International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 41, issue C, 2023
- Vulnerable underground entrance understanding for visual surveillance systems

- Luping Wang, Hui Wei and Yun Hao
- Vulnerability analysis of urban road networks based on traffic situation

- Ziqi Wang, Yulong Pei, Jing Liu and Hehang Liu
- A review on effective alarm management systems for industrial process control: Barriers and opportunities

- Faizan E Mustafa, Ijaz Ahmed, Abdul Basit, Um-E-Habiba Alvi, Saddam Hussain Malik, Atif Mahmood and Paghunda Roheela Ali
- Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)

- Wensheng Wang, Faezeh Karimi, Kaveh Khalilpour, David Green and Manos Varvarigos
- A threat modeling language for generating attack graphs of substation automation systems

- Engla Rencelj Ling and Mathias Ekstedt
- A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch

- Shuliang Wang and Qiqi Dong
Volume 40, issue C, 2023
- A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid

- Kübra Bitirgen and Ümmühan Başaran Filik
- Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes

- Shuliang Wang, Jingya Sun, Jianhua Zhang, Qiqi Dong, Xifeng Gu and Chen Chen
- Critical link identification algorithm for power communication networks in SDN architecture

- Bing Fan, Hongtao Tan and Yaqun Li
- Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems

- James Ashworth, Jason Staggs and Sujeet Shenoi
- A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power–water networks under disruption

- Achara Tiong and Hector A. Vergara
Volume 39, issue C, 2022
- Physical performance of power grids against earthquakes: from framework to implementation

- Mohsen Ghafory-Ashtiany and Mahban Arghavani
- Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review

- Godslove Ampratwum, Robert Osei-Kyei and Vivian W.Y. Tam
- Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features

- Manikant Panthi and Tanmoy Kanti Das
- Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms

- Ayesha Rahman, Ghulam Mustafa, Abdul Qayyum Khan, Muhammad Abid and Muhammad Hanif Durad
- Mitigation of the impact of disturbances in gas transmission systems

- Ivars Zalitis, Aleksandrs Dolgicers, Laila Zemite, Sebastian Ganter, Vytis Kopustinskas, Bogdan Vamanu, Jörg Finger, Clemente Fuggini, Ilmars Bode, Jevgenijs Kozadajevs and Ivo Häring
- Identifying critical and vulnerable links: A new approach using the Fisher information matrix

- Beatriz Martinez-Pastor, Maria Nogal, O’Connor, Alan and Rui Teixeira
- Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis

- Victor Bolbot, Ketki Kulkarni, Päivi Brunou, Osiris Valdez Banda and Mashrura Musharraf
- The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints

- Johnathon D. Huff, William B. Leonard and Hugh R. Medal
- Feasibility of critical infrastructure protection using network functions for programmable and decoupled ICS policy enforcement over WAN

- Stuart M. Baxley, Nicholas Bastin, Deniz Gurkan and William Arthur Conklin
Volume 38, issue C, 2022
- Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

- Muhammad Azmi Umer, Khurum Nazir Junejo, Muhammad Taha Jilani and Aditya P. Mathur
- The digital divide in state vulnerability to submarine communications cable failure

- Jonas Franken, Thomas Reinhold, Lilian Reichert and Christian Reuter
- The drift of industrial control systems to pseudo security

- Peter Donnelly, Mabrouka Abuhmida and Christopher Tubb
- Vulnerability assessment of urban road traffic systems based on traffic flow

- Shuliang Wang, Chen Chen, Jianhua Zhang, Xifeng Gu and Xiaodi Huang
- A novel deep learning based security assessment framework for enhanced security in swarm network environment

- Zhiqiang Liu, Mohi-ud-din Ghulam, Jiangbin Zheng, Sifei Wang and Asim Muhammad
- Cyber-attacks detection in industrial systems using artificial intelligence-driven methods

- Wu Wang, Fouzi Harrou, Benamar Bouyeddou, Sidi-Mohammed Senouci and Ying Sun
- Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects

- Tarek Berghout, Mohamed Benbouzid and S.M. Muyeen
- Security in Digital Aeronautical Communications A Comprehensive Gap Analysis

- Nils Mäurer, Tobias Guggemos, Thomas Ewert, Thomas Gräupl, Corinna Schmitt and Sophia Grundner-Culemann
- A taxonomy of IoT firmware security and principal firmware analysis techniques

- Ibrahim Nadir, Haroon Mahmood and Ghalib Asadullah
- Physical layer protection for ADS-B against spoofing and jamming

- Saulius Rudys, Jurgis Aleksandravicius, Rimvydas Aleksiejunas, Andriy Konovaltsev, Chen Zhu and Lukasz Greda
- A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems

- Jun Yang, Leixiong Huang, Haoming Ma, Zhihui Xu, Ming Yang and Shaoqiang Guo
Volume 37, issue C, 2022
- Bayesian games for the cybersecurity of nuclear power plants

- Lee T. Maccarone and Daniel G. Cole
- A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems

- Alexander Staves, Tom Anderson, Harry Balderstone, Benjamin Green, Antonios Gouglidis and David Hutchison
- FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid

- Seyed Hossein Majidi, Shahrzad Hadayeghparast and Hadis Karimipour
- Load-altering attack detection on smart grid using functional observers

- Álan e Sousa, Nadhir Messai and Noureddine Manamanni
- APT attacks on industrial control systems: A tale of three incidents

- Rajesh Kumar, Rohan Kela, Siddhant Singh and Rolando Trujillo-Rasua
- Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis

- Sang Min Han, Chanyoung Lee and Poong Hyun Seong
- VetaDetect: Vehicle tampering detection with closed-loop model ensemble

- Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero and Georgios Fontaras
- Digital transformation of the maritime industry: A cybersecurity systemic approach

- Evripidis P. Kechagias, Georgios Chatzistelios, Georgios A. Papadopoulos and Panagiotis Apostolou
- SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair

- Meysam Valueian, Mojtaba Vahidi-Asl and Alireza Khalilian
- An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace

- Busyairah Syd Ali, Sam Saji and Moon Ting Su
Volume 36, issue C, 2022
- On the component resilience importance measures for infrastructure systems

- Ruiying Li and Ying Gao
- Effect of adding physical links on the robustness of the Internet modeled as a physical–logical interdependent network using simple strategies

- Ivana Bachmann, Valeria Valdés, Javier Bustos-Jiménez and Benjamin Bustos
- An evaluation framework for industrial control system cyber incidents

- Mahdi Daghmehchi Firoozjaei, Nastaran Mahmoudyar, Yaser Baseri and Ali A. Ghorbani
- Defensive cost–benefit analysis of smart grid digital functionalities

- Jim Stright, Peter Cheetham and Charalambos Konstantinou
- Flood risk assessment and application of risk curves for design of mitigation strategies

- Ning Zhang and Alice Alipour
- A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks

- Shun Chen, Xudong Zhao, Zhilong Chen, Benwei Hou and Yipeng Wu
- Cyber-threat landscape of border control infrastructures

- Petros Chatzis and Eliana Stavrou
- Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus

- Livinus Obiora Nweke, Goitom K. Weldehawaryat and Stephen D. Wolthusen
- Risk assessment and mitigation for electric power sectors: A developing country's perspective

- Obaid ur Rehman, Yousaf Ali and Muhammad Sabir
| |