EconPapers    
Economics at your fingertips  
 

International Journal of Critical Infrastructure Protection

2008 - 2025

Current editor(s): Leon Strous

From Elsevier
Bibliographic data for series maintained by Catherine Liu ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 14, issue C, 2016

Quantitative evaluation of the synergistic effects of failures in a critical infrastructure system pp. 3-17 Downloads
David Rehak, Jiri Markuci, Martin Hromada and Karla Barcova
A methodology for modeling and measuring interdependencies of information and communications systems used for public administration and eGovernment services pp. 18-27 Downloads
Antonio De Nicola, Maria Luisa Villani, Maria Cristina Brugnoli and Gregorio D'Agostino
Towards comparable cross-sector risk analyses: A re-examination of the Risk Analysis and Management for Critical Asset Protection (RAMCAP) methodology pp. 28-40 Downloads
Richard White, Aaron Burkhart, Randy George, Terrance Boult and Edward Chow
A framework for incorporating insurance in critical infrastructure cyber risk strategies pp. 43-57 Downloads
Derek Young, Juan Lopez, Mason Rice, Benjamin Ramsey and Robert McTasney
Using 3D printers as weapons pp. 58-71 Downloads
Mark Yampolskiy, Anthony Skjellum, Michael Kretzschmar, Ruel A. Overfelt, Kenneth R. Sloan and Alec Yasinsac

Volume 13, issue C, 2016

An analytical model for benchmarking the development of national infrastructure items against those in similar countries pp. 3-18 Downloads
Shih-Hsu Wang
Evaluating the readiness of cyber first responders responsible for critical infrastructure protection pp. 19-27 Downloads
Jungsang Yoon, Stephen Dunlap, Jonathan Butts, Mason Rice and Benjamin Ramsey
Designing an emergency continuity plan for a megacity government: A conceptual framework for coping with natural catastrophes pp. 28-35 Downloads
Qin-Ying Sun, Xiang-Yang Li and Feng Yu
A novel security information and event management system for enhancing cyber security in a hydroelectric dam pp. 39-51 Downloads
Cesario Di Sarno, Alessia Garofalo, Ilaria Matteucci and Marco Vallini
Exploiting traffic periodicity in industrial control networks pp. 52-62 Downloads
Rafael Ramos Regis Barbosa, Ramin Sadre and Aiko Pras

Volume 12, issue C, 2016

Objectives for managing cyber supply chain risk pp. 4-11 Downloads
Marjorie Windelberg
Current practices and challenges in industrial control organizations regarding information security incident management – Does size matter? Information security incident management in large and small industrial control organizations pp. 12-26 Downloads
Maria Bartnes Line, Inger Anne Tøndel and Martin G. Jaatun
New centrality measures for assessing smart grid vulnerabilities and predicting brownouts and blackouts pp. 29-45 Downloads
Pravin Chopade and Marwan Bikdash
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures pp. 46-60 Downloads
George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Georgia Lykou and Dimitris Gritzalis
Integrated roadmap for the rapid finding and tracking of people at large airports pp. 61-74 Downloads
Henri Bouma, Jeroen van Rest, Kim van Buul-Besseling, Jacomien de Jong and Anton Havekes

Volume 11, issue C, 2015

WikiLeaks and the risks to critical foreign dependencies pp. 3-11 Downloads
Daniel Arce
Regional response to large-scale emergency events: Building on historical data pp. 12-21 Downloads
Carol Romanowski, Rajendra Raj, Jennifer Schneider, Sumita Mishra, Vinay Shivshankar, Srikant Ayengar and Fernando Cueva
Experimental assessment of network design approaches for protecting industrial control systems pp. 24-38 Downloads
Béla Genge, Flavius Graur and Piroska Haller
A multi-layered and kill-chain based security analysis framework for cyber-physical systems pp. 39-50 Downloads
Adam Hahn, Roshan K. Thomas, Ivan Lozano and Alvaro Cardenas
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems pp. 51-61 Downloads
Hoda Jannati

Volume 10, issue C, 2015

A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures pp. 3-17 Downloads
Béla Genge, István Kiss and Piroska Haller
Multilayer hybrid modeling framework for the performance assessment of interdependent critical infrastructures pp. 18-33 Downloads
Cen Nan and Giovanni Sansavini
Risk mitigation strategies for critical infrastructures based on graph centrality analysis pp. 34-44 Downloads
George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou and Dimitris Gritzalis
Constructing cost-effective and targetable industrial control system honeypots for production networks pp. 47-58 Downloads
Michael Winn, Mason Rice, Stephen Dunlap, Juan Lopez and Barry Mullins
Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems pp. 59-70 Downloads
Noam Erez and Avishai Wool

Volume 9, issue C, 2015

Policy networks—A threat to procedural and expert-based decision making and the quality of public risk decisions? pp. 3-12 Downloads
Vicki Johansson
Multidisciplinary coordination of on-scene command teams in virtual emergency exercises pp. 13-23 Downloads
Theo van Ruijven, Igor Mayer and Mark de Bruijne
Designing reliable and resilient smart low-voltage grids pp. 24-37 Downloads
Ebisa Negeri, Fernando Kuipers and Nico Baken
Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process pp. 41-51 Downloads
Samuel J. Stone, Michael A. Temple and Rusty O. Baldwin
A survey of cyber security management in industrial control systems pp. 52-80 Downloads
William Knowles, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso and Kevin Jones

Volume 8, issue C, 2015

A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure pp. 3-15 Downloads
Zili Zhang, Xiangyang Li and Hengyun Li
Critical infrastructure dependencies: A holistic, dynamic and quantitative approach pp. 16-23 Downloads
Ana Laugé, Josune Hernantes and Jose M. Sarriegi
Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers pp. 27-39 Downloads
Benjamin W. Ramsey, Tyler D. Stubbs, Barry E. Mullins, Michael A. Temple and Mark A. Buckner
A language for describing attacks on cyber-physical systems pp. 40-52 Downloads
Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue and Janos Sztipanovits
Critical infrastructure protection: Requirements and challenges for the 21st century pp. 53-66 Downloads
Cristina Alcaraz and Sherali Zeadally

Volume 7, issue 4, 2014

Vulnerabilities of cyber-physical systems to stale data—Determining the optimal time to launch attacks pp. 213-232 Downloads
Marina Krotofil, Alvaro Cárdenas, Jason Larsen and Dieter Gollmann
Implementation of security and privacy in ePassports and the extended access control infrastructure pp. 233-243 Downloads
Antonia Rana and Luigi Sportiello
Security considerations related to the use of mobile devices in the operation of critical infrastructures pp. 247-256 Downloads
Alessandro Armando, Alessio Merlo and Luca Verderame
Analysis of pipeline accidents in the United States from 1968 to 2009 pp. 257-269 Downloads
Kyle Siler-Evans, Alex Hanson, Cecily Sunday, Nathan Leonard and Michele Tumminello

Volume 7, issue 3, 2014

Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation pp. 141-154 Downloads
Ryan Farley and Xinyuan Wang
Phasor measurement unit selection for unobservable electric power data integrity attack detection pp. 155-164 Downloads
Annarita Giani, Russell Bent and Feng Pan
A computational asset vulnerability model for the strategic protection of the critical infrastructure pp. 167-177 Downloads
Richard White, Terrance Boult and Edward Chow
Designing physical security for complex infrastructures pp. 178-192 Downloads
Rick Nunes-Vaz and Steven Lord
Trust building and the European Reference Network for Critical Infrastructure Protection community pp. 193-210 Downloads
David Ward, Naouma Kourti, Alessandro Lazari and Piotr Cofta

Volume 7, issue 2, 2014

Identifying critical infrastructure sectors and their dependencies: An Indian scenario pp. 71-85 Downloads
Abhishek Narain Singh, M.P. Gupta and Amitabh Ojha
Fragility of oil as a critical infrastructure problem pp. 86-99 Downloads
Jaradat, Ra’ed M. and Charles B. Keating
A framework for studying mortality arising from critical infrastructure loss pp. 100-111 Downloads
Athol Yates
Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices pp. 114-123 Downloads
Roland Bodenheim, Jonathan Butts, Stephen Dunlap and Barry Mullins
Whither cyberpower? pp. 124-137 Downloads
Jill Rowland, Mason Rice and Sujeet Shenoi

Volume 7, issue 1, 2014

The anatomy of a cyber power pp. 3-11 Downloads
Jill Rowland, Mason Rice and Sujeet Shenoi
Interdependency-induced risk with applications to healthcare pp. 12-26 Downloads
Polinpapilinho F. Katina, C. Ariel Pinto, Joseph M. Bradley and Patrick T. Hester
Effect of air travel on the spread of an avian influenza pandemic to the United States pp. 27-47 Downloads
Necibe Tuncer and Trang Le
Exposing vulnerabilities in electric power grids: An experimental approach pp. 51-60 Downloads
Luigi Coppolino, D׳Antonio, Salvatore and Luigi Romano
An evaluation of modification attacks on programmable logic controllers pp. 61-68 Downloads
Carl Schuett, Jonathan Butts and Stephen Dunlap
Page updated 2025-03-31