참고문헌
- USNRC. Regulatory Guide 1.152 Revision 3, "Criteria for Use of Computers in Safety Systems of Nuclear Power Plants", 2011.
- USNRC. Regulatory Guide 5.71, "Cyber Security Programs for Nuclear Facilities", 2010.
- Ghahramani B., "Software reliability analysis: a systems development model", Computers & Industrial Engineering, vol. 45, pp. 295-305 (2003). https://doi.org/10.1016/S0360-8352(03)00037-8
- Weber W, Tondok H, Bachmayer M, "Enhancing software safety by fault trees: experiences from an application to flight critical software", Reliability Engineering & System Safety, vol. 89, pp. 57-70 (2005). https://doi.org/10.1016/j.ress.2004.08.007
- Nai Fovino I, Masera M, De Cian A, "Integrating cyber attacks within fault trees", Reliability Engineering & System Safety, vol. 94, pp. 1394-1402 (2009). https://doi.org/10.1016/j.ress.2009.02.020
- Chou IH, "Secure Software Configuration Management Processes for nuclear safety software development environment", Annals of Nuclear Energy, vol. 38, pp. 2174-2179 (2011). https://doi.org/10.1016/j.anucene.2011.06.016
- Lahtinen J, Valkonen J, Bjorkman K, Frits J, Niemela I, Heljanko K, "Model checking of safety-critical software in the nuclear engineering domain", Reliability Engineering & System Safety, vol. 105, pp. 104-113 (2012). https://doi.org/10.1016/j.ress.2012.03.021
- Chou IH, Fan C-F, "Regulatory-based development processes for software security in nuclear safety systems", Progress in Nuclear Energy, vol. 52, pp. 395-402 (2010). https://doi.org/10.1016/j.pnucene.2009.09.002
- USNRC. Regulatory Guide 1.152 Revision 2, "Criteria for Use of Computers in Safety Systems of Nuclear Power Plants", 2006.
- Kesler B, "The Vulnerability of Nuclear Facilities to Cyber Attack", Strategic Insights, vol. 10, pp. 15-25 (2011).
- Zakaria I. Saleh, Heba Refai, Mashhour A, "Proposed Framework for Security Risk Assessment", Journal of Information Security, vol. 2, pp. 85-90 (2011). https://doi.org/10.4236/jis.2011.22008
- Nai Fovino I, Guidi L, Masera M, Stefanini A, "Cyber security assessment of a power plant", Electric Power Systems Research, vol. 81, pp. 518-526 (2011). https://doi.org/10.1016/j.epsr.2010.10.012
- Lee CK, Park GY, Kwon KC, Hahn DH, Cho SH, "Cyber security design requirements based on a risk assessment", Nuclear Plant Instrumentation, Control, and Human-Machine Interface Technologies, pp. 1638-1646 (2009).
- Mark D, John MD, Justin S., "The art of software security assessment", Addison-Wesley (2007).