EconPapers    
Economics at your fingertips  
 

International Journal of Critical Infrastructure Protection

2008 - 2025

Current editor(s): Leon Strous

From Elsevier
Bibliographic data for series maintained by Catherine Liu ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 6, issue 3, 2013

Threats to municipal information systems posed by aging infrastructure pp. 123-131 Downloads
Ginger Armbruster, Barbara Endicott-Popovsky and Jan Whittington
A methodology for designing robust and efficient hybrid monitoring systems pp. 132-146 Downloads
Luigi Sportiello
Flow whitelisting in SCADA networks pp. 150-158 Downloads
Rafael Ramos Regis Barbosa, Ramin Sadre and Aiko Pras
Towards end-to-end network resilience pp. 159-178 Downloads
Panagiotis Vlacheas, Vera Stavroulaki, Panagiotis Demestichas, Scott Cadzow, Demosthenes Ikonomou and Slawomir Gorniak
Security of European electricity systems: Conceptualizing the assessment criteria and core indicators pp. 182-196 Downloads
Rabindra Nepal and Tooraj Jamasb
Using interconnected risk maps to assess the threats faced by electricity infrastructures pp. 197-216 Downloads
Gabriel J. Correa-Henao, Jose M. Yusta and Roberto Lacal-Arántegui
Vulnerability modeling and analysis for critical infrastructure protection applications pp. 217-227 Downloads
Stefano Marrone, Roberto Nardone, Annarita Tedesco, Pasquale D'Amore, Valeria Vittorini, Roberto Setola, Francesca De Cillis and Nicola Mazzocca

Volume 6, issue 2, 2013

Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems pp. 63-75 Downloads
Niv Goldenberg and Avishai Wool
Firmware modification attacks on programmable logic controllers pp. 76-84 Downloads
Zachry Basnight, Jonathan Butts, Juan Lopez and Thomas Dube
Analysis of the effects of distributed denial-of-service attacks on MPLS networks pp. 87-95 Downloads
Béla Genge and Christos Siaterlis
Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis pp. 96-106 Downloads
Stephen Papa, William Casper and Tyler Moore
A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector pp. 107-119 Downloads
Justin Yates and Sujeevraja Sanjeevi

Volume 6, issue 1, 2013

Enhancing the security of aircraft surveillance in the next generation air traffic control system pp. 3-11 Downloads
Cindy Finke, Jonathan Butts, Robert Mills and Michael Grimaila
A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices pp. 12-24 Downloads
Jeffrey L. Hieb, Jacob Schreiver and James H. Graham
Crimeware-as-a-service—A survey of commoditized crimeware in the underground market pp. 28-38 Downloads
Aditya K. Sood and Richard J. Enbody
Realizing the promise of public-private partnerships in U.S. critical infrastructure protection pp. 39-50 Downloads
Austen D. Givens and Nathan E. Busch
European Reference Network for Critical Infrastructure Protection pp. 51-60 Downloads
Adam M. Lewis, David Ward, Lukasz Cyra and Naouma Kourti

Volume 5, issue 3, 2012

A global reference model of the domain name system pp. 108-117 Downloads
Yakup Koç, Almerima Jamakovic and Bart Gijsen
Modeling security in cyber–physical systems pp. 118-126 Downloads
Mike Burmester, Emmanouil Magkos and Vassilis Chrissikopoulos
Modeling and reasoning about the security of drive-by-wire automobile systems pp. 127-134 Downloads
Gerry Howser and Bruce McMillin
Analysis of requirements for critical control systems pp. 137-145 Downloads
Cristina Alcaraz and Javier Lopez
Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks pp. 146-153 Downloads
Daniel P. Shepard, Todd E. Humphreys and Aaron A. Fansler
Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems pp. 154-174 Downloads
Bradley Reaves and Thomas Morris

Volume 5, issue 2, 2012

Are we prepared for the economic risk resulting from telecom hotel disruptions? pp. 55-65 Downloads
Ginger Armbruster, Barbara Endicott-Popovsky and Jan Whittington
Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure pp. 66-73 Downloads
Samuel Stone and Michael Temple
Intrusion detection for resource-constrained embedded control systems in the power grid pp. 74-83 Downloads
Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus and Sean Smith
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures pp. 86-97 Downloads
Marco Castrucci, Alessandro Neri, Filipe Caldeira, Jocelyn Aubert, Djamel Khadraoui, Matthieu Aubigny, Carlo Harpes, Paulo Simões, Vincenzo Suraci and Paolo Capodieci
Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC) pp. 98-103 Downloads
Casey Deccio

Volume 5, issue 1, 2012

Analysis of the security of VPN configurations in industrial control environments pp. 3-13 Downloads
Sanaz Rahimi and Mehdi Zargham
Quantification of dependencies between electrical and information infrastructures pp. 14-27 Downloads
Marco Beccuti, Silvano Chiaradonna, Felicita Di Giandomenico, Susanna Donatelli, Giovanna Dondossola and Giuliana Franceschinis
Creating a cyber moving target for critical infrastructure applications using platform diversity pp. 30-39 Downloads
Hamed Okhravi, Adam Comella, Eric Robinson and Joshua Haines
Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling pp. 40-52 Downloads
Daniel Guernsey, Mason Rice and Sujeet Shenoi

Volume 4, issue 3, 2011

A dependable architecture to mitigate distributed denial of service attacks on network-based control systems pp. 107-123 Downloads
Hakem Beitollahi and Geert Deconinck
Assessing and improving SCADA security in the Dutch drinking water sector pp. 124-134 Downloads
Eric Luiijf, Manou Ali and Annemarie Zielstra
An IP based platform for emergency calls and reporting pp. 137-153 Downloads
Yacine Rebahi, Tran Quang Thanh, Mao Tong, Fernando López, José Manuel López, Luis A. Teixeira and Nelson Blanco
A survey of system security in contactless electronic passports pp. 154-164 Downloads
Anshuman Sinha
Fuzzy dynamic input–output inoperability model pp. 165-175 Downloads
Gabriele Oliva, Stefano Panzieri and Roberto Setola

Volume 4, issue 2, 2011

A signaling framework to deter aggression in cyberspace pp. 57-65 Downloads
Mason Rice, Jonathan Butts and Sujeet Shenoi
An exploration of defensive deception in industrial communication networks pp. 66-75 Downloads
Julian L. Rrushi
Control systems personnel are from Mars; IT personnel are from Venus pp. 76-77 Downloads
William Arthur Conklin
Security analysis of the ADS-B implementation in the next generation air transportation system pp. 78-87 Downloads
Donald McCallie, Jonathan Butts and Robert Mills
A control system testbed to validate critical infrastructure protection concepts pp. 88-103 Downloads
Thomas Morris, Anurag Srivastava, Bradley Reaves, Wei Gao, Kalyan Pavurapu and Ram Reddi

Volume 4, issue 1, 2011

May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats? pp. 3-13 Downloads
Mason Rice, Robert Miller and Sujeet Shenoi
A decision-analysis approach for optimal airport security pp. 14-21 Downloads
Arthur Gerstenfeld and Paul D. Berger
Definition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems pp. 24-40 Downloads
Silvano Chiaradonna, Felicita Di Giandomenico and Paolo Lollini
An integrated framework for control system simulation and regulatory compliance monitoring pp. 41-53 Downloads
William Mahoney and Robin A. Gandhi

Volume 3, issue 3, 2010

The economics of cybersecurity: Principles and policy options pp. 103-117 Downloads
Tyler Moore
Applying public health strategies to the protection of cyberspace pp. 118-127 Downloads
Mason Rice, Jonathan Butts, Robert Miller and Sujeet Shenoi
The interdependent security problem in the defense industrial base: An agent-based model on a social network pp. 128-139 Downloads
Forrest Hare and Jonathan Goldstein
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure pp. 140-156 Downloads
Gianmarco Baldini, Igor Nai Fovino, Marcelo Masera, Marco Luise, Vincenzo Pellegrini, Enzo Bagagli, Giuseppe Rubino, Raffaele Malangone, Marcoccio Stefano and Fabio Senesi
Analysis of information flow security in cyber–physical systems pp. 157-173 Downloads
Ravi Akella, Han Tang and Bruce M. McMillin
Long-lived authentication protocols for process control systems pp. 174-181 Downloads
Rasika Chakravarthy, Carl Hauser and David E. Bakken

Volume 3, issue 2, 2010

The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety” pp. 55-66 Downloads
Ludovic Piètre-Cambacédès and Claude Chaudet
Coupled Petri nets for computer network risk analysis pp. 67-75 Downloads
Matthew H. Henry, Ryan M. Layer and David R. Zaret
Agent-based input–output interdependency model pp. 76-82 Downloads
Gabriele Oliva, Stefano Panzieri and Roberto Setola
Risk-informed assessment of regional preparedness: A case study of emergency potable water for hurricane response in Southeast Virginia pp. 83-98 Downloads
Kenneth G. Crowther

Volume 3, issue 1, 2010

An analysis of the legality of government-mandated computer inoculations pp. 5-15 Downloads
Mason Rice, Jonathan Butts, Robert Miller and Sujeet Shenoi
Critical infrastructure protection under imperfect attacker perception pp. 16-26 Downloads
Erik Jenelius, Jonas Westin and Åke J. Holmgren
Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure pp. 29-40 Downloads
Mark G. Stewart
How secure is the next generation of IP-based emergency services architecture? pp. 41-50 Downloads
Hannes Tschofenig, Mayutan Arumaithurai, Henning Schulzrinne and Bernard Aboba
Page updated 2025-03-31