International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 37, issue C, 2022
- Bayesian games for the cybersecurity of nuclear power plants

- Lee T. Maccarone and Daniel G. Cole
- A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems

- Alexander Staves, Tom Anderson, Harry Balderstone, Benjamin Green, Antonios Gouglidis and David Hutchison
- FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid

- Seyed Hossein Majidi, Shahrzad Hadayeghparast and Hadis Karimipour
- Load-altering attack detection on smart grid using functional observers

- Álan e Sousa, Nadhir Messai and Noureddine Manamanni
- APT attacks on industrial control systems: A tale of three incidents

- Rajesh Kumar, Rohan Kela, Siddhant Singh and Rolando Trujillo-Rasua
- Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis

- Sang Min Han, Chanyoung Lee and Poong Hyun Seong
- VetaDetect: Vehicle tampering detection with closed-loop model ensemble

- Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero and Georgios Fontaras
- Digital transformation of the maritime industry: A cybersecurity systemic approach

- Evripidis P. Kechagias, Georgios Chatzistelios, Georgios A. Papadopoulos and Panagiotis Apostolou
- SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair

- Meysam Valueian, Mojtaba Vahidi-Asl and Alireza Khalilian
- An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace

- Busyairah Syd Ali, Sam Saji and Moon Ting Su
Volume 36, issue C, 2022
- On the component resilience importance measures for infrastructure systems

- Ruiying Li and Ying Gao
- Effect of adding physical links on the robustness of the Internet modeled as a physical–logical interdependent network using simple strategies

- Ivana Bachmann, Valeria Valdés, Javier Bustos-Jiménez and Benjamin Bustos
- An evaluation framework for industrial control system cyber incidents

- Mahdi Daghmehchi Firoozjaei, Nastaran Mahmoudyar, Yaser Baseri and Ali A. Ghorbani
- Defensive cost–benefit analysis of smart grid digital functionalities

- Jim Stright, Peter Cheetham and Charalambos Konstantinou
- Flood risk assessment and application of risk curves for design of mitigation strategies

- Ning Zhang and Alice Alipour
- A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks

- Shun Chen, Xudong Zhao, Zhilong Chen, Benwei Hou and Yipeng Wu
- Cyber-threat landscape of border control infrastructures

- Petros Chatzis and Eliana Stavrou
- Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus

- Livinus Obiora Nweke, Goitom K. Weldehawaryat and Stephen D. Wolthusen
- Risk assessment and mitigation for electric power sectors: A developing country's perspective

- Obaid ur Rehman, Yousaf Ali and Muhammad Sabir
Volume 35, issue C, 2021
- A hypothesis-driven framework for resilience analysis of public transport network under compound failure scenarios

- Yifan Zhang and S. Thomas Ng
- Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts

- Javad Khazaei and M. Hadi Amini
- A multi-criteria model for the security assessment of large-infrastructure construction sites

- Gabriele Oliva, Luca Faramondi, Roberto Setola, Marco Tesei and Enrico Zio
- Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory

- Shuliang Wang, Xifeng Gu, Shengyang Luan and Mingwei Zhao
- Critical flow centrality measures on interdependent networks with time-varying demands

- James Bryan Williams
- Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems

- Thomas Miller, Alexander Staves, Sam Maesschalck, Miriam Sturdee and Benjamin Green
- Threat Modelling of Cyber–Physical Systems Using an Applied π-Calculus

- Livinus Obiora Nweke, Goitom K. Weldehawaryat and Stephen D. Wolthusen
- Optimal allocation of defensive resources to defend urban power networks against different types of attackers

- Lin Han, Xudong Zhao, Zhilong Chen, Yipeng Wu, Xiaochao Su and Ning Zhang
- A study on resilient and cost-based design in power distribution network against severe hurricane

- Masoumeh Karimi, Sajad Najafi Ravadanegh and Mahmoud-Reza Haghifam
- Vulnerability analysis of S7 PLCs: Manipulating the security mechanism

- Henry Hui, Kieran McLaughlin and Sakir Sezer
- Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set

- Eric Luiijf and Marieke Klaver
- Vulnerability analysis of critical infrastructure network

- A. Kizhakkedath and K. Tai
- Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility

- Prasanta Kumar Jena, Subhojit Ghosh and Ebha Koley
- IoT fusion based model predictive pid control approach for oil pipeline infrastructure

- E.B. Priyanka, S. Thangavel, P.H. Prasad and R. Mohanasundaram
Volume 34, issue C, 2021
- End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure

- Neeraj Kumar Singh and Vasundhara Mahajan
- Industrial intrusion detection based on the behavior of rotating machine

- Mohammad Safari, Elham Parvinnia and Alireza Keshavarz Haddad
- Architecture and security of SCADA systems: A review

- Geeta Yadav and Kolin Paul
- Nodal vulnerability assessment of water distribution networks: An integrated Fuzzy AHP-TOPSIS approach

- Hoese Michel Tornyeviadzi, Fabrice Abunde Neba, Hadi Mohammed and Razak Seidu
- SafeCI: Avoiding process anomalies in critical infrastructure

- Sridhar Adepu and Aditya Mathur
- Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things

- Faiza Medjek, Djamel Tandjaoui, Nabil Djedjig and Imed Romdhani
- Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment

- Jan Vávra, Martin Hromada, Luděk Lukáš and Jacek Dworzecki
- Evaluation on nuclear emergency response strategies in the Asia-Pacific region

- Fei Li, Jing Wang, Hui Li, Qian Hu, Wenxuan Dan, Liangquan Ge and David Cohen
- Assessing the effects of link-repair sequences on road network resilience

- Philippe Y.R. Sohouenou and Luis A.C. Neves
- A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem

- Muataz Salam Al-Daweri, Salwani Abdullah and Khairul Akram Zainol Ariffin
- Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems

- Yifan Jia, Jingyi Wang, Christopher M. Poskitt, Sudipta Chattopadhyay, Jun Sun and Yuqi Chen
- Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants

- R.A. Busquim e Silva, J.R.C. Piqueira, J.J. Cruz and R.P. Marques
- Cybersecurity professionals information sharing sources and networks in the U.S. electrical power industry

- Rick G. Randall and Stuart Allen
Volume 33, issue C, 2021
- Vulnerabilities and countermeasures in electrical substations

- Shahbaz Hussain, Javier Hernandez Fernandez, Abdulla Khalid Al-Ali and Abdullatif Shikfa
- Power systems resilience: Definition and taxonomy with a view towards metrics

- Jordan J. Plotnek and Jill Slay
- Resilient backup controller placement in distributed SDN under critical targeted attacks

- Eusebi Calle, David Martínez, Mariusz Mycek and Michał Pióro
- Unsupervised machine learning techniques to prevent faults in railroad switch machines

- Nielson Soares, Eduardo Pestana de Aguiar, Amanda Campos Souza and Leonardo Goliatt
- A Systematic Literature Review on RAMS analysis for critical infrastructures protection

- Sandeep Pirbhulal, Vasileios Gkioulos and Sokratis Katsikas
- ARTINALI#: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems

- Maryam Raiyat Aliabadi, Margo Seltzer, Mojtaba Vahidi Asl and Ramak Ghavamizadeh
- SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems

- Eyasu Getahun Chekole, Martín Ochoa and Sudipta Chattopadhyay
- Robustness of the Chinese power grid to cascading failures under attack and defense strategies

- Kaiwen Li, Kai Liu and Ming Wang
| |