International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 2, issue 4, 2009
- An experimental investigation of malware attacks on SCADA systems pp. 139-145

- Igor Nai Fovino, Andrea Carcano, Marcelo Masera and Alberto Trombetta
- Analysis of security threats to MPLS virtual private networks pp. 146-153

- Denise Grayson, Daniel Guernsey, Jonathan Butts, Michael Spainhower and Sujeet Shenoi
- PolyOrBAC: A security framework for Critical Infrastructures pp. 154-169

- A. Abou El Kalam, Y. Deswarte, A. Baïna and M. Kaâniche
- Critical infrastructure dependency assessment using the input–output inoperability model pp. 170-178

- Roberto Setola, Stefano De Porcellinis and Marino Sforna
- Public–Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection pp. 179-187

- Myriam Dunn-Cavelty and Manuel Suter
Volume 2, issue 3, 2009
- Understanding the physical and economic consequences of attacks on control systems pp. 73-83

- Yu-Lun Huang, Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Hsin-Yi Tsai and Shankar Sastry
- Application of trusted network technology to industrial control networks pp. 84-94

- Hamed Okhravi and David M. Nicol
- Blind information security strategy pp. 95-109

- Finn Olav Sveen, Jose M. Torres and Jose M. Sarriegi
- Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk pp. 110-123

- Eliot Rich, Jose J. Gonzalez, Ying Qian, Finn Olav Sveen, Jaziar Radianti and Stefanie Hillen
- Interactive visualizations for critical infrastructure analysis pp. 124-134

- William J. Tolone
Volume 2, issue 1, 2009
- Analysis of structural vulnerabilities in power transmission grids pp. 5-12

- Ettore Bompard, Roberto Napoli and Fei Xue
- Budget constrained optimal security hardening of control networks for critical cyber-infrastructures pp. 13-25

- Zahid Anwar, Mirko Montanari, Alejandro Gutierrez and Roy H. Campbell
- A framework for incident response management in the petroleum industry pp. 26-37

- Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Inger Anne Tøndel and Odd Helge Longva
- Causes, cost consequences, and risk implications of accidents in US hazardous liquid pipeline infrastructure pp. 38-50

- Carlos E. Restrepo, Jeffrey S. Simonoff and Rae Zimmerman
- Combined person tracking and classification in a network of chemical sensors pp. 51-67

- Monika Wieneke and Wolfgang Koch
Volume 1, issue C, 2008
- Critical infrastructure protection pp. 4-5

- Richard George
- Models of critical information infrastructure protection pp. 6-14

- Dan Assaf
- Security and the US rail infrastructure pp. 15-28

- Mark Hartong, Rajni Goel and Duminda Wijesekera
- Modeling the NAJPTC network using NS-2 pp. 29-36

- Paul Vincent Craven and Paul Oman
- Attack taxonomies for the Modbus protocols pp. 37-44

- Peter Huitsing, Rodrigo Chandia, Mauricio Papa and Sujeet Shenoi
- Assessing operational risk in the financial sector, using interdependency metrics pp. 45-52

- Tyson Macaulay
- Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input–output model pp. 53-67

- Kenneth G. Crowther
- Security analysis of RSVP-TE signaling in MPLS networks pp. 68-74

- Michael Spainhower, Jonathan Butts, Daniel Guernsey and Sujeet Shenoi
- Game-theoretic modeling and analysis of insider threats pp. 75-80

- Debin Liu, XiaoFeng Wang and Jean Camp
- A CBK for Information Security and Critical Information and Communication Infrastructure Protection pp. 81-96

- Marianthi Theoharidou, Dimitra Xidara and Dimitris Gritzalis
| |