International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 22, issue C, 2018
- Vulnerability analysis of critical infrastructures in the case of a semi-centralised water reuse system in Qingdao, China pp. 4-15

- Martin Zimmermann, Martina Winker and Engelbert Schramm
- Lightweight privacy-preserving data aggregation scheme for smart grid metering infrastructure protection pp. 16-24

- Ulas Baran Baloglu and Yakup Demir
- Critical infrastructure vulnerability—A method for identifying the infrastructure service failure interdependencies pp. 25-38

- Hannes Seppänen, Pekka Luokkala, Zhe Zhang, Paulus Torkki and Kirsi Virrantaus
- Towards a next generation 112 testbed: The EMYNOS ESInet pp. 39-50

- Yacine Rebahi, Kin Tsun Chiu, Nikolay Tcholtchev, Simon Hohberg, Evangelos Pallis and Evangelos Markakis
- Modeling infrastructure interdependencies by integrating network and fuzzy set theory pp. 51-61

- C.Y. Lam and K. Tai
- On PLC network security pp. 62-69

- Asem Ghaleb, Sami Zhioua and Ahmad Almulhem
- Standards on cyber security assessment of smart grid pp. 70-89

- Rafał Leszczyna
- Anomaly behavior detection and reliability assessment of control systems based on association rules pp. 90-99

- Xinchun Jie, Haikuan Wang, Minrui Fei, Dajun Du, Qing Sun and T.C. Yang
- Criticality assessment of urban interdependent lifeline systems using a biased PageRank algorithm and a multilayer weighted directed network model pp. 100-112

- Chen Zhao, Nan Li and Dongping Fang
- SIDS: State-based intrusion detection for stage-based cyber physical systems pp. 113-124

- Abdullah Khalili, Ashkan Sami, Amin Khozaei and Saber Pouresmaeeli
- Cascading Impact Assessment in a Critical Infrastructure System pp. 125-138

- David Rehak, Pavel Senovsky, Martin Hromada, Tomas Lovecek and Petr Novotny
- China's cybersecurity legislation, it's relevance to critical infrastructures and the challenges it faces pp. 139-149

- Meirong Guo
Volume 21, issue C, 2018
- Regulated applications for the road transportation infrastructure: The case study of the smart tachograph in the European Union pp. 3-21

- Gianmarco Baldini, Luigi Sportiello, Michel Chiaramello and Vincent Mahieu
- Enhanced connectivity index – A new measure for identifying critical points in urban public transportation networks pp. 22-32

- Artemis Psaltoglou and Eusebi Calle
- A dual-radio approach for reliable emergency signaling in critical infrastructure assets with large wireless networks pp. 33-46

- Florian Kauer, Emil Kallias and Volker Turau
- Legally critical: Defining critical infrastructure in an interconnected world pp. 47-56

- Jakub Harašta
- Proposed methodology for risk analysis of interdependent critical infrastructures to extreme weather events pp. 57-71

- Margarita Tsavdaroglou, Saad H.S. Al-Jibouri, Thomas Bles and Johannes I.M. Halman
- Integrated protection of industrial control systems from cyber-attacks: the ATENA approach pp. 72-82

- F. Adamsky, M. Aubigny, F. Battisti, M. Carli, F. Cimorelli, T. Cruz, A. Di Giorgio, C. Foglietta, A. Galli, A. Giuseppi, F. Liberati, A. Neri, S. Panzieri, F. Pascucci, J. Proenca, P. Pucci, L. Rosa and R. Soua
- Voting infrastructure and the money problem pp. 83-84

- Chris Bronk
Volume 20, issue C, 2018
- Finding critical nodes in infrastructure networks pp. 3-15

- Luca Faramondi, Roberto Setola, Stefano Panzieri, Federica Pascucci and Gabriele Oliva
- A connection probability model for communications networks under regional failures pp. 16-25

- Muhammad Nomani Kabir, Md Arafatur Rahman, Saiful Azad, Mohamed Mostafa A. Azim and Md Zakirul Alam Bhuiyan
- Building resilience against cyber threats in the energy sector pp. 26-27

- Janne Hagen
- Nationwide critical infrastructure monitoring using a common operating picture framework pp. 28-47

- Samir Puuska, Lauri Rummukainen, Jussi Timonen, Lauri Lääperi, Markus Klemetti, Lauri Oksama and Jouko Vankka
- Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols pp. 48-67

- Hassan Lahza, Kenneth Radke and Ernest Foo
- A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol pp. 68-84

- Tarek Cherifi and Lamia Hamami
Volume 19, issue C, 2017
- Comparative analysis of the security of configuration protocols for industrial control devices pp. 4-15

- Luis Martín-Liras, Miguel A. Prada, Juan J. Fuertes, Antonio Morán, Serafín Alonso and Manuel Domínguez
- Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system pp. 16-31

- Mohsen Riahi Manesh and Naima Kaabouch
- A cyber risk scoring system for medical devices pp. 32-46

- Ian Stine, Mason Rice, Stephen Dunlap and John Pecarina
- On the harms arising from the Equifax data breach of 2017 pp. 47-48

- Tyler Moore
- Information and power terminals: A reliable microgrid infrastructure for use in disaster scenarios pp. 49-58

- Pio Lombardi, Kathleen Hänsch, Bartlomiej Arendarski and Przemyslaw Komarnicki
- An improved authentication protocol for distributed mobile cloud computing services pp. 59-67

- Hoda Jannati and Behnam Bahrak
Volume 18, issue C, 2017
- Security analysis of an advanced metering infrastructure pp. 3-19

- Aaron Hansen, Jason Staggs and Sujeet Shenoi
- Cybersecurity protection for power grid control infrastructures pp. 20-33

- Jacek Jarmakiewicz, Krzysztof Parobczak and Krzysztof Maślanka
- Smart grids: And the bad news is? pp. 34-36

- Hendricus (Eric) Antonius Maria Luiijf,
- Measuring the organizational resilience of critical infrastructure providers: A New Zealand case study pp. 37-49

- Charlotte Brown, Erica Seville and John Vargo
- Risk assessment of critical infrastructures – New parameters for commercial ports pp. 50-57

- David Romero-Faz and Alberto Camarero-Orive
- Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections pp. 58-70

- Jose Gutierrez del Arroyo, Jason Bindewald, Scott Graham and Mason Rice
Volume 17, issue C, 2017
- Wind farm security: attack surface, targets, scenarios and mitigation pp. 3-14

- Jason Staggs, David Ferlemann and Sujeet Shenoi
- Distributed monitoring for the prevention of cascading failures in operational power grids pp. 15-27

- Martijn Warnier, Stefan Dulman, Yakup Koç and Eric Pauwels
- Improving the cyber resilience of industrial control systems pp. 30-48

- Andrew Chaves, Mason Rice, Stephen Dunlap and John Pecarina
- Cyber resilience preparedness of Africa’s top-12 emerging economies pp. 49-59

- Ada S. Peter
- Using geographic information science to evaluate legal restrictions on freight transportation routing in disruptive scenarios pp. 60-74

- Marc R. Fialkoff, Olufemi A. Omitaomu, Steven K. Peterson and Mark A. Tuttle
Volume 16, issue C, 2017
- Using interdependency matrices to mitigate targeted attacks on interdependent networks: A case study involving a power grid and backbone telecommunications networks pp. 3-12

- Diego F. Rueda and Eusebi Calle
- Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory pp. 13-25

- Xiaoxue Liu, Jiexin Zhang and Peidong Zhu
- A methodology for determining the image base of ARM-based industrial control system firmware pp. 26-35

- Ruijin Zhu, Baofeng Zhang, Junjie Mao, Quanxin Zhang and Yu-an Tan
- A fuzzy model for evaluating metal detection equipment at airport security screening checkpoints pp. 39-48

- Jacek Skorupski and Piotr Uchroński
- Infrastructure financing and development: A bibliometric review pp. 49-65

- Anita Kumari and Anil Kumar Sharma
Volume 15, issue C, 2016
- A framework for designing resilient distributed intrusion detection systems for critical infrastructures pp. 3-11

- Béla Genge, Piroska Haller and István Kiss
- Using timing-based side channels for anomaly detection in industrial control systems pp. 12-26

- Stephen Dunlap, Jonathan Butts, Juan Lopez, Mason Rice and Barry Mullins
- Implementation of error detection and correction in the Modbus-RTU serial protocol pp. 27-37

- Claudio Urrea, Claudio Morales and John Kern
- System specifications for developing an Automatic Dependent Surveillance-Broadcast (ADS-B) monitoring system pp. 40-46

- Busyairah Syd Ali
- A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness pp. 47-59

- Bilge Karabacak, Sevgi Ozkan Yildirim and Nazife Baykal
| |