International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 43, issue C, 2023
- A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction

- Jiarui Chen, Yiqin Lu, Yang Zhang, Fang Huang and Jiancheng Qin
- Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem

- Itzhak Aviv and Uri Ferri
- Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network

- Armin Aalirezaei, Dr. Golam Kabir and Md Saiful Arif Khan
- Modeling and assessing seismic resilience leveraging systems dynamic approach: A case study of society 5.0

- Shohreh Moradi, Md Muzahid Khan, Niamat Ullah Ibne Hossain, Mohammad Shamsuddoha and Alex Gorod
- An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space

- Georgios Kavallieratos and Sokratis Katsikas
- Ensuring the longevity of WirelessHART devices in industrial automation and control systems using distinct native attribute fingerprinting

- Matthew J. Maier, Hunter S. Hayden, Michael A. Temple and Matthew C. Fickus
- A systematic co-engineering of safety and security analysis in requirements engineering process

- Sejin Jung, Junbeom Yoo and Sam Malek
- Measurement protection to prevent cyber–physical attacks against power system State Estimation

- Harag Margossian, Ronald Kfouri and Rita Saliba
Volume 42, issue C, 2023
- Rule-based anomaly detection for railway signalling networks

- Markus Heinrich, Arwed Gölz, Tolga Arul and Stefan Katzenbeisser
- Protocol study and anomaly detection for server-driven traffic in SCADA networks

- Chih-Yuan Lin and Simin Nadjm-Tehrani
- A forensics and compliance auditing framework for critical infrastructure protection

- João Henriques, Filipe Caldeira, Tiago Cruz and Paulo Simões
- Assessing the comprehensive importance of power grid nodes based on DEA

- Xin Gao, Yunxia Ye, Wenxin Su and Linyan Chen
- Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey

- Xabier Etxezarreta, Iñaki Garitano, Mikel Iturbe and Urko Zurutuza
- A multi-criteria framework for critical infrastructure systems resilience

- Zhuyu Yang, Bruno Barroca, Katia Laffréchine, Alexandre Weppe, Aurélia Bony-Dandrieux and Nicolas Daclin
- Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems

- Paola Vargas and Iris Tien
- A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE

- Matthew Boeding, Michael Hempel, Hamid Sharif, Juan Lopez and Kalyan Perumalla
- AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications

- Suleman Khan, Gurjot Singh Gaba, An Braeken, Pardeep Kumar and Andrei Gurtov
- CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks

- Ali Ahmadian Ramaki, Abbas Ghaemi-Bafghi and Abbas Rasoolzadegan
- Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990–2018

- Jennifer S. Holmes, Agustin Palao, Mercedez Callenes, Neil Ortiz Silva and Alvaro Cardenas
- Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering

- Mohamed Salama, Wael El-Dakhakhni and Michael Tait
- Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies

- Achara Tiong and Hector A. Vergara
- National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage

- Tolga Ahmet Gülcan and Kadir Emrah Erginer
Volume 41, issue C, 2023
- Vulnerable underground entrance understanding for visual surveillance systems

- Luping Wang, Hui Wei and Yun Hao
- Vulnerability analysis of urban road networks based on traffic situation

- Ziqi Wang, Yulong Pei, Jing Liu and Hehang Liu
- A review on effective alarm management systems for industrial process control: Barriers and opportunities

- Faizan E Mustafa, Ijaz Ahmed, Abdul Basit, Um-E-Habiba Alvi, Saddam Hussain Malik, Atif Mahmood and Paghunda Roheela Ali
- Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)

- Wensheng Wang, Faezeh Karimi, Kaveh Khalilpour, David Green and Manos Varvarigos
- A threat modeling language for generating attack graphs of substation automation systems

- Engla Rencelj Ling and Mathias Ekstedt
- A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch

- Shuliang Wang and Qiqi Dong
Volume 40, issue C, 2023
- A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid

- Kübra Bitirgen and Ümmühan Başaran Filik
- Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes

- Shuliang Wang, Jingya Sun, Jianhua Zhang, Qiqi Dong, Xifeng Gu and Chen Chen
- Critical link identification algorithm for power communication networks in SDN architecture

- Bing Fan, Hongtao Tan and Yaqun Li
- Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems

- James Ashworth, Jason Staggs and Sujeet Shenoi
- A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power–water networks under disruption

- Achara Tiong and Hector A. Vergara
Volume 39, issue C, 2022
- Physical performance of power grids against earthquakes: from framework to implementation

- Mohsen Ghafory-Ashtiany and Mahban Arghavani
- Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review

- Godslove Ampratwum, Robert Osei-Kyei and Vivian W.Y. Tam
- Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features

- Manikant Panthi and Tanmoy Kanti Das
- Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms

- Ayesha Rahman, Ghulam Mustafa, Abdul Qayyum Khan, Muhammad Abid and Muhammad Hanif Durad
- Mitigation of the impact of disturbances in gas transmission systems

- Ivars Zalitis, Aleksandrs Dolgicers, Laila Zemite, Sebastian Ganter, Vytis Kopustinskas, Bogdan Vamanu, Jörg Finger, Clemente Fuggini, Ilmars Bode, Jevgenijs Kozadajevs and Ivo Häring
- Identifying critical and vulnerable links: A new approach using the Fisher information matrix

- Beatriz Martinez-Pastor, Maria Nogal, O’Connor, Alan and Rui Teixeira
- Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis

- Victor Bolbot, Ketki Kulkarni, Päivi Brunou, Osiris Valdez Banda and Mashrura Musharraf
- The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints

- Johnathon D. Huff, William B. Leonard and Hugh R. Medal
- Feasibility of critical infrastructure protection using network functions for programmable and decoupled ICS policy enforcement over WAN

- Stuart M. Baxley, Nicholas Bastin, Deniz Gurkan and William Arthur Conklin
Volume 38, issue C, 2022
- Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

- Muhammad Azmi Umer, Khurum Nazir Junejo, Muhammad Taha Jilani and Aditya P. Mathur
- The digital divide in state vulnerability to submarine communications cable failure

- Jonas Franken, Thomas Reinhold, Lilian Reichert and Christian Reuter
- The drift of industrial control systems to pseudo security

- Peter Donnelly, Mabrouka Abuhmida and Christopher Tubb
- Vulnerability assessment of urban road traffic systems based on traffic flow

- Shuliang Wang, Chen Chen, Jianhua Zhang, Xifeng Gu and Xiaodi Huang
- A novel deep learning based security assessment framework for enhanced security in swarm network environment

- Zhiqiang Liu, Mohi-ud-din Ghulam, Jiangbin Zheng, Sifei Wang and Asim Muhammad
- Cyber-attacks detection in industrial systems using artificial intelligence-driven methods

- Wu Wang, Fouzi Harrou, Benamar Bouyeddou, Sidi-Mohammed Senouci and Ying Sun
- Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects

- Tarek Berghout, Mohamed Benbouzid and S.M. Muyeen
- Security in Digital Aeronautical Communications A Comprehensive Gap Analysis

- Nils Mäurer, Tobias Guggemos, Thomas Ewert, Thomas Gräupl, Corinna Schmitt and Sophia Grundner-Culemann
- A taxonomy of IoT firmware security and principal firmware analysis techniques

- Ibrahim Nadir, Haroon Mahmood and Ghalib Asadullah
- Physical layer protection for ADS-B against spoofing and jamming

- Saulius Rudys, Jurgis Aleksandravicius, Rimvydas Aleksiejunas, Andriy Konovaltsev, Chen Zhu and Lukasz Greda
- A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems

- Jun Yang, Leixiong Huang, Haoming Ma, Zhihui Xu, Ming Yang and Shaoqiang Guo
| |