International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 48, issue C, 2025
- Simulation of multi-stage attack and defense mechanisms in smart grids

- Ömer Sen, Bozhidar Ivanov, Christian Kloos, Christoph Zöll, Philipp Lutat, Martin Henze, Andreas Ulbig and Michael Andres
- CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B

- Mikaëla Ngamboé, Xiao Niu, Benoit Joly, Steven P. Biegler, Paul Berthier, Rémi Benito, Greg Rice, José M. Fernandez and Gabriela Nicolescu
- Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems

- Seyed Ali Alavi, Hamed Pourvali Moghadam and Amir Hossein Jahangir
- An efficient convolutional neural network based attack detection for smart grid in 5G-IOT

- Sheeja Rani S, Mostafa F. Shaaban and Abdelfatah Ali
- Artificial immunity-based energy theft detection for advanced metering infrastructures

- Jie Fu, Chengxi Yang, Yuxuan Liu, Kunsan Zhang, Jiaqi Li and Beibei Li
- OptAML: Optimized adversarial machine learning on water treatment and distribution systems

- Mustafa Sinasi Ayas, Enis Kara, Selen Ayas and Ali Kivanc Sahin
- Modeling flood propagation and cascading failures in interdependent transportation and stormwater networks

- H M Imran Kays, Arif Mohaimin Sadri, "Muralee" Muraleetharan, K.K., P. Scott Harvey and Gerald A. Miller
- Interdependencies and third parties

- Roberto Setola
Volume 47, issue C, 2024
- Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city

- Ying Lu, Qingling Wang, Shiyu Huang, Wenhui Yu and Shuyue Yao
- Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator

- Darshana Upadhyay, Sagarika Ghosh, Hiroyuki Ohno, Marzia Zaman and Srinivas Sampalli
- Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea

- Young Hwan Choi, Do Guen Yoo, Pill Jae Kwak, Hyung Do Kim, Jungsu Park, Jaehyeoung Park and Younghan Yoon
- Evaluation of SDN security measures in the context of IEC 62443-3-3

- Georgios Michail Makrakis, Dakota Roberson, Constantinos Kolias and Dallin Cook
- Obfuscation strategies for industrial control systems

- Vittoria Cozza, Mila Dalla Preda, Ruggero Lanotte, Marco Lucchese, Massimo Merro and Nicola Zannone
- An AutoML-based security defender for industrial control systems

- Danish Vasan, Ebtesam Jubran S. Alqahtani, Mohammad Hammoudeh and Adel F. Ahmed
- Process-aware security monitoring in industrial control systems: A systematic review and future directions

- Muaan ur Rehman and Hayretdin Bahşi
- SIRT: A distinctive and smart invasion recognition tool (SIRT) for defending IoT integrated ICS from cyber-attacks

- M.S. Kavitha, G. Sumathy, B. Sarala, J. Jasmine Hephzipah, R. Dhanalakshmi and T.D. Subha
- Digital Twin-assisted anomaly detection for industrial scenarios

- Cristina Alcaraz and Javier Lopez
- Impact of Internet and mobile communication on cyber resilience: A multivariate adaptive regression spline modeling approach

- Serhiy Lyeonov, Wadim Strielkowski, Vitaliia Koibichuk and Serhii Drozd
- A tri-level optimization model for interdependent infrastructure network resilience against compound hazard events

- Matthew R. Oster, Ilya Amburg, Samrat Chatterjee, Daniel A. Eisenberg, Dennis G. Thomas, Feng Pan and Auroop R. Ganguly
- Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions

- Shah Khalid Khan, Nirajan Shiwakoti, Abebe Diro, Alemayehu Molla, Iqbal Gondal and Matthew Warren
- FingerCI: Writing industrial process specifications from network traffic

- Filipe Apolinário, Nelson Escravana, Éric Hervé, Miguel L. Pardal and Miguel Correia
- Optimized unmanned aerial vehicle pathway system in disaster resilience network

- Yi-Wei Ma and Desti Syuhada
- Physical threats vs Cyber threats

- Roberto Setola
Volume 46, issue C, 2024
- Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity

- Tobias Liebetrau and Christian Bueger
- Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences

- Kirti Gupta, Bijaya Ketan Panigrahi, Anupam Joshi and Kolin Paul
- Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements

- Asma Farooq, Kamal Shahid and Rasmus Løvenstein Olsen
- Cyber risk assessment of cyber-enabled autonomous cargo vessel

- Awais Yousaf, Ahmed Amro, Philip Teow Huat Kwa, Meixuan Li and Jianying Zhou
- Technological advancements and innovations in enhancing resilience of electrical distribution systems

- Divyanshi Dwivedi, Sagar Babu Mitikiri, K. Victor Sam Moses Babu, Pradeep Kumar Yemula, Vedantham Lakshmi Srinivas, Pratyush Chakraborty and Mayukha Pal
- Power grid network security: A lightweight detection model for composite false data injection attacks using spatiotemporal features

- Tianci Zhu, Jun Wang, Yonghai Zhu, Haoran Chen, Hang Zhang and Shanshan Yin
- Probabilistic dynamic resilience quantification for infrastructure systems in multi-hazard environments

- Ahmed Badr, Zoe Li and Wael El-Dakhakhni
- Robustness evaluation method and defense strategy of electricity-heat integrated energy system

- Funian Hu, Chenhui Peng and Jun Chen
- Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review

- Yuning Jiang, Manfred Jeusfeld, Michael Mosaad and Nay Oo
- Cyber attacks on critical infrastructures and satellite communications

- Antonio Carlo and Kim Obergfaell
- Blockchain-based anonymous authentication and data aggregation for advanced metering infrastructure in smart grid

- Tingrui Pei, Zhiwen Hou, Jun Zhou, Chixin Xiao and Juan Zou
- Assessment of cross-border electricity interconnection projects using a MCDA method

- Natalia Naval and Jose M. Yusta
- It is the time, are you sufficiently resilient?

- Roberto Setola
Volume 45, issue C, 2024
- DSACR: A defense-based system with adaptive cyber resilience for industrial control systems

- Yi-Wei Ma, Yi-Hao Tu and Chih-Ting Shen
- False data injection in distribution system: Attacker's perspective

- Poornachandratejasvi Laxman Bhattar, Naran M Pindoriya and Anurag Sharma
- Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation

- Taiyi Zhao, Yuchun Tang, Qiming Li and Jingquan Wang
- ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems

- Yakub Kayode Saheed, Oluwadamilare Harazeem Abdulganiyu, Kaloma Usman Majikumna, Musa Mustapha and Abebaw Degu Workneh
- Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis

- Midhya Mathew and Faruk Kazi
- A real-time network based anomaly detection in industrial control systems

- Faeze Zare, Payam Mahmoudi-Nasr and Rohollah Yousefpour
- Cybersecurity and cyber-terrorism challenges to energy-related infrastructures – Cybersecurity frameworks and economics – Comprehensive review

- Sampath Kumar Venkatachary, Jagdish Prasad, Annamalai Alagappan, Leo John Baptist Andrews, Raymon Antony Raj and Sarathkumar Duraisamy
- DAR-LFC: A data-driven attack recovery mechanism for Load Frequency Control

- Andrew D. Syrmakesis, Cristina Alcaraz and Nikos D. Hatziargyriou
- A comparison of onshore oil and gas transmission pipeline incident statistics in Canada and the United States

- Y. Shen and W. Zhou
- Impact of space systems capabilities and their role as critical infrastructure

- Mr. Antonio Carlo and Dr. Paola Breda
- Performing risk assessment for critical infrastructure protection: A study of human decision-making and practitioners' transnationalism considerations

- Michalis Papamichael, Christos Dimopoulos, Georgios Boustras and Marios Vryonides
Volume 44, issue C, 2024
- Need for intensive care? A socio-technical systems perspective on water supply failure preparedness in German health care facilities

- Christine Heinzel, Sophie van der Heijden, Aljoscha Mayer, Nathalie Sänger and Simone Sandholz
- Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks

- Nazia Raza and Faegheh Moazeni
- Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review

- Basem A. Alkhaleel
- A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions

- Khushi Jatinkumar Raval, Nilesh Kumar Jadav, Tejal Rathod, Sudeep Tanwar, Vrince Vimal and Nagendar Yamsani
- Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach

- Lazaros Papadopoulos, Konstantinos Demestichas, Eva Muñoz-Navarro, Juan José Hernández-Montesinos, Stephane Paul, Nicolas Museux, Sandra König, Stefan Schauer, Alfonso Climente Alarcón, Israel Perez Llopis, Tim Stelkens-Kobsch, Tamara Hadjina and Jelena Levak
- A comparative study of cyber security intrusion detection in healthcare systems

- Yan Zhang, Degang Zhu, Menglin Wang, Junhan Li and Jie Zhang
- A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms

- Morteza Haghshenas, Rahmat-Allah Hooshmand and Mehdi Gholipour
- A watchdog model for physics-based anomaly detection in digital substations

- Hussam Tarazi, Sara Sutton, John Olinjyk, Benjamin Bond and Julian Rrushi
- Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication

- Jian Chen, Fei Lu, Yuanzhe Liu, Sheng Peng, Zhiming Cai and Fu Mo
| |