{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:32:06Z","timestamp":1759336326923,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,8]]},"DOI":"10.1145\/3297156.3297211","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:07:04Z","timestamp":1551359224000},"page":"463-467","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Cybersecurity Vulnerability Scanner for Digital Nuclear Power Plant Instrumentation and Control Systems"],"prefix":"10.1145","author":[{"given":"Jae-Hong","family":"Kim","sequence":"first","affiliation":[{"name":"University of Science and Technology (UST), Daejeon, South Korea"}]},{"given":"Yang-Seo","family":"Choi","sequence":"additional","affiliation":[{"name":"Electronic and Telecommunications Research Institute (ETRI), Daejeon, South Korea"}]},{"given":"Jung-Chan","family":"Na","sequence":"additional","affiliation":[{"name":"Electronic and Telecommunications Research Institute (ETRI), Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The vulnerability of nuclear facilities to cyber attack","author":"Kesler B.","year":"2010","unstructured":"Kesler , B. , 2011. The vulnerability of nuclear facilities to cyber attack ; strategic insights: Spring 2010 . Strategic Insights , Spring 2011. Kesler, B., 2011. The vulnerability of nuclear facilities to cyber attack; strategic insights: Spring 2010. Strategic Insights, Spring 2011."},{"key":"e_1_3_2_1_2_1","unstructured":"KASPERSKY 2010 Kaspersky Lab provides its insights on Stuxnet worm. Retrieved from https:\/\/www.kaspersky.com\/about\/press-releases\/2010_kaspersky-lab-provides-its-insights-on-stuxnet-worm.  KASPERSKY 2010 Kaspersky Lab provides its insights on Stuxnet worm. Retrieved from https:\/\/www.kaspersky.com\/about\/press-releases\/2010_kaspersky-lab-provides-its-insights-on-stuxnet-worm."},{"key":"e_1_3_2_1_3_1","article-title":"An analysis on the cyber accident for the cybersecurity policy making at the nuclear facilities, Intl","author":"Won KS.","year":"2017","unstructured":"Won , KS. 2017 . An analysis on the cyber accident for the cybersecurity policy making at the nuclear facilities, Intl . J. Marit. Inf. Commun. Sci. Won, KS. 2017. An analysis on the cyber accident for the cybersecurity policy making at the nuclear facilities, Intl. J. Marit. Inf. Commun. Sci.","journal-title":"J. Marit. Inf. Commun. Sci."},{"key":"e_1_3_2_1_4_1","volume-title":"Nuclear Threat Initiative","author":"Van Dine A.","year":"2016","unstructured":"Van Dine , A. , Assante , M. , Stoutland , P., Ph.D. , Outpacing Cyber Threats : Priorities for Cybersecurity at Nuclear Facilities , Nuclear Threat Initiative , 2016 . Van Dine, A., Assante, M., Stoutland, P., Ph.D., Outpacing Cyber Threats: Priorities for Cybersecurity at Nuclear Facilities, Nuclear Threat Initiative, 2016."},{"key":"e_1_3_2_1_5_1","unstructured":"R.G. 5.71 2010. Cybersecurity Programs for Nuclear Facilities U.S. Nuclear Regulatory Commission.  R.G. 5.71 2010. Cybersecurity Programs for Nuclear Facilities U.S. Nuclear Regulatory Commission."},{"key":"e_1_3_2_1_6_1","volume-title":"Guidance","author":"Nuclear Security Series","year":"2011","unstructured":"Nuclear Security Series (NSS) No. 17, Tech . Guidance , 2011 . Computer Security at Nuclear Facilities, IAEA. Nuclear Security Series (NSS) No. 17, Tech. Guidance, 2011. Computer Security at Nuclear Facilities, IAEA."},{"volume-title":"NRC","author":"Veitch C.K.","key":"e_1_3_2_1_7_1","unstructured":"Veitch , C.K. , Wade , S. , Michalski , J.T. 2012 , Cyber Security Assessment Tools and Methodologies for the Evaluation of Secure Network Design at Nuclear Power Plants , NRC Veitch, C.K., Wade, S., Michalski, J.T. 2012, Cyber Security Assessment Tools and Methodologies for the Evaluation of Secure Network Design at Nuclear Power Plants, NRC"},{"volume-title":"Network- and Host-Based Vulnerability Assessments: An Introduction to a Cost Effective and Easy to Use Strategy","author":"Guirguis R.","key":"e_1_3_2_1_8_1","unstructured":"Guirguis , R. 2002. Network- and Host-Based Vulnerability Assessments: An Introduction to a Cost Effective and Easy to Use Strategy , SANS Institute Guirguis, R. 2002. Network- and Host-Based Vulnerability Assessments: An Introduction to a Cost Effective and Easy to Use Strategy, SANS Institute"},{"key":"e_1_3_2_1_9_1","unstructured":"The Government of the Hong Kong Special Administrative Region. 2008. An Overview of Vulnerability Scanners.  The Government of the Hong Kong Special Administrative Region. 2008. An Overview of Vulnerability Scanners."},{"key":"e_1_3_2_1_10_1","volume-title":"Sep.","author":"KISA","year":"2002","unstructured":"KISA , Guide for selecting system vulnerability assessment tools, with paper , Sep. 2002 . KISA, Guide for selecting system vulnerability assessment tools, with paper, Sep. 2002."},{"key":"e_1_3_2_1_11_1","unstructured":"NileSoft \"Security Vulnerability Assessment Tool Selection Criteria\". Retrieved from http:\/\/www.nilesoft.co.kr\/sub\/vulnerability\/vulnerability_02.  NileSoft \"Security Vulnerability Assessment Tool Selection Criteria\". Retrieved from http:\/\/www.nilesoft.co.kr\/sub\/vulnerability\/vulnerability_02."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.792"},{"volume-title":"Wireshark User's Guide","author":"Combs G.","key":"e_1_3_2_1_13_1","unstructured":"Combs G. 2008 , Wireshark User's Guide , Wireshark Co. Inc . Combs G. 2008, Wireshark User's Guide, Wireshark Co. Inc."},{"key":"e_1_3_2_1_14_1","volume-title":"Passive Asset Detection System","author":"Shelton M.","year":"2008","unstructured":"Shelton , M. , Passive Asset Detection System , 2008 . Retrieved from http:\/\/passive.sourceforge.net\/about.php. Shelton, M., Passive Asset Detection System, 2008. Retrieved from http:\/\/passive.sourceforge.net\/about.php."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"J. Medeiros A. Brito and P. Pires. 2009. A data mining based analysis of Nmap operating system fingerprint database. Computational  J. Medeiros A. Brito and P. Pires. 2009. A data mining based analysis of Nmap operating system fingerprint database. Computational","DOI":"10.1007\/978-3-642-04091-7_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Medeiros J.P.S. Brito A.M. and Pires P.S.M. 2009. A data mining based analysis of Nmap operating system fingerprint database. In Computational Intelligence in Security for Information Systems Springer Berlin Heidelberg 1--8.  Medeiros J.P.S. Brito A.M. and Pires P.S.M. 2009. A data mining based analysis of Nmap operating system fingerprint database. In Computational Intelligence in Security for Information Systems Springer Berlin Heidelberg 1--8.","DOI":"10.1007\/978-3-642-04091-7_1"},{"key":"e_1_3_2_1_17_1","unstructured":"Lyon G.F. 2009. Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure.   Lyon G.F. 2009. Nmap network scanning: The official Nmap project guide to network discovery and security scanning. Insecure."},{"key":"e_1_3_2_1_18_1","unstructured":"Orrill J. What Is the Difference Between Active & Passive Vulnerability Scanners?. Retrieved from https:\/\/smallbusiness.chron.com\/difference-between-active-passive-vulnerability-scanners-34805.html.  Orrill J. What Is the Difference Between Active & Passive Vulnerability Scanners?. Retrieved from https:\/\/smallbusiness.chron.com\/difference-between-active-passive-vulnerability-scanners-34805.html."},{"key":"e_1_3_2_1_19_1","unstructured":"Fellinge J. 2004. Intrusive vs. Nonintrusive Scanning. Retrieved from https:\/\/www.itprotoday.com\/security\/intrusive-vs-nonintrusive-scanning.  Fellinge J. 2004. Intrusive vs. Nonintrusive Scanning. Retrieved from https:\/\/www.itprotoday.com\/security\/intrusive-vs-nonintrusive-scanning."},{"key":"e_1_3_2_1_20_1","unstructured":"Beale J. Deraison R. Meer H. Temmingh R. and Walt C.V.D. 2004. Nessus network auditing. Syngress Publishing..   Beale J. Deraison R. Meer H. Temmingh R. and Walt C.V.D. 2004. Nessus network auditing. Syngress Publishing.."},{"key":"e_1_3_2_1_21_1","unstructured":"Kennedy D. O'gorman J. Kearns D. and Aharoni M. 2011. Metasploit: the penetration tester's guide. No Starch Press.   Kennedy D. O'gorman J. Kearns D. and Aharoni M. 2011. Metasploit: the penetration tester's guide. No Starch Press."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Genge B. Graur F. and En\u0103chescu C. 2015. Non-intrusive Techniques for Vulnerability Assessment of Services in Distributed Systems. Procedia Technol. 19 (Jan. 2015) 12--19.  Genge B. Graur F. and En\u0103chescu C. 2015. Non-intrusive Techniques for Vulnerability Assessment of Services in Distributed Systems. Procedia Technol. 19 (Jan. 2015) 12--19.","DOI":"10.1016\/j.protcy.2015.02.003"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFRA.2008.5439659"},{"key":"e_1_3_2_1_24_1","unstructured":"Tenable 2015. Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations  Tenable 2015. Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations"},{"key":"e_1_3_2_1_25_1","unstructured":"Department of Homeland Security and NIST. 2014. National Vulnerability Database. Retrieved fromhttp:\/\/nvd.nist.gov\/.  Department of Homeland Security and NIST. 2014. National Vulnerability Database. Retrieved fromhttp:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_1_26_1","volume-title":"World IT Congress","author":"Kim J.","year":"2018","unstructured":"Kim , J. , Choi , Y. Na , J. 2018 , A Study of nuclear cyber security regulation guideline inspection automation and information providing list derivation using ICT vulnerability check tool . In World IT Congress 2018, 20--24 Kim, J., Choi, Y. Na, J. 2018, A Study of nuclear cyber security regulation guideline inspection automation and information providing list derivation using ICT vulnerability check tool. In World IT Congress 2018, 20--24"}],"event":{"name":"CSAI '18: 2018 2nd International Conference on Computer Science and Artificial Intelligence","sponsor":["Shenzhen University Shenzhen University"],"location":"Shenzhen China","acronym":"CSAI '18"},"container-title":["Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297211","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297156.3297211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:13Z","timestamp":1750208533000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":26,"alternative-id":["10.1145\/3297156.3297211","10.1145\/3297156"],"URL":"https:\/\/doi.org\/10.1145\/3297156.3297211","relation":{},"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"2018-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}