International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 51, issue C, 2025
- Threat model for IEC 61850 based substation automation system

- Mihael Marović, Ante Đerek, Stjepan Groš and Ivan Kovačević
- How interdependent coupling affects the resilience of urban critical infrastructure(UCI)

- Li Guo, Jianing Hu, Mengjuan Luo, Shihao Ren, Xiaobin Dong and Pengcheng Li
- Vulnerability assessment of interdependent road-power networks with probability-based coupling strategies

- Qiaojun Guo, Xin Gao, Damin Dong and Guangtai Zhang
- Resilience of interdependent infrastructure networks: Review and future directions

- Wenjing Tong, Hong Xian Li, Farnad Nasirzadeh, Fuyi Yao and Yingbo Ji
- Dynamic optimization of multi-layered defenses inspired by Chakravyuh

- Kishore Dutta
- A novel data–intelligence–driven three–stage dynamic model for resilience assessment in an emergency material support system

- Weilan Suo, Wenjie Xu, Longfei Li and Xiaolei Sun
- Developing security metrics for space systems: A study considering the NIST Cybersecurity Framework 2.0 and the NIS2

- Francesco Casaril and Letterio Galletta
- Securing cyber-physical systems: Attack detection and isolation in power grid AGC

- Muhammad Asim Abbasi, Aadil Sarwar Khan, Shiping Huang, Mansoor Zahoor Qadri and Li Guo
- Securing the future: Integrating quantum computing and digital twin technologies into modern power & transportation systems for resilient smart cities against false data injection cyberattacks

- Ehsan Naderi
- From antagonisms to synergies: A systematic review of safety-security interrelations

- Verena Zimmermann, Linda Fanconi, Hannah Sievers, Yanis Isenring, Lisa Zankel and Marita Unden
- Quantification of seismic resilience of water distribution networks considering interdependency using Dempster-Shafer theory

- Z. Zarebidaki and B. Omidvar
- Identifying cyber attack vulnerabilities in the main lubricating oil system of marine propulsion units

- Yigit Gülmez, Olgun Konur, Muhammed Erbas and Sanja Bauk
- Bridging technical and social dimensions in critical infrastructure accessibility assessment: A case study from Chile

- Marta Contreras, Alondra Chamorro, Trinidad Gómez, Tomás Echaveguren and María Molinos-Senante
- Robust trust management in Intelligent Transportation System: A machine learning approach

- Ahmed Danladi Abdullahi, Erfan Bahrami, Tooska Dargahi, Mohammed Al-Khalidi and Mohammad Hammoudeh
- Feature extraction and selection for flooding-based multi-class DDoS attacks detection in IoT network

- Hayelom Gebrye, Yong Wang, Fagen Li and Birhanu Kahsay
- Operational technologies is the blend spot of the critical Infrastrutcturte

- Roberto Setola
Volume 50, issue C, 2025
- Securing the nuclear supply chain: Addressing the issue of counterfeiting

- Christopher Hobbs, Zoha Naser and Sarah Tzinieris
- Using Kolmogorov–Arnold network for cyber–physical system security: A fast and efficient approach

- Mohammadmahdi Ghorbani, Alimohammad Ghassemi, Mohammad Alikhani, Hamid Khaloozadeh and Amirhossein Nikoofard
- AI-enhanced intrusion detection in smart renewable energy grids: A novel industry 4.0 cyber threat management approach

- Umar Islam, Hanif Ullah, Naveed Khan, Kashif Saleem and Iftikhar Ahmad
- Transposing EU-legislation on critical infrastructure protection legal implementation performance in the Baltic Sea region

- Marie Becker
- CyberSentry: Enhancing SCADA security through advanced deep learning and optimization strategies

- Alaa O. Khadidos, Adil O. Khadidos, Shitharth Selvarajan, Taher Al-Shehari, Nasser A Alsadhan and Subhav Singh
- Digital twin application in lifecycle security of critical infrastructures: A systematic literature review

- Taru Itäpelto, Mohammed Elhajj and Marten van Sinderen
- Developing a performance assessment tool for building critical infrastructure resilience through Public-Private Partnership in Ghana

- Godslove Ampratwum, Robert Osei-Kyei and Vivian W.Y. Tam
- A cyber-resilient mechanism for detection, classification and mitigation of intrusion on synchrophasor data in power networks

- Soma Bhattacharya, Brundavanam Seshasai, Ebha Koley and Subhojit Ghosh
- SuPOR: A lightweight stream cipher for confidentiality and attack-resilient visual data security in IoT

- Ifeoluwapo Aribilola, Saeed Hamood Alsamhi, John G. Breslin and Mamoona Naveed Asghar
- From breach to bias: Measuring reputation value and trust recovery after cyber incidents in critical infrastructure

- Bonnie Rushing, Shouhuai Xu and Ashley Fairman
- Enhancing cybersecurity in railways: Machine learning approaches for attack detection

- Beatriz Otero Calviño, Eva Rodriguez, Juan José Costa and Mercedes Oriol
- Hardware security modules for sustainable energy systems: Targeted review

- Yehia Ibrahim Alzoubi
- Protection of critical infrastructures in times of peace and war

- Roberto Setola
Volume 49, issue C, 2025
- Semi-asynchronous federated learning-based privacy-preserving intrusion detection for advanced metering infrastructure

- Zhuoqun Xia, Hongmei Zhou, Zhenzhen Hu, Qisheng Jiang and Kaixin Zhou
- Advances in UAV detection: integrating multi-sensor systems and AI for enhanced accuracy and efficiency

- Vladislav Semenyuk, Ildar Kurmashev, Alberto Lupidi, Dmitriy Alyoshin, Liliya Kurmasheva and Alessandro Cantelli-Forti
- Optimizing vehicle security: A multiclassification framework using deep transfer learning and metaheuristic-based genetic algorithm optimization

- Hamad Naeem, Farhan Ullah, Ondrej Krejcar, Deguang Li and Danish Vasan
- Situation Awareness for Cyber Resilience: A review

- Emanuele Bellini, D’Aniello, Giuseppe, Francesco Flammini and Rosario Gaeta
- Assessing earthquake risks to lifeline infrastructure systems in the United States

- N. Simon Kwong and Kishor S. Jaiswal
- SPARK and SAD: Leading-edge deep learning frameworks for robust and effective intrusion detection in SCADA systems

- Raghuram Bhukya, Syed Abdul Moeed, Anusha Medavaka, Alaa O. Khadidos, Adil O. Khadidos and Shitharth Selvarajan
- Measuring spatial accessibility to critical infrastructure: The Access Road Identification model

- Ana Maria Mager Pozo, Peter Priesmeier and Alexander Fekete
- International perspectives on critical infrastructure: Evaluation criteria and definitions

- Edvan Gomes da Silva, Marcus Aurélio Carvalho Georg, Luiz Antônio Ribeiro Júnior, Leonardo Rodrigo Ferreira, Laerte Peotta de Melo and Rafael Rabelo Nunes
- STADe: An unsupervised time-windows method of detecting anomalies in oil and gas Industrial Cyber-Physical Systems (ICPS) networks

- Abubakar Sadiq Mohammed, Eirini Anthi, Omer Rana, Pete Burnap and Andrew Hood
- Evaluating regional emergency response capabilities using entropy weight and matter-element extension theory

- Peijian Jin, Haohao Qu, Pengzhen Fan and Suling Ge
- Resilience in cogeneration systems: Graphical analysis of novel indexes and system behavior under failure scenarios

- Fellipe Sartori da Silva, Thiago Magalhães Lessa and José Alexandre Matelli
- IPSMInfer: Industrial proprietary protocol state machine inference from network traces

- Yahui Yang, Yangyang Geng, Qiang Wei, Rongkuan Ma and Zihan Wei
- Critical entities resilience strengthening tools to small-scale disasters

- David Rehak, Alena Splichalova, Heidi Janeckova, Ondrej Ryska, Alena Oulehlova, Lenka Michalcova, Martin Hromada, Miltiadis Kontogeorgos and Jozef Ristvej
- Interdependencies and supply chain

- Roberto Setola
Volume 48, issue C, 2025
- Simulation of multi-stage attack and defense mechanisms in smart grids

- Ömer Sen, Bozhidar Ivanov, Christian Kloos, Christoph Zöll, Philipp Lutat, Martin Henze, Andreas Ulbig and Michael Andres
- CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B

- Mikaëla Ngamboé, Xiao Niu, Benoit Joly, Steven P. Biegler, Paul Berthier, Rémi Benito, Greg Rice, José M. Fernandez and Gabriela Nicolescu
- Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems

- Seyed Ali Alavi, Hamed Pourvali Moghadam and Amir Hossein Jahangir
- An efficient convolutional neural network based attack detection for smart grid in 5G-IOT

- Sheeja Rani S, Mostafa F. Shaaban and Abdelfatah Ali
- Artificial immunity-based energy theft detection for advanced metering infrastructures

- Jie Fu, Chengxi Yang, Yuxuan Liu, Kunsan Zhang, Jiaqi Li and Beibei Li
- OptAML: Optimized adversarial machine learning on water treatment and distribution systems

- Mustafa Sinasi Ayas, Enis Kara, Selen Ayas and Ali Kivanc Sahin
- Modeling flood propagation and cascading failures in interdependent transportation and stormwater networks

- H M Imran Kays, Arif Mohaimin Sadri, "Muralee" Muraleetharan, K.K., P. Scott Harvey and Gerald A. Miller
- Interdependencies and third parties

- Roberto Setola
| |