International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 50, issue C, 2025
- Securing the nuclear supply chain: Addressing the issue of counterfeiting

- Christopher Hobbs, Zoha Naser and Sarah Tzinieris
- Using Kolmogorov–Arnold network for cyber–physical system security: A fast and efficient approach

- Mohammadmahdi Ghorbani, Alimohammad Ghassemi, Mohammad Alikhani, Hamid Khaloozadeh and Amirhossein Nikoofard
- AI-enhanced intrusion detection in smart renewable energy grids: A novel industry 4.0 cyber threat management approach

- Umar Islam, Hanif Ullah, Naveed Khan, Kashif Saleem and Iftikhar Ahmad
- Transposing EU-legislation on critical infrastructure protection legal implementation performance in the Baltic Sea region

- Marie Becker
- CyberSentry: Enhancing SCADA security through advanced deep learning and optimization strategies

- Alaa O. Khadidos, Adil O. Khadidos, Shitharth Selvarajan, Taher Al-Shehari, Nasser A Alsadhan and Subhav Singh
- Digital twin application in lifecycle security of critical infrastructures: A systematic literature review

- Taru Itäpelto, Mohammed Elhajj and Marten van Sinderen
- Developing a performance assessment tool for building critical infrastructure resilience through Public-Private Partnership in Ghana

- Godslove Ampratwum, Robert Osei-Kyei and Vivian W.Y. Tam
- A cyber-resilient mechanism for detection, classification and mitigation of intrusion on synchrophasor data in power networks

- Soma Bhattacharya, Brundavanam Seshasai, Ebha Koley and Subhojit Ghosh
- SuPOR: A lightweight stream cipher for confidentiality and attack-resilient visual data security in IoT

- Ifeoluwapo Aribilola, Saeed Hamood Alsamhi, John G. Breslin and Mamoona Naveed Asghar
- From breach to bias: Measuring reputation value and trust recovery after cyber incidents in critical infrastructure

- Bonnie Rushing, Shouhuai Xu and Ashley Fairman
- Enhancing cybersecurity in railways: Machine learning approaches for attack detection

- Beatriz Otero Calviño, Eva Rodriguez, Juan José Costa and Mercedes Oriol
- Hardware security modules for sustainable energy systems: Targeted review

- Yehia Ibrahim Alzoubi
- Protection of critical infrastructures in times of peace and war

- Roberto Setola
Volume 49, issue C, 2025
- Semi-asynchronous federated learning-based privacy-preserving intrusion detection for advanced metering infrastructure

- Zhuoqun Xia, Hongmei Zhou, Zhenzhen Hu, Qisheng Jiang and Kaixin Zhou
- Advances in UAV detection: integrating multi-sensor systems and AI for enhanced accuracy and efficiency

- Vladislav Semenyuk, Ildar Kurmashev, Alberto Lupidi, Dmitriy Alyoshin, Liliya Kurmasheva and Alessandro Cantelli-Forti
- Optimizing vehicle security: A multiclassification framework using deep transfer learning and metaheuristic-based genetic algorithm optimization

- Hamad Naeem, Farhan Ullah, Ondrej Krejcar, Deguang Li and Danish Vasan
- Situation Awareness for Cyber Resilience: A review

- Emanuele Bellini, D’Aniello, Giuseppe, Francesco Flammini and Rosario Gaeta
- Assessing earthquake risks to lifeline infrastructure systems in the United States

- N. Simon Kwong and Kishor S. Jaiswal
- SPARK and SAD: Leading-edge deep learning frameworks for robust and effective intrusion detection in SCADA systems

- Raghuram Bhukya, Syed Abdul Moeed, Anusha Medavaka, Alaa O. Khadidos, Adil O. Khadidos and Shitharth Selvarajan
- Measuring spatial accessibility to critical infrastructure: The Access Road Identification model

- Ana Maria Mager Pozo, Peter Priesmeier and Alexander Fekete
- International perspectives on critical infrastructure: Evaluation criteria and definitions

- Edvan Gomes da Silva, Marcus Aurélio Carvalho Georg, Luiz Antônio Ribeiro Júnior, Leonardo Rodrigo Ferreira, Laerte Peotta de Melo and Rafael Rabelo Nunes
- STADe: An unsupervised time-windows method of detecting anomalies in oil and gas Industrial Cyber-Physical Systems (ICPS) networks

- Abubakar Sadiq Mohammed, Eirini Anthi, Omer Rana, Pete Burnap and Andrew Hood
- Evaluating regional emergency response capabilities using entropy weight and matter-element extension theory

- Peijian Jin, Haohao Qu, Pengzhen Fan and Suling Ge
- Resilience in cogeneration systems: Graphical analysis of novel indexes and system behavior under failure scenarios

- Fellipe Sartori da Silva, Thiago Magalhães Lessa and José Alexandre Matelli
- IPSMInfer: Industrial proprietary protocol state machine inference from network traces

- Yahui Yang, Yangyang Geng, Qiang Wei, Rongkuan Ma and Zihan Wei
- Critical entities resilience strengthening tools to small-scale disasters

- David Rehak, Alena Splichalova, Heidi Janeckova, Ondrej Ryska, Alena Oulehlova, Lenka Michalcova, Martin Hromada, Miltiadis Kontogeorgos and Jozef Ristvej
- Interdependencies and supply chain

- Roberto Setola
Volume 48, issue C, 2025
- Simulation of multi-stage attack and defense mechanisms in smart grids

- Ömer Sen, Bozhidar Ivanov, Christian Kloos, Christoph Zöll, Philipp Lutat, Martin Henze, Andreas Ulbig and Michael Andres
- CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B

- Mikaëla Ngamboé, Xiao Niu, Benoit Joly, Steven P. Biegler, Paul Berthier, Rémi Benito, Greg Rice, José M. Fernandez and Gabriela Nicolescu
- Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems

- Seyed Ali Alavi, Hamed Pourvali Moghadam and Amir Hossein Jahangir
- An efficient convolutional neural network based attack detection for smart grid in 5G-IOT

- Sheeja Rani S, Mostafa F. Shaaban and Abdelfatah Ali
- Artificial immunity-based energy theft detection for advanced metering infrastructures

- Jie Fu, Chengxi Yang, Yuxuan Liu, Kunsan Zhang, Jiaqi Li and Beibei Li
- OptAML: Optimized adversarial machine learning on water treatment and distribution systems

- Mustafa Sinasi Ayas, Enis Kara, Selen Ayas and Ali Kivanc Sahin
- Modeling flood propagation and cascading failures in interdependent transportation and stormwater networks

- H M Imran Kays, Arif Mohaimin Sadri, "Muralee" Muraleetharan, K.K., P. Scott Harvey and Gerald A. Miller
- Interdependencies and third parties

- Roberto Setola
Volume 47, issue C, 2024
- Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city

- Ying Lu, Qingling Wang, Shiyu Huang, Wenhui Yu and Shuyue Yao
- Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator

- Darshana Upadhyay, Sagarika Ghosh, Hiroyuki Ohno, Marzia Zaman and Srinivas Sampalli
- Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea

- Young Hwan Choi, Do Guen Yoo, Pill Jae Kwak, Hyung Do Kim, Jungsu Park, Jaehyeoung Park and Younghan Yoon
- Evaluation of SDN security measures in the context of IEC 62443-3-3

- Georgios Michail Makrakis, Dakota Roberson, Constantinos Kolias and Dallin Cook
- Obfuscation strategies for industrial control systems

- Vittoria Cozza, Mila Dalla Preda, Ruggero Lanotte, Marco Lucchese, Massimo Merro and Nicola Zannone
- An AutoML-based security defender for industrial control systems

- Danish Vasan, Ebtesam Jubran S. Alqahtani, Mohammad Hammoudeh and Adel F. Ahmed
- Process-aware security monitoring in industrial control systems: A systematic review and future directions

- Muaan ur Rehman and Hayretdin Bahşi
- SIRT: A distinctive and smart invasion recognition tool (SIRT) for defending IoT integrated ICS from cyber-attacks

- M.S. Kavitha, G. Sumathy, B. Sarala, J. Jasmine Hephzipah, R. Dhanalakshmi and T.D. Subha
- Digital Twin-assisted anomaly detection for industrial scenarios

- Cristina Alcaraz and Javier Lopez
- Impact of Internet and mobile communication on cyber resilience: A multivariate adaptive regression spline modeling approach

- Serhiy Lyeonov, Wadim Strielkowski, Vitaliia Koibichuk and Serhii Drozd
- A tri-level optimization model for interdependent infrastructure network resilience against compound hazard events

- Matthew R. Oster, Ilya Amburg, Samrat Chatterjee, Daniel A. Eisenberg, Dennis G. Thomas, Feng Pan and Auroop R. Ganguly
- Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions

- Shah Khalid Khan, Nirajan Shiwakoti, Abebe Diro, Alemayehu Molla, Iqbal Gondal and Matthew Warren
- FingerCI: Writing industrial process specifications from network traffic

- Filipe Apolinário, Nelson Escravana, Éric Hervé, Miguel L. Pardal and Miguel Correia
- Optimized unmanned aerial vehicle pathway system in disaster resilience network

- Yi-Wei Ma and Desti Syuhada
- Physical threats vs Cyber threats

- Roberto Setola
| |