International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 48, issue C, 2025
- Simulation of multi-stage attack and defense mechanisms in smart grids

- Ömer Sen, Bozhidar Ivanov, Christian Kloos, Christoph Zöll, Philipp Lutat, Martin Henze, Andreas Ulbig and Michael Andres
- CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B

- Mikaëla Ngamboé, Xiao Niu, Benoit Joly, Steven P. Biegler, Paul Berthier, Rémi Benito, Greg Rice, José M. Fernandez and Gabriela Nicolescu
- Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems

- Seyed Ali Alavi, Hamed Pourvali Moghadam and Amir Hossein Jahangir
- An efficient convolutional neural network based attack detection for smart grid in 5G-IOT

- Sheeja Rani S, Mostafa F. Shaaban and Abdelfatah Ali
- Artificial immunity-based energy theft detection for advanced metering infrastructures

- Jie Fu, Chengxi Yang, Yuxuan Liu, Kunsan Zhang, Jiaqi Li and Beibei Li
- OptAML: Optimized adversarial machine learning on water treatment and distribution systems

- Mustafa Sinasi Ayas, Enis Kara, Selen Ayas and Ali Kivanc Sahin
- Modeling flood propagation and cascading failures in interdependent transportation and stormwater networks

- H M Imran Kays, Arif Mohaimin Sadri, "Muralee" Muraleetharan, K.K., P. Scott Harvey and Gerald A. Miller
- Interdependencies and third parties

- Roberto Setola
Volume 46, issue C, 2024
- Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity

- Tobias Liebetrau and Christian Bueger
- Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences

- Kirti Gupta, Bijaya Ketan Panigrahi, Anupam Joshi and Kolin Paul
- Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements

- Asma Farooq, Kamal Shahid and Rasmus Løvenstein Olsen
- Cyber risk assessment of cyber-enabled autonomous cargo vessel

- Awais Yousaf, Ahmed Amro, Philip Teow Huat Kwa, Meixuan Li and Jianying Zhou
- Technological advancements and innovations in enhancing resilience of electrical distribution systems

- Divyanshi Dwivedi, Sagar Babu Mitikiri, K. Victor Sam Moses Babu, Pradeep Kumar Yemula, Vedantham Lakshmi Srinivas, Pratyush Chakraborty and Mayukha Pal
- Power grid network security: A lightweight detection model for composite false data injection attacks using spatiotemporal features

- Tianci Zhu, Jun Wang, Yonghai Zhu, Haoran Chen, Hang Zhang and Shanshan Yin
- Probabilistic dynamic resilience quantification for infrastructure systems in multi-hazard environments

- Ahmed Badr, Zoe Li and Wael El-Dakhakhni
- Robustness evaluation method and defense strategy of electricity-heat integrated energy system

- Funian Hu, Chenhui Peng and Jun Chen
- Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review

- Yuning Jiang, Manfred Jeusfeld, Michael Mosaad and Nay Oo
- Cyber attacks on critical infrastructures and satellite communications

- Antonio Carlo and Kim Obergfaell
- Blockchain-based anonymous authentication and data aggregation for advanced metering infrastructure in smart grid

- Tingrui Pei, Zhiwen Hou, Jun Zhou, Chixin Xiao and Juan Zou
- Assessment of cross-border electricity interconnection projects using a MCDA method

- Natalia Naval and Jose M. Yusta
- It is the time, are you sufficiently resilient?

- Roberto Setola
Volume 45, issue C, 2024
- DSACR: A defense-based system with adaptive cyber resilience for industrial control systems

- Yi-Wei Ma, Yi-Hao Tu and Chih-Ting Shen
- False data injection in distribution system: Attacker's perspective

- Poornachandratejasvi Laxman Bhattar, Naran M Pindoriya and Anurag Sharma
- Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation

- Taiyi Zhao, Yuchun Tang, Qiming Li and Jingquan Wang
- ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems

- Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Kaloma Usman Majikumna, Musa Mustapha and Abebaw Degu Workneh
- Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis

- Midhya Mathew and Faruk Kazi
- A real-time network based anomaly detection in industrial control systems

- Faeze Zare, Payam Mahmoudi-Nasr and Rohollah Yousefpour
- Cybersecurity and cyber-terrorism challenges to energy-related infrastructures – Cybersecurity frameworks and economics – Comprehensive review

- Sampath Kumar Venkatachary, Jagdish Prasad, Annamalai Alagappan, Leo John Baptist Andrews, Raymon Antony Raj and Sarathkumar Duraisamy
- DAR-LFC: A data-driven attack recovery mechanism for Load Frequency Control

- Andrew D. Syrmakesis, Cristina Alcaraz and Nikos D. Hatziargyriou
- A comparison of onshore oil and gas transmission pipeline incident statistics in Canada and the United States

- Y. Shen and W. Zhou
- Impact of space systems capabilities and their role as critical infrastructure

- Mr. Antonio Carlo and Dr. Paola Breda
- Performing risk assessment for critical infrastructure protection: A study of human decision-making and practitioners' transnationalism considerations

- Michalis Papamichael, Christos Dimopoulos, Georgios Boustras and Marios Vryonides
Volume 44, issue C, 2024
- Need for intensive care? A socio-technical systems perspective on water supply failure preparedness in German health care facilities

- Christine Heinzel, Sophie van der Heijden, Aljoscha Mayer, Nathalie Sänger and Simone Sandholz
- Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks

- Nazia Raza and Faegheh Moazeni
- Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review

- Basem A. Alkhaleel
- A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions

- Khushi Jatinkumar Raval, Nilesh Kumar Jadav, Tejal Rathod, Sudeep Tanwar, Vrince Vimal and Nagendar Yamsani
- Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach

- Lazaros Papadopoulos, Konstantinos Demestichas, Eva Muñoz-Navarro, Juan José Hernández-Montesinos, Stephane Paul, Nicolas Museux, Sandra König, Stefan Schauer, Alfonso Climente Alarcón, Israel Perez Llopis, Tim Stelkens-Kobsch, Tamara Hadjina and Jelena Levak
- A comparative study of cyber security intrusion detection in healthcare systems

- Yan Zhang, Degang Zhu, Menglin Wang, Junhan Li and Jie Zhang
- A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms

- Morteza Haghshenas, Rahmat-Allah Hooshmand and Mehdi Gholipour
- A watchdog model for physics-based anomaly detection in digital substations

- Hussam Tarazi, Sara Sutton, John Olinjyk, Benjamin Bond and Julian Rrushi
- Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication

- Jian Chen, Fei Lu, Yuanzhe Liu, Sheng Peng, Zhiming Cai and Fu Mo
Volume 43, issue C, 2023
- A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction

- Jiarui Chen, Yiqin Lu, Yang Zhang, Fang Huang and Jiancheng Qin
- Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem

- Itzhak Aviv and Uri Ferri
- Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network

- Armin Aalirezaei, Dr. Golam Kabir and Md Saiful Arif Khan
- Modeling and assessing seismic resilience leveraging systems dynamic approach: A case study of society 5.0

- Shohreh Moradi, Md Muzahid Khan, Niamat Ullah Ibne Hossain, Mohammad Shamsuddoha and Alex Gorod
- An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space

- Georgios Kavallieratos and Sokratis Katsikas
- Ensuring the longevity of WirelessHART devices in industrial automation and control systems using distinct native attribute fingerprinting

- Matthew J. Maier, Hunter S. Hayden, Michael A. Temple and Matthew C. Fickus
- A systematic co-engineering of safety and security analysis in requirements engineering process

- Sejin Jung, Junbeom Yoo and Sam Malek
- Measurement protection to prevent cyber–physical attacks against power system State Estimation

- Harag Margossian, Ronald Kfouri and Rita Saliba
Volume 42, issue C, 2023
- Rule-based anomaly detection for railway signalling networks

- Markus Heinrich, Arwed Gölz, Tolga Arul and Stefan Katzenbeisser
- Protocol study and anomaly detection for server-driven traffic in SCADA networks

- Chih-Yuan Lin and Simin Nadjm-Tehrani
- A forensics and compliance auditing framework for critical infrastructure protection

- João Henriques, Filipe Caldeira, Tiago Cruz and Paulo Simões
- Assessing the comprehensive importance of power grid nodes based on DEA

- Xin Gao, Yunxia Ye, Wenxin Su and Linyan Chen
- Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey

- Xabier Etxezarreta, Iñaki Garitano, Mikel Iturbe and Urko Zurutuza
- A multi-criteria framework for critical infrastructure systems resilience

- Zhuyu Yang, Bruno Barroca, Katia Laffréchine, Alexandre Weppe, Aurélia Bony-Dandrieux and Nicolas Daclin
- Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems

- Paola Vargas and Iris Tien
- A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE

- Matthew Boeding, Michael Hempel, Hamid Sharif, Juan Lopez and Kalyan Perumalla
- AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications

- Suleman Khan, Gurjot Singh Gaba, An Braeken, Pardeep Kumar and Andrei Gurtov
- CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks

- Ali Ahmadian Ramaki, Abbas Ghaemi-Bafghi and Abbas Rasoolzadegan
- Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990–2018

- Jennifer S. Holmes, Agustin Palao, Mercedez Callenes, Neil Ortiz Silva and Alvaro Cardenas
- Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering

- Mohamed Salama, Wael El-Dakhakhni and Michael Tait
- Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies

- Achara Tiong and Hector A. Vergara
- National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage

- Tolga Ahmet Gülcan and Kadir Emrah Erginer
| |