Results 1 - 10 of 168
Results 1 - 10 of 168. Search took: 0.018 seconds
|Sort by: date | relevance|
[en] AWE’s Detection Science and Technology Programme develops and evaluates novel technologies and techniques for the detection of illicit radiological or nuclear materials for the UK government. Its research covers a range of technology readiness levels from proof of concept through to technology demonstrators and collaborates with multiple governments, industrial, and academic partners. Research areas within this programme, focusing on gamma and neutron detection technologies, will be presented.
[en] The ordering problem of arbitrary objects characterized by a set of attribute-value pairs is considered. According to the linear-extension principle, the natural partial order associated with the essential structure of such kind of objects can adequately be extended to a total order, and therefore this qualitative object ranking can be relevant in resolving various types of decision problems. Some consequences of this study are clearly encountered in different fields of engineering practice, which may be best illustrated by risk or threat analysis. (author)
[en] IT/OT convergence brings significant benefits but poses challenges as well, especially regarding how to assure IT (cyber) security in the OT world. In this paper, we take a lifecycle perspective to systematically analyze the challenges to building IT security into OT environments. Based on that, we present strategies and new research proposals for addressing some identified gaps. (author)
[en] The U.S. Nuclear Regulatory Commission (NRC) has efforts underway to better risk-inform its security regulations. Over the past few years, the NRC has conducted a number of workshops to obtain stakeholder feedback on how to accomplish this. The most recent workshops, organized by the Institute for Nuclear Materials Management (INMM), focused on interactions among safety and security risk specialists, in such areas as cyber security, insider mitigation and perception of risk. In addition, the NRC staff is responding to recommendations from an NRC Risk Management Task Force that concluded in 2012. Among the Task Force’s recommendations was to improve communication between safety and security to allow each discipline to leverage the strengths of the other. This paper will summarize the NRC’s current initiatives to better risk-inform security, and in the process, enhance its regulatory process to become more predictable for regulated entities, more appropriately graded consistent with the potential harm to the public or environment, and more efficient in the use of limited resources. (author)
[en] Regulatory changes as well as persistent threats are major drivers in the field of nuclear security. To respond to these challenges the International Atomic Energy Agency (IAEA) has called for universities to set up master programs in nuclear security. Therefore the Institute for Security and Safety at the Brandenburg University of Applied Sciences is currently setting up an innovative Master in Nuclear Security (MiNS). MiNS will be conducted as a distance learning program and its curriculum will be based on the results of the IAEA’s Nuclear Security Series No.12 (NSS 12) on education in nuclear security. This article aims at providing a comprehensive overview over the Master in Nuclear Security. (author)
[en] This paper describes design and development of a trusted path based technique for Secure booting and authenticated execution for Linux servers deployed in Nuclear Facilities. The trusted path based secure booting relies on a small core software and a hardware assisted mechanism for integrity verification. Authenticated execution(AE) mechanism relies on two facts; that the machine is booted in a secure state and the integrity of the application binary matches with reference. Authenticated execution is close to the idea of Measured Launch Execution and enhances the security of Mandatory Access Control(MAC) mechanism. The performance penalty of the authenticated execution is measured and found to be within acceptable limits. (author)
[en] This paper sets out the findings of a two-year research project to explore the impact of nuclear security ‘train the- trainer’ professional development courses (PDCs). Drawing on extensive empirical fieldwork, the research identifies a number of lessons learned from the experience. These range from the challenges associated with integrating nuclear security into academic courses and training programmes, to the significance of the interactive elements forming part of the PDC process. On a larger scale, the research finds that the PDC process has served as a force multiplier for an emerging community of practice in nuclear security education. (author)
[en] This publication presents the proceedings of an international conference in the field of nuclear security, which took place at the IAEA Headquarters in Vienna from 5–9 December 2016. The conference was convened to discuss the international community’s experiences and achievements in strengthening nuclear security, to enhance understanding of current approaches to nuclear security worldwide, to identify trends and to provide an inclusive forum at which ministers, policy makers, senior officials and nuclear security experts could formulate and exchange views on future directions and priorities for nuclear security. The publication contains the President’s summary of the conference, a summary of the ministerial segment, the full text of the ministerial declaration adopted by the conference, statements from the opening and closing sessions, an outline of the conference programme and a list of invited contributions. For the first time, the IAEA invited students and young professionals to submit an essay on a topic related to the conference for review by a panel of international judges. The three winning essays are reproduced in this publication. This accompanying CD-ROM includes the full conference programme, the list of conference participants, the national statements from the ministerial segment, and a selection of papers and presentations from the conference.
[en] Different approaches to interpretation of the same analytical results as well as of the same information are demonstrated. Examples of TTX “Glowing Tulip” as well as of one real investigation are considered. Possible reasons of different results of analysis of the same data are mentioned and discussed. (author)
[en] The 2016 Nuclear Industry Summit convened in Washington on March 29-31, 2016, in conjunction with the 2016 Nuclear Security Summit. It was attended by approximately 200 leaders from the global nuclear industry with significant experience and responsibility for the operation of nuclear installations, production and management of nuclear materials, and for international nuclear cooperation and trade. The Nuclear Industry Summit concluded a process that started in 2010 and brought increased focus to the field of cyber security. This paper describes especially the work of the NIS 2016 Working Group on Managing Cyber Threat. (author)