EconPapers    
Economics at your fingertips  
 

International Journal of Critical Infrastructure Protection

2008 - 2025

Current editor(s): Leon Strous

From Elsevier
Bibliographic data for series maintained by Catherine Liu ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 22, issue C, 2018

Vulnerability analysis of critical infrastructures in the case of a semi-centralised water reuse system in Qingdao, China pp. 4-15 Downloads
Martin Zimmermann, Martina Winker and Engelbert Schramm
Lightweight privacy-preserving data aggregation scheme for smart grid metering infrastructure protection pp. 16-24 Downloads
Ulas Baran Baloglu and Yakup Demir
Critical infrastructure vulnerability—A method for identifying the infrastructure service failure interdependencies pp. 25-38 Downloads
Hannes Seppänen, Pekka Luokkala, Zhe Zhang, Paulus Torkki and Kirsi Virrantaus
Towards a next generation 112 testbed: The EMYNOS ESInet pp. 39-50 Downloads
Yacine Rebahi, Kin Tsun Chiu, Nikolay Tcholtchev, Simon Hohberg, Evangelos Pallis and Evangelos Markakis
Modeling infrastructure interdependencies by integrating network and fuzzy set theory pp. 51-61 Downloads
C.Y. Lam and K. Tai
On PLC network security pp. 62-69 Downloads
Asem Ghaleb, Sami Zhioua and Ahmad Almulhem
Standards on cyber security assessment of smart grid pp. 70-89 Downloads
Rafał Leszczyna
Anomaly behavior detection and reliability assessment of control systems based on association rules pp. 90-99 Downloads
Xinchun Jie, Haikuan Wang, Minrui Fei, Dajun Du, Qing Sun and T.C. Yang
Criticality assessment of urban interdependent lifeline systems using a biased PageRank algorithm and a multilayer weighted directed network model pp. 100-112 Downloads
Chen Zhao, Nan Li and Dongping Fang
SIDS: State-based intrusion detection for stage-based cyber physical systems pp. 113-124 Downloads
Abdullah Khalili, Ashkan Sami, Amin Khozaei and Saber Pouresmaeeli
Cascading Impact Assessment in a Critical Infrastructure System pp. 125-138 Downloads
David Rehak, Pavel Senovsky, Martin Hromada, Tomas Lovecek and Petr Novotny
China's cybersecurity legislation, it's relevance to critical infrastructures and the challenges it faces pp. 139-149 Downloads
Meirong Guo

Volume 21, issue C, 2018

Regulated applications for the road transportation infrastructure: The case study of the smart tachograph in the European Union pp. 3-21 Downloads
Gianmarco Baldini, Luigi Sportiello, Michel Chiaramello and Vincent Mahieu
Enhanced connectivity index – A new measure for identifying critical points in urban public transportation networks pp. 22-32 Downloads
Artemis Psaltoglou and Eusebi Calle
A dual-radio approach for reliable emergency signaling in critical infrastructure assets with large wireless networks pp. 33-46 Downloads
Florian Kauer, Emil Kallias and Volker Turau
Legally critical: Defining critical infrastructure in an interconnected world pp. 47-56 Downloads
Jakub Harašta
Proposed methodology for risk analysis of interdependent critical infrastructures to extreme weather events pp. 57-71 Downloads
Margarita Tsavdaroglou, Saad H.S. Al-Jibouri, Thomas Bles and Johannes I.M. Halman
Integrated protection of industrial control systems from cyber-attacks: the ATENA approach pp. 72-82 Downloads
F. Adamsky, M. Aubigny, F. Battisti, M. Carli, F. Cimorelli, T. Cruz, A. Di Giorgio, C. Foglietta, A. Galli, A. Giuseppi, F. Liberati, A. Neri, S. Panzieri, F. Pascucci, J. Proenca, P. Pucci, L. Rosa and R. Soua
Voting infrastructure and the money problem pp. 83-84 Downloads
Chris Bronk

Volume 20, issue C, 2018

Finding critical nodes in infrastructure networks pp. 3-15 Downloads
Luca Faramondi, Roberto Setola, Stefano Panzieri, Federica Pascucci and Gabriele Oliva
A connection probability model for communications networks under regional failures pp. 16-25 Downloads
Muhammad Nomani Kabir, Md Arafatur Rahman, Saiful Azad, Mohamed Mostafa A. Azim and Md Zakirul Alam Bhuiyan
Building resilience against cyber threats in the energy sector pp. 26-27 Downloads
Janne Hagen
Nationwide critical infrastructure monitoring using a common operating picture framework pp. 28-47 Downloads
Samir Puuska, Lauri Rummukainen, Jussi Timonen, Lauri Lääperi, Markus Klemetti, Lauri Oksama and Jouko Vankka
Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols pp. 48-67 Downloads
Hassan Lahza, Kenneth Radke and Ernest Foo
A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol pp. 68-84 Downloads
Tarek Cherifi and Lamia Hamami

Volume 19, issue C, 2017

Comparative analysis of the security of configuration protocols for industrial control devices pp. 4-15 Downloads
Luis Martín-Liras, Miguel A. Prada, Juan J. Fuertes, Antonio Morán, Serafín Alonso and Manuel Domínguez
Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system pp. 16-31 Downloads
Mohsen Riahi Manesh and Naima Kaabouch
A cyber risk scoring system for medical devices pp. 32-46 Downloads
Ian Stine, Mason Rice, Stephen Dunlap and John Pecarina
On the harms arising from the Equifax data breach of 2017 pp. 47-48 Downloads
Tyler Moore
Information and power terminals: A reliable microgrid infrastructure for use in disaster scenarios pp. 49-58 Downloads
Pio Lombardi, Kathleen Hänsch, Bartlomiej Arendarski and Przemyslaw Komarnicki
An improved authentication protocol for distributed mobile cloud computing services pp. 59-67 Downloads
Hoda Jannati and Behnam Bahrak

Volume 18, issue C, 2017

Security analysis of an advanced metering infrastructure pp. 3-19 Downloads
Aaron Hansen, Jason Staggs and Sujeet Shenoi
Cybersecurity protection for power grid control infrastructures pp. 20-33 Downloads
Jacek Jarmakiewicz, Krzysztof Parobczak and Krzysztof Maślanka
Smart grids: And the bad news is? pp. 34-36 Downloads
Hendricus (Eric) Antonius Maria Luiijf,
Measuring the organizational resilience of critical infrastructure providers: A New Zealand case study pp. 37-49 Downloads
Charlotte Brown, Erica Seville and John Vargo
Risk assessment of critical infrastructures – New parameters for commercial ports pp. 50-57 Downloads
David Romero-Faz and Alberto Camarero-Orive
Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections pp. 58-70 Downloads
Jose Gutierrez del Arroyo, Jason Bindewald, Scott Graham and Mason Rice

Volume 17, issue C, 2017

Wind farm security: attack surface, targets, scenarios and mitigation pp. 3-14 Downloads
Jason Staggs, David Ferlemann and Sujeet Shenoi
Distributed monitoring for the prevention of cascading failures in operational power grids pp. 15-27 Downloads
Martijn Warnier, Stefan Dulman, Yakup Koç and Eric Pauwels
Improving the cyber resilience of industrial control systems pp. 30-48 Downloads
Andrew Chaves, Mason Rice, Stephen Dunlap and John Pecarina
Cyber resilience preparedness of Africa’s top-12 emerging economies pp. 49-59 Downloads
Ada S. Peter
Using geographic information science to evaluate legal restrictions on freight transportation routing in disruptive scenarios pp. 60-74 Downloads
Marc R. Fialkoff, Olufemi A. Omitaomu, Steven K. Peterson and Mark A. Tuttle

Volume 16, issue C, 2017

Using interdependency matrices to mitigate targeted attacks on interdependent networks: A case study involving a power grid and backbone telecommunications networks pp. 3-12 Downloads
Diego F. Rueda and Eusebi Calle
Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory pp. 13-25 Downloads
Xiaoxue Liu, Jiexin Zhang and Peidong Zhu
A methodology for determining the image base of ARM-based industrial control system firmware pp. 26-35 Downloads
Ruijin Zhu, Baofeng Zhang, Junjie Mao, Quanxin Zhang and Yu-an Tan
A fuzzy model for evaluating metal detection equipment at airport security screening checkpoints pp. 39-48 Downloads
Jacek Skorupski and Piotr Uchroński
Infrastructure financing and development: A bibliometric review pp. 49-65 Downloads
Anita Kumari and Anil Kumar Sharma

Volume 15, issue C, 2016

A framework for designing resilient distributed intrusion detection systems for critical infrastructures pp. 3-11 Downloads
Béla Genge, Piroska Haller and István Kiss
Using timing-based side channels for anomaly detection in industrial control systems pp. 12-26 Downloads
Stephen Dunlap, Jonathan Butts, Juan Lopez, Mason Rice and Barry Mullins
Implementation of error detection and correction in the Modbus-RTU serial protocol pp. 27-37 Downloads
Claudio Urrea, Claudio Morales and John Kern
System specifications for developing an Automatic Dependent Surveillance-Broadcast (ADS-B) monitoring system pp. 40-46 Downloads
Busyairah Syd Ali
A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness pp. 47-59 Downloads
Bilge Karabacak, Sevgi Ozkan Yildirim and Nazife Baykal
Page updated 2025-03-31