International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 39, issue C, 2022
- Physical performance of power grids against earthquakes: from framework to implementation

- Mohsen Ghafory-Ashtiany and Mahban Arghavani
- Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review

- Godslove Ampratwum, Robert Osei-Kyei and Vivian W.Y. Tam
- Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features

- Manikant Panthi and Tanmoy Kanti Das
- Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms

- Ayesha Rahman, Ghulam Mustafa, Abdul Qayyum Khan, Muhammad Abid and Muhammad Hanif Durad
- Mitigation of the impact of disturbances in gas transmission systems

- Ivars Zalitis, Aleksandrs Dolgicers, Laila Zemite, Sebastian Ganter, Vytis Kopustinskas, Bogdan Vamanu, Jörg Finger, Clemente Fuggini, Ilmars Bode, Jevgenijs Kozadajevs and Ivo Häring
- Identifying critical and vulnerable links: A new approach using the Fisher information matrix

- Beatriz Martinez-Pastor, Maria Nogal, O’Connor, Alan and Rui Teixeira
- Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis

- Victor Bolbot, Ketki Kulkarni, Päivi Brunou, Osiris Valdez Banda and Mashrura Musharraf
- The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints

- Johnathon D. Huff, William B. Leonard and Hugh R. Medal
- Feasibility of critical infrastructure protection using network functions for programmable and decoupled ICS policy enforcement over WAN

- Stuart M. Baxley, Nicholas Bastin, Deniz Gurkan and William Arthur Conklin
Volume 38, issue C, 2022
- Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations

- Muhammad Azmi Umer, Khurum Nazir Junejo, Muhammad Taha Jilani and Aditya P. Mathur
- The digital divide in state vulnerability to submarine communications cable failure

- Jonas Franken, Thomas Reinhold, Lilian Reichert and Christian Reuter
- The drift of industrial control systems to pseudo security

- Peter Donnelly, Mabrouka Abuhmida and Christopher Tubb
- Vulnerability assessment of urban road traffic systems based on traffic flow

- Shuliang Wang, Chen Chen, Jianhua Zhang, Xifeng Gu and Xiaodi Huang
- A novel deep learning based security assessment framework for enhanced security in swarm network environment

- Zhiqiang Liu, Mohi-ud-din Ghulam, Jiangbin Zheng, Sifei Wang and Asim Muhammad
- Cyber-attacks detection in industrial systems using artificial intelligence-driven methods

- Wu Wang, Fouzi Harrou, Benamar Bouyeddou, Sidi-Mohammed Senouci and Ying Sun
- Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects

- Tarek Berghout, Mohamed Benbouzid and S.M. Muyeen
- Security in Digital Aeronautical Communications A Comprehensive Gap Analysis

- Nils Mäurer, Tobias Guggemos, Thomas Ewert, Thomas Gräupl, Corinna Schmitt and Sophia Grundner-Culemann
- A taxonomy of IoT firmware security and principal firmware analysis techniques

- Ibrahim Nadir, Haroon Mahmood and Ghalib Asadullah
- Physical layer protection for ADS-B against spoofing and jamming

- Saulius Rudys, Jurgis Aleksandravicius, Rimvydas Aleksiejunas, Andriy Konovaltsev, Chen Zhu and Lukasz Greda
- A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems

- Jun Yang, Leixiong Huang, Haoming Ma, Zhihui Xu, Ming Yang and Shaoqiang Guo
Volume 37, issue C, 2022
- Bayesian games for the cybersecurity of nuclear power plants

- Lee T. Maccarone and Daniel G. Cole
- A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems

- Alexander Staves, Tom Anderson, Harry Balderstone, Benjamin Green, Antonios Gouglidis and David Hutchison
- FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid

- Seyed Hossein Majidi, Shahrzad Hadayeghparast and Hadis Karimipour
- Load-altering attack detection on smart grid using functional observers

- Álan e Sousa, Nadhir Messai and Noureddine Manamanni
- APT attacks on industrial control systems: A tale of three incidents

- Rajesh Kumar, Rohan Kela, Siddhant Singh and Rolando Trujillo-Rasua
- Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis

- Sang Min Han, Chanyoung Lee and Poong Hyun Seong
- VetaDetect: Vehicle tampering detection with closed-loop model ensemble

- Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero and Georgios Fontaras
- Digital transformation of the maritime industry: A cybersecurity systemic approach

- Evripidis P. Kechagias, Georgios Chatzistelios, Georgios A. Papadopoulos and Panagiotis Apostolou
- SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair

- Meysam Valueian, Mojtaba Vahidi-Asl and Alireza Khalilian
- An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace

- Busyairah Syd Ali, Sam Saji and Moon Ting Su
Volume 36, issue C, 2022
- On the component resilience importance measures for infrastructure systems

- Ruiying Li and Ying Gao
- Effect of adding physical links on the robustness of the Internet modeled as a physical–logical interdependent network using simple strategies

- Ivana Bachmann, Valeria Valdés, Javier Bustos-Jiménez and Benjamin Bustos
- An evaluation framework for industrial control system cyber incidents

- Mahdi Daghmehchi Firoozjaei, Nastaran Mahmoudyar, Yaser Baseri and Ali A. Ghorbani
- Defensive cost–benefit analysis of smart grid digital functionalities

- Jim Stright, Peter Cheetham and Charalambos Konstantinou
- Flood risk assessment and application of risk curves for design of mitigation strategies

- Ning Zhang and Alice Alipour
- A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks

- Shun Chen, Xudong Zhao, Zhilong Chen, Benwei Hou and Yipeng Wu
- Cyber-threat landscape of border control infrastructures

- Petros Chatzis and Eliana Stavrou
- Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus

- Livinus Obiora Nweke, Goitom K. Weldehawaryat and Stephen D. Wolthusen
- Risk assessment and mitigation for electric power sectors: A developing country's perspective

- Obaid ur Rehman, Yousaf Ali and Muhammad Sabir
Volume 35, issue C, 2021
- A hypothesis-driven framework for resilience analysis of public transport network under compound failure scenarios

- Yifan Zhang and S. Thomas Ng
- Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts

- Javad Khazaei and M. Hadi Amini
- A multi-criteria model for the security assessment of large-infrastructure construction sites

- Gabriele Oliva, Luca Faramondi, Roberto Setola, Marco Tesei and Enrico Zio
- Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory

- Shuliang Wang, Xifeng Gu, Shengyang Luan and Mingwei Zhao
- Critical flow centrality measures on interdependent networks with time-varying demands

- James Bryan Williams
- Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems

- Thomas Miller, Alexander Staves, Sam Maesschalck, Miriam Sturdee and Benjamin Green
- Threat Modelling of Cyber–Physical Systems Using an Applied π-Calculus

- Livinus Obiora Nweke, Goitom K. Weldehawaryat and Stephen D. Wolthusen
- Optimal allocation of defensive resources to defend urban power networks against different types of attackers

- Lin Han, Xudong Zhao, Zhilong Chen, Yipeng Wu, Xiaochao Su and Ning Zhang
- A study on resilient and cost-based design in power distribution network against severe hurricane

- Masoumeh Karimi, Sajad Najafi Ravadanegh and Mahmoud-Reza Haghifam
- Vulnerability analysis of S7 PLCs: Manipulating the security mechanism

- Henry Hui, Kieran McLaughlin and Sakir Sezer
- Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set

- Eric Luiijf and Marieke Klaver
- Vulnerability analysis of critical infrastructure network

- A. Kizhakkedath and K. Tai
- Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility

- Prasanta Kumar Jena, Subhojit Ghosh and Ebha Koley
- IoT fusion based model predictive pid control approach for oil pipeline infrastructure

- E.B. Priyanka, S. Thangavel, P.H. Prasad and R. Mohanasundaram
| |