International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 32, issue C, 2021
- Securing SCADA and critical industrial systems: From needs to security mechanisms

- Anas Abou el Kalam
- Changes in inoperability for interdependent industry sectors in Norway from 2012 to 2017

- Stig Rune Sellevåg
- Critical infrastructure protection system design based on SCOUT multitech seCurity system for intercOnnected space control groUnd staTions

- Alessandro Cantelli-Forti, Amerigo Capria, Anna Lisa Saverino, Fabrizio Berizzi, Davide Adami and Christian Callegari
- Risk-averse bi-level stochastic network interdiction model for cyber-security risk management

- Tanveer Hossain Bhuiyan, Hugh R. Medal, Apurba K. Nandi and Mahantesh Halappanavar
Volume 31, issue C, 2020
- Network trace generation for flow-based IDS evaluation in control and automation systems

- Gorby Kabasele Ndonda and Ramin Sadre
- An online real-time estimation tool of leakage parameters for hazardous liquid pipelines

- Jianqin Zheng, Yuanhao Dai, Yongtu Liang, Qi Liao and Haoran Zhang
- Computer-aided security assessment of water networks monitoring platforms

- U. Gentile, S. Marrone, R. Nardone and E. Bellini
- Integrating data-driven and physics-based approaches to characterize failures of interdependent infrastructures

- Shenghua Zhou, Yifan Yang, S. Thomas Ng, J. Frank Xu and Dezhi Li
- Linear time invariant system fault isolation: A static compensation decoupling method

- Yuanjie Fang, Minrui Fei and Dajun Du
- A multilayer perceptron model for anomaly detection in water treatment plants

- Gauthama Raman MR, Nivethitha Somu and A.P. Mathur
Volume 30, issue C, 2020
- Multi-period vulnerability analysis of power grids under multiple outages: An AC-based bilevel optimization approach

- Amin Abedi and Franco Romerio
- Developing an evaluation method for SCADA-Controlled urban gas infrastructure hierarchical design using multi-level fuzzy comprehensive evaluation

- Wu Liu, Longxuan Hui, Yuting Lu and Jinsong Tang
- Quantitative approach to physical protection systems assessment of critical infrastructure elements: Use case in the Slovak Republic

- Katarina Kampova, Tomas Lovecek and David Rehak
- A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments

- Wissam Aoudi and Magnus Almgren
Volume 29, issue C, 2020
- Using a random road graph model to understand road networks robustness to link failures

- Philippe Y.R. Sohouenou, Panayotis Christidis, Aris Christodoulou, Luis A.C. Neves and Davide Lo Presti
- A novel optimization method for urban resilient and fair power distribution preventing critical network states

- Sadeeb Simon Ottenburger, Hüseyin Kemal Çakmak, Wilfried Jakob, Andreas Blattmann, Dmytro Trybushnyi, Wolfgang Raskob, Uwe Kühnapfel and Veit Hagenmeyer
- Obtaining high preventive and resilience capacities in critical infrastructure by industrial automation cells

- Santiago G. González, S. Dormido Canto and José Sánchez Moreno
- Industrial control system security taxonomic framework with application to a comprehensive incidents survey

- Mohammad Mehdi Ahmadian, Mehdi Shajari and Mohammad Ali Shafiee
- Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: A case study involving a virtual gas pipeline SCADA system

- Abouzar Choubineh, David A. Wood and Zahak Choubineh
- A double-weighted vulnerability assessment model for metrorail transit networks and its application in Shanghai metro

- Yanjie Zhang, Bilal M. Ayyub, Yalda Saadat, Dongming Zhang and Hongwei Huang
Volume 28, issue C, 2020
- A new soft computing approach for analyzing the influential relationships of critical infrastructures

- Huai-Wei Lo, James J.H. Liou, Chun-Nen Huang, Yen-Ching Chuang and Gwo-Hshiung Tzeng
- Using stakeholders’ judgement and fuzzy logic theory to analyze the risk influencing factors in oil and gas pipeline projects: Case study in Iraq, Stage II

- Layth Kraidi, Raj Shah, Wilfred Matipa and Fiona Borthwick
- Multi-criteria node criticality assessment framework for critical infrastructure networks

- Luca Faramondi, Gabriele Oliva and Roberto Setola
- Seismic risk assessment of natural gas networks with steady-state flow computation

- Francesco Cavalieri
- Resilience for whom? The general public's tolerance levels as CI resilience criteria

- Laura Petersen, Emma Lundin, Laure Fallou, Johan Sjöström, David Lange, Rui Teixeira and Alexandre Bonavita
- Generating invariants using design and data-centric approaches for distributed attack detection

- Muhammad Azmi Umer, Aditya Mathur, Khurum Nazir Junejo and Sridhar Adepu
- A Methodology for Security Classification applied to Smart Grid Infrastructures

- Manish Shrestha, Christian Johansen, Josef Noll and Davide Roverso
Volume 27, issue C, 2019
- Critical rotating machinery protection by integration of a “fuse” bearing

- Dmitri Gazizulin, Evyatar Cohen, Jacob Bortman and Renata Klein
- A novel online state-based anomaly detection system for process control networks

- Hamed Farsi, Ali Fanian and Zahra Taghiyarrenani
- A method for testing distributed anomaly detectors

- Gayathri Sugumar and Aditya Mathur
- A leakage risk assessment method for hazardous liquid pipeline based on Markov chain Monte Carlo

- Zhengbing Li, Huixia Feng, Yongtu Liang, Ning Xu, Siming Nie and Haoran Zhang
- Measures of robustness for networked critical infrastructure: An empirical comparison on four electrical grids

- John W. Galbraith and Luca Iuliani
- IJCIP Editorial December 2019 – Volume 27

- Leon Strous
Volume 26, issue C, 2019
- A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system

- Vishrut Kumar Mishra, Venkata Reddy Palleti and Aditya Mathur
- PLC memory attack detection and response in a clean water supply system

- Andres Robles-Durazno, Naghmeh Moradpoor, James McWhinnie, Gordon Russell and Inaki Maneru-Marin
- A business that can’t lose: Investing in attacks against the Colombian power grid

- Carlos Barreto, Alvaro A. Cardenas, Jennifer Holmes, Agustin Palao and Juan Carlos Restrepo
- Systemic vulnerability assessment of urban water distribution networks considering failure scenario uncertainty

- Fei Wang, Xia-zhong Zheng, Nan Li and Xuesong Shen
- Quality function deployment-based framework for improving the resilience of critical infrastructure systems

- Quan Mao, Nan Li and Feniosky Peña-Mora
- Quality of supply regulations versus societal priorities regarding electricity outage consequences: Case study in a Swedish context

- Finn Landegren, Jonas Johansson and Olof Samuelsson
- Traffic management for drones flying in the city

- Busyairah Syd Ali
- Exploring the temporal structure of time series data for hazardous liquid pipeline incidents based on complex network theory

- Liu Shengli and Liang Yongtu
- Detecting control system misbehavior by fingerprinting programmable logic controller functionality

- Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz and Sean Peisert
- The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system

- Choong-Hee Han, Soon-Tai Park and Sang-Joon Lee
- Optimal sabotage attack on composite material parts

- Bikash Ranabhat, Joseph Clements, Jacob Gatlin, Kuang-Ting Hsiao and Mark Yampolskiy
- “Internet of Smart Cards”: A pocket attacks scenario

- Luigi Sportiello
Volume 25, issue C, 2019
- Editorial pp. iii-v

- Leon Strous
- Energy infrastructure as a target of terrorist attacks from the Islamic state in Iraq and Syria pp. 1-13

- Lukáš Tichý
- Extending the cyber-attack landscape for SCADA-based critical infrastructure pp. 14-35

- Nicholas R. Rodofile, Kenneth Radke and Ernest Foo
- Cyber security challenges for IoT-based smart grid networks pp. 36-49

- Kenneth Kimani, Vitalice Oduol and Kibet Langat
- A comprehensive instrument for identifying critical information infrastructure services pp. 50-61

- Luis-Carlos Herrera and Olaf Maennel
- A framework for modeling and assessing system resilience using a Bayesian network: A case study of an interdependent electrical infrastructure system pp. 62-83

- Niamat Ullah Ibne Hossain, Raed Jaradat, Seyedmohsen Hosseini, Mohammad Marufuzzaman and Randy K. Buchanan
- MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems pp. 84-101

- Kubilay Demir, Ferdaus Nayyer and Neeraj Suri
- Adaptive control of criticality infrastructure in automatic closed-loop supply chain considering uncertainty pp. 102-124

- Shideh Saraeian, Babak Shirazi and Homayun Motameni
- Complex approach to assessing resilience of critical infrastructure elements pp. 125-138

- David Rehak, Pavel Senovsky, Martin Hromada and Tomas Lovecek
- The study of weather conditions favourable to the accretion of icing that pose a threat to transmission power lines pp. 139-151

- Michał Tomaszewski, Bogdan Ruszczak, Paweł Michalski and Sławomir Zator
- Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems pp. 152-168

- Hunor Sándor, Béla Genge, Zoltán Szántó, Lőrinc Márton and Piroska Haller
| |