103772
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_10739816
doaj_primary_oai_doaj_org_article_0d643e782ad34bd08ec23e93b4591512
unpaywall_primary_10_1016_j_net_2025_103772
crossref_primary_10_1016_j_net_2025_103772
elsevier_sciencedirect_doi_10_1016_j_net_2025_103772
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate November 2025
2025-11-00
2025-11-01
2025-11
PublicationDateYYYYMMDD 2025-11-01
PublicationDate_xml – month: 11
  year: 2025
  text: November 2025
PublicationDecade 2020
PublicationTitle Nuclear engineering and technology
PublicationYear 2025
Publisher Elsevier B.V
Elsevier
한국원자력학회
Publisher_xml – name: Elsevier B.V
– name: Elsevier
– name: 한국원자력학회
References Greiman (bib6) 2023
(bib43) 2012
(bib26) 2009
Chen, Chen, Hsiung (bib13) 2014; 2014
(bib36) 2006
Langner (bib50) 2011; 9
Kim, Jeon, Kim, Kang, Lee, Seo (bib49) 2024; 80
Korea Atomic Energy Research Institute, Advanced Compact Nuclear Simulator Textbook, Nuclear Training Center in Korea Atomic, Energy Research Institute.
(bib31) 2024
(bib34) 2020
(bib41) 2023
(bib10) 2018
Nyre-Yu (bib33) 2021
Lee (bib45) 2024; 14
(bib7) 2019
(bib48) 2003
(bib38) 2024
Bracho, Saygin, Wan, Lee, Zarreh (bib44) 2018; 26
(bib32) 2017
(bib21) December 23, 2014
Mohan, Glantz, Landine, Kishan Motkuri (bib40) 2024
Ho Chae, Lee, Han, Hyun Seong (bib46) 2022; 54
Mases, Maennel, Toussaint, Rosa (bib22) 2021; 2021
(bib27) 2010
Fakhrul Safitra, Lubis, Fakhrurroja (bib23) 2023; 15
(bib42) 2012; SP
Mudassar Yamin, Katt (bib15) 2022; 116
(bib35) 2023
(bib24) 2016
Staves, Anderson, Balderstone, Green, Gouglidis, Hutchison (bib18) 2022; 37
Gulay, Maglaras (bib19) 2024
Kral (bib29) 2012
(bib25) 2018
Kim, Heo, Zio, Shin, Song (bib12) 2020; 52
(bib11) 2009
(bib4) 2017
Kim, Hee University (bib5) 2022
White, Dietrich, Goles (bib17) 2004; 37
British Standards Institution (BSI), Determining the Effectiveness of an Incident Response Plan Study Based on Lessons Learned from a Real Life Incident A Whitepaper.
(bib39) 2021
Ayodeji, Mohamed, Li, Buono, Pierce, Ahmed (bib1) 2023; 161
O'Neil, Ahmad, Sean (bib16) 2021
Shin, Kwon, Jeong, Shin (bib14) 2024; 13
Parsons (bib8) 2025
(bib37) 2018
(bib9) 2017
(bib2) 2021
(bib3) 2011
Kleinhuis, Young (bib20) 2017; 8
(bib30) 2023
O'Neil (10.1016/j.net.2025.103772_bib16) 2021
10.1016/j.net.2025.103772_bib47
Kleinhuis (10.1016/j.net.2025.103772_bib20) 2017; 8
(10.1016/j.net.2025.103772_bib9) 2017
(10.1016/j.net.2025.103772_bib32) 2017
Lee (10.1016/j.net.2025.103772_bib45) 2024; 14
(10.1016/j.net.2025.103772_bib42) 2012; SP
(10.1016/j.net.2025.103772_bib11) 2009
Kim (10.1016/j.net.2025.103772_bib12) 2020; 52
(10.1016/j.net.2025.103772_bib25) 2018
Gulay (10.1016/j.net.2025.103772_bib19) 2024
(10.1016/j.net.2025.103772_bib48) 2003
(10.1016/j.net.2025.103772_bib3) 2011
Fakhrul Safitra (10.1016/j.net.2025.103772_bib23) 2023; 15
(10.1016/j.net.2025.103772_bib30) 2023
Mudassar Yamin (10.1016/j.net.2025.103772_bib15) 2022; 116
(10.1016/j.net.2025.103772_bib2) 2021
Kral (10.1016/j.net.2025.103772_bib29) 2012
(10.1016/j.net.2025.103772_bib43) 2012
Kim (10.1016/j.net.2025.103772_bib49) 2024; 80
Ho Chae (10.1016/j.net.2025.103772_bib46) 2022; 54
Parsons (10.1016/j.net.2025.103772_bib8) 2025
(10.1016/j.net.2025.103772_bib34) 2020
(10.1016/j.net.2025.103772_bib4) 2017
(10.1016/j.net.2025.103772_bib37) 2018
(10.1016/j.net.2025.103772_bib36) 2006
10.1016/j.net.2025.103772_bib28
Mohan (10.1016/j.net.2025.103772_bib40) 2024
(10.1016/j.net.2025.103772_bib10) 2018
Langner (10.1016/j.net.2025.103772_bib50) 2011; 9
(10.1016/j.net.2025.103772_bib27) 2010
(10.1016/j.net.2025.103772_bib31) 2024
(10.1016/j.net.2025.103772_bib41) 2023
Greiman (10.1016/j.net.2025.103772_bib6) 2023
Mases (10.1016/j.net.2025.103772_bib22) 2021; 2021
(10.1016/j.net.2025.103772_bib24) 2016
Ayodeji (10.1016/j.net.2025.103772_bib1) 2023; 161
(10.1016/j.net.2025.103772_bib26) 2009
(10.1016/j.net.2025.103772_bib38) 2024
White (10.1016/j.net.2025.103772_bib17) 2004; 37
(10.1016/j.net.2025.103772_bib35) 2023
Staves (10.1016/j.net.2025.103772_bib18) 2022; 37
Shin (10.1016/j.net.2025.103772_bib14) 2024; 13
Nyre-Yu (10.1016/j.net.2025.103772_bib33) 2021
(10.1016/j.net.2025.103772_bib21) 2014
Kim (10.1016/j.net.2025.103772_bib5) 2022
(10.1016/j.net.2025.103772_bib7) 2019
(10.1016/j.net.2025.103772_bib39) 2021
Chen (10.1016/j.net.2025.103772_bib13) 2014; 2014
Bracho (10.1016/j.net.2025.103772_bib44) 2018; 26
References_xml – year: 2025
  ident: bib8
  article-title: National Law Review, Cybersecurity in the Nuclear Industry: US and UK Regulation and the Sellafield Case
– year: 2024
  ident: bib19
  article-title: Alignment of Cybersecurity Incident Prioritisation with Incident Response Management Maturity Capabilities
– year: December 23, 2014
  ident: bib21
  article-title: Regulations on Physical Protection Education and Training
– volume: 14
  year: 2024
  ident: bib45
  article-title: A study on a scenario-based security incident prediction system for cybersecurity
  publication-title: Appl. Sci.
– volume: 15
  year: 2023
  ident: bib23
  article-title: Counterattacking cyber threats: a framework for the future of cybersecurity
  publication-title: Sustain. Times
– volume: 2021
  start-page: 259
  year: 2021
  end-page: 268
  ident: bib22
  article-title: Success factors for designing a cybersecurity exercise on the example of incident response
  publication-title: Proc. 2021 IEEE Eur. Symp. Secur. Priv. Workshops
– reference: British Standards Institution (BSI), Determining the Effectiveness of an Incident Response Plan Study Based on Lessons Learned from a Real Life Incident A Whitepaper.
– year: 2006
  ident: bib36
  article-title: Guide to Integrating Forensic Techniques into Incident Response, NIST SP 800-886, Gaithersburg, MD
– year: 2010
  ident: bib27
  article-title: Cyber security plan for nuclear power reactors
  publication-title: NEI 08-09 Rev. 6, Washington D.C
– year: 2017
  ident: bib32
  article-title: Framework for Performance Evaluation of Computer Security Incident Response Capabilities
– year: 2017
  ident: bib4
  article-title: Hotspot Analysis: Stuxnet, CSS Cyber Defense Project
– volume: 8
  year: 2017
  ident: bib20
  article-title: Computer security incident response team effectiveness: a needs assessment
  publication-title: Front. Psychol.
– year: 2022
  ident: bib5
  article-title: North Korea's Cyber Capabilities and their Implications for International Security
– volume: 116
  year: 2022
  ident: bib15
  article-title: Modeling and executing cyber security exercise scenarios in cyber ranges
  publication-title: Comput. Secur.
– year: 2009
  ident: bib26
  article-title: Recommended Practice: Developing an Industrial Control Systems Cybersecurity Incident Response Capability
– reference: Korea Atomic Energy Research Institute, Advanced Compact Nuclear Simulator Textbook, Nuclear Training Center in Korea Atomic, Energy Research Institute.
– year: 2024
  ident: bib31
  article-title: The Landscape of Performance-based Assessments in Cybersecurity, Gaithersburg, MD
– volume: 80
  start-page: 21642
  year: 2024
  end-page: 21675
  ident: bib49
  article-title: Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment
  publication-title: J. Supercomput.
– year: 2021
  ident: bib33
  article-title: Identifying Expertise Gaps in Cyber Incident Response: Cyber Defender Needs Vs. Technological Development
– year: 2021
  ident: bib2
  article-title: DIS-21-03, Cyber Security and the Protection of Digital Information
– volume: 9
  start-page: 49
  year: 2011
  end-page: 51
  ident: bib50
  article-title: Stuxnet: dissecting a cyberwarfare weapon
  publication-title: IEEE Secur. Priv.
– year: 2018
  ident: bib37
  article-title: Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1, Gaithersburg, MD
– year: 2017
  ident: bib9
  article-title: Utility Dive, Reports: Cyberattacks Breached at Least a Dozen Power Plants, Including Nukes
– year: 2016
  ident: bib24
  article-title: Computer Security Incident Response Planning at Nuclear Facilities
– year: 2020
  ident: bib34
  article-title: Homeland Security Exercise and Evaluation Program (HSEEP)
– volume: 37
  year: 2022
  ident: bib18
  article-title: A cyber incident response and recovery framework to support operators of industrial control systems
  publication-title: Int. J. Crit. Infrastruct. Prot.
– year: 2012
  ident: bib29
  article-title: Incident Handler's Handbook
– year: 2023
  ident: bib30
  publication-title: Cyber Incident Response Plan Guidance
– year: 2021
  ident: bib16
  article-title: Maynard, cybersecurity incident response in organisations: a meta-level framework for scenario-based training
  publication-title: ACIS 2022 - Australas
– year: 2019
  ident: bib7
  article-title: Cyber Attack on Kudankulam Nuclear Power Plant
– volume: 26
  start-page: 1116
  year: 2018
  end-page: 1127
  ident: bib44
  article-title: A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems
  publication-title: Procedia Manuf.
– year: 2003
  ident: bib48
  article-title: Study on Environmental Optimization of CNS Simulation Code
– volume: 37
  start-page: 2635
  year: 2004
  end-page: 2644
  ident: bib17
  article-title: Cyber security exercises: testing an organization's ability to prevent, detect, and respond to cyber security events
  publication-title: Proc. Hawaii Int. Conf. Syst. Sci.
– year: 2012
  ident: bib43
  article-title: Information Technology — Security Techniques — Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence, ISO/IEC 27037:2012
– volume: 2014
  start-page: 22
  year: 2014
  end-page: 28
  ident: bib13
  article-title: I-Hsin chou, unified security and safety risk assessment - a case study on nuclear power plant
  publication-title: Proc. 1st Int. Conf. Trustworthy Syst. Their Appl., TSA
– year: 2018
  ident: bib25
  article-title: Preparation, Conduct and Evaluation of Exercises to Test Security Contingency Plans at Nuclear Facilities
– year: 2011
  ident: bib3
  article-title: Nuclear security recommendations on physical protection of nuclear material and nuclear facilities (INFCIRC/225/Rev. 5)
  publication-title: IAEA Nuclear Security Series No. 13, Vienna
– volume: 13
  start-page: 3867
  year: 2024
  ident: bib14
  article-title: A study on designing cyber training and cyber range to effectively respond to cyber threats
  publication-title: Electron
– volume: 54
  start-page: 2859
  year: 2022
  end-page: 2870
  ident: bib46
  article-title: Graph neural network based multiple accident diagnosis in nuclear power plants: data optimization to represent the system configuration
  publication-title: Nucl. Eng. Technol.
– year: 2024
  ident: bib38
  article-title: CIS Critical Security Controls Version 8.1
– volume: 161
  year: 2023
  ident: bib1
  article-title: Cyber security in the nuclear industry: a closer look at digital control systems, networks and human factors
  publication-title: Prog. Nucl. Energy
– volume: SP
  start-page: 800
  year: 2012
  end-page: 861
  ident: bib42
  publication-title: Computer Security Incident Handling Guide
– volume: 52
  start-page: 995
  year: 2020
  end-page: 1001
  ident: bib12
  article-title: Cyber attack taxonomy for digital environment in nuclear power plants
  publication-title: Nucl. Eng. Technol.
– year: 2023
  ident: bib35
  article-title: Nuclear regulatory commission (NRC), cybersecurity programs for nuclear power reactors
  publication-title: Regulatory Guide 5.71, Washington, D.C.
– year: 2023
  ident: bib41
  article-title: Regulatory Guide 5.83, Revision 1, Washington, D.C
– year: 2023
  ident: bib6
  article-title: Nuclear cyber attacks: a study of sabotage and regulation of critical infrastructure
  publication-title: International Conference on Cyber Warfare and Security
– year: 2009
  ident: bib11
  article-title: Protection of Digital Computer and Communication Systems and Networks, Washington, D.C
– start-page: 245
  year: 2024
  end-page: 290
  ident: bib40
  article-title: Cybersecurity and Nuclear Facilities
– year: 2018
  ident: bib10
  article-title: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors
– year: 2021
  ident: bib39
  article-title: Computer Security Techniques for Nuclear Facilities, IAEA Nuclear Security Series No. 17-T
– year: 2021
  ident: 10.1016/j.net.2025.103772_bib39
– year: 2009
  ident: 10.1016/j.net.2025.103772_bib11
– year: 2012
  ident: 10.1016/j.net.2025.103772_bib43
– year: 2016
  ident: 10.1016/j.net.2025.103772_bib24
– volume: 37
  year: 2022
  ident: 10.1016/j.net.2025.103772_bib18
  article-title: A cyber incident response and recovery framework to support operators of industrial control systems
  publication-title: Int. J. Crit. Infrastruct. Prot.
  doi: 10.1016/j.ijcip.2021.100505
– year: 2006
  ident: 10.1016/j.net.2025.103772_bib36
– year: 2010
  ident: 10.1016/j.net.2025.103772_bib27
  article-title: Cyber security plan for nuclear power reactors
– volume: 26
  start-page: 1116
  year: 2018
  ident: 10.1016/j.net.2025.103772_bib44
  article-title: A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems
  publication-title: Procedia Manuf.
  doi: 10.1016/j.promfg.2018.07.148
– volume: 37
  start-page: 2635
  year: 2004
  ident: 10.1016/j.net.2025.103772_bib17
  article-title: Cyber security exercises: testing an organization's ability to prevent, detect, and respond to cyber security events
  publication-title: Proc. Hawaii Int. Conf. Syst. Sci.
– year: 2018
  ident: 10.1016/j.net.2025.103772_bib37
– volume: 52
  start-page: 995
  year: 2020
  ident: 10.1016/j.net.2025.103772_bib12
  article-title: Cyber attack taxonomy for digital environment in nuclear power plants
  publication-title: Nucl. Eng. Technol.
  doi: 10.1016/j.net.2019.11.001
– volume: 2021
  start-page: 259
  year: 2021
  ident: 10.1016/j.net.2025.103772_bib22
  article-title: Success factors for designing a cybersecurity exercise on the example of incident response
– ident: 10.1016/j.net.2025.103772_bib28
– volume: 80
  start-page: 21642
  year: 2024
  ident: 10.1016/j.net.2025.103772_bib49
  article-title: Guide to developing case-based attack scenarios and establishing defense strategies for cybersecurity exercise in ICS environment
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-024-06273-9
– year: 2014
  ident: 10.1016/j.net.2025.103772_bib21
– year: 2003
  ident: 10.1016/j.net.2025.103772_bib48
– volume: 116
  year: 2022
  ident: 10.1016/j.net.2025.103772_bib15
  article-title: Modeling and executing cyber security exercise scenarios in cyber ranges
  publication-title: Comput. Secur.
– year: 2022
  ident: 10.1016/j.net.2025.103772_bib5
– year: 2017
  ident: 10.1016/j.net.2025.103772_bib9
– year: 2023
  ident: 10.1016/j.net.2025.103772_bib30
– year: 2023
  ident: 10.1016/j.net.2025.103772_bib35
  article-title: Nuclear regulatory commission (NRC), cybersecurity programs for nuclear power reactors
– year: 2018
  ident: 10.1016/j.net.2025.103772_bib10
– year: 2025
  ident: 10.1016/j.net.2025.103772_bib8
– volume: SP
  start-page: 800
  year: 2012
  ident: 10.1016/j.net.2025.103772_bib42
– year: 2021
  ident: 10.1016/j.net.2025.103772_bib2
– year: 2024
  ident: 10.1016/j.net.2025.103772_bib31
– year: 2019
  ident: 10.1016/j.net.2025.103772_bib7
– year: 2011
  ident: 10.1016/j.net.2025.103772_bib3
  article-title: Nuclear security recommendations on physical protection of nuclear material and nuclear facilities (INFCIRC/225/Rev. 5)
– year: 2024
  ident: 10.1016/j.net.2025.103772_bib38
– year: 2009
  ident: 10.1016/j.net.2025.103772_bib26
– volume: 14
  year: 2024
  ident: 10.1016/j.net.2025.103772_bib45
  article-title: A study on a scenario-based security incident prediction system for cybersecurity
  publication-title: Appl. Sci.
  doi: 10.3390/app142411836
– year: 2023
  ident: 10.1016/j.net.2025.103772_bib41
– volume: 8
  year: 2017
  ident: 10.1016/j.net.2025.103772_bib20
  article-title: Computer security incident response team effectiveness: a needs assessment
  publication-title: Front. Psychol.
– year: 2020
  ident: 10.1016/j.net.2025.103772_bib34
– volume: 161
  year: 2023
  ident: 10.1016/j.net.2025.103772_bib1
  article-title: Cyber security in the nuclear industry: a closer look at digital control systems, networks and human factors
  publication-title: Prog. Nucl. Energy
  doi: 10.1016/j.pnucene.2023.104738
– year: 2021
  ident: 10.1016/j.net.2025.103772_bib33
– ident: 10.1016/j.net.2025.103772_bib47
– year: 2024
  ident: 10.1016/j.net.2025.103772_bib19
– year: 2018
  ident: 10.1016/j.net.2025.103772_bib25
– year: 2012
  ident: 10.1016/j.net.2025.103772_bib29
– year: 2017
  ident: 10.1016/j.net.2025.103772_bib32
– volume: 13
  start-page: 3867
  year: 2024
  ident: 10.1016/j.net.2025.103772_bib14
  article-title: A study on designing cyber training and cyber range to effectively respond to cyber threats
  publication-title: Electron
  doi: 10.3390/electronics13193867
– year: 2021
  ident: 10.1016/j.net.2025.103772_bib16
  article-title: Maynard, cybersecurity incident response in organisations: a meta-level framework for scenario-based training
– volume: 54
  start-page: 2859
  year: 2022
  ident: 10.1016/j.net.2025.103772_bib46
  article-title: Graph neural network based multiple accident diagnosis in nuclear power plants: data optimization to represent the system configuration
  publication-title: Nucl. Eng. Technol.
  doi: 10.1016/j.net.2022.02.024
– volume: 9
  start-page: 49
  year: 2011
  ident: 10.1016/j.net.2025.103772_bib50
  article-title: Stuxnet: dissecting a cyberwarfare weapon
  publication-title: IEEE Secur. Priv.
  doi: 10.1109/MSP.2011.67
– volume: 15
  year: 2023
  ident: 10.1016/j.net.2025.103772_bib23
  article-title: Counterattacking cyber threats: a framework for the future of cybersecurity
  publication-title: Sustain. Times
– year: 2023
  ident: 10.1016/j.net.2025.103772_bib6
  article-title: Nuclear cyber attacks: a study of sabotage and regulation of critical infrastructure
– start-page: 245
  year: 2024
  ident: 10.1016/j.net.2025.103772_bib40
– year: 2017
  ident: 10.1016/j.net.2025.103772_bib4
– volume: 2014
  start-page: 22
  year: 2014
  ident: 10.1016/j.net.2025.103772_bib13
  article-title: I-Hsin chou, unified security and safety risk assessment - a case study on nuclear power plant
  publication-title: Proc. 1st Int. Conf. Trustworthy Syst. Their Appl., TSA
SSID ssj0064470
Score 2.3583548
Snippet Cyberattacks on nuclear facilities can cause unauthorized information leakage and critical impacts on nuclear safety, making an effective cyber incident...
SourceID nrf
doaj
unpaywall
crossref
elsevier
SourceType Open Website
Open Access Repository
Index Database
Publisher
StartPage 103772
SubjectTerms Cyber incident response
Cyber-attack
Cybersecurity
Evaluation
Exercise
Response capability
원자력공학
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NSxwxFA_Vi3ooViuutiVQT5bBbJKZJMdaXGyhPSl4C_kUP5hdZldkD_3ffUlmZL3oxdNACMkk701-703e-z2EjqJUjQDVqWggruI--gpcMFFRmsk-lLAxOYp__zXnl_zPVX21UuorxYQVeuCycSfEA2YGwDHjGbeeyOAoC4pZXquEVun0JVINzlQ5gwHkRUmFhM85Mf4N95k5sgt8fnAMaZ0TzgV9gUiZuP8FMK21HbRvPLQzs3w09_cr8DPZRh97uxH_LO_7CX0I7Q7aWmET3EX_J0OgFQZLFA883u01dksbOpz-qqe0XNyVuNiAHSBlDo4FdxlPI24TubHpcDQutS7xdBbyNfwc9_V8-hYQZpXwz-OhZNP8M7qcnF38Oq_66gqVY6peVBwsN8aJ55FEFUU9BmE6KxpHDPdgpNgwdhIcZBq4cNIJzgG6amaDaAzYgTXbQ-vttA37CEsaueHBKc8it5JaLhlTxFgyjtaSeoSOhx3Ws0KioYfoslsN4tBJHLqIY4ROkwyeOyb-69wAWqF7rdBvacUI8UGCujcliokAQ928Nvd3kLa-czd52vS8nuq7ToNz8Rv6CKbkuBmhH8_a8PZ6Dt5jPYdoMw1ZkiC_oPVF9xC-gjW0sN-y4j8BQgUFAQ
  priority: 102
  providerName: Directory of Open Access Journals
Title Framework for evaluating cyber incident response capabilities of nuclear facility operators through operation-based exercises
URI https://dx.doi.org/10.1016/j.net.2025.103772
https://doi.org/10.1016/j.net.2025.103772
https://doaj.org/article/0d643e782ad34bd08ec23e93b4591512
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART003229464
UnpaywallVersion publishedVersion
Volume 57
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX Nuclear Engineering and Technology, 2025, 57(11)
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2234-358X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0064470
  issn: 1738-5733
  databaseCode: KQ8
  dateStart: 20130201
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2234-358X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0064470
  issn: 1738-5733
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 2234-358X
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0064470
  issn: 1738-5733
  databaseCode: AKRWK
  dateStart: 20130201
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dixMxEA_aexAf_BYregT0ScmRbpJN8niK5VQ8FCzUp5DP4-yxLdsWqeD_7iS7e1xF_HjZhSEkbDLZ-U0y8xuEnielawmqQ6pIPeEhBQIumCRVVcg-tHQpO4ofTuuTGX83F_OeLDrnwuzd35c4LPDQwY2rREkPl_C3PagFwO4ROpidfjz-UhIeYdNmXr9cSK5inDCh5sMN5u_62LNBhap_zxRdb1qQ39g2K7v7Zi8urhic6e0uVGtdeApznMniaLtxR_77LyyO__Qtd9CtHnbi405P7qJrsbmHbl4hI7yPfkyHOC0MQBYPNODNGfY7F1ucD-VzVi9uu7DaiD0Y2hJbC942XibcZG5k2-JkfZbu8HIVyy3-GvflgHoJ6ALJ5jPgoeLT-gGaTd98fn1C-uIMxDMtNoQD8GOcBp5o0kmKCeiCd7L21PIAGMfFiVfgX1eRS6-85Bwsn2AuytoCjBTsIRo1yyY-QlhViVsevQ4scacqxxVjmlpHJ8k5KsboxbBcZtVxcJghOO2rgTk1eU5NN6dj9Cov6GXDTJ9dBLASpt-NhgYAYhHAkQ2Mu0BV9BWLmjkudIZAY8QHdTA9EukQBnR1_qexn4HqmIU_L8Pm99nSLFoDvslbaCOZVpN6jF5eqtbfv-fxf7V-gkabdhufAlDauMNywADP95_UYb9dfgJOYw-q
linkProvider Unpaywall
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dixMxEA_aexAf_JbroRLQJyVHukk2yeMpllPw8MFCfQr5PM4e27JtkR74vzvJ7h5XET-eFoaQkGSS-c1m5jcIvUpK1xJUh1SResJDCgRcMEmqqpB9aOlSdhQ_ndWnM_5xLuY9WXTOhdl7vy9xWOChgxtXiZIeLuG2PagFwO4ROpidfT75WhIe4dBmXr9cSK5inDCh5sML5u_62LNBhap_zxTdblqQ39k2K7v7bi8vbxic6f0uVGtdeApznMnieLtxx_7qFxbHf5rLA3Svh534pNOTh-hWbB6huzfICB-jH9MhTgsDkMUDDXhzjv3OxRbnn_I5qxe3XVhtxB4MbYmtBW8bLxNuMjeybXGyPkt3eLmK5RV_jftyQL0EdIFk8xnwUPFp_QTNpu-_vDslfXEG4pkWG8IB-DFOA0806STFBHTBO1l7ankAjOPixCvwr6vIpVdecg6WTzAXZW0BRgr2FI2aZRMPEVZV4pZHrwNL3KnKccWYptbRSXKOijF6PWyXWXUcHGYITvtmYE1NXlPTrekYvc0bet0w02cXAeyE6U-joQGAWARwZAPjLlAVfcWiZo4LnSHQGPFBHUyPRDqEAV1d_Gnsl6A6ZuEvyrD5e740i9aAb_IB2kim1aQeozfXqvX3-Rz9V-tnaLRpt_E5AKWNe9EfkZ-joA3A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Framework+for+evaluating+cyber+incident+response+capabilities+of+nuclear+facility+operators+through+operation-based+exercises&rft.jtitle=Nuclear+engineering+and+technology&rft.au=%EC%B5%9C%ED%9D%AC%EC%9B%90&rft.au=%EB%B0%95%EC%B2%9C%ED%98%B8&rft.au=%EC%9D%B4%EC%A3%BC%ED%98%84&rft.au=%EC%A0%84%EC%8A%B9%ED%98%B8&rft.date=2025-11-01&rft.pub=%ED%95%9C%EA%B5%AD%EC%9B%90%EC%9E%90%EB%A0%A5%ED%95%99%ED%9A%8C&rft.issn=1738-5733&rft.eissn=2234-358X&rft_id=info:doi/10.1016%2Fj.net.2025.103772&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_10739816
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-5733&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-5733&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-5733&client=summon