International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 42, issue C, 2023
- Rule-based anomaly detection for railway signalling networks

- Markus Heinrich, Arwed Gölz, Tolga Arul and Stefan Katzenbeisser
- Protocol study and anomaly detection for server-driven traffic in SCADA networks

- Chih-Yuan Lin and Simin Nadjm-Tehrani
- A forensics and compliance auditing framework for critical infrastructure protection

- João Henriques, Filipe Caldeira, Tiago Cruz and Paulo Simões
- Assessing the comprehensive importance of power grid nodes based on DEA

- Xin Gao, Yunxia Ye, Wenxin Su and Linyan Chen
- Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey

- Xabier Etxezarreta, Iñaki Garitano, Mikel Iturbe and Urko Zurutuza
- A multi-criteria framework for critical infrastructure systems resilience

- Zhuyu Yang, Bruno Barroca, Katia Laffréchine, Alexandre Weppe, Aurélia Bony-Dandrieux and Nicolas Daclin
- Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems

- Paola Vargas and Iris Tien
- A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE

- Matthew Boeding, Michael Hempel, Hamid Sharif, Juan Lopez and Kalyan Perumalla
- AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications

- Suleman Khan, Gurjot Singh Gaba, An Braeken, Pardeep Kumar and Andrei Gurtov
- CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks

- Ali Ahmadian Ramaki, Abbas Ghaemi-Bafghi and Abbas Rasoolzadegan
- Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990–2018

- Jennifer S. Holmes, Agustin Palao, Mercedez Callenes, Neil Ortiz Silva and Alvaro Cardenas
- Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering

- Mohamed Salama, Wael El-Dakhakhni and Michael Tait
- Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies

- Achara Tiong and Hector A. Vergara
- National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage

- Tolga Ahmet Gülcan and Kadir Emrah Erginer
Volume 41, issue C, 2023
- Vulnerable underground entrance understanding for visual surveillance systems

- Luping Wang, Hui Wei and Yun Hao
- Vulnerability analysis of urban road networks based on traffic situation

- Ziqi Wang, Yulong Pei, Jing Liu and Hehang Liu
- A review on effective alarm management systems for industrial process control: Barriers and opportunities

- Faizan E Mustafa, Ijaz Ahmed, Abdul Basit, Um-E-Habiba Alvi, Saddam Hussain Malik, Atif Mahmood and Paghunda Roheela Ali
- Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)

- Wensheng Wang, Faezeh Karimi, Kaveh Khalilpour, David Green and Manos Varvarigos
- A threat modeling language for generating attack graphs of substation automation systems

- Engla Rencelj Ling and Mathias Ekstedt
- A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch

- Shuliang Wang and Qiqi Dong
Volume 40, issue C, 2023
- A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid

- Kübra Bitirgen and Ümmühan Başaran Filik
- Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes

- Shuliang Wang, Jingya Sun, Jianhua Zhang, Qiqi Dong, Xifeng Gu and Chen Chen
- Critical link identification algorithm for power communication networks in SDN architecture

- Bing Fan, Hongtao Tan and Yaqun Li
- Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems

- James Ashworth, Jason Staggs and Sujeet Shenoi
- A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power–water networks under disruption

- Achara Tiong and Hector A. Vergara
Volume 39, issue C, 2022
- Physical performance of power grids against earthquakes: from framework to implementation

- Mohsen Ghafory-Ashtiany and Mahban Arghavani
- Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review

- Godslove Ampratwum, Robert Osei-Kyei and Vivian W.Y. Tam
- Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features

- Manikant Panthi and Tanmoy Kanti Das
- Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms

- Ayesha Rahman, Ghulam Mustafa, Abdul Qayyum Khan, Muhammad Abid and Muhammad Hanif Durad
- Mitigation of the impact of disturbances in gas transmission systems

- Ivars Zalitis, Aleksandrs Dolgicers, Laila Zemite, Sebastian Ganter, Vytis Kopustinskas, Bogdan Vamanu, Jörg Finger, Clemente Fuggini, Ilmars Bode, Jevgenijs Kozadajevs and Ivo Häring
- Identifying critical and vulnerable links: A new approach using the Fisher information matrix

- Beatriz Martinez-Pastor, Maria Nogal, O’Connor, Alan and Rui Teixeira
- Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis

- Victor Bolbot, Ketki Kulkarni, Päivi Brunou, Osiris Valdez Banda and Mashrura Musharraf
- The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints

- Johnathon D. Huff, William B. Leonard and Hugh R. Medal
- Feasibility of critical infrastructure protection using network functions for programmable and decoupled ICS policy enforcement over WAN

- Stuart M. Baxley, Nicholas Bastin, Deniz Gurkan and William Arthur Conklin
Volume 38, issue C, 2022
- Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

- Muhammad Azmi Umer, Khurum Nazir Junejo, Muhammad Taha Jilani and Aditya P. Mathur
- The digital divide in state vulnerability to submarine communications cable failure

- Jonas Franken, Thomas Reinhold, Lilian Reichert and Christian Reuter
- The drift of industrial control systems to pseudo security

- Peter Donnelly, Mabrouka Abuhmida and Christopher Tubb
- Vulnerability assessment of urban road traffic systems based on traffic flow

- Shuliang Wang, Chen Chen, Jianhua Zhang, Xifeng Gu and Xiaodi Huang
- A novel deep learning based security assessment framework for enhanced security in swarm network environment

- Zhiqiang Liu, Mohi-ud-din Ghulam, Jiangbin Zheng, Sifei Wang and Asim Muhammad
- Cyber-attacks detection in industrial systems using artificial intelligence-driven methods

- Wu Wang, Fouzi Harrou, Benamar Bouyeddou, Sidi-Mohammed Senouci and Ying Sun
- Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects

- Tarek Berghout, Mohamed Benbouzid and S.M. Muyeen
- Security in Digital Aeronautical Communications A Comprehensive Gap Analysis

- Nils Mäurer, Tobias Guggemos, Thomas Ewert, Thomas Gräupl, Corinna Schmitt and Sophia Grundner-Culemann
- A taxonomy of IoT firmware security and principal firmware analysis techniques

- Ibrahim Nadir, Haroon Mahmood and Ghalib Asadullah
- Physical layer protection for ADS-B against spoofing and jamming

- Saulius Rudys, Jurgis Aleksandravicius, Rimvydas Aleksiejunas, Andriy Konovaltsev, Chen Zhu and Lukasz Greda
- A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems

- Jun Yang, Leixiong Huang, Haoming Ma, Zhihui Xu, Ming Yang and Shaoqiang Guo
Volume 37, issue C, 2022
- Bayesian games for the cybersecurity of nuclear power plants

- Lee T. Maccarone and Daniel G. Cole
- A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems

- Alexander Staves, Tom Anderson, Harry Balderstone, Benjamin Green, Antonios Gouglidis and David Hutchison
- FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid

- Seyed Hossein Majidi, Shahrzad Hadayeghparast and Hadis Karimipour
- Load-altering attack detection on smart grid using functional observers

- Álan e Sousa, Nadhir Messai and Noureddine Manamanni
- APT attacks on industrial control systems: A tale of three incidents

- Rajesh Kumar, Rohan Kela, Siddhant Singh and Rolando Trujillo-Rasua
- Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis

- Sang Min Han, Chanyoung Lee and Poong Hyun Seong
- VetaDetect: Vehicle tampering detection with closed-loop model ensemble

- Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero and Georgios Fontaras
- Digital transformation of the maritime industry: A cybersecurity systemic approach

- Evripidis P. Kechagias, Georgios Chatzistelios, Georgios A. Papadopoulos and Panagiotis Apostolou
- SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair

- Meysam Valueian, Mojtaba Vahidi-Asl and Alireza Khalilian
- An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace

- Busyairah Syd Ali, Sam Saji and Moon Ting Su
| |