Contact information of Elsevier
Serial Information
Download restrictions: Full text for ScienceDirect subscribers only
Series handle: RePEc:eee:ijocip
ISSN: 1874-5482
Citations RSS feed: at CitEc
Impact factors
Access and download statisticsTop item:
Corrections
All material on this site has been provided by the respective publishers and authors. You can help
correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .
Content
2024, Volume 46, Issue C
- S1874548224000246 Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity
by Liebetrau, Tobias & Bueger, Christian
- S1874548224000349 Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences
by Gupta, Kirti & Panigrahi, Bijaya Ketan & Joshi, Anupam & Paul, Kolin
- S1874548224000350 Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements
by Farooq, Asma & Shahid, Kamal & Olsen, Rasmus Løvenstein
- S1874548224000362 Cyber risk assessment of cyber-enabled autonomous cargo vessel
by Yousaf, Awais & Amro, Ahmed & Kwa, Philip Teow Huat & Li, Meixuan & Zhou, Jianying
- S1874548224000374 Technological advancements and innovations in enhancing resilience of electrical distribution systems
by Dwivedi, Divyanshi & Mitikiri, Sagar Babu & Babu, K. Victor Sam Moses & Yemula, Pradeep Kumar & Srinivas, Vedantham Lakshmi & Chakraborty, Pratyush & Pal, Mayukha
- S1874548224000386 Power grid network security: A lightweight detection model for composite false data injection attacks using spatiotemporal features
by Zhu, Tianci & Wang, Jun & Zhu, Yonghai & Chen, Haoran & Zhang, Hang & Yin, Shanshan
- S1874548224000398 Probabilistic dynamic resilience quantification for infrastructure systems in multi-hazard environments
by Badr, Ahmed & Li, Zoe & El-Dakhakhni, Wael
- S1874548224000404 Robustness evaluation method and defense strategy of electricity-heat integrated energy system
by Hu, Funian & Peng, Chenhui & Chen, Jun
- S1874548224000416 Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review
by Jiang, Yuning & Jeusfeld, Manfred A. & Mosaad, Michael & Oo, Nay
- S1874548224000428 Cyber attacks on critical infrastructures and satellite communications
by Carlo, Antonio & Obergfaell, Kim
- S1874548224000441 Assessment of cross-border electricity interconnection projects using a MCDA method
by Naval, Natalia & Yusta, Jose M.
- S1874548224000519 It is the time, are you sufficiently resilient?
by Setola, Roberto
- S187454822400043X Blockchain-based anonymous authentication and data aggregation for advanced metering infrastructure in smart grid
by Pei, Tingrui & Hou, Zhiwen & Zhou, Jun & Xiao, Chixin & Zou, Juan
2024, Volume 45, Issue C
- S1874548224000039 DSACR: A defense-based system with adaptive cyber resilience for industrial control systems
by Ma, Yi-Wei & Tu, Yi-Hao & Shen, Chih-Ting
- S1874548224000131 False data injection in distribution system: Attacker's perspective
by Bhattar, Poornachandratejasvi Laxman & Pindoriya, Naran M & Sharma, Anurag
- S1874548224000143 Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation
by Zhao, Taiyi & Tang, Yuchun & Li, Qiming & Wang, Jingquan
- S1874548224000155 ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems
by Saheed, Yakub Kayode & Abdulganiyu, Oluwadamilare Harazeem & Majikumna, Kaloma Usman & Mustapha, Musa & Workneh, Abebaw Degu
- S1874548224000167 Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis
by Mathew, Midhya & Kazi, Faruk
- S1874548224000179 A real-time network based anomaly detection in industrial control systems
by Zare, Faeze & Mahmoudi-Nasr, Payam & Yousefpour, Rohollah
- S1874548224000180 Cybersecurity and cyber-terrorism challenges to energy-related infrastructures – Cybersecurity frameworks and economics – Comprehensive review
by Venkatachary, Sampath Kumar & Prasad, Jagdish & Alagappan, Annamalai & Andrews, Leo John Baptist & Raj, Raymon Antony & Duraisamy, Sarathkumar
- S1874548224000192 DAR-LFC: A data-driven attack recovery mechanism for Load Frequency Control
by Syrmakesis, Andrew D. & Alcaraz, Cristina & Hatziargyriou, Nikos D.
- S1874548224000209 A comparison of onshore oil and gas transmission pipeline incident statistics in Canada and the United States
by Shen, Y. & Zhou, W.
- S1874548224000210 Impact of space systems capabilities and their role as critical infrastructure
by Carlo, Mr. Antonio & Breda, Dr. Paola
- S1874548224000234 Performing risk assessment for critical infrastructure protection: A study of human decision-making and practitioners' transnationalism considerations
by Papamichael, Michalis & Dimopoulos, Christos & Boustras, Georgios & Vryonides, Marios
2024, Volume 44, Issue C
- S1874548223000574 Need for intensive care? A socio-technical systems perspective on water supply failure preparedness in German health care facilities
by Heinzel, Christine & van der Heijden, Sophie & Mayer, Aljoscha & Sänger, Nathalie & Sandholz, Simone
- S1874548223000586 Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks
by Raza, Nazia & Moazeni, Faegheh
- S1874548223000598 Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review
by Alkhaleel, Basem A.
- S1874548223000604 A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions
by Raval, Khushi Jatinkumar & Jadav, Nilesh Kumar & Rathod, Tejal & Tanwar, Sudeep & Vimal, Vrince & Yamsani, Nagendar
- S1874548223000707 Protection of critical infrastructures from advanced combined cyber and physical threats: The PRAETORIAN approach
by Papadopoulos, Lazaros & Demestichas, Konstantinos & Muñoz-Navarro, Eva & Hernández-Montesinos, Juan José & Paul, Stephane & Museux, Nicolas & König, Sandra & Schauer, Stefan & Alarcón, Alfonso Climente & Llopis, Israel Perez & Stelkens-Kobsch, Tim & Hadjina, Tamara & Levak, Jelena
- S1874548223000719 A comparative study of cyber security intrusion detection in healthcare systems
by Zhang, Yan & Zhu, Degang & Wang, Menglin & Li, Junhan & Zhang, Jie
- S1874548223000720 A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms
by Haghshenas, Morteza & Hooshmand, Rahmat-Allah & Gholipour, Mehdi
- S1874548224000015 A watchdog model for physics-based anomaly detection in digital substations
by Tarazi, Hussam & Sutton, Sara & Olinjyk, John & Bond, Benjamin & Rrushi, Julian
- S1874548224000027 Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication
by Chen, Jian & Lu, Fei & Liu, Yuanzhe & Peng, Sheng & Cai, Zhiming & Mo, Fu
2023, Volume 43, Issue C
- S1874548223000471 A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction
by Chen, Jiarui & Lu, Yiqin & Zhang, Yang & Huang, Fang & Qin, Jiancheng
- S1874548223000501 Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem
by Aviv, Itzhak & Ferri, Uri
- S1874548223000513 Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network
by Aalirezaei, Armin & Kabir, Dr. Golam & Khan, Md Saiful Arif
- S1874548223000525 Modeling and assessing seismic resilience leveraging systems dynamic approach: A case study of society 5.0
by Moradi, Shohreh & Khan, Md Muzahid & Hossain, Niamat Ullah Ibne & Shamsuddoha, Mohammad & Gorod, Alex
- S1874548223000537 An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space
by Kavallieratos, Georgios & Katsikas, Sokratis
- S1874548223000549 Ensuring the longevity of WirelessHART devices in industrial automation and control systems using distinct native attribute fingerprinting
by Maier, Matthew J. & Hayden, Hunter S. & Temple, Michael A. & Fickus, Matthew C.
- S1874548223000550 A systematic co-engineering of safety and security analysis in requirements engineering process
by Jung, Sejin & Yoo, Junbeom & Malek, Sam
- S1874548223000562 Measurement protection to prevent cyber–physical attacks against power system State Estimation
by Margossian, Harag & Kfouri, Ronald & Saliba, Rita
2023, Volume 42, Issue C
- S1874548223000161 Rule-based anomaly detection for railway signalling networks
by Heinrich, Markus & Gölz, Arwed & Arul, Tolga & Katzenbeisser, Stefan
- S1874548223000252 Protocol study and anomaly detection for server-driven traffic in SCADA networks
by Lin, Chih-Yuan & Nadjm-Tehrani, Simin
- S1874548223000264 A forensics and compliance auditing framework for critical infrastructure protection
by Henriques, João & Caldeira, Filipe & Cruz, Tiago & Simões, Paulo
- S1874548223000276 Assessing the comprehensive importance of power grid nodes based on DEA
by Gao, Xin & Ye, Yunxia & Su, Wenxin & Chen, Linyan
- S1874548223000288 Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey
by Etxezarreta, Xabier & Garitano, Iñaki & Iturbe, Mikel & Zurutuza, Urko
- S1874548223000306 Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems
by Vargas, Paola & Tien, Iris
- S1874548223000318 A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE
by Boeding, Matthew & Hempel, Michael & Sharif, Hamid & Lopez, Juan & Perumalla, Kalyan
- S1874548223000331 CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks
by Ramaki, Ali Ahmadian & Ghaemi-Bafghi, Abbas & Rasoolzadegan, Abbas
- S1874548223000343 Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990–2018
by Holmes, Jennifer S. & Palao, Agustin & Callenes, Mercedez & Silva, Neil Ortiz & Cardenas, Alvaro
- S1874548223000355 Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering
by Salama, Mohamed & El-Dakhakhni, Wael & Tait, Michael
- S1874548223000367 Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies
by Tiong, Achara & Vergara, Hector A.
- S1874548223000379 National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage
by Gülcan, Tolga Ahmet & Erginer, Kadir Emrah
- S187454822300029X A multi-criteria framework for critical infrastructure systems resilience
by Yang, Zhuyu & Barroca, Bruno & Laffréchine, Katia & Weppe, Alexandre & Bony-Dandrieux, Aurélia & Daclin, Nicolas
- S187454822300032X AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications
by Khan, Suleman & Gaba, Gurjot Singh & Braeken, An & Kumar, Pardeep & Gurtov, Andrei
2023, Volume 41, Issue C
- S1874548223000021 Vulnerable underground entrance understanding for visual surveillance systems
by Wang, Luping & Wei, Hui & Hao, Yun
- S1874548223000033 Vulnerability analysis of urban road networks based on traffic situation
by Wang, Ziqi & Pei, Yulong & Liu, Jing & Liu, Hehang
- S1874548223000124 A review on effective alarm management systems for industrial process control: Barriers and opportunities
by Mustafa, Faizan E & Ahmed, Ijaz & Basit, Abdul & Alvi, Um-E-Habiba & Malik, Saddam Hussain & Mahmood, Atif & Ali, Paghunda Roheela
- S1874548223000136 Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)
by Wang, Wensheng & Karimi, Faezeh & Khalilpour, Kaveh & Green, David & Varvarigos, Manos
- S1874548223000148 A threat modeling language for generating attack graphs of substation automation systems
by Rencelj Ling, Engla & Ekstedt, Mathias
- S187454822300015X A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch
by Wang, Shuliang & Dong, Qiqi
2023, Volume 40, Issue C
- S1874548222000671 Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes
by Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen
- S1874548222000683 Critical link identification algorithm for power communication networks in SDN architecture
by Fan, Bing & Tan, Hongtao & Li, Yaqun
- S1874548222000713 Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems
by Ashworth, James & Staggs, Jason & Shenoi, Sujeet
- S187454822200066X A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid
by Bitirgen, Kübra & Filik, Ümmühan Başaran
- S187454822300001X A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power–water networks under disruption
by Tiong, Achara & Vergara, Hector A.
2022, Volume 39, Issue C
- S1874548222000361 Physical performance of power grids against earthquakes: from framework to implementation
by Ghafory-Ashtiany, Mohsen & Arghavani, Mahban
- S1874548222000403 Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review
by Ampratwum, Godslove & Osei-Kyei, Robert & Tam, Vivian W.Y.
- S1874548222000518 Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features
by Panthi, Manikant & Kanti Das, Tanmoy
- S1874548222000531 Mitigation of the impact of disturbances in gas transmission systems
by Zalitis, Ivars & Dolgicers, Aleksandrs & Zemite, Laila & Ganter, Sebastian & Kopustinskas, Vytis & Vamanu, Bogdan & Finger, Jörg & Fuggini, Clemente & Bode, Ilmars & Kozadajevs, Jevgenijs & Häring, Ivo
- S1874548222000543 Identifying critical and vulnerable links: A new approach using the Fisher information matrix
by Martinez-Pastor, Beatriz & Nogal, Maria & O’Connor, Alan & Teixeira, Rui
- S1874548222000555 Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis
by Bolbot, Victor & Kulkarni, Ketki & Brunou, Päivi & Banda, Osiris Valdez & Musharraf, Mashrura
- S1874548222000567 The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints
by Huff, Johnathon D. & Leonard, William B. & Medal, Hugh R.
- S1874548222000579 Feasibility of critical infrastructure protection using network functions for programmable and decoupled ICS policy enforcement over WAN
by Baxley, Stuart M. & Bastin, Nicholas & Gurkan, Deniz & Conklin, William Arthur
- S187454822200052X Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms
by Rahman, Ayesha & Mustafa, Ghulam & Khan, Abdul Qayyum & Abid, Muhammad & Durad, Muhammad Hanif
2022, Volume 38, Issue C
- S1874548222000087 Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations
by Umer, Muhammad Azmi & Junejo, Khurum Nazir & Jilani, Muhammad Taha & Mathur, Aditya P.
- S1874548222000130 The digital divide in state vulnerability to submarine communications cable failure
by Franken, Jonas & Reinhold, Thomas & Reichert, Lilian & Reuter, Christian
- S1874548222000257 The drift of industrial control systems to pseudo security
by Donnelly, Peter & Abuhmida, Mabrouka & Tubb, Christopher
- S1874548222000269 Vulnerability assessment of urban road traffic systems based on traffic flow
by Wang, Shuliang & Chen, Chen & Zhang, Jianhua & Gu, Xifeng & Huang, Xiaodi
- S1874548222000294 A novel deep learning based security assessment framework for enhanced security in swarm network environment
by Liu, Zhiqiang & Ghulam, Mohi-ud-din & Zheng, Jiangbin & Wang, Sifei & Muhammad, Asim
- S1874548222000300 Cyber-attacks detection in industrial systems using artificial intelligence-driven methods
by Wang, Wu & Harrou, Fouzi & Bouyeddou, Benamar & Senouci, Sidi-Mohammed & Sun, Ying
- S1874548222000348 Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects
by Berghout, Tarek & Benbouzid, Mohamed & Muyeen, S.M.
- S1874548222000373 A taxonomy of IoT firmware security and principal firmware analysis techniques
by Nadir, Ibrahim & Mahmood, Haroon & Asadullah, Ghalib
- S1874548222000385 Physical layer protection for ADS-B against spoofing and jamming
by Rudys, Saulius & Aleksandravicius, Jurgis & Aleksiejunas, Rimvydas & Konovaltsev, Andriy & Zhu, Chen & Greda, Lukasz
- S1874548222000397 A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems
by Yang, Jun & Huang, Leixiong & Ma, Haoming & Xu, Zhihui & Yang, Ming & Guo, Shaoqiang
- S187454822200035X Security in Digital Aeronautical Communications A Comprehensive Gap Analysis
by Mäurer, Nils & Guggemos, Tobias & Ewert, Thomas & Gräupl, Thomas & Schmitt, Corinna & Grundner-Culemann, Sophia
2022, Volume 37, Issue C
- S1874548221000755 Bayesian games for the cybersecurity of nuclear power plants
by Maccarone, Lee T. & Cole, Daniel G.
- S1874548222000014 FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid
by Majidi, Seyed Hossein & Hadayeghparast, Shahrzad & Karimipour, Hadis
- S1874548222000099 Load-altering attack detection on smart grid using functional observers
by e Sousa, Álan & Messai, Nadhir & Manamanni, Noureddine
- S1874548222000129 APT attacks on industrial control systems: A tale of three incidents
by Kumar, Rajesh & Kela, Rohan & Singh, Siddhant & Trujillo-Rasua, Rolando
- S1874548222000142 Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis
by Han, Sang Min & Lee, Chanyoung & Seong, Poong Hyun
- S1874548222000154 VetaDetect: Vehicle tampering detection with closed-loop model ensemble
by Haller, Piroska & Genge, Béla & Forloni, Fabrizio & Baldini, Gianmarco & Carriero, Massimo & Fontaras, Georgios
- S1874548222000166 Digital transformation of the maritime industry: A cybersecurity systemic approach
by Kechagias, Evripidis P. & Chatzistelios, Georgios & Papadopoulos, Georgios A. & Apostolou, Panagiotis
- S1874548222000178 SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair
by Valueian, Meysam & Vahidi-Asl, Mojtaba & Khalilian, Alireza
- S187454822100086X A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems
by Staves, Alexander & Anderson, Tom & Balderstone, Harry & Green, Benjamin & Gouglidis, Antonios & Hutchison, David
- S187454822200018X An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace
by Ali, Busyairah Syd & Saji, Sam & Su, Moon Ting
2022, Volume 36, Issue C
- S1874548221000676 On the component resilience importance measures for infrastructure systems
by Li, Ruiying & Gao, Ying
- S1874548221000688 Effect of adding physical links on the robustness of the Internet modeled as a physical–logical interdependent network using simple strategies
by Bachmann, Ivana & Valdés, Valeria & Bustos-Jiménez, Javier & Bustos, Benjamin
- S1874548221000718 An evaluation framework for industrial control system cyber incidents
by Firoozjaei, Mahdi Daghmehchi & Mahmoudyar, Nastaran & Baseri, Yaser & Ghorbani, Ali A.
- S1874548221000731 Flood risk assessment and application of risk curves for design of mitigation strategies
by Zhang, Ning & Alipour, Alice
- S1874548221000767 A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks
by Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng
- S1874548221000858 Cyber-threat landscape of border control infrastructures
by Chatzis, Petros & Stavrou, Eliana
- S1874548221000871 Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus
by Nweke, Livinus Obiora & Weldehawaryat, Goitom K. & Wolthusen, Stephen D.
- S1874548221000883 Risk assessment and mitigation for electric power sectors: A developing country's perspective
by Rehman, Obaid ur & Ali, Yousaf & Sabir, Muhammad
- S187454822100072X Defensive cost–benefit analysis of smart grid digital functionalities
by Stright, Jim & Cheetham, Peter & Konstantinou, Charalambos
2021, Volume 35, Issue C
- S1874548221000470 A hypothesis-driven framework for resilience analysis of public transport network under compound failure scenarios
by Zhang, Yifan & Ng, S. Thomas
- S1874548221000482 Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts
by Khazaei, Javad & Amini, M. Hadi
- S1874548221000494 A multi-criteria model for the security assessment of large-infrastructure construction sites
by Oliva, Gabriele & Faramondi, Luca & Setola, Roberto & Tesei, Marco & Zio, Enrico
- S1874548221000500 Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory
by Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei
- S1874548221000512 Critical flow centrality measures on interdependent networks with time-varying demands
by Williams, James Bryan
- S1874548221000524 Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems
by Miller, Thomas & Staves, Alexander & Maesschalck, Sam & Sturdee, Miriam & Green, Benjamin
- S1874548221000536 Threat Modelling of Cyber–Physical Systems Using an Applied π-Calculus
by Nweke, Livinus Obiora & Weldehawaryat, Goitom K. & Wolthusen, Stephen D.
- S1874548221000548 Optimal allocation of defensive resources to defend urban power networks against different types of attackers
by Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning
- S1874548221000561 A study on resilient and cost-based design in power distribution network against severe hurricane
by Karimi, Masoumeh & Ravadanegh, Sajad Najafi & Haghifam, Mahmoud-Reza
- S1874548221000573 Vulnerability analysis of S7 PLCs: Manipulating the security mechanism
by Hui, Henry & McLaughlin, Kieran & Sezer, Sakir
- S1874548221000585 Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set
by Luiijf, Eric & Klaver, Marieke
- S1874548221000597 Vulnerability analysis of critical infrastructure network
by Kizhakkedath, A. & Tai, K.
- S1874548221000706 IoT fusion based model predictive pid control approach for oil pipeline infrastructure
by Priyanka, E.B. & Thangavel, S. & Prasad, P.H. & Mohanasundaram, R.
- S187454822100069X Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility
by Jena, Prasanta Kumar & Ghosh, Subhojit & Koley, Ebha
2021, Volume 34, Issue C
- S1874548221000020 End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure
by Singh, Neeraj Kumar & Mahajan, Vasundhara
- S1874548221000160 Industrial intrusion detection based on the behavior of rotating machine
by Safari, Mohammad & Parvinnia, Elham & Haddad, Alireza Keshavarz
- S1874548221000251 Architecture and security of SCADA systems: A review
by Yadav, Geeta & Paul, Kolin
- S1874548221000263 Nodal vulnerability assessment of water distribution networks: An integrated Fuzzy AHP-TOPSIS approach
by Tornyeviadzi, Hoese Michel & Neba, Fabrice Abunde & Mohammed, Hadi & Seidu, Razak
- S1874548221000275 SafeCI: Avoiding process anomalies in critical infrastructure
by adepu, Sridhar & Mathur, Aditya
- S1874548221000287 Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things
by Medjek, Faiza & Tandjaoui, Djamel & Djedjig, Nabil & Romdhani, Imed
- S1874548221000391 Evaluation on nuclear emergency response strategies in the Asia-Pacific region
by Li, Fei & Wang, Jing & Li, Hui & Hu, Qian & Dan, Wenxuan & Ge, Liangquan & Cohen, David
- S1874548221000408 Assessing the effects of link-repair sequences on road network resilience
by Sohouenou, Philippe Y.R. & Neves, Luis A.C.
- S1874548221000445 Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems
by Jia, Yifan & Wang, Jingyi & Poskitt, Christopher M. & Chattopadhyay, Sudipta & Sun, Jun & Chen, Yuqi
- S1874548221000457 Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants
by Busquim e Silva, R.A. & Piqueira, J.R.C. & Cruz, J.J. & Marques, R.P.
- S1874548221000469 Cybersecurity professionals information sharing sources and networks in the U.S. electrical power industry
by Randall, Rick G. & Allen, Stuart
- S187454822100038X Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment
by Vávra, Jan & Hromada, Martin & Lukáš, Luděk & Dworzecki, Jacek
- S187454822100041X A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem
by Al-Daweri, Muataz Salam & Abdullah, Salwani & Ariffin, Khairul Akram Zainol
2021, Volume 33, Issue C
- S1874548220300706 Vulnerabilities and countermeasures in electrical substations
by Hussain, Shahbaz & Hernandez Fernandez, Javier & Al-Ali, Abdulla Khalid & Shikfa, Abdullatif
- S1874548221000032 Power systems resilience: Definition and taxonomy with a view towards metrics
by Plotnek, Jordan J. & Slay, Jill
- S1874548221000147 Resilient backup controller placement in distributed SDN under critical targeted attacks
by Calle, Eusebi & Martínez, David & Mycek, Mariusz & Pióro, Michał
- S1874548221000159 Unsupervised machine learning techniques to prevent faults in railroad switch machines
by Soares, Nielson & Aguiar, Eduardo Pestana de & Souza, Amanda Campos & Goliatt, Leonardo
- S1874548221000196 A Systematic Literature Review on RAMS analysis for critical infrastructures protection
by Pirbhulal, Sandeep & Gkioulos, Vasileios & Katsikas, Sokratis
- S1874548221000226 ARTINALI#: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems
by Raiyat Aliabadi, Maryam & Seltzer, Margo & Vahidi Asl, Mojtaba & Ghavamizadeh, Ramak
- S1874548221000238 SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems
by Chekole, Eyasu Getahun & Ochoa, Martín & Chattopadhyay, Sudipta
- S187454822100024X Robustness of the Chinese power grid to cascading failures under attack and defense strategies
by Li, Kaiwen & Liu, Kai & Wang, Ming
2021, Volume 32, Issue C
- S1874548220300585 Securing SCADA and critical industrial systems: From needs to security mechanisms
by Abou el Kalam, Anas
- S1874548220300718 Critical infrastructure protection system design based on SCOUT multitech seCurity system for intercOnnected space control groUnd staTions
by Cantelli-Forti, Alessandro & Capria, Amerigo & Saverino, Anna Lisa & Berizzi, Fabrizio & Adami, Davide & Callegari, Christian
- S1874548221000019 Risk-averse bi-level stochastic network interdiction model for cyber-security risk management
by Bhuiyan, Tanveer Hossain & Medal, Hugh R. & Nandi, Apurba K. & Halappanavar, Mahantesh
- S187454822030069X Changes in inoperability for interdependent industry sectors in Norway from 2012 to 2017
by Sellevåg, Stig Rune
2020, Volume 31, Issue C
- S1874548220300494 Network trace generation for flow-based IDS evaluation in control and automation systems
by Ndonda, Gorby Kabasele & Sadre, Ramin
- S1874548220300536 An online real-time estimation tool of leakage parameters for hazardous liquid pipelines
by Zheng, Jianqin & Dai, Yuanhao & Liang, Yongtu & Liao, Qi & Zhang, Haoran
- S1874548220300548 Computer-aided security assessment of water networks monitoring platforms
by Gentile, U. & Marrone, S. & Nardone, R. & Bellini, E.
- S1874548220300561 Linear time invariant system fault isolation: A static compensation decoupling method
by Fang, Yuanjie & Fei, Minrui & Du, Dajun
- S1874548220300573 A multilayer perceptron model for anomaly detection in water treatment plants
by Raman MR, Gauthama & Somu, Nivethitha & Mathur, A.P.
- S187454822030055X Integrating data-driven and physics-based approaches to characterize failures of interdependent infrastructures
by Zhou, Shenghua & Yang, Yifan & Ng, S. Thomas & Xu, J. Frank & Li, Dezhi
2020, Volume 30, Issue C
- S1874548220300299 Multi-period vulnerability analysis of power grids under multiple outages: An AC-based bilevel optimization approach
by Abedi, Amin & Romerio, Franco
- S1874548220300391 Developing an evaluation method for SCADA-Controlled urban gas infrastructure hierarchical design using multi-level fuzzy comprehensive evaluation
by Liu, Wu & Hui, Longxuan & Lu, Yuting & Tang, Jinsong
- S1874548220300408 Quantitative approach to physical protection systems assessment of critical infrastructure elements: Use case in the Slovak Republic
by Kampova, Katarina & Lovecek, Tomas & Rehak, David
- S187454822030041X A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments
by Aoudi, Wissam & Almgren, Magnus
2020, Volume 29, Issue C
- S1874548220300172 Using a random road graph model to understand road networks robustness to link failures
by Sohouenou, Philippe Y.R. & Christidis, Panayotis & Christodoulou, Aris & Neves, Luis A.C. & Presti, Davide Lo
- S1874548220300184 A novel optimization method for urban resilient and fair power distribution preventing critical network states
by Ottenburger, Sadeeb Simon & Çakmak, Hüseyin Kemal & Jakob, Wilfried & Blattmann, Andreas & Trybushnyi, Dmytro & Raskob, Wolfgang & Kühnapfel, Uwe & Hagenmeyer, Veit
- S1874548220300196 Obtaining high preventive and resilience capacities in critical infrastructure by industrial automation cells
by González, Santiago G. & Dormido Canto, S. & Sánchez Moreno, José
- S1874548220300202 Industrial control system security taxonomic framework with application to a comprehensive incidents survey
by Ahmadian, Mohammad Mehdi & Shajari, Mehdi & Shafiee, Mohammad Ali
- S1874548220300214 Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: A case study involving a virtual gas pipeline SCADA system
by Choubineh, Abouzar & Wood, David A. & Choubineh, Zahak
- S1874548220300226 A double-weighted vulnerability assessment model for metrorail transit networks and its application in Shanghai metro
by Zhang, Yanjie & Ayyub, Bilal M. & Saadat, Yalda & Zhang, Dongming & Huang, Hongwei
2020, Volume 28, Issue C
- S1874548219301337 A new soft computing approach for analyzing the influential relationships of critical infrastructures
by Lo, Huai-Wei & Liou, James J.H. & Huang, Chun-Nen & Chuang, Yen-Ching & Tzeng, Gwo-Hshiung
- S1874548220300019 Using stakeholders’ judgement and fuzzy logic theory to analyze the risk influencing factors in oil and gas pipeline projects: Case study in Iraq, Stage II
by Kraidi, Layth & Shah, Raj & Matipa, Wilfred & Borthwick, Fiona
- S1874548220300020 Multi-criteria node criticality assessment framework for critical infrastructure networks
by Faramondi, Luca & Oliva, Gabriele & Setola, Roberto
- S1874548220300032 Seismic risk assessment of natural gas networks with steady-state flow computation
by Cavalieri, Francesco
- S1874548220300044 Resilience for whom? The general public's tolerance levels as CI resilience criteria
by Petersen, Laura & Lundin, Emma & Fallou, Laure & Sjöström, Johan & Lange, David & Teixeira, Rui & Bonavita, Alexandre
- S1874548220300056 Generating invariants using design and data-centric approaches for distributed attack detection
by Umer, Muhammad Azmi & Mathur, Aditya & Junejo, Khurum Nazir & Adepu, Sridhar
- S1874548220300068 A Methodology for Security Classification applied to Smart Grid Infrastructures
by Shrestha, Manish & Johansen, Christian & Noll, Josef & Roverso, Davide
2019, Volume 27, Issue C
- S1874548218301409 Critical rotating machinery protection by integration of a “fuse” bearing
by Gazizulin, Dmitri & Cohen, Evyatar & Bortman, Jacob & Klein, Renata
- S1874548219301209 A novel online state-based anomaly detection system for process control networks
by Farsi, Hamed & Fanian, Ali & Taghiyarrenani, Zahra
- S1874548219301210 A method for testing distributed anomaly detectors
by Sugumar, Gayathri & Mathur, Aditya
- S1874548219301222 A leakage risk assessment method for hazardous liquid pipeline based on Markov chain Monte Carlo
by Li, Zhengbing & Feng, Huixia & Liang, Yongtu & Xu, Ning & Nie, Siming & Zhang, Haoran
- S1874548219301234 Measures of robustness for networked critical infrastructure: An empirical comparison on four electrical grids
by Galbraith, John W. & Iuliani, Luca
- S1874548219301301 IJCIP Editorial December 2019 – Volume 27
by Strous, Leon
2019, Volume 26, Issue C
- S1874548218301616 A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system
by Mishra, Vishrut Kumar & Palleti, Venkata Reddy & Mathur, Aditya
- S1874548218301641 PLC memory attack detection and response in a clean water supply system
by Robles-Durazno, Andres & Moradpoor, Naghmeh & McWhinnie, James & Russell, Gordon & Maneru-Marin, Inaki
- S1874548218301781 A business that can’t lose: Investing in attacks against the Colombian power grid
by Barreto, Carlos & Cardenas, Alvaro A. & Holmes, Jennifer & Palao, Agustin & Restrepo, Juan Carlos
- S1874548218301793 Systemic vulnerability assessment of urban water distribution networks considering failure scenario uncertainty
by Wang, Fei & Zheng, Xia-zhong & Li, Nan & Shen, Xuesong
- S1874548218301823 Quality function deployment-based framework for improving the resilience of critical infrastructure systems
by Mao, Quan & Li, Nan & Peña-Mora, Feniosky
- S1874548219300022 Quality of supply regulations versus societal priorities regarding electricity outage consequences: Case study in a Swedish context
by Landegren, Finn & Johansson, Jonas & Samuelsson, Olof
- S1874548219300034 Traffic management for drones flying in the city
by Syd Ali, Busyairah
- S1874548219300277 Exploring the temporal structure of time series data for hazardous liquid pipeline incidents based on complex network theory
by Shengli, Liu & Yongtu, Liang
- S1874548219300320 Detecting control system misbehavior by fingerprinting programmable logic controller functionality
by Stockman, Melissa & Dwivedi, Dipankar & Gentz, Reinhard & Peisert, Sean
- S1874548219300460 The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system
by Han, Choong-Hee & Park, Soon-Tai & Lee, Sang-Joon
- S1874548219300630 Optimal sabotage attack on composite material parts
by Ranabhat, Bikash & Clements, Joseph & Gatlin, Jacob & Hsiao, Kuang-Ting & Yampolskiy, Mark
- S1874548219300642 “Internet of Smart Cards”: A pocket attacks scenario
by Sportiello, Luigi
2019, Volume 25, Issue C
- 1-1 Editorial
by Strous, Leon
- 1-13 Energy infrastructure as a target of terrorist attacks from the Islamic state in Iraq and Syria
by Tichý, Lukáš
- 14-35 Extending the cyber-attack landscape for SCADA-based critical infrastructure
by Rodofile, Nicholas R. & Radke, Kenneth & Foo, Ernest
- 36-49 Cyber security challenges for IoT-based smart grid networks
by Kimani, Kenneth & Oduol, Vitalice & Langat, Kibet
- 50-61 A comprehensive instrument for identifying critical information infrastructure services
by Herrera, Luis-Carlos & Maennel, Olaf
- 62-83 A framework for modeling and assessing system resilience using a Bayesian network: A case study of an interdependent electrical infrastructure system
by Hossain, Niamat Ullah Ibne & Jaradat, Raed & Hosseini, Seyedmohsen & Marufuzzaman, Mohammad & Buchanan, Randy K.
- 84-101 MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems
by Demir, Kubilay & Nayyer, Ferdaus & Suri, Neeraj
- 102-124 Adaptive control of criticality infrastructure in automatic closed-loop supply chain considering uncertainty
by Saraeian, Shideh & Shirazi, Babak & Motameni, Homayun
- 125-138 Complex approach to assessing resilience of critical infrastructure elements
by Rehak, David & Senovsky, Pavel & Hromada, Martin & Lovecek, Tomas
- 139-151 The study of weather conditions favourable to the accretion of icing that pose a threat to transmission power lines
by Tomaszewski, Michał & Ruszczak, Bogdan & Michalski, Paweł & Zator, Sławomir
- 152-168 Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems
by Sándor, Hunor & Genge, Béla & Szántó, Zoltán & Márton, Lőrinc & Haller, Piroska
2019, Volume 24, Issue C