EconPapers    
Economics at your fingertips  
 

International Journal of Critical Infrastructure Protection

2008 - 2025

Current editor(s): Leon Strous

From Elsevier
Bibliographic data for series maintained by Catherine Liu ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 19, issue C, 2017

Comparative analysis of the security of configuration protocols for industrial control devices pp. 4-15 Downloads
Luis Martín-Liras, Miguel A. Prada, Juan J. Fuertes, Antonio Morán, Serafín Alonso and Manuel Domínguez
Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system pp. 16-31 Downloads
Mohsen Riahi Manesh and Naima Kaabouch
A cyber risk scoring system for medical devices pp. 32-46 Downloads
Ian Stine, Mason Rice, Stephen Dunlap and John Pecarina
On the harms arising from the Equifax data breach of 2017 pp. 47-48 Downloads
Tyler Moore
Information and power terminals: A reliable microgrid infrastructure for use in disaster scenarios pp. 49-58 Downloads
Pio Lombardi, Kathleen Hänsch, Bartlomiej Arendarski and Przemyslaw Komarnicki
An improved authentication protocol for distributed mobile cloud computing services pp. 59-67 Downloads
Hoda Jannati and Behnam Bahrak

Volume 18, issue C, 2017

Security analysis of an advanced metering infrastructure pp. 3-19 Downloads
Aaron Hansen, Jason Staggs and Sujeet Shenoi
Cybersecurity protection for power grid control infrastructures pp. 20-33 Downloads
Jacek Jarmakiewicz, Krzysztof Parobczak and Krzysztof Maślanka
Smart grids: And the bad news is? pp. 34-36 Downloads
Hendricus (Eric) Antonius Maria Luiijf,
Measuring the organizational resilience of critical infrastructure providers: A New Zealand case study pp. 37-49 Downloads
Charlotte Brown, Erica Seville and John Vargo
Risk assessment of critical infrastructures – New parameters for commercial ports pp. 50-57 Downloads
David Romero-Faz and Alberto Camarero-Orive
Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections pp. 58-70 Downloads
Jose Gutierrez del Arroyo, Jason Bindewald, Scott Graham and Mason Rice

Volume 17, issue C, 2017

Wind farm security: attack surface, targets, scenarios and mitigation pp. 3-14 Downloads
Jason Staggs, David Ferlemann and Sujeet Shenoi
Distributed monitoring for the prevention of cascading failures in operational power grids pp. 15-27 Downloads
Martijn Warnier, Stefan Dulman, Yakup Koç and Eric Pauwels
Improving the cyber resilience of industrial control systems pp. 30-48 Downloads
Andrew Chaves, Mason Rice, Stephen Dunlap and John Pecarina
Cyber resilience preparedness of Africa’s top-12 emerging economies pp. 49-59 Downloads
Ada S. Peter
Using geographic information science to evaluate legal restrictions on freight transportation routing in disruptive scenarios pp. 60-74 Downloads
Marc R. Fialkoff, Olufemi A. Omitaomu, Steven K. Peterson and Mark A. Tuttle

Volume 16, issue C, 2017

Using interdependency matrices to mitigate targeted attacks on interdependent networks: A case study involving a power grid and backbone telecommunications networks pp. 3-12 Downloads
Diego F. Rueda and Eusebi Calle
Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory pp. 13-25 Downloads
Xiaoxue Liu, Jiexin Zhang and Peidong Zhu
A methodology for determining the image base of ARM-based industrial control system firmware pp. 26-35 Downloads
Ruijin Zhu, Baofeng Zhang, Junjie Mao, Quanxin Zhang and Yu-an Tan
A fuzzy model for evaluating metal detection equipment at airport security screening checkpoints pp. 39-48 Downloads
Jacek Skorupski and Piotr Uchroński
Infrastructure financing and development: A bibliometric review pp. 49-65 Downloads
Anita Kumari and Anil Kumar Sharma

Volume 15, issue C, 2016

A framework for designing resilient distributed intrusion detection systems for critical infrastructures pp. 3-11 Downloads
Béla Genge, Piroska Haller and István Kiss
Using timing-based side channels for anomaly detection in industrial control systems pp. 12-26 Downloads
Stephen Dunlap, Jonathan Butts, Juan Lopez, Mason Rice and Barry Mullins
Implementation of error detection and correction in the Modbus-RTU serial protocol pp. 27-37 Downloads
Claudio Urrea, Claudio Morales and John Kern
System specifications for developing an Automatic Dependent Surveillance-Broadcast (ADS-B) monitoring system pp. 40-46 Downloads
Busyairah Syd Ali
A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness pp. 47-59 Downloads
Bilge Karabacak, Sevgi Ozkan Yildirim and Nazife Baykal

Volume 14, issue C, 2016

Quantitative evaluation of the synergistic effects of failures in a critical infrastructure system pp. 3-17 Downloads
David Rehak, Jiri Markuci, Martin Hromada and Karla Barcova
A methodology for modeling and measuring interdependencies of information and communications systems used for public administration and eGovernment services pp. 18-27 Downloads
Antonio De Nicola, Maria Luisa Villani, Maria Cristina Brugnoli and Gregorio D'Agostino
Towards comparable cross-sector risk analyses: A re-examination of the Risk Analysis and Management for Critical Asset Protection (RAMCAP) methodology pp. 28-40 Downloads
Richard White, Aaron Burkhart, Randy George, Terrance Boult and Edward Chow
A framework for incorporating insurance in critical infrastructure cyber risk strategies pp. 43-57 Downloads
Derek Young, Juan Lopez, Mason Rice, Benjamin Ramsey and Robert McTasney
Using 3D printers as weapons pp. 58-71 Downloads
Mark Yampolskiy, Anthony Skjellum, Michael Kretzschmar, Ruel A. Overfelt, Kenneth R. Sloan and Alec Yasinsac

Volume 13, issue C, 2016

An analytical model for benchmarking the development of national infrastructure items against those in similar countries pp. 3-18 Downloads
Shih-Hsu Wang
Evaluating the readiness of cyber first responders responsible for critical infrastructure protection pp. 19-27 Downloads
Jungsang Yoon, Stephen Dunlap, Jonathan Butts, Mason Rice and Benjamin Ramsey
Designing an emergency continuity plan for a megacity government: A conceptual framework for coping with natural catastrophes pp. 28-35 Downloads
Qin-Ying Sun, Xiang-Yang Li and Feng Yu
A novel security information and event management system for enhancing cyber security in a hydroelectric dam pp. 39-51 Downloads
Cesario Di Sarno, Alessia Garofalo, Ilaria Matteucci and Marco Vallini
Exploiting traffic periodicity in industrial control networks pp. 52-62 Downloads
Rafael Ramos Regis Barbosa, Ramin Sadre and Aiko Pras

Volume 12, issue C, 2016

Objectives for managing cyber supply chain risk pp. 4-11 Downloads
Marjorie Windelberg
Current practices and challenges in industrial control organizations regarding information security incident management – Does size matter? Information security incident management in large and small industrial control organizations pp. 12-26 Downloads
Maria Bartnes Line, Inger Anne Tøndel and Martin G. Jaatun
New centrality measures for assessing smart grid vulnerabilities and predicting brownouts and blackouts pp. 29-45 Downloads
Pravin Chopade and Marwan Bikdash
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures pp. 46-60 Downloads
George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou, Georgia Lykou and Dimitris Gritzalis
Integrated roadmap for the rapid finding and tracking of people at large airports pp. 61-74 Downloads
Henri Bouma, Jeroen van Rest, Kim van Buul-Besseling, Jacomien de Jong and Anton Havekes

Volume 11, issue C, 2015

WikiLeaks and the risks to critical foreign dependencies pp. 3-11 Downloads
Daniel Arce
Regional response to large-scale emergency events: Building on historical data pp. 12-21 Downloads
Carol Romanowski, Rajendra Raj, Jennifer Schneider, Sumita Mishra, Vinay Shivshankar, Srikant Ayengar and Fernando Cueva
Experimental assessment of network design approaches for protecting industrial control systems pp. 24-38 Downloads
Béla Genge, Flavius Graur and Piroska Haller
A multi-layered and kill-chain based security analysis framework for cyber-physical systems pp. 39-50 Downloads
Adam Hahn, Roshan K. Thomas, Ivan Lozano and Alvaro Cardenas
Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems pp. 51-61 Downloads
Hoda Jannati

Volume 10, issue C, 2015

A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures pp. 3-17 Downloads
Béla Genge, István Kiss and Piroska Haller
Multilayer hybrid modeling framework for the performance assessment of interdependent critical infrastructures pp. 18-33 Downloads
Cen Nan and Giovanni Sansavini
Risk mitigation strategies for critical infrastructures based on graph centrality analysis pp. 34-44 Downloads
George Stergiopoulos, Panayiotis Kotzanikolaou, Marianthi Theocharidou and Dimitris Gritzalis
Constructing cost-effective and targetable industrial control system honeypots for production networks pp. 47-58 Downloads
Michael Winn, Mason Rice, Stephen Dunlap, Juan Lopez and Barry Mullins
Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems pp. 59-70 Downloads
Noam Erez and Avishai Wool
Page updated 2025-06-08