Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Education (4)
- Nuclear Security (4)
- Training (4)
- Nuclear security (3)
- Editorial (2)
-
- Information security (2)
- Security (2)
- Security culture (2)
- Self-assessment (2)
- 2016 election (1)
- Ahimsa (1)
- Antonio Rowry (1)
- BLUE1647 (1)
- Baby (1)
- Betsy leitch (1)
- Bill leitch (1)
- Black Sky (1)
- CBRN (1)
- CME (1)
- Capacity building (1)
- Center of Excellence (1)
- Certification exam (1)
- Child (1)
- Closed Source Software (1)
- Coding (1)
- Collaborative Learning (1)
- Common Industrial Protocols (1)
- Critical Infrastructure (1)
- Cruel (1)
- Cultural beliefs (1)
Articles 1 - 30 of 51
Full-Text Articles in Physical Sciences and Mathematics
Letter From The Editor
International Journal of Nuclear Security
No abstract provided.
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
International Journal of Nuclear Security
Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …
Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall
Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall
International Journal of Nuclear Security
Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust …
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
International Journal of Nuclear Security
The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.
Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …
Student Competition Cover
International Journal of Nuclear Security
No abstract provided.
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
International Journal of Nuclear Security
No abstract provided.
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
International Journal of Nuclear Security
No abstract provided.
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
International Journal of Nuclear Security
No abstract provided.
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
International Journal of Nuclear Security
No abstract provided.
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
Welcome to the second issue of the Journal of Cybersecurity Education, Research and Practice (JCERP).
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia
Journal of Cybersecurity Education, Research and Practice
The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …
Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt
Towards An In-Depth Understanding Of Deep Packet Inspection Using A Suite Of Industrial Control Systems Protocol Packets, Guillermo A. Francia Iii, Xavier P. Francia, Anthony M. Pruitt
Journal of Cybersecurity Education, Research and Practice
Industrial control systems (ICS) are increasingly at risk and vulnerable to internal and external threats. These systems are integral part of our nation’s critical infrastructures. Consequently, a successful cyberattack on one of these could present disastrous consequences to human life and property as well. It is imperative that cybersecurity professionals gain a good understanding of these systems particularly in the area of communication protocols. Traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are made to encapsulate some of these ICS protocols which may enable malicious payload to get through the network firewall and thus, gain entry into the …
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.
Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga
Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga
International Journal of Nuclear Security
Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear energy …
Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa
Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa
International Journal of Nuclear Security
Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).
The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to accommodate fault causes …
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
International Journal of Nuclear Security
Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.
From The Editor’S Desk
International Journal of Nuclear Security
No abstract provided.
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath
International Journal of Nuclear Security
This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.
Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr
Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr
International Journal of Nuclear Security
Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.
Minerva 2016, The Honors College
Minerva 2016, The Honors College
Minerva
This issue of Minerva includes the article "Dear Bill and Betsy," documenting student gratitude for generous Honors donors Bill and Betsy Leitch; an interview with former professor and Honors Preceptor, Walter Macdougall; and an article on Honors student Emily Illingworth and her experiences in Honors. Other highlights include an article on distinguished Honors graduates Mark Pettegrow and Mark Haskell; and an article on the 2016 election as covered by UMaine Journalism students.
Letter From The Editor - Choe, Kwan Kyoo Choe
Letter From The Editor - Choe, Kwan Kyoo Choe
International Journal of Nuclear Security
No abstract provided.
Letter From The Editor - Frahi-Amroun, Akila Frahi-Amroun
Letter From The Editor - Frahi-Amroun, Akila Frahi-Amroun
International Journal of Nuclear Security
No abstract provided.
Letter From The Editor - Hirst, Russel K. Hirst
Letter From The Editor - Hirst, Russel K. Hirst
International Journal of Nuclear Security
No abstract provided.
The Capacity-Building Support Activities Of The Integrated Support Center For Nuclear Nonproliferation And Nuclear Security Of The Japan Atomic Energy Agency, Yosuke Naoi, Kalman A. Robertson, Naoko Noro
The Capacity-Building Support Activities Of The Integrated Support Center For Nuclear Nonproliferation And Nuclear Security Of The Japan Atomic Energy Agency, Yosuke Naoi, Kalman A. Robertson, Naoko Noro
International Journal of Nuclear Security
International cooperation is essential to support states in building the human resources necessary for maintaining and strengthening nuclear security. As the nation’s only comprehensive nuclear research and development institute, the Japan Atomic Energy Agency (JAEA) has long-standing experience developing and operating nuclear technology in all steps of the fuel cycle. The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) was established within the JAEA in December 2010 as Japan’s Center of Excellence for nuclear security. The ISCN provides assistance with capacity building to states throughout Asia and some other regions. The objective of this article is to describe …
Khalifa University Reachback Program Supporting Prevention Of Illicit Nuclear And Radiological Material Smuggling In The United Arab Emirates, Braden Goddard, Alexander A. Solodov, Patrick J. Simmons
Khalifa University Reachback Program Supporting Prevention Of Illicit Nuclear And Radiological Material Smuggling In The United Arab Emirates, Braden Goddard, Alexander A. Solodov, Patrick J. Simmons
International Journal of Nuclear Security
Trafficking of Illicit nuclear or radiological materials is a global threat which can involve and adversely affect any country. Ultimately, it is the responsibility of each state to prevent and combat illicit nuclear trafficking by screening all cargo and travelers entering, exiting, and transiting through its borders. As a part of the national radiation detection infrastructure of the United Arab Emirates (UAE), a reachback program was established at Khalifa University (KU) to provide capabilities for adjudication of radiation alarms at Khalifa Port and other radiation portal monitor (RPM) locations. In addition to the main mission, KU Reachback aims to educate …
Status Of Nuclear Security Education And Research In Bangladesh And Looking Forward, Md. Shafiqul Islam, Md. Mobasher Ahmed
Status Of Nuclear Security Education And Research In Bangladesh And Looking Forward, Md. Shafiqul Islam, Md. Mobasher Ahmed
International Journal of Nuclear Security
Bangladesh uses category I of nuclear materials and category 1-5 of radioactive materials in the field of research, medical and industries. The Government is going to implement its first nuclear power plant under an IGA between the Bangladesh and Russian Governments. With the emerging global nuclear and radiological terrorism by potential adversaries, enhancing nuclear security is the paramount importance for the country. The paper has found no established communication channels among stakeholders in order to work in a coordinated and collaborative manner for strengthening the nuclear security. This has resulted lacking importance of education, research, training and knowledge management initiatives …