International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 6, issue 3, 2013
- Threats to municipal information systems posed by aging infrastructure pp. 123-131

- Ginger Armbruster, Barbara Endicott-Popovsky and Jan Whittington
- A methodology for designing robust and efficient hybrid monitoring systems pp. 132-146

- Luigi Sportiello
- Flow whitelisting in SCADA networks pp. 150-158

- Rafael Ramos Regis Barbosa, Ramin Sadre and Aiko Pras
- Towards end-to-end network resilience pp. 159-178

- Panagiotis Vlacheas, Vera Stavroulaki, Panagiotis Demestichas, Scott Cadzow, Demosthenes Ikonomou and Slawomir Gorniak
- Security of European electricity systems: Conceptualizing the assessment criteria and core indicators pp. 182-196

- Rabindra Nepal and Tooraj Jamasb
- Using interconnected risk maps to assess the threats faced by electricity infrastructures pp. 197-216

- Gabriel J. Correa-Henao, Jose M. Yusta and Roberto Lacal-Arántegui
- Vulnerability modeling and analysis for critical infrastructure protection applications pp. 217-227

- Stefano Marrone, Roberto Nardone, Annarita Tedesco, Pasquale D'Amore, Valeria Vittorini, Roberto Setola, Francesca De Cillis and Nicola Mazzocca
Volume 6, issue 2, 2013
- Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems pp. 63-75

- Niv Goldenberg and Avishai Wool
- Firmware modification attacks on programmable logic controllers pp. 76-84

- Zachry Basnight, Jonathan Butts, Juan Lopez and Thomas Dube
- Analysis of the effects of distributed denial-of-service attacks on MPLS networks pp. 87-95

- Béla Genge and Christos Siaterlis
- Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis pp. 96-106

- Stephen Papa, William Casper and Tyler Moore
- A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector pp. 107-119

- Justin Yates and Sujeevraja Sanjeevi
Volume 6, issue 1, 2013
- Enhancing the security of aircraft surveillance in the next generation air traffic control system pp. 3-11

- Cindy Finke, Jonathan Butts, Robert Mills and Michael Grimaila
- A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices pp. 12-24

- Jeffrey L. Hieb, Jacob Schreiver and James H. Graham
- Crimeware-as-a-service—A survey of commoditized crimeware in the underground market pp. 28-38

- Aditya K. Sood and Richard J. Enbody
- Realizing the promise of public-private partnerships in U.S. critical infrastructure protection pp. 39-50

- Austen D. Givens and Nathan E. Busch
- European Reference Network for Critical Infrastructure Protection pp. 51-60

- Adam M. Lewis, David Ward, Lukasz Cyra and Naouma Kourti
Volume 5, issue 3, 2012
- A global reference model of the domain name system pp. 108-117

- Yakup Koç, Almerima Jamakovic and Bart Gijsen
- Modeling security in cyber–physical systems pp. 118-126

- Mike Burmester, Emmanouil Magkos and Vassilis Chrissikopoulos
- Modeling and reasoning about the security of drive-by-wire automobile systems pp. 127-134

- Gerry Howser and Bruce McMillin
- Analysis of requirements for critical control systems pp. 137-145

- Cristina Alcaraz and Javier Lopez
- Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks pp. 146-153

- Daniel P. Shepard, Todd E. Humphreys and Aaron A. Fansler
- Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems pp. 154-174

- Bradley Reaves and Thomas Morris
Volume 5, issue 2, 2012
- Are we prepared for the economic risk resulting from telecom hotel disruptions? pp. 55-65

- Ginger Armbruster, Barbara Endicott-Popovsky and Jan Whittington
- Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure pp. 66-73

- Samuel Stone and Michael Temple
- Intrusion detection for resource-constrained embedded control systems in the power grid pp. 74-83

- Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus and Sean Smith
- Design and implementation of a mediation system enabling secure communication among Critical Infrastructures pp. 86-97

- Marco Castrucci, Alessandro Neri, Filipe Caldeira, Jocelyn Aubert, Djamel Khadraoui, Matthieu Aubigny, Carlo Harpes, Paulo Simões, Vincenzo Suraci and Paolo Capodieci
- Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC) pp. 98-103

- Casey Deccio
Volume 5, issue 1, 2012
- Analysis of the security of VPN configurations in industrial control environments pp. 3-13

- Sanaz Rahimi and Mehdi Zargham
- Quantification of dependencies between electrical and information infrastructures pp. 14-27

- Marco Beccuti, Silvano Chiaradonna, Felicita Di Giandomenico, Susanna Donatelli, Giovanna Dondossola and Giuliana Franceschinis
- Creating a cyber moving target for critical infrastructure applications using platform diversity pp. 30-39

- Hamed Okhravi, Adam Comella, Eric Robinson and Joshua Haines
- Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling pp. 40-52

- Daniel Guernsey, Mason Rice and Sujeet Shenoi
Volume 4, issue 3, 2011
- A dependable architecture to mitigate distributed denial of service attacks on network-based control systems pp. 107-123

- Hakem Beitollahi and Geert Deconinck
- Assessing and improving SCADA security in the Dutch drinking water sector pp. 124-134

- Eric Luiijf, Manou Ali and Annemarie Zielstra
- An IP based platform for emergency calls and reporting pp. 137-153

- Yacine Rebahi, Tran Quang Thanh, Mao Tong, Fernando López, José Manuel López, Luis A. Teixeira and Nelson Blanco
- A survey of system security in contactless electronic passports pp. 154-164

- Anshuman Sinha
- Fuzzy dynamic input–output inoperability model pp. 165-175

- Gabriele Oliva, Stefano Panzieri and Roberto Setola
Volume 4, issue 2, 2011
- A signaling framework to deter aggression in cyberspace pp. 57-65

- Mason Rice, Jonathan Butts and Sujeet Shenoi
- An exploration of defensive deception in industrial communication networks pp. 66-75

- Julian L. Rrushi
- Control systems personnel are from Mars; IT personnel are from Venus pp. 76-77

- William Arthur Conklin
- Security analysis of the ADS-B implementation in the next generation air transportation system pp. 78-87

- Donald McCallie, Jonathan Butts and Robert Mills
- A control system testbed to validate critical infrastructure protection concepts pp. 88-103

- Thomas Morris, Anurag Srivastava, Bradley Reaves, Wei Gao, Kalyan Pavurapu and Ram Reddi
Volume 4, issue 1, 2011
- May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats? pp. 3-13

- Mason Rice, Robert Miller and Sujeet Shenoi
- A decision-analysis approach for optimal airport security pp. 14-21

- Arthur Gerstenfeld and Paul D. Berger
- Definition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems pp. 24-40

- Silvano Chiaradonna, Felicita Di Giandomenico and Paolo Lollini
- An integrated framework for control system simulation and regulatory compliance monitoring pp. 41-53

- William Mahoney and Robin A. Gandhi
Volume 3, issue 3, 2010
- The economics of cybersecurity: Principles and policy options pp. 103-117

- Tyler Moore
- Applying public health strategies to the protection of cyberspace pp. 118-127

- Mason Rice, Jonathan Butts, Robert Miller and Sujeet Shenoi
- The interdependent security problem in the defense industrial base: An agent-based model on a social network pp. 128-139

- Forrest Hare and Jonathan Goldstein
- An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure pp. 140-156

- Gianmarco Baldini, Igor Nai Fovino, Marcelo Masera, Marco Luise, Vincenzo Pellegrini, Enzo Bagagli, Giuseppe Rubino, Raffaele Malangone, Marcoccio Stefano and Fabio Senesi
- Analysis of information flow security in cyber–physical systems pp. 157-173

- Ravi Akella, Han Tang and Bruce M. McMillin
- Long-lived authentication protocols for process control systems pp. 174-181

- Rasika Chakravarthy, Carl Hauser and David E. Bakken
Volume 3, issue 2, 2010
- The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety” pp. 55-66

- Ludovic Piètre-Cambacédès and Claude Chaudet
- Coupled Petri nets for computer network risk analysis pp. 67-75

- Matthew H. Henry, Ryan M. Layer and David R. Zaret
- Agent-based input–output interdependency model pp. 76-82

- Gabriele Oliva, Stefano Panzieri and Roberto Setola
- Risk-informed assessment of regional preparedness: A case study of emergency potable water for hurricane response in Southeast Virginia pp. 83-98

- Kenneth G. Crowther
Volume 3, issue 1, 2010
- An analysis of the legality of government-mandated computer inoculations pp. 5-15

- Mason Rice, Jonathan Butts, Robert Miller and Sujeet Shenoi
- Critical infrastructure protection under imperfect attacker perception pp. 16-26

- Erik Jenelius, Jonas Westin and Åke J. Holmgren
- Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure pp. 29-40

- Mark G. Stewart
- How secure is the next generation of IP-based emergency services architecture? pp. 41-50

- Hannes Tschofenig, Mayutan Arumaithurai, Henning Schulzrinne and Bernard Aboba
| |