International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 5, issue 3, 2012
- A global reference model of the domain name system pp. 108-117

- Yakup Koç, Almerima Jamakovic and Bart Gijsen
- Modeling security in cyber–physical systems pp. 118-126

- Mike Burmester, Emmanouil Magkos and Vassilis Chrissikopoulos
- Modeling and reasoning about the security of drive-by-wire automobile systems pp. 127-134

- Gerry Howser and Bruce McMillin
- Analysis of requirements for critical control systems pp. 137-145

- Cristina Alcaraz and Javier Lopez
- Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks pp. 146-153

- Daniel P. Shepard, Todd E. Humphreys and Aaron A. Fansler
- Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems pp. 154-174

- Bradley Reaves and Thomas Morris
Volume 5, issue 2, 2012
- Are we prepared for the economic risk resulting from telecom hotel disruptions? pp. 55-65

- Ginger Armbruster, Barbara Endicott-Popovsky and Jan Whittington
- Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure pp. 66-73

- Samuel Stone and Michael Temple
- Intrusion detection for resource-constrained embedded control systems in the power grid pp. 74-83

- Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus and Sean Smith
- Design and implementation of a mediation system enabling secure communication among Critical Infrastructures pp. 86-97

- Marco Castrucci, Alessandro Neri, Filipe Caldeira, Jocelyn Aubert, Djamel Khadraoui, Matthieu Aubigny, Carlo Harpes, Paulo Simões, Vincenzo Suraci and Paolo Capodieci
- Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC) pp. 98-103

- Casey Deccio
Volume 5, issue 1, 2012
- Analysis of the security of VPN configurations in industrial control environments pp. 3-13

- Sanaz Rahimi and Mehdi Zargham
- Quantification of dependencies between electrical and information infrastructures pp. 14-27

- Marco Beccuti, Silvano Chiaradonna, Felicita Di Giandomenico, Susanna Donatelli, Giovanna Dondossola and Giuliana Franceschinis
- Creating a cyber moving target for critical infrastructure applications using platform diversity pp. 30-39

- Hamed Okhravi, Adam Comella, Eric Robinson and Joshua Haines
- Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling pp. 40-52

- Daniel Guernsey, Mason Rice and Sujeet Shenoi
Volume 4, issue 3, 2011
- A dependable architecture to mitigate distributed denial of service attacks on network-based control systems pp. 107-123

- Hakem Beitollahi and Geert Deconinck
- Assessing and improving SCADA security in the Dutch drinking water sector pp. 124-134

- Eric Luiijf, Manou Ali and Annemarie Zielstra
- An IP based platform for emergency calls and reporting pp. 137-153

- Yacine Rebahi, Tran Quang Thanh, Mao Tong, Fernando López, José Manuel López, Luis A. Teixeira and Nelson Blanco
- A survey of system security in contactless electronic passports pp. 154-164

- Anshuman Sinha
- Fuzzy dynamic input–output inoperability model pp. 165-175

- Gabriele Oliva, Stefano Panzieri and Roberto Setola
Volume 4, issue 2, 2011
- A signaling framework to deter aggression in cyberspace pp. 57-65

- Mason Rice, Jonathan Butts and Sujeet Shenoi
- An exploration of defensive deception in industrial communication networks pp. 66-75

- Julian L. Rrushi
- Control systems personnel are from Mars; IT personnel are from Venus pp. 76-77

- William Arthur Conklin
- Security analysis of the ADS-B implementation in the next generation air transportation system pp. 78-87

- Donald McCallie, Jonathan Butts and Robert Mills
- A control system testbed to validate critical infrastructure protection concepts pp. 88-103

- Thomas Morris, Anurag Srivastava, Bradley Reaves, Wei Gao, Kalyan Pavurapu and Ram Reddi
Volume 4, issue 1, 2011
- May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats? pp. 3-13

- Mason Rice, Robert Miller and Sujeet Shenoi
- A decision-analysis approach for optimal airport security pp. 14-21

- Arthur Gerstenfeld and Paul D. Berger
- Definition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems pp. 24-40

- Silvano Chiaradonna, Felicita Di Giandomenico and Paolo Lollini
- An integrated framework for control system simulation and regulatory compliance monitoring pp. 41-53

- William Mahoney and Robin A. Gandhi
Volume 3, issue 3, 2010
- The economics of cybersecurity: Principles and policy options pp. 103-117

- Tyler Moore
- Applying public health strategies to the protection of cyberspace pp. 118-127

- Mason Rice, Jonathan Butts, Robert Miller and Sujeet Shenoi
- The interdependent security problem in the defense industrial base: An agent-based model on a social network pp. 128-139

- Forrest Hare and Jonathan Goldstein
- An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure pp. 140-156

- Gianmarco Baldini, Igor Nai Fovino, Marcelo Masera, Marco Luise, Vincenzo Pellegrini, Enzo Bagagli, Giuseppe Rubino, Raffaele Malangone, Marcoccio Stefano and Fabio Senesi
- Analysis of information flow security in cyber–physical systems pp. 157-173

- Ravi Akella, Han Tang and Bruce M. McMillin
- Long-lived authentication protocols for process control systems pp. 174-181

- Rasika Chakravarthy, Carl Hauser and David E. Bakken
Volume 3, issue 2, 2010
- The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety” pp. 55-66

- Ludovic Piètre-Cambacédès and Claude Chaudet
- Coupled Petri nets for computer network risk analysis pp. 67-75

- Matthew H. Henry, Ryan M. Layer and David R. Zaret
- Agent-based input–output interdependency model pp. 76-82

- Gabriele Oliva, Stefano Panzieri and Roberto Setola
- Risk-informed assessment of regional preparedness: A case study of emergency potable water for hurricane response in Southeast Virginia pp. 83-98

- Kenneth G. Crowther
Volume 3, issue 1, 2010
- An analysis of the legality of government-mandated computer inoculations pp. 5-15

- Mason Rice, Jonathan Butts, Robert Miller and Sujeet Shenoi
- Critical infrastructure protection under imperfect attacker perception pp. 16-26

- Erik Jenelius, Jonas Westin and Åke J. Holmgren
- Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure pp. 29-40

- Mark G. Stewart
- How secure is the next generation of IP-based emergency services architecture? pp. 41-50

- Hannes Tschofenig, Mayutan Arumaithurai, Henning Schulzrinne and Bernard Aboba
Volume 2, issue 4, 2009
- An experimental investigation of malware attacks on SCADA systems pp. 139-145

- Igor Nai Fovino, Andrea Carcano, Marcelo Masera and Alberto Trombetta
- Analysis of security threats to MPLS virtual private networks pp. 146-153

- Denise Grayson, Daniel Guernsey, Jonathan Butts, Michael Spainhower and Sujeet Shenoi
- PolyOrBAC: A security framework for Critical Infrastructures pp. 154-169

- A. Abou El Kalam, Y. Deswarte, A. Baïna and M. Kaâniche
- Critical infrastructure dependency assessment using the input–output inoperability model pp. 170-178

- Roberto Setola, Stefano De Porcellinis and Marino Sforna
- Public–Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection pp. 179-187

- Myriam Dunn-Cavelty and Manuel Suter
Volume 2, issue 3, 2009
- Understanding the physical and economic consequences of attacks on control systems pp. 73-83

- Yu-Lun Huang, Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Hsin-Yi Tsai and Shankar Sastry
- Application of trusted network technology to industrial control networks pp. 84-94

- Hamed Okhravi and David M. Nicol
- Blind information security strategy pp. 95-109

- Finn Olav Sveen, Jose M. Torres and Jose M. Sarriegi
- Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk pp. 110-123

- Eliot Rich, Jose J. Gonzalez, Ying Qian, Finn Olav Sveen, Jaziar Radianti and Stefanie Hillen
- Interactive visualizations for critical infrastructure analysis pp. 124-134

- William J. Tolone
Volume 2, issue 1, 2009
- Analysis of structural vulnerabilities in power transmission grids pp. 5-12

- Ettore Bompard, Roberto Napoli and Fei Xue
- Budget constrained optimal security hardening of control networks for critical cyber-infrastructures pp. 13-25

- Zahid Anwar, Mirko Montanari, Alejandro Gutierrez and Roy H. Campbell
- A framework for incident response management in the petroleum industry pp. 26-37

- Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Inger Anne Tøndel and Odd Helge Longva
- Causes, cost consequences, and risk implications of accidents in US hazardous liquid pipeline infrastructure pp. 38-50

- Carlos E. Restrepo, Jeffrey S. Simonoff and Rae Zimmerman
- Combined person tracking and classification in a network of chemical sensors pp. 51-67

- Monika Wieneke and Wolfgang Koch
| |