International Journal of Critical Infrastructure Protection
2008 - 2025
Current editor(s): Leon Strous From Elsevier Bibliographic data for series maintained by Catherine Liu (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 4, issue 3, 2011
- A dependable architecture to mitigate distributed denial of service attacks on network-based control systems pp. 107-123

- Hakem Beitollahi and Geert Deconinck
- Assessing and improving SCADA security in the Dutch drinking water sector pp. 124-134

- Eric Luiijf, Manou Ali and Annemarie Zielstra
- An IP based platform for emergency calls and reporting pp. 137-153

- Yacine Rebahi, Tran Quang Thanh, Mao Tong, Fernando López, José Manuel López, Luis A. Teixeira and Nelson Blanco
- A survey of system security in contactless electronic passports pp. 154-164

- Anshuman Sinha
- Fuzzy dynamic input–output inoperability model pp. 165-175

- Gabriele Oliva, Stefano Panzieri and Roberto Setola
Volume 4, issue 2, 2011
- A signaling framework to deter aggression in cyberspace pp. 57-65

- Mason Rice, Jonathan Butts and Sujeet Shenoi
- An exploration of defensive deception in industrial communication networks pp. 66-75

- Julian L. Rrushi
- Control systems personnel are from Mars; IT personnel are from Venus pp. 76-77

- William Arthur Conklin
- Security analysis of the ADS-B implementation in the next generation air transportation system pp. 78-87

- Donald McCallie, Jonathan Butts and Robert Mills
- A control system testbed to validate critical infrastructure protection concepts pp. 88-103

- Thomas Morris, Anurag Srivastava, Bradley Reaves, Wei Gao, Kalyan Pavurapu and Ram Reddi
Volume 4, issue 1, 2011
- May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats? pp. 3-13

- Mason Rice, Robert Miller and Sujeet Shenoi
- A decision-analysis approach for optimal airport security pp. 14-21

- Arthur Gerstenfeld and Paul D. Berger
- Definition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems pp. 24-40

- Silvano Chiaradonna, Felicita Di Giandomenico and Paolo Lollini
- An integrated framework for control system simulation and regulatory compliance monitoring pp. 41-53

- William Mahoney and Robin A. Gandhi
Volume 3, issue 3, 2010
- The economics of cybersecurity: Principles and policy options pp. 103-117

- Tyler Moore
- Applying public health strategies to the protection of cyberspace pp. 118-127

- Mason Rice, Jonathan Butts, Robert Miller and Sujeet Shenoi
- The interdependent security problem in the defense industrial base: An agent-based model on a social network pp. 128-139

- Forrest Hare and Jonathan Goldstein
- An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure pp. 140-156

- Gianmarco Baldini, Igor Nai Fovino, Marcelo Masera, Marco Luise, Vincenzo Pellegrini, Enzo Bagagli, Giuseppe Rubino, Raffaele Malangone, Marcoccio Stefano and Fabio Senesi
- Analysis of information flow security in cyber–physical systems pp. 157-173

- Ravi Akella, Han Tang and Bruce M. McMillin
- Long-lived authentication protocols for process control systems pp. 174-181

- Rasika Chakravarthy, Carl Hauser and David E. Bakken
Volume 3, issue 2, 2010
- The SEMA referential framework: Avoiding ambiguities in the terms “security” and “safety” pp. 55-66

- Ludovic Piètre-Cambacédès and Claude Chaudet
- Coupled Petri nets for computer network risk analysis pp. 67-75

- Matthew H. Henry, Ryan M. Layer and David R. Zaret
- Agent-based input–output interdependency model pp. 76-82

- Gabriele Oliva, Stefano Panzieri and Roberto Setola
- Risk-informed assessment of regional preparedness: A case study of emergency potable water for hurricane response in Southeast Virginia pp. 83-98

- Kenneth G. Crowther
Volume 3, issue 1, 2010
- An analysis of the legality of government-mandated computer inoculations pp. 5-15

- Mason Rice, Jonathan Butts, Robert Miller and Sujeet Shenoi
- Critical infrastructure protection under imperfect attacker perception pp. 16-26

- Erik Jenelius, Jonas Westin and Åke J. Holmgren
- Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure pp. 29-40

- Mark G. Stewart
- How secure is the next generation of IP-based emergency services architecture? pp. 41-50

- Hannes Tschofenig, Mayutan Arumaithurai, Henning Schulzrinne and Bernard Aboba
Volume 2, issue 4, 2009
- An experimental investigation of malware attacks on SCADA systems pp. 139-145

- Igor Nai Fovino, Andrea Carcano, Marcelo Masera and Alberto Trombetta
- Analysis of security threats to MPLS virtual private networks pp. 146-153

- Denise Grayson, Daniel Guernsey, Jonathan Butts, Michael Spainhower and Sujeet Shenoi
- PolyOrBAC: A security framework for Critical Infrastructures pp. 154-169

- A. Abou El Kalam, Y. Deswarte, A. Baïna and M. Kaâniche
- Critical infrastructure dependency assessment using the input–output inoperability model pp. 170-178

- Roberto Setola, Stefano De Porcellinis and Marino Sforna
- Public–Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection pp. 179-187

- Myriam Dunn-Cavelty and Manuel Suter
Volume 2, issue 3, 2009
- Understanding the physical and economic consequences of attacks on control systems pp. 73-83

- Yu-Lun Huang, Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Hsin-Yi Tsai and Shankar Sastry
- Application of trusted network technology to industrial control networks pp. 84-94

- Hamed Okhravi and David M. Nicol
- Blind information security strategy pp. 95-109

- Finn Olav Sveen, Jose M. Torres and Jose M. Sarriegi
- Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk pp. 110-123

- Eliot Rich, Jose J. Gonzalez, Ying Qian, Finn Olav Sveen, Jaziar Radianti and Stefanie Hillen
- Interactive visualizations for critical infrastructure analysis pp. 124-134

- William J. Tolone
Volume 2, issue 1, 2009
- Analysis of structural vulnerabilities in power transmission grids pp. 5-12

- Ettore Bompard, Roberto Napoli and Fei Xue
- Budget constrained optimal security hardening of control networks for critical cyber-infrastructures pp. 13-25

- Zahid Anwar, Mirko Montanari, Alejandro Gutierrez and Roy H. Campbell
- A framework for incident response management in the petroleum industry pp. 26-37

- Martin Gilje Jaatun, Eirik Albrechtsen, Maria B. Line, Inger Anne Tøndel and Odd Helge Longva
- Causes, cost consequences, and risk implications of accidents in US hazardous liquid pipeline infrastructure pp. 38-50

- Carlos E. Restrepo, Jeffrey S. Simonoff and Rae Zimmerman
- Combined person tracking and classification in a network of chemical sensors pp. 51-67

- Monika Wieneke and Wolfgang Koch
Volume 1, issue C, 2008
- Critical infrastructure protection pp. 4-5

- Richard George
- Models of critical information infrastructure protection pp. 6-14

- Dan Assaf
- Security and the US rail infrastructure pp. 15-28

- Mark Hartong, Rajni Goel and Duminda Wijesekera
- Modeling the NAJPTC network using NS-2 pp. 29-36

- Paul Vincent Craven and Paul Oman
- Attack taxonomies for the Modbus protocols pp. 37-44

- Peter Huitsing, Rodrigo Chandia, Mauricio Papa and Sujeet Shenoi
- Assessing operational risk in the financial sector, using interdependency metrics pp. 45-52

- Tyson Macaulay
- Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input–output model pp. 53-67

- Kenneth G. Crowther
- Security analysis of RSVP-TE signaling in MPLS networks pp. 68-74

- Michael Spainhower, Jonathan Butts, Daniel Guernsey and Sujeet Shenoi
- Game-theoretic modeling and analysis of insider threats pp. 75-80

- Debin Liu, XiaoFeng Wang and Jean Camp
- A CBK for Information Security and Critical Information and Communication Infrastructure Protection pp. 81-96

- Marianthi Theoharidou, Dimitra Xidara and Dimitris Gritzalis
| |