Abstract
The fundamental purpose of the security system in a nuclear power plant is to thwart any adversary attempting to breach the facility by means of detection, delay, and response. This study introduces a novel flow intrusion model (FIM) that integrates the EASI method and Bayesian Attack Tree to assess the effectiveness and sensitivity of the security system. In contrast to the conventional effectiveness evaluation technique, which utilizes the enumeration method to compute the vulnerable path, the FIM method concentrates on a thorough analysis of the dynamic and static risks inherent in the security system. To facilitate a practical analysis of the FIM, a minimum case is presented.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.