EconPapers    
Economics at your fingertips  
 

International Journal of Critical Infrastructure Protection

2008 - 2025

Current editor(s): Leon Strous

From Elsevier
Bibliographic data for series maintained by Catherine Liu ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 9, issue C, 2015

Policy networks—A threat to procedural and expert-based decision making and the quality of public risk decisions? pp. 3-12 Downloads
Vicki Johansson
Multidisciplinary coordination of on-scene command teams in virtual emergency exercises pp. 13-23 Downloads
Theo van Ruijven, Igor Mayer and Mark de Bruijne
Designing reliable and resilient smart low-voltage grids pp. 24-37 Downloads
Ebisa Negeri, Fernando Kuipers and Nico Baken
Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process pp. 41-51 Downloads
Samuel J. Stone, Michael A. Temple and Rusty O. Baldwin
A survey of cyber security management in industrial control systems pp. 52-80 Downloads
William Knowles, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso and Kevin Jones

Volume 8, issue C, 2015

A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure pp. 3-15 Downloads
Zili Zhang, Xiangyang Li and Hengyun Li
Critical infrastructure dependencies: A holistic, dynamic and quantitative approach pp. 16-23 Downloads
Ana Laugé, Josune Hernantes and Jose M. Sarriegi
Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers pp. 27-39 Downloads
Benjamin W. Ramsey, Tyler D. Stubbs, Barry E. Mullins, Michael A. Temple and Mark A. Buckner
A language for describing attacks on cyber-physical systems pp. 40-52 Downloads
Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue and Janos Sztipanovits
Critical infrastructure protection: Requirements and challenges for the 21st century pp. 53-66 Downloads
Cristina Alcaraz and Sherali Zeadally

Volume 7, issue 4, 2014

Vulnerabilities of cyber-physical systems to stale data—Determining the optimal time to launch attacks pp. 213-232 Downloads
Marina Krotofil, Alvaro Cárdenas, Jason Larsen and Dieter Gollmann
Implementation of security and privacy in ePassports and the extended access control infrastructure pp. 233-243 Downloads
Antonia Rana and Luigi Sportiello
Security considerations related to the use of mobile devices in the operation of critical infrastructures pp. 247-256 Downloads
Alessandro Armando, Alessio Merlo and Luca Verderame
Analysis of pipeline accidents in the United States from 1968 to 2009 pp. 257-269 Downloads
Kyle Siler-Evans, Alex Hanson, Cecily Sunday, Nathan Leonard and Michele Tumminello

Volume 7, issue 3, 2014

Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation pp. 141-154 Downloads
Ryan Farley and Xinyuan Wang
Phasor measurement unit selection for unobservable electric power data integrity attack detection pp. 155-164 Downloads
Annarita Giani, Russell Bent and Feng Pan
A computational asset vulnerability model for the strategic protection of the critical infrastructure pp. 167-177 Downloads
Richard White, Terrance Boult and Edward Chow
Designing physical security for complex infrastructures pp. 178-192 Downloads
Rick Nunes-Vaz and Steven Lord
Trust building and the European Reference Network for Critical Infrastructure Protection community pp. 193-210 Downloads
David Ward, Naouma Kourti, Alessandro Lazari and Piotr Cofta

Volume 7, issue 2, 2014

Identifying critical infrastructure sectors and their dependencies: An Indian scenario pp. 71-85 Downloads
Abhishek Narain Singh, M.P. Gupta and Amitabh Ojha
Fragility of oil as a critical infrastructure problem pp. 86-99 Downloads
Jaradat, Ra’ed M. and Charles B. Keating
A framework for studying mortality arising from critical infrastructure loss pp. 100-111 Downloads
Athol Yates
Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices pp. 114-123 Downloads
Roland Bodenheim, Jonathan Butts, Stephen Dunlap and Barry Mullins
Whither cyberpower? pp. 124-137 Downloads
Jill Rowland, Mason Rice and Sujeet Shenoi

Volume 7, issue 1, 2014

The anatomy of a cyber power pp. 3-11 Downloads
Jill Rowland, Mason Rice and Sujeet Shenoi
Interdependency-induced risk with applications to healthcare pp. 12-26 Downloads
Polinpapilinho F. Katina, C. Ariel Pinto, Joseph M. Bradley and Patrick T. Hester
Effect of air travel on the spread of an avian influenza pandemic to the United States pp. 27-47 Downloads
Necibe Tuncer and Trang Le
Exposing vulnerabilities in electric power grids: An experimental approach pp. 51-60 Downloads
Luigi Coppolino, D׳Antonio, Salvatore and Luigi Romano
An evaluation of modification attacks on programmable logic controllers pp. 61-68 Downloads
Carl Schuett, Jonathan Butts and Stephen Dunlap

Volume 6, issue 3, 2013

Threats to municipal information systems posed by aging infrastructure pp. 123-131 Downloads
Ginger Armbruster, Barbara Endicott-Popovsky and Jan Whittington
A methodology for designing robust and efficient hybrid monitoring systems pp. 132-146 Downloads
Luigi Sportiello
Flow whitelisting in SCADA networks pp. 150-158 Downloads
Rafael Ramos Regis Barbosa, Ramin Sadre and Aiko Pras
Towards end-to-end network resilience pp. 159-178 Downloads
Panagiotis Vlacheas, Vera Stavroulaki, Panagiotis Demestichas, Scott Cadzow, Demosthenes Ikonomou and Slawomir Gorniak
Security of European electricity systems: Conceptualizing the assessment criteria and core indicators pp. 182-196 Downloads
Rabindra Nepal and Tooraj Jamasb
Using interconnected risk maps to assess the threats faced by electricity infrastructures pp. 197-216 Downloads
Gabriel J. Correa-Henao, Jose M. Yusta and Roberto Lacal-Arántegui
Vulnerability modeling and analysis for critical infrastructure protection applications pp. 217-227 Downloads
Stefano Marrone, Roberto Nardone, Annarita Tedesco, Pasquale D'Amore, Valeria Vittorini, Roberto Setola, Francesca De Cillis and Nicola Mazzocca

Volume 6, issue 2, 2013

Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems pp. 63-75 Downloads
Niv Goldenberg and Avishai Wool
Firmware modification attacks on programmable logic controllers pp. 76-84 Downloads
Zachry Basnight, Jonathan Butts, Juan Lopez and Thomas Dube
Analysis of the effects of distributed denial-of-service attacks on MPLS networks pp. 87-95 Downloads
Béla Genge and Christos Siaterlis
Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis pp. 96-106 Downloads
Stephen Papa, William Casper and Tyler Moore
A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector pp. 107-119 Downloads
Justin Yates and Sujeevraja Sanjeevi

Volume 6, issue 1, 2013

Enhancing the security of aircraft surveillance in the next generation air traffic control system pp. 3-11 Downloads
Cindy Finke, Jonathan Butts, Robert Mills and Michael Grimaila
A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices pp. 12-24 Downloads
Jeffrey L. Hieb, Jacob Schreiver and James H. Graham
Crimeware-as-a-service—A survey of commoditized crimeware in the underground market pp. 28-38 Downloads
Aditya K. Sood and Richard J. Enbody
Realizing the promise of public-private partnerships in U.S. critical infrastructure protection pp. 39-50 Downloads
Austen D. Givens and Nathan E. Busch
European Reference Network for Critical Infrastructure Protection pp. 51-60 Downloads
Adam M. Lewis, David Ward, Lukasz Cyra and Naouma Kourti

Volume 5, issue 3, 2012

A global reference model of the domain name system pp. 108-117 Downloads
Yakup Koç, Almerima Jamakovic and Bart Gijsen
Modeling security in cyber–physical systems pp. 118-126 Downloads
Mike Burmester, Emmanouil Magkos and Vassilis Chrissikopoulos
Modeling and reasoning about the security of drive-by-wire automobile systems pp. 127-134 Downloads
Gerry Howser and Bruce McMillin
Analysis of requirements for critical control systems pp. 137-145 Downloads
Cristina Alcaraz and Javier Lopez
Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks pp. 146-153 Downloads
Daniel P. Shepard, Todd E. Humphreys and Aaron A. Fansler
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems pp. 154-174 Downloads
Bradley Reaves and Thomas Morris

Volume 5, issue 2, 2012

Are we prepared for the economic risk resulting from telecom hotel disruptions? pp. 55-65 Downloads
Ginger Armbruster, Barbara Endicott-Popovsky and Jan Whittington
Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure pp. 66-73 Downloads
Samuel Stone and Michael Temple
Intrusion detection for resource-constrained embedded control systems in the power grid pp. 74-83 Downloads
Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus and Sean Smith
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures pp. 86-97 Downloads
Marco Castrucci, Alessandro Neri, Filipe Caldeira, Jocelyn Aubert, Djamel Khadraoui, Matthieu Aubigny, Carlo Harpes, Paulo Simões, Vincenzo Suraci and Paolo Capodieci
Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC) pp. 98-103 Downloads
Casey Deccio

Volume 5, issue 1, 2012

Analysis of the security of VPN configurations in industrial control environments pp. 3-13 Downloads
Sanaz Rahimi and Mehdi Zargham
Quantification of dependencies between electrical and information infrastructures pp. 14-27 Downloads
Marco Beccuti, Silvano Chiaradonna, Felicita Di Giandomenico, Susanna Donatelli, Giovanna Dondossola and Giuliana Franceschinis
Creating a cyber moving target for critical infrastructure applications using platform diversity pp. 30-39 Downloads
Hamed Okhravi, Adam Comella, Eric Robinson and Joshua Haines
Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling pp. 40-52 Downloads
Daniel Guernsey, Mason Rice and Sujeet Shenoi
Page updated 2025-06-08