International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 28, issue C, 2020
- A new soft computing approach for analyzing the influential relationships of critical infrastructures

- Huai-Wei Lo, James J.H. Liou, Chun-Nen Huang, Yen-Ching Chuang and Gwo-Hshiung Tzeng
- Using stakeholders’ judgement and fuzzy logic theory to analyze the risk influencing factors in oil and gas pipeline projects: Case study in Iraq, Stage II

- Layth Kraidi, Raj Shah, Wilfred Matipa and Fiona Borthwick
- Multi-criteria node criticality assessment framework for critical infrastructure networks

- Luca Faramondi, Gabriele Oliva and Roberto Setola
- Seismic risk assessment of natural gas networks with steady-state flow computation

- Francesco Cavalieri
- Resilience for whom? The general public's tolerance levels as CI resilience criteria

- Laura Petersen, Emma Lundin, Laure Fallou, Johan Sjöström, David Lange, Rui Teixeira and Alexandre Bonavita
- Generating invariants using design and data-centric approaches for distributed attack detection

- Muhammad Azmi Umer, Aditya Mathur, Khurum Nazir Junejo and Sridhar Adepu
- A Methodology for Security Classification applied to Smart Grid Infrastructures

- Manish Shrestha, Christian Johansen, Josef Noll and Davide Roverso
Volume 27, issue C, 2019
- Critical rotating machinery protection by integration of a “fuse” bearing

- Dmitri Gazizulin, Evyatar Cohen, Jacob Bortman and Renata Klein
- A novel online state-based anomaly detection system for process control networks

- Hamed Farsi, Ali Fanian and Zahra Taghiyarrenani
- A method for testing distributed anomaly detectors

- Gayathri Sugumar and Aditya Mathur
- A leakage risk assessment method for hazardous liquid pipeline based on Markov chain Monte Carlo

- Zhengbing Li, Huixia Feng, Yongtu Liang, Ning Xu, Siming Nie and Haoran Zhang
- Measures of robustness for networked critical infrastructure: An empirical comparison on four electrical grids

- John W. Galbraith and Luca Iuliani
- IJCIP Editorial December 2019 – Volume 27

- Leon Strous
Volume 26, issue C, 2019
- A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system

- Vishrut Kumar Mishra, Venkata Reddy Palleti and Aditya Mathur
- PLC memory attack detection and response in a clean water supply system

- Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell and Inaki Maneru-Marin
- A business that can’t lose: Investing in attacks against the Colombian power grid

- Carlos Barreto, Alvaro A. Cardenas, Jennifer Holmes, Agustin Palao and Juan Carlos Restrepo
- Systemic vulnerability assessment of urban water distribution networks considering failure scenario uncertainty

- Fei Wang, Xia-zhong Zheng, Nan Li and Xuesong Shen
- Quality function deployment-based framework for improving the resilience of critical infrastructure systems

- Quan Mao, Nan Li and Feniosky Peña-Mora
- Quality of supply regulations versus societal priorities regarding electricity outage consequences: Case study in a Swedish context

- Finn Landegren, Jonas Johansson and Olof Samuelsson
- Traffic management for drones flying in the city

- Busyairah Syd Ali
- Exploring the temporal structure of time series data for hazardous liquid pipeline incidents based on complex network theory

- Liu Shengli and Liang Yongtu
- Detecting control system misbehavior by fingerprinting programmable logic controller functionality

- Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz and Sean Peisert
- The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system

- Choong-Hee Han, Soon-Tai Park and Sang-Joon Lee
- Optimal sabotage attack on composite material parts

- Bikash Ranabhat, Joseph Clements, Jacob Gatlin, Kuang-Ting Hsiao and Mark Yampolskiy
- “Internet of Smart Cards”: A pocket attacks scenario

- Luigi Sportiello
Volume 25, issue C, 2019
- Editorial pp. iii-v

- Leon Strous
- Energy infrastructure as a target of terrorist attacks from the Islamic state in Iraq and Syria pp. 1-13

- Lukáš Tichý
- Extending the cyber-attack landscape for SCADA-based critical infrastructure pp. 14-35

- Nicholas R. Rodofile, Kenneth Radke and Ernest Foo
- Cyber security challenges for IoT-based smart grid networks pp. 36-49

- Kenneth Kimani, Vitalice Oduol and Kibet Langat
- A comprehensive instrument for identifying critical information infrastructure services pp. 50-61

- Luis-Carlos Herrera and Olaf Maennel
- A framework for modeling and assessing system resilience using a Bayesian network: A case study of an interdependent electrical infrastructure system pp. 62-83

- Niamat Ullah Ibne Hossain, Raed Jaradat, Seyedmohsen Hosseini, Mohammad Marufuzzaman and Randy K. Buchanan
- MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems pp. 84-101

- Kubilay Demir, Ferdaus Nayyer and Neeraj Suri
- Adaptive control of criticality infrastructure in automatic closed-loop supply chain considering uncertainty pp. 102-124

- Shideh Saraeian, Babak Shirazi and Homayun Motameni
- Complex approach to assessing resilience of critical infrastructure elements pp. 125-138

- David Rehak, Pavel Senovsky, Martin Hromada and Tomas Lovecek
- The study of weather conditions favourable to the accretion of icing that pose a threat to transmission power lines pp. 139-151

- Michał Tomaszewski, Bogdan Ruszczak, Paweł Michalski and Sławomir Zator
- Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems pp. 152-168

- Hunor Sándor, Béla Genge, Zoltán Szántó, Lőrinc Márton and Piroska Haller
Volume 24, issue C, 2019
- IJCIP Editorial March 2019 – Volume 24 pp. iii-iv

- Leon Strous
- A multi-perspective framework of analysis of critical infrastructures with respect to supply service, controllability and topology pp. 1-13

- Fangyuan Han and Enrico Zio
- Analyzing the critical risk factors associated with oil and gas pipeline projects in Iraq pp. 14-22

- Layth Kraidi, Raj Shah, Wilfred Matipa and Fiona Borthwick
- Multi-criteria spatial decision support system for identifying strategic roads in disaster situations pp. 23-36

- Seyed Morsal Ghavami
- Framework for shared drinking water risk assessment pp. 37-47

- Vincent C. Tidwell, Thomas S. Lowry, David Binning, Jenny Graves, William J. Peplinski and Roger Mitchell
- On the practical integration of anomaly detection techniques in industrial control applications pp. 48-68

- Piroska Haller, Béla Genge and Adrian-Vasile Duka
- Dynamics of interdependent critical infrastructures – A mathematical model with unexpected results pp. 69-77

- Peter Klein and Fabian Klein
- Sequential collaborative detection strategy on ADS-B data attack pp. 78-99

- Tengyao Li and Buhong Wang
- The challenge of detecting false documents at the border: Exploring the performance of humans, machines and their interaction pp. 100-110

- Monica Gariup and Jakub Piskorski
- Key pre-distribution scheme with join leave support for SCADA systems pp. 111-125

- Pramod T. C., Kianoosh G. Boroojeni, M. Hadi Amini, N.R. Sunitha and S.S. Iyengar
- A stealth monitoring mechanism for cyber-physical systems pp. 126-143

- Vitor Graveto, Luís Rosa, Tiago Cruz and Paulo Simões
- Interdependent Critical Infrastructure Model (ICIM): An agent-based model of power and water infrastructure pp. 144-165

- James R. Thompson, Damon Frezza, Burhan Necioglu, Michael L. Cohen, Kenneth Hoffman and Kristine Rosfjord
- The insider threat: Behavioral indicators and factors influencing likelihood of intervention pp. 166-176

- Alison J.C. Bell, M. Brooke Rogers and Julia M. Pearce
Volume 23, issue C, 2018
- IJCIP Editorial December 2018 – Volume 23 pp. iii-v

- Leon Strous
- A policy model for access control using building information models pp. 1-10

- Nimalaprakasan Skandhakumar, Jason Reid, Farzad Salim and Ed Dawson
- A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of Critical Infrastructures pp. 11-20

- Xavier Clotet, José Moyano and Gladys León
- A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures pp. 21-32

- Venkata Reddy Palleti, Jude Victor Joseph and Arlindo Silva
- Advancing cyber–physical sustainability through integrated analysis of smart power systems: A case study on electric vehicles pp. 33-48

- Baraa Mohandes, Reem Al Hammadi, Wasiu Sanusi, Toufic Mezher and Sameh El Khatib
- On hardening problems in critical infrastructure systems pp. 49-67

- Joydeep Banerjee, Kaustav Basu and Arunabha Sen
- Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks pp. 68-78

- Andreas Aichhorn, Bernhard Etzlinger, Andreas Unterweger, René Mayrhofer and Andreas Springer
- Vulnerability analysis of an urban gas pipeline network considering pipeline-road dependency pp. 79-89

- Kai Liu, Ming Wang, Weihua Zhu, Jinshan Wu and Xiaoyong Yan
- Evaluation of vulnerable path: Using heuristic path-finding algorithm in physical protection system of nuclear power plant pp. 90-99

- Bowen Zou, Ming Yang, Yuxin Zhang, Emi-Reynolds Benjamin, Ke Tan, Wenfei Wu and Hidekazu Yoshikawa
- Securing the cloud-assisted smart grid pp. 100-111

- Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova and Neeraj Suri
- Simulation based assessment of resilience of two large-scale socio-technical IT networks pp. 112-125

- Finn Landegren, Martin Höst and Peter Möller
- Developing a spatial methodology to reduce the vulnerability of critical infrastructures against intelligent air-based threats pp. 126-138

- Abouzar Ramezani, MohammadReza Malek, Habib Sahami and Reza Hosnavi
- A conceptual system architecture for countering the civilian unmanned aerial vehicles threat to nuclear facilities pp. 139-149

- Md. Shafiqul Islam, Md. Mobasher Ahmed and Saad Islam
| |