EconPapers    
Economics at your fingertips  
 

International Journal of Critical Infrastructure Protection

2008 - 2025

Current editor(s): Leon Strous

From Elsevier
Bibliographic data for series maintained by Catherine Liu ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 24, issue C, 2019

IJCIP Editorial March 2019 – Volume 24 pp. iii-iv Downloads
Leon Strous
A multi-perspective framework of analysis of critical infrastructures with respect to supply service, controllability and topology pp. 1-13 Downloads
Fangyuan Han and Enrico Zio
Analyzing the critical risk factors associated with oil and gas pipeline projects in Iraq pp. 14-22 Downloads
Layth Kraidi, Raj Shah, Wilfred Matipa and Fiona Borthwick
Multi-criteria spatial decision support system for identifying strategic roads in disaster situations pp. 23-36 Downloads
Seyed Morsal Ghavami
Framework for shared drinking water risk assessment pp. 37-47 Downloads
Vincent C. Tidwell, Thomas S. Lowry, David Binning, Jenny Graves, William J. Peplinski and Roger Mitchell
On the practical integration of anomaly detection techniques in industrial control applications pp. 48-68 Downloads
Piroska Haller, Béla Genge and Adrian-Vasile Duka
Dynamics of interdependent critical infrastructures – A mathematical model with unexpected results pp. 69-77 Downloads
Peter Klein and Fabian Klein
Sequential collaborative detection strategy on ADS-B data attack pp. 78-99 Downloads
Tengyao Li and Buhong Wang
The challenge of detecting false documents at the border: Exploring the performance of humans, machines and their interaction pp. 100-110 Downloads
Monica Gariup and Jakub Piskorski
Key pre-distribution scheme with join leave support for SCADA systems pp. 111-125 Downloads
Pramod T. C., Kianoosh G. Boroojeni, M. Hadi Amini, N.R. Sunitha and S.S. Iyengar
A stealth monitoring mechanism for cyber-physical systems pp. 126-143 Downloads
Vitor Graveto, Luís Rosa, Tiago Cruz and Paulo Simões
Interdependent Critical Infrastructure Model (ICIM): An agent-based model of power and water infrastructure pp. 144-165 Downloads
James R. Thompson, Damon Frezza, Burhan Necioglu, Michael L. Cohen, Kenneth Hoffman and Kristine Rosfjord
The insider threat: Behavioral indicators and factors influencing likelihood of intervention pp. 166-176 Downloads
Alison J.C. Bell, M. Brooke Rogers and Julia M. Pearce

Volume 23, issue C, 2018

IJCIP Editorial December 2018 – Volume 23 pp. iii-v Downloads
Leon Strous
A policy model for access control using building information models pp. 1-10 Downloads
Nimalaprakasan Skandhakumar, Jason Reid, Farzad Salim and Ed Dawson
A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of Critical Infrastructures pp. 11-20 Downloads
Xavier Clotet, José Moyano and Gladys León
A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures pp. 21-32 Downloads
Venkata Reddy Palleti, Jude Victor Joseph and Arlindo Silva
Advancing cyber–physical sustainability through integrated analysis of smart power systems: A case study on electric vehicles pp. 33-48 Downloads
Baraa Mohandes, Reem Al Hammadi, Wasiu Sanusi, Toufic Mezher and Sameh El Khatib
On hardening problems in critical infrastructure systems pp. 49-67 Downloads
Joydeep Banerjee, Kaustav Basu and Arunabha Sen
Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks pp. 68-78 Downloads
Andreas Aichhorn, Bernhard Etzlinger, Andreas Unterweger, René Mayrhofer and Andreas Springer
Vulnerability analysis of an urban gas pipeline network considering pipeline-road dependency pp. 79-89 Downloads
Kai Liu, Ming Wang, Weihua Zhu, Jinshan Wu and Xiaoyong Yan
Evaluation of vulnerable path: Using heuristic path-finding algorithm in physical protection system of nuclear power plant pp. 90-99 Downloads
Bowen Zou, Ming Yang, Yuxin Zhang, Emi-Reynolds Benjamin, Ke Tan, Wenfei Wu and Hidekazu Yoshikawa
Securing the cloud-assisted smart grid pp. 100-111 Downloads
Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova and Neeraj Suri
Simulation based assessment of resilience of two large-scale socio-technical IT networks pp. 112-125 Downloads
Finn Landegren, Martin Höst and Peter Möller
Developing a spatial methodology to reduce the vulnerability of critical infrastructures against intelligent air-based threats pp. 126-138 Downloads
Abouzar Ramezani, MohammadReza Malek, Habib Sahami and Reza Hosnavi
A conceptual system architecture for countering the civilian unmanned aerial vehicles threat to nuclear facilities pp. 139-149 Downloads
Md. Shafiqul Islam, Md. Mobasher Ahmed and Saad Islam

Volume 22, issue C, 2018

Vulnerability analysis of critical infrastructures in the case of a semi-centralised water reuse system in Qingdao, China pp. 4-15 Downloads
Martin Zimmermann, Martina Winker and Engelbert Schramm
Lightweight privacy-preserving data aggregation scheme for smart grid metering infrastructure protection pp. 16-24 Downloads
Ulas Baran Baloglu and Yakup Demir
Critical infrastructure vulnerability—A method for identifying the infrastructure service failure interdependencies pp. 25-38 Downloads
Hannes Seppänen, Pekka Luokkala, Zhe Zhang, Paulus Torkki and Kirsi Virrantaus
Towards a next generation 112 testbed: The EMYNOS ESInet pp. 39-50 Downloads
Yacine Rebahi, Kin Tsun Chiu, Nikolay Tcholtchev, Simon Hohberg, Evangelos Pallis and Evangelos Markakis
Modeling infrastructure interdependencies by integrating network and fuzzy set theory pp. 51-61 Downloads
C.Y. Lam and K. Tai
On PLC network security pp. 62-69 Downloads
Asem Ghaleb, Sami Zhioua and Ahmad Almulhem
Standards on cyber security assessment of smart grid pp. 70-89 Downloads
Rafał Leszczyna
Anomaly behavior detection and reliability assessment of control systems based on association rules pp. 90-99 Downloads
Xinchun Jie, Haikuan Wang, Minrui Fei, Dajun Du, Qing Sun and T.C. Yang
Criticality assessment of urban interdependent lifeline systems using a biased PageRank algorithm and a multilayer weighted directed network model pp. 100-112 Downloads
Chen Zhao, Nan Li and Dongping Fang
SIDS: State-based intrusion detection for stage-based cyber physical systems pp. 113-124 Downloads
Abdullah Khalili, Ashkan Sami, Amin Khozaei and Saber Pouresmaeeli
Cascading Impact Assessment in a Critical Infrastructure System pp. 125-138 Downloads
David Rehak, Pavel Senovsky, Martin Hromada, Tomas Lovecek and Petr Novotny
China's cybersecurity legislation, it's relevance to critical infrastructures and the challenges it faces pp. 139-149 Downloads
Meirong Guo

Volume 21, issue C, 2018

Regulated applications for the road transportation infrastructure: The case study of the smart tachograph in the European Union pp. 3-21 Downloads
Gianmarco Baldini, Luigi Sportiello, Michel Chiaramello and Vincent Mahieu
Enhanced connectivity index – A new measure for identifying critical points in urban public transportation networks pp. 22-32 Downloads
Artemis Psaltoglou and Eusebi Calle
A dual-radio approach for reliable emergency signaling in critical infrastructure assets with large wireless networks pp. 33-46 Downloads
Florian Kauer, Emil Kallias and Volker Turau
Legally critical: Defining critical infrastructure in an interconnected world pp. 47-56 Downloads
Jakub Harašta
Proposed methodology for risk analysis of interdependent critical infrastructures to extreme weather events pp. 57-71 Downloads
Margarita Tsavdaroglou, Saad H.S. Al-Jibouri, Thomas Bles and Johannes I.M. Halman
Integrated protection of industrial control systems from cyber-attacks: the ATENA approach pp. 72-82 Downloads
F. Adamsky, M. Aubigny, F. Battisti, M. Carli, F. Cimorelli, T. Cruz, A. Di Giorgio, C. Foglietta, A. Galli, A. Giuseppi, F. Liberati, A. Neri, S. Panzieri, F. Pascucci, J. Proenca, P. Pucci, L. Rosa and R. Soua
Voting infrastructure and the money problem pp. 83-84 Downloads
Chris Bronk

Volume 20, issue C, 2018

Finding critical nodes in infrastructure networks pp. 3-15 Downloads
Luca Faramondi, Roberto Setola, Stefano Panzieri, Federica Pascucci and Gabriele Oliva
A connection probability model for communications networks under regional failures pp. 16-25 Downloads
Muhammad Nomani Kabir, Md Arafatur Rahman, Saiful Azad, Mohamed Mostafa A. Azim and Md Zakirul Alam Bhuiyan
Building resilience against cyber threats in the energy sector pp. 26-27 Downloads
Janne Hagen
Nationwide critical infrastructure monitoring using a common operating picture framework pp. 28-47 Downloads
Samir Puuska, Lauri Rummukainen, Jussi Timonen, Lauri Lääperi, Markus Klemetti, Lauri Oksama and Jouko Vankka
Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols pp. 48-67 Downloads
Hassan Lahza, Kenneth Radke and Ernest Foo
A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol pp. 68-84 Downloads
Tarek Cherifi and Lamia Hamami
Page updated 2025-06-08