EconPapers    
Economics at your fingertips  
 

International Journal of Critical Infrastructure Protection

2008 - 2025

Current editor(s): Leon Strous

From Elsevier
Bibliographic data for series maintained by Catherine Liu ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 4, issue 3, 2011

A dependable architecture to mitigate distributed denial of service attacks on network-based control systems pp. 107-123 Downloads
Hakem Beitollahi and Geert Deconinck
Assessing and improving SCADA security in the Dutch drinking water sector pp. 124-134 Downloads
Eric Luiijf, Manou Ali and Annemarie Zielstra
An IP based platform for emergency calls and reporting pp. 137-153 Downloads
Yacine Rebahi, Tran Quang Thanh, Mao Tong, Fernando López, José Manuel López, Luis A. Teixeira and Nelson Blanco
A survey of system security in contactless electronic passports pp. 154-164 Downloads
Anshuman Sinha
Fuzzy dynamic input–output inoperability model pp. 165-175 Downloads
Gabriele Oliva, Stefano Panzieri and Roberto Setola

Volume 4, issue 2, 2011

A signaling framework to deter aggression in cyberspace pp. 57-65 Downloads
Mason Rice, Jonathan Butts and Sujeet Shenoi
An exploration of defensive deception in industrial communication networks pp. 66-75 Downloads
Julian L. Rrushi
Control systems personnel are from Mars; IT personnel are from Venus pp. 76-77 Downloads
William Arthur Conklin
Security analysis of the ADS-B implementation in the next generation air transportation system pp. 78-87 Downloads
Donald McCallie, Jonathan Butts and Robert Mills
A control system testbed to validate critical infrastructure protection concepts pp. 88-103 Downloads
Thomas Morris, Anurag Srivastava, Bradley Reaves, Wei Gao, Kalyan Pavurapu and Ram Reddi

Volume 4, issue 1, 2011

May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats? pp. 3-13 Downloads
Mason Rice, Robert Miller and Sujeet Shenoi
A decision-analysis approach for optimal airport security pp. 14-21 Downloads
Arthur Gerstenfeld and Paul D. Berger
Definition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems pp. 24-40 Downloads
Silvano Chiaradonna, Felicita Di Giandomenico and Paolo Lollini
An integrated framework for control system simulation and regulatory compliance monitoring pp. 41-53 Downloads
William Mahoney and Robin A. Gandhi

Volume 3, issue 3, 2010

The economics of cybersecurity: Principles and policy options pp. 103-117 Downloads
Tyler Moore
Applying public health strategies to the protection of cyberspace pp. 118-127 Downloads
Mason Rice, Jonathan Butts, Robert Miller and Sujeet Shenoi
The interdependent security problem in the defense industrial base: An agent-based model on a social network pp. 128-139 Downloads
Forrest Hare and Jonathan Goldstein
An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure pp. 140-156 Downloads
Gianmarco Baldini, Igor Nai Fovino, Marcelo Masera, Marco Luise, Vincenzo Pellegrini, Enzo Bagagli, Giuseppe Rubino, Raffaele Malangone, Marcoccio Stefano and Fabio Senesi
Analysis of information flow security in cyber–physical systems pp. 157-173 Downloads
Ravi Akella, Han Tang and Bruce M. McMillin
Long-lived authentication protocols for process control systems pp. 174-181 Downloads
Rasika Chakravarthy, Carl Hauser and David E. Bakken

Volume 3, issue 2, 2010

The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety” pp. 55-66 Downloads
Ludovic Piètre-Cambacédès and Claude Chaudet
Coupled Petri nets for computer network risk analysis pp. 67-75 Downloads
Matthew H. Henry, Ryan M. Layer and David R. Zaret
Agent-based input–output interdependency model pp. 76-82 Downloads
Gabriele Oliva, Stefano Panzieri and Roberto Setola
Risk-informed assessment of regional preparedness: A case study of emergency potable water for hurricane response in Southeast Virginia pp. 83-98 Downloads
Kenneth G. Crowther

Volume 3, issue 1, 2010

An analysis of the legality of government-mandated computer inoculations pp. 5-15 Downloads
Mason Rice, Jonathan Butts, Robert Miller and Sujeet Shenoi
Critical infrastructure protection under imperfect attacker perception pp. 16-26 Downloads
Erik Jenelius, Jonas Westin and Åke J. Holmgren
Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure pp. 29-40 Downloads
Mark G. Stewart
How secure is the next generation of IP-based emergency services architecture? pp. 41-50 Downloads
Hannes Tschofenig, Mayutan Arumaithurai, Henning Schulzrinne and Bernard Aboba

Volume 2, issue 4, 2009

An experimental investigation of malware attacks on SCADA systems pp. 139-145 Downloads
Igor Nai Fovino, Andrea Carcano, Marcelo Masera and Alberto Trombetta
Analysis of security threats to MPLS virtual private networks pp. 146-153 Downloads
Denise Grayson, Daniel Guernsey, Jonathan Butts, Michael Spainhower and Sujeet Shenoi
PolyOrBAC: A security framework for Critical Infrastructures pp. 154-169 Downloads
A. Abou El Kalam, Y. Deswarte, A. Baïna and M. Kaâniche
Critical infrastructure dependency assessment using the input–output inoperability model pp. 170-178 Downloads
Roberto Setola, Stefano De Porcellinis and Marino Sforna
Public–Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection pp. 179-187 Downloads
Myriam Dunn-Cavelty and Manuel Suter

Volume 2, issue 3, 2009

Understanding the physical and economic consequences of attacks on control systems pp. 73-83 Downloads
Yu-Lun Huang, Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Hsin-Yi Tsai and Shankar Sastry
Application of trusted network technology to industrial control networks pp. 84-94 Downloads
Hamed Okhravi and David M. Nicol
Blind information security strategy pp. 95-109 Downloads
Finn Olav Sveen, Jose M. Torres and Jose M. Sarriegi
Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk pp. 110-123 Downloads
Eliot Rich, Jose J. Gonzalez, Ying Qian, Finn Olav Sveen, Jaziar Radianti and Stefanie Hillen
Interactive visualizations for critical infrastructure analysis pp. 124-134 Downloads
William J. Tolone

Volume 2, issue 1, 2009

Analysis of structural vulnerabilities in power transmission grids pp. 5-12 Downloads
Ettore Bompard, Roberto Napoli and Fei Xue
Budget constrained optimal security hardening of control networks for critical cyber-infrastructures pp. 13-25 Downloads
Zahid Anwar, Mirko Montanari, Alejandro Gutierrez and Roy H. Campbell
A framework for incident response management in the petroleum industry pp. 26-37 Downloads
Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Inger Anne Tøndel and Odd Helge Longva
Causes, cost consequences, and risk implications of accidents in US hazardous liquid pipeline infrastructure pp. 38-50 Downloads
Carlos E. Restrepo, Jeffrey S. Simonoff and Rae Zimmerman
Combined person tracking and classification in a network of chemical sensors pp. 51-67 Downloads
Monika Wieneke and Wolfgang Koch

Volume 1, issue C, 2008

Critical infrastructure protection pp. 4-5 Downloads
Richard George
Models of critical information infrastructure protection pp. 6-14 Downloads
Dan Assaf
Security and the US rail infrastructure pp. 15-28 Downloads
Mark Hartong, Rajni Goel and Duminda Wijesekera
Modeling the NAJPTC network using NS-2 pp. 29-36 Downloads
Paul Vincent Craven and Paul Oman
Attack taxonomies for the Modbus protocols pp. 37-44 Downloads
Peter Huitsing, Rodrigo Chandia, Mauricio Papa and Sujeet Shenoi
Assessing operational risk in the financial sector, using interdependency metrics pp. 45-52 Downloads
Tyson Macaulay
Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input–output model pp. 53-67 Downloads
Kenneth G. Crowther
Security analysis of RSVP-TE signaling in MPLS networks pp. 68-74 Downloads
Michael Spainhower, Jonathan Butts, Daniel Guernsey and Sujeet Shenoi
Game-theoretic modeling and analysis of insider threats pp. 75-80 Downloads
Debin Liu, XiaoFeng Wang and Jean Camp
A CBK for Information Security and Critical Information and Communication Infrastructure Protection pp. 81-96 Downloads
Marianthi Theoharidou, Dimitra Xidara and Dimitris Gritzalis
Page updated 2025-06-08