International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 14, issue C, 2016
- Quantitative evaluation of the synergistic effects of failures in a critical infrastructure system pp. 3-17

- David Rehak, Jiri Markuci, Martin Hromada and Karla Barcova
- A methodology for modeling and measuring interdependencies of information and communications systems used for public administration and eGovernment services pp. 18-27

- Antonio De Nicola, Maria Luisa Villani, Maria Cristina Brugnoli and Gregorio D'Agostino
- Towards comparable cross-sector risk analyses: A re-examination of the Risk Analysis and Management for Critical Asset Protection (RAMCAP) methodology pp. 28-40

- Richard White, Aaron Burkhart, Randy George, Terrance Boult and Edward Chow
- A framework for incorporating insurance in critical infrastructure cyber risk strategies pp. 43-57

- Derek Young, Juan Lopez, Mason Rice, Benjamin Ramsey and Robert McTasney
- Using 3D printers as weapons pp. 58-71

- Mark Yampolskiy, Anthony Skjellum, Michael Kretzschmar, Ruel A. Overfelt, Kenneth R. Sloan and Alec Yasinsac
Volume 13, issue C, 2016
- An analytical model for benchmarking the development of national infrastructure items against those in similar countries pp. 3-18

- Shih-Hsu Wang
- Evaluating the readiness of cyber first responders responsible for critical infrastructure protection pp. 19-27

- Jungsang Yoon, Stephen Dunlap, Jonathan Butts, Mason Rice and Benjamin Ramsey
- Designing an emergency continuity plan for a megacity government: A conceptual framework for coping with natural catastrophes pp. 28-35

- Qin-Ying Sun, Xiang-Yang Li and Feng Yu
- A novel security information and event management system for enhancing cyber security in a hydroelectric dam pp. 39-51

- Cesario Di Sarno, Alessia Garofalo, Ilaria Matteucci and Marco Vallini
- Exploiting traffic periodicity in industrial control networks pp. 52-62

- Rafael Ramos Regis Barbosa, Ramin Sadre and Aiko Pras
Volume 12, issue C, 2016
- Objectives for managing cyber supply chain risk pp. 4-11

- Marjorie Windelberg
- Current practices and challenges in industrial control organizations regarding information security incident management – Does size matter? Information security incident management in large and small industrial control organizations pp. 12-26

- Maria Bartnes Line, Inger Anne Tøndel and Martin G. Jaatun
- New centrality measures for assessing smart grid vulnerabilities and predicting brownouts and blackouts pp. 29-45

- Pravin Chopade and Marwan Bikdash
- Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures pp. 46-60

- George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Georgia Lykou and Dimitris Gritzalis
- Integrated roadmap for the rapid finding and tracking of people at large airports pp. 61-74

- Henri Bouma, Jeroen van Rest, Kim van Buul-Besseling, Jacomien de Jong and Anton Havekes
Volume 11, issue C, 2015
- WikiLeaks and the risks to critical foreign dependencies pp. 3-11

- Daniel Arce
- Regional response to large-scale emergency events: Building on historical data pp. 12-21

- Carol Romanowski, Rajendra Raj, Jennifer Schneider, Sumita Mishra, Vinay Shivshankar, Srikant Ayengar and Fernando Cueva
- Experimental assessment of network design approaches for protecting industrial control systems pp. 24-38

- Béla Genge, Flavius Graur and Piroska Haller
- A multi-layered and kill-chain based security analysis framework for cyber-physical systems pp. 39-50

- Adam Hahn, Roshan K. Thomas, Ivan Lozano and Alvaro Cardenas
- Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems pp. 51-61

- Hoda Jannati
Volume 10, issue C, 2015
- A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures pp. 3-17

- Béla Genge, István Kiss and Piroska Haller
- Multilayer hybrid modeling framework for the performance assessment of interdependent critical infrastructures pp. 18-33

- Cen Nan and Giovanni Sansavini
- Risk mitigation strategies for critical infrastructures based on graph centrality analysis pp. 34-44

- George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou and Dimitris Gritzalis
- Constructing cost-effective and targetable industrial control system honeypots for production networks pp. 47-58

- Michael Winn, Mason Rice, Stephen Dunlap, Juan Lopez and Barry Mullins
- Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems pp. 59-70

- Noam Erez and Avishai Wool
Volume 9, issue C, 2015
- Policy networks—A threat to procedural and expert-based decision making and the quality of public risk decisions? pp. 3-12

- Vicki Johansson
- Multidisciplinary coordination of on-scene command teams in virtual emergency exercises pp. 13-23

- Theo van Ruijven, Igor Mayer and Mark de Bruijne
- Designing reliable and resilient smart low-voltage grids pp. 24-37

- Ebisa Negeri, Fernando Kuipers and Nico Baken
- Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process pp. 41-51

- Samuel J. Stone, Michael A. Temple and Rusty O. Baldwin
- A survey of cyber security management in industrial control systems pp. 52-80

- William Knowles, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso and Kevin Jones
Volume 8, issue C, 2015
- A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure pp. 3-15

- Zili Zhang, Xiangyang Li and Hengyun Li
- Critical infrastructure dependencies: A holistic, dynamic and quantitative approach pp. 16-23

- Ana Laugé, Josune Hernantes and Jose M. Sarriegi
- Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers pp. 27-39

- Benjamin W. Ramsey, Tyler D. Stubbs, Barry E. Mullins, Michael A. Temple and Mark A. Buckner
- A language for describing attacks on cyber-physical systems pp. 40-52

- Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue and Janos Sztipanovits
- Critical infrastructure protection: Requirements and challenges for the 21st century pp. 53-66

- Cristina Alcaraz and Sherali Zeadally
Volume 7, issue 4, 2014
- Vulnerabilities of cyber-physical systems to stale data—Determining the optimal time to launch attacks pp. 213-232

- Marina Krotofil, Alvaro Cárdenas, Jason Larsen and Dieter Gollmann
- Implementation of security and privacy in ePassports and the extended access control infrastructure pp. 233-243

- Antonia Rana and Luigi Sportiello
- Security considerations related to the use of mobile devices in the operation of critical infrastructures pp. 247-256

- Alessandro Armando, Alessio Merlo and Luca Verderame
- Analysis of pipeline accidents in the United States from 1968 to 2009 pp. 257-269

- Kyle Siler-Evans, Alex Hanson, Cecily Sunday, Nathan Leonard and Michele Tumminello
Volume 7, issue 3, 2014
- Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation pp. 141-154

- Ryan Farley and Xinyuan Wang
- Phasor measurement unit selection for unobservable electric power data integrity attack detection pp. 155-164

- Annarita Giani, Russell Bent and Feng Pan
- A computational asset vulnerability model for the strategic protection of the critical infrastructure pp. 167-177

- Richard White, Terrance Boult and Edward Chow
- Designing physical security for complex infrastructures pp. 178-192

- Rick Nunes-Vaz and Steven Lord
- Trust building and the European Reference Network for Critical Infrastructure Protection community pp. 193-210

- David Ward, Naouma Kourti, Alessandro Lazari and Piotr Cofta
Volume 7, issue 2, 2014
- Identifying critical infrastructure sectors and their dependencies: An Indian scenario pp. 71-85

- Abhishek Narain Singh, M.P. Gupta and Amitabh Ojha
- Fragility of oil as a critical infrastructure problem pp. 86-99

- Jaradat, Ra’ed M. and Charles B. Keating
- A framework for studying mortality arising from critical infrastructure loss pp. 100-111

- Athol Yates
- Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices pp. 114-123

- Roland Bodenheim, Jonathan Butts, Stephen Dunlap and Barry Mullins
- Whither cyberpower? pp. 124-137

- Jill Rowland, Mason Rice and Sujeet Shenoi
Volume 7, issue 1, 2014
- The anatomy of a cyber power pp. 3-11

- Jill Rowland, Mason Rice and Sujeet Shenoi
- Interdependency-induced risk with applications to healthcare pp. 12-26

- Polinpapilinho F. Katina, C. Ariel Pinto, Joseph M. Bradley and Patrick T. Hester
- Effect of air travel on the spread of an avian influenza pandemic to the United States pp. 27-47

- Necibe Tuncer and Trang Le
- Exposing vulnerabilities in electric power grids: An experimental approach pp. 51-60

- Luigi Coppolino, D׳Antonio, Salvatore and Luigi Romano
- An evaluation of modification attacks on programmable logic controllers pp. 61-68

- Carl Schuett, Jonathan Butts and Stephen Dunlap
| |