International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 9, issue C, 2015
- Policy networks—A threat to procedural and expert-based decision making and the quality of public risk decisions? pp. 3-12

- Vicki Johansson
- Multidisciplinary coordination of on-scene command teams in virtual emergency exercises pp. 13-23

- Theo van Ruijven, Igor Mayer and Mark de Bruijne
- Designing reliable and resilient smart low-voltage grids pp. 24-37

- Ebisa Negeri, Fernando Kuipers and Nico Baken
- Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process pp. 41-51

- Samuel J. Stone, Michael A. Temple and Rusty O. Baldwin
- A survey of cyber security management in industrial control systems pp. 52-80

- William Knowles, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso and Kevin Jones
Volume 8, issue C, 2015
- A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure pp. 3-15

- Zili Zhang, Xiangyang Li and Hengyun Li
- Critical infrastructure dependencies: A holistic, dynamic and quantitative approach pp. 16-23

- Ana Laugé, Josune Hernantes and Jose M. Sarriegi
- Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers pp. 27-39

- Benjamin W. Ramsey, Tyler D. Stubbs, Barry E. Mullins, Michael A. Temple and Mark A. Buckner
- A language for describing attacks on cyber-physical systems pp. 40-52

- Mark Yampolskiy, Péter Horváth, Xenofon D. Koutsoukos, Yuan Xue and Janos Sztipanovits
- Critical infrastructure protection: Requirements and challenges for the 21st century pp. 53-66

- Cristina Alcaraz and Sherali Zeadally
Volume 7, issue 4, 2014
- Vulnerabilities of cyber-physical systems to stale data—Determining the optimal time to launch attacks pp. 213-232

- Marina Krotofil, Alvaro Cárdenas, Jason Larsen and Dieter Gollmann
- Implementation of security and privacy in ePassports and the extended access control infrastructure pp. 233-243

- Antonia Rana and Luigi Sportiello
- Security considerations related to the use of mobile devices in the operation of critical infrastructures pp. 247-256

- Alessandro Armando, Alessio Merlo and Luca Verderame
- Analysis of pipeline accidents in the United States from 1968 to 2009 pp. 257-269

- Kyle Siler-Evans, Alex Hanson, Cecily Sunday, Nathan Leonard and Michele Tumminello
Volume 7, issue 3, 2014
- Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation pp. 141-154

- Ryan Farley and Xinyuan Wang
- Phasor measurement unit selection for unobservable electric power data integrity attack detection pp. 155-164

- Annarita Giani, Russell Bent and Feng Pan
- A computational asset vulnerability model for the strategic protection of the critical infrastructure pp. 167-177

- Richard White, Terrance Boult and Edward Chow
- Designing physical security for complex infrastructures pp. 178-192

- Rick Nunes-Vaz and Steven Lord
- Trust building and the European Reference Network for Critical Infrastructure Protection community pp. 193-210

- David Ward, Naouma Kourti, Alessandro Lazari and Piotr Cofta
Volume 7, issue 2, 2014
- Identifying critical infrastructure sectors and their dependencies: An Indian scenario pp. 71-85

- Abhishek Narain Singh, M.P. Gupta and Amitabh Ojha
- Fragility of oil as a critical infrastructure problem pp. 86-99

- Jaradat, Ra’ed M. and Charles B. Keating
- A framework for studying mortality arising from critical infrastructure loss pp. 100-111

- Athol Yates
- Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices pp. 114-123

- Roland Bodenheim, Jonathan Butts, Stephen Dunlap and Barry Mullins
- Whither cyberpower? pp. 124-137

- Jill Rowland, Mason Rice and Sujeet Shenoi
Volume 7, issue 1, 2014
- The anatomy of a cyber power pp. 3-11

- Jill Rowland, Mason Rice and Sujeet Shenoi
- Interdependency-induced risk with applications to healthcare pp. 12-26

- Polinpapilinho F. Katina, C. Ariel Pinto, Joseph M. Bradley and Patrick T. Hester
- Effect of air travel on the spread of an avian influenza pandemic to the United States pp. 27-47

- Necibe Tuncer and Trang Le
- Exposing vulnerabilities in electric power grids: An experimental approach pp. 51-60

- Luigi Coppolino, D׳Antonio, Salvatore and Luigi Romano
- An evaluation of modification attacks on programmable logic controllers pp. 61-68

- Carl Schuett, Jonathan Butts and Stephen Dunlap
Volume 6, issue 3, 2013
- Threats to municipal information systems posed by aging infrastructure pp. 123-131

- Ginger Armbruster, Barbara Endicott-Popovsky and Jan Whittington
- A methodology for designing robust and efficient hybrid monitoring systems pp. 132-146

- Luigi Sportiello
- Flow whitelisting in SCADA networks pp. 150-158

- Rafael Ramos Regis Barbosa, Ramin Sadre and Aiko Pras
- Towards end-to-end network resilience pp. 159-178

- Panagiotis Vlacheas, Vera Stavroulaki, Panagiotis Demestichas, Scott Cadzow, Demosthenes Ikonomou and Slawomir Gorniak
- Security of European electricity systems: Conceptualizing the assessment criteria and core indicators pp. 182-196

- Rabindra Nepal and Tooraj Jamasb
- Using interconnected risk maps to assess the threats faced by electricity infrastructures pp. 197-216

- Gabriel J. Correa-Henao, Jose M. Yusta and Roberto Lacal-Arántegui
- Vulnerability modeling and analysis for critical infrastructure protection applications pp. 217-227

- Stefano Marrone, Roberto Nardone, Annarita Tedesco, Pasquale D'Amore, Valeria Vittorini, Roberto Setola, Francesca De Cillis and Nicola Mazzocca
Volume 6, issue 2, 2013
- Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems pp. 63-75

- Niv Goldenberg and Avishai Wool
- Firmware modification attacks on programmable logic controllers pp. 76-84

- Zachry Basnight, Jonathan Butts, Juan Lopez and Thomas Dube
- Analysis of the effects of distributed denial-of-service attacks on MPLS networks pp. 87-95

- Béla Genge and Christos Siaterlis
- Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis pp. 96-106

- Stephen Papa, William Casper and Tyler Moore
- A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector pp. 107-119

- Justin Yates and Sujeevraja Sanjeevi
Volume 6, issue 1, 2013
- Enhancing the security of aircraft surveillance in the next generation air traffic control system pp. 3-11

- Cindy Finke, Jonathan Butts, Robert Mills and Michael Grimaila
- A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices pp. 12-24

- Jeffrey L. Hieb, Jacob Schreiver and James H. Graham
- Crimeware-as-a-service—A survey of commoditized crimeware in the underground market pp. 28-38

- Aditya K. Sood and Richard J. Enbody
- Realizing the promise of public-private partnerships in U.S. critical infrastructure protection pp. 39-50

- Austen D. Givens and Nathan E. Busch
- European Reference Network for Critical Infrastructure Protection pp. 51-60

- Adam M. Lewis, David Ward, Lukasz Cyra and Naouma Kourti
Volume 5, issue 3, 2012
- A global reference model of the domain name system pp. 108-117

- Yakup Koç, Almerima Jamakovic and Bart Gijsen
- Modeling security in cyber–physical systems pp. 118-126

- Mike Burmester, Emmanouil Magkos and Vassilis Chrissikopoulos
- Modeling and reasoning about the security of drive-by-wire automobile systems pp. 127-134

- Gerry Howser and Bruce McMillin
- Analysis of requirements for critical control systems pp. 137-145

- Cristina Alcaraz and Javier Lopez
- Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks pp. 146-153

- Daniel P. Shepard, Todd E. Humphreys and Aaron A. Fansler
- Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems pp. 154-174

- Bradley Reaves and Thomas Morris
Volume 5, issue 2, 2012
- Are we prepared for the economic risk resulting from telecom hotel disruptions? pp. 55-65

- Ginger Armbruster, Barbara Endicott-Popovsky and Jan Whittington
- Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure pp. 66-73

- Samuel Stone and Michael Temple
- Intrusion detection for resource-constrained embedded control systems in the power grid pp. 74-83

- Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus and Sean Smith
- Design and implementation of a mediation system enabling secure communication among Critical Infrastructures pp. 86-97

- Marco Castrucci, Alessandro Neri, Filipe Caldeira, Jocelyn Aubert, Djamel Khadraoui, Matthieu Aubigny, Carlo Harpes, Paulo Simões, Vincenzo Suraci and Paolo Capodieci
- Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC) pp. 98-103

- Casey Deccio
Volume 5, issue 1, 2012
- Analysis of the security of VPN configurations in industrial control environments pp. 3-13

- Sanaz Rahimi and Mehdi Zargham
- Quantification of dependencies between electrical and information infrastructures pp. 14-27

- Marco Beccuti, Silvano Chiaradonna, Felicita Di Giandomenico, Susanna Donatelli, Giovanna Dondossola and Giuliana Franceschinis
- Creating a cyber moving target for critical infrastructure applications using platform diversity pp. 30-39

- Hamed Okhravi, Adam Comella, Eric Robinson and Joshua Haines
- Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling pp. 40-52

- Daniel Guernsey, Mason Rice and Sujeet Shenoi
| |