Contact information of Elsevier
Serial Information
Download restrictions: Full text for ScienceDirect subscribers only
Series handle: RePEc:eee:ijocip
ISSN: 1874-5482
Citations RSS feed: at CitEc
Impact factors
Access and download statisticsTop item:
Corrections
All material on this site has been provided by the respective publishers and authors. You can help
correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .
Content
2019, Volume 24, Issue C
- 23-36 Multi-criteria spatial decision support system for identifying strategic roads in disaster situations
by Ghavami, Seyed Morsal
- 37-47 Framework for shared drinking water risk assessment
by Tidwell, Vincent C. & Lowry, Thomas S. & Binning, David & Graves, Jenny & Peplinski, William J. & Mitchell, Roger
- 48-68 On the practical integration of anomaly detection techniques in industrial control applications
by Haller, Piroska & Genge, Béla & Duka, Adrian-Vasile
- 69-77 Dynamics of interdependent critical infrastructures – A mathematical model with unexpected results
by Klein, Peter & Klein, Fabian
- 78-99 Sequential collaborative detection strategy on ADS-B data attack
by Li, Tengyao & Wang, Buhong
- 100-110 The challenge of detecting false documents at the border: Exploring the performance of humans, machines and their interaction
by Gariup, Monica & Piskorski, Jakub
- 111-125 Key pre-distribution scheme with join leave support for SCADA systems
by T. C., Pramod & Boroojeni, Kianoosh G. & Hadi Amini, M. & Sunitha, N.R. & Iyengar, S.S.
- 126-143 A stealth monitoring mechanism for cyber-physical systems
by Graveto, Vitor & Rosa, Luís & Cruz, Tiago & Simões, Paulo
- 144-165 Interdependent Critical Infrastructure Model (ICIM): An agent-based model of power and water infrastructure
by Thompson, James R. & Frezza, Damon & Necioglu, Burhan & Cohen, Michael L. & Hoffman, Kenneth & Rosfjord, Kristine
- 166-176 The insider threat: Behavioral indicators and factors influencing likelihood of intervention
by Bell, Alison J.C. & Rogers, M. Brooke & Pearce, Julia M.
2018, Volume 23, Issue C
- 1-1 IJCIP Editorial December 2018 – Volume 23
by Strous, Leon
- 1-10 A policy model for access control using building information models
by Skandhakumar, Nimalaprakasan & Reid, Jason & Salim, Farzad & Dawson, Ed
- 11-20 A real-time anomaly-based IDS for cyber-attack detection at the industrial process level of Critical Infrastructures
by Clotet, Xavier & Moyano, José & León, Gladys
- 21-32 A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures
by Palleti, Venkata Reddy & Joseph, Jude Victor & Silva, Arlindo
- 33-48 Advancing cyber–physical sustainability through integrated analysis of smart power systems: A case study on electric vehicles
by Mohandes, Baraa & Hammadi, Reem Al & Sanusi, Wasiu & Mezher, Toufic & Khatib, Sameh El
- 49-67 On hardening problems in critical infrastructure systems
by Banerjee, Joydeep & Basu, Kaustav & Sen, Arunabha
- 68-78 Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks
by Aichhorn, Andreas & Etzlinger, Bernhard & Unterweger, Andreas & Mayrhofer, René & Springer, Andreas
- 79-89 Vulnerability analysis of an urban gas pipeline network considering pipeline-road dependency
by Liu, Kai & Wang, Ming & Zhu, Weihua & Wu, Jinshan & Yan, Xiaoyong
- 90-99 Evaluation of vulnerable path: Using heuristic path-finding algorithm in physical protection system of nuclear power plant
by Zou, Bowen & Yang, Ming & Zhang, Yuxin & Benjamin, Emi-Reynolds & Tan, Ke & Wu, Wenfei & Yoshikawa, Hidekazu
- 100-111 Securing the cloud-assisted smart grid
by Demir, Kubilay & Ismail, Hatem & Vateva-Gurova, Tsvetoslava & Suri, Neeraj
- 112-125 Simulation based assessment of resilience of two large-scale socio-technical IT networks
by Landegren, Finn & Höst, Martin & Möller, Peter
- 126-138 Developing a spatial methodology to reduce the vulnerability of critical infrastructures against intelligent air-based threats
by Ramezani, Abouzar & Malek, MohammadReza & Sahami, Habib & Hosnavi, Reza
- 139-149 A conceptual system architecture for countering the civilian unmanned aerial vehicles threat to nuclear facilities
by Islam, Md. Shafiqul & Ahmed, Md. Mobasher & Islam, Saad
2018, Volume 22, Issue C
- 4-15 Vulnerability analysis of critical infrastructures in the case of a semi-centralised water reuse system in Qingdao, China
by Zimmermann, Martin & Winker, Martina & Schramm, Engelbert
- 16-24 Lightweight privacy-preserving data aggregation scheme for smart grid metering infrastructure protection
by Baloglu, Ulas Baran & Demir, Yakup
- 25-38 Critical infrastructure vulnerability—A method for identifying the infrastructure service failure interdependencies
by Seppänen, Hannes & Luokkala, Pekka & Zhang, Zhe & Torkki, Paulus & Virrantaus, Kirsi
- 39-50 Towards a next generation 112 testbed: The EMYNOS ESInet
by Rebahi, Yacine & Chiu, Kin Tsun & Tcholtchev, Nikolay & Hohberg, Simon & Pallis, Evangelos & Markakis, Evangelos
- 51-61 Modeling infrastructure interdependencies by integrating network and fuzzy set theory
by Lam, C.Y. & Tai, K.
- 62-69 On PLC network security
by Ghaleb, Asem & Zhioua, Sami & Almulhem, Ahmad
- 70-89 Standards on cyber security assessment of smart grid
by Leszczyna, Rafał
- 90-99 Anomaly behavior detection and reliability assessment of control systems based on association rules
by Jie, Xinchun & Wang, Haikuan & Fei, Minrui & Du, Dajun & Sun, Qing & Yang, T.C.
- 100-112 Criticality assessment of urban interdependent lifeline systems using a biased PageRank algorithm and a multilayer weighted directed network model
by Zhao, Chen & Li, Nan & Fang, Dongping
- 113-124 SIDS: State-based intrusion detection for stage-based cyber physical systems
by Khalili, Abdullah & Sami, Ashkan & Khozaei, Amin & Pouresmaeeli, Saber
- 125-138 Cascading Impact Assessment in a Critical Infrastructure System
by Rehak, David & Senovsky, Pavel & Hromada, Martin & Lovecek, Tomas & Novotny, Petr
- 139-149 China's cybersecurity legislation, it's relevance to critical infrastructures and the challenges it faces
by Guo, Meirong
2018, Volume 21, Issue C
- 3-21 Regulated applications for the road transportation infrastructure: The case study of the smart tachograph in the European Union
by Baldini, Gianmarco & Sportiello, Luigi & Chiaramello, Michel & Mahieu, Vincent
- 22-32 Enhanced connectivity index – A new measure for identifying critical points in urban public transportation networks
by Psaltoglou, Artemis & Calle, Eusebi
- 33-46 A dual-radio approach for reliable emergency signaling in critical infrastructure assets with large wireless networks
by Kauer, Florian & Kallias, Emil & Turau, Volker
- 47-56 Legally critical: Defining critical infrastructure in an interconnected world
by Harašta, Jakub
- 57-71 Proposed methodology for risk analysis of interdependent critical infrastructures to extreme weather events
by Tsavdaroglou, Margarita & Al-Jibouri, Saad H.S. & Bles, Thomas & Halman, Johannes I.M.
- 72-82 Integrated protection of industrial control systems from cyber-attacks: the ATENA approach
by Adamsky, F. & Aubigny, M. & Battisti, F. & Carli, M. & Cimorelli, F. & Cruz, T. & Di Giorgio, A. & Foglietta, C. & Galli, A. & Giuseppi, A. & Liberati, F. & Neri, A. & Panzieri, S. & Pascucci, F. & Proenca, J. & Pucci, P. & Rosa, L. & Soua, R.
- 83-84 Voting infrastructure and the money problem
by Bronk, Chris
2018, Volume 20, Issue C
- 3-15 Finding critical nodes in infrastructure networks
by Faramondi, Luca & Setola, Roberto & Panzieri, Stefano & Pascucci, Federica & Oliva, Gabriele
- 16-25 A connection probability model for communications networks under regional failures
by Kabir, Muhammad Nomani & Rahman, Md Arafatur & Azad, Saiful & Azim, Mohamed Mostafa A. & Bhuiyan, Md Zakirul Alam
- 26-27 Building resilience against cyber threats in the energy sector
by Hagen, Janne
- 28-47 Nationwide critical infrastructure monitoring using a common operating picture framework
by Puuska, Samir & Rummukainen, Lauri & Timonen, Jussi & Lääperi, Lauri & Klemetti, Markus & Oksama, Lauri & Vankka, Jouko
- 48-67 Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the GOOSE and MMS protocols
by Lahza, Hassan & Radke, Kenneth & Foo, Ernest
- 68-84 A practical implementation of unconditional security for the IEC 60780-5-101 SCADA protocol
by CHERIFI, Tarek & HAMAMI, Lamia
2017, Volume 19, Issue C
- 4-15 Comparative analysis of the security of configuration protocols for industrial control devices
by Martín-Liras, Luis & Prada, Miguel A. & Fuertes, Juan J. & Morán, Antonio & Alonso, Serafín & Domínguez, Manuel
- 16-31 Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system
by Riahi Manesh, Mohsen & Kaabouch, Naima
- 32-46 A cyber risk scoring system for medical devices
by Stine, Ian & Rice, Mason & Dunlap, Stephen & Pecarina, John
- 47-48 On the harms arising from the Equifax data breach of 2017
by Moore, Tyler
- 49-58 Information and power terminals: A reliable microgrid infrastructure for use in disaster scenarios
by Lombardi, Pio & Hänsch, Kathleen & Arendarski, Bartlomiej & Komarnicki, Przemyslaw
- 59-67 An improved authentication protocol for distributed mobile cloud computing services
by Jannati, Hoda & Bahrak, Behnam
2017, Volume 18, Issue C
- 3-19 Security analysis of an advanced metering infrastructure
by Hansen, Aaron & Staggs, Jason & Shenoi, Sujeet
- 20-33 Cybersecurity protection for power grid control infrastructures
by Jarmakiewicz, Jacek & Parobczak, Krzysztof & Maślanka, Krzysztof
- 34-36 Smart grids: And the bad news is?
by LUIIJF, Hendricus (Eric) Antonius Maria
- 37-49 Measuring the organizational resilience of critical infrastructure providers: A New Zealand case study
by Brown, Charlotte & Seville, Erica & Vargo, John
- 50-57 Risk assessment of critical infrastructures – New parameters for commercial ports
by Romero-Faz, David & Camarero-Orive, Alberto
- 58-70 Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections
by Gutierrez del Arroyo, Jose & Bindewald, Jason & Graham, Scott & Rice, Mason
2017, Volume 17, Issue C
- 3-14 Wind farm security: attack surface, targets, scenarios and mitigation
by Staggs, Jason & Ferlemann, David & Shenoi, Sujeet
- 15-27 Distributed monitoring for the prevention of cascading failures in operational power grids
by Warnier, Martijn & Dulman, Stefan & Koç, Yakup & Pauwels, Eric
- 30-48 Improving the cyber resilience of industrial control systems
by Chaves, Andrew & Rice, Mason & Dunlap, Stephen & Pecarina, John
- 49-59 Cyber resilience preparedness of Africa’s top-12 emerging economies
by Peter, Ada S.
- 60-74 Using geographic information science to evaluate legal restrictions on freight transportation routing in disruptive scenarios
by Fialkoff, Marc R. & Omitaomu, Olufemi A. & Peterson, Steven K. & Tuttle, Mark A.
2017, Volume 16, Issue C
- 3-12 Using interdependency matrices to mitigate targeted attacks on interdependent networks: A case study involving a power grid and backbone telecommunications networks
by Rueda, Diego F. & Calle, Eusebi
- 13-25 Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory
by Liu, Xiaoxue & Zhang, Jiexin & Zhu, Peidong
- 26-35 A methodology for determining the image base of ARM-based industrial control system firmware
by Zhu, Ruijin & Zhang, Baofeng & Mao, Junjie & Zhang, Quanxin & Tan, Yu-an
- 39-48 A fuzzy model for evaluating metal detection equipment at airport security screening checkpoints
by Skorupski, Jacek & Uchroński, Piotr
- 49-65 Infrastructure financing and development: A bibliometric review
by Kumari, Anita & Kumar Sharma, Anil
2016, Volume 15, Issue C
- 3-11 A framework for designing resilient distributed intrusion detection systems for critical infrastructures
by Genge, Béla & Haller, Piroska & Kiss, István
- 12-26 Using timing-based side channels for anomaly detection in industrial control systems
by Dunlap, Stephen & Butts, Jonathan & Lopez, Juan & Rice, Mason & Mullins, Barry
- 27-37 Implementation of error detection and correction in the Modbus-RTU serial protocol
by Urrea, Claudio & Morales, Claudio & Kern, John
- 40-46 System specifications for developing an Automatic Dependent Surveillance-Broadcast (ADS-B) monitoring system
by Ali, Busyairah Syd
- 47-59 A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness
by Karabacak, Bilge & Yildirim, Sevgi Ozkan & Baykal, Nazife
2016, Volume 14, Issue C
- 3-17 Quantitative evaluation of the synergistic effects of failures in a critical infrastructure system
by Rehak, David & Markuci, Jiri & Hromada, Martin & Barcova, Karla
- 18-27 A methodology for modeling and measuring interdependencies of information and communications systems used for public administration and eGovernment services
by De Nicola, Antonio & Villani, Maria Luisa & Brugnoli, Maria Cristina & D'Agostino, Gregorio
- 28-40 Towards comparable cross-sector risk analyses: A re-examination of the Risk Analysis and Management for Critical Asset Protection (RAMCAP) methodology
by White, Richard & Burkhart, Aaron & George, Randy & Boult, Terrance & Chow, Edward
- 43-57 A framework for incorporating insurance in critical infrastructure cyber risk strategies
by Young, Derek & Lopez, Juan & Rice, Mason & Ramsey, Benjamin & McTasney, Robert
- 58-71 Using 3D printers as weapons
by Yampolskiy, Mark & Skjellum, Anthony & Kretzschmar, Michael & Overfelt, Ruel A. & Sloan, Kenneth R. & Yasinsac, Alec
2016, Volume 13, Issue C
- 3-18 An analytical model for benchmarking the development of national infrastructure items against those in similar countries
by Wang, Shih-Hsu
- 19-27 Evaluating the readiness of cyber first responders responsible for critical infrastructure protection
by Yoon, Jungsang & Dunlap, Stephen & Butts, Jonathan & Rice, Mason & Ramsey, Benjamin
- 28-35 Designing an emergency continuity plan for a megacity government: A conceptual framework for coping with natural catastrophes
by Sun, Qin-Ying & Li, Xiang-Yang & Yu, Feng
- 39-51 A novel security information and event management system for enhancing cyber security in a hydroelectric dam
by Di Sarno, Cesario & Garofalo, Alessia & Matteucci, Ilaria & Vallini, Marco
- 52-62 Exploiting traffic periodicity in industrial control networks
by Barbosa, Rafael Ramos Regis & Sadre, Ramin & Pras, Aiko
2016, Volume 12, Issue C
- 4-11 Objectives for managing cyber supply chain risk
by Windelberg, Marjorie
- 12-26 Current practices and challenges in industrial control organizations regarding information security incident management – Does size matter? Information security incident management in large and small industrial control organizations
by Bartnes Line, Maria & Anne Tøndel, Inger & Jaatun, Martin G.
- 29-45 New centrality measures for assessing smart grid vulnerabilities and predicting brownouts and blackouts
by Chopade, Pravin & Bikdash, Marwan
- 46-60 Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures
by Stergiopoulos, George & Kotzanikolaou, Panayiotis & Theocharidou, Marianthi & Lykou, Georgia & Gritzalis, Dimitris
- 61-74 Integrated roadmap for the rapid finding and tracking of people at large airports
by Bouma, Henri & van Rest, Jeroen & van Buul-Besseling, Kim & de Jong, Jacomien & Havekes, Anton
2015, Volume 11, Issue C
- 3-11 WikiLeaks and the risks to critical foreign dependencies
by Arce, Daniel G.
- 12-21 Regional response to large-scale emergency events: Building on historical data
by Romanowski, Carol & Raj, Rajendra & Schneider, Jennifer & Mishra, Sumita & Shivshankar, Vinay & Ayengar, Srikant & Cueva, Fernando
- 24-38 Experimental assessment of network design approaches for protecting industrial control systems
by Genge, Béla & Graur, Flavius & Haller, Piroska
- 39-50 A multi-layered and kill-chain based security analysis framework for cyber-physical systems
by Hahn, Adam & Thomas, Roshan K. & Lozano, Ivan & Cardenas, Alvaro
- 51-61 Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems
by Jannati, Hoda
2015, Volume 10, Issue C
- 3-17 A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures
by Genge, Béla & Kiss, István & Haller, Piroska
- 18-33 Multilayer hybrid modeling framework for the performance assessment of interdependent critical infrastructures
by Nan, Cen & Sansavini, Giovanni
- 34-44 Risk mitigation strategies for critical infrastructures based on graph centrality analysis
by Stergiopoulos, George & Kotzanikolaou, Panayiotis & Theocharidou, Marianthi & Gritzalis, Dimitris
- 47-58 Constructing cost-effective and targetable industrial control system honeypots for production networks
by Winn, Michael & Rice, Mason & Dunlap, Stephen & Lopez, Juan & Mullins, Barry
- 59-70 Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems
by Erez, Noam & Wool, Avishai
2015, Volume 9, Issue C
- 3-12 Policy networks—A threat to procedural and expert-based decision making and the quality of public risk decisions?
by Johansson, Vicki
- 13-23 Multidisciplinary coordination of on-scene command teams in virtual emergency exercises
by van Ruijven, Theo & Mayer, Igor & de Bruijne, Mark
- 24-37 Designing reliable and resilient smart low-voltage grids
by Negeri, Ebisa & Kuipers, Fernando & Baken, Nico
- 41-51 Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process
by Stone, Samuel J. & Temple, Michael A. & Baldwin, Rusty O.
- 52-80 A survey of cyber security management in industrial control systems
by Knowles, William & Prince, Daniel & Hutchison, David & Disso, Jules Ferdinand Pagna & Jones, Kevin
2015, Volume 8, Issue C
- 3-15 A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure
by Zhang, Zili & Li, Xiangyang & Li, Hengyun
- 16-23 Critical infrastructure dependencies: A holistic, dynamic and quantitative approach
by Laugé, Ana & Hernantes, Josune & Sarriegi, Jose M.
- 27-39 Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers
by Ramsey, Benjamin W. & Stubbs, Tyler D. & Mullins, Barry E. & Temple, Michael A. & Buckner, Mark A.
- 40-52 A language for describing attacks on cyber-physical systems
by Yampolskiy, Mark & Horváth, Péter & Koutsoukos, Xenofon D. & Xue, Yuan & Sztipanovits, Janos
- 53-66 Critical infrastructure protection: Requirements and challenges for the 21st century
by Alcaraz, Cristina & Zeadally, Sherali
2014, Volume 7, Issue 4
- 213-232 Vulnerabilities of cyber-physical systems to stale data—Determining the optimal time to launch attacks
by Krotofil, Marina & Cárdenas, Alvaro & Larsen, Jason & Gollmann, Dieter
- 233-243 Implementation of security and privacy in ePassports and the extended access control infrastructure
by Rana, Antonia & Sportiello, Luigi
- 247-256 Security considerations related to the use of mobile devices in the operation of critical infrastructures
by Armando, Alessandro & Merlo, Alessio & Verderame, Luca
- 257-269 Analysis of pipeline accidents in the United States from 1968 to 2009
by Siler-Evans, Kyle & Hanson, Alex & Sunday, Cecily & Leonard, Nathan & Tumminello, Michele
2014, Volume 7, Issue 3
- 141-154 Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation
by Farley, Ryan & Wang, Xinyuan
- 155-164 Phasor measurement unit selection for unobservable electric power data integrity attack detection
by Giani, Annarita & Bent, Russell & Pan, Feng
- 167-177 A computational asset vulnerability model for the strategic protection of the critical infrastructure
by White, Richard & Boult, Terrance & Chow, Edward
- 178-192 Designing physical security for complex infrastructures
by Nunes-Vaz, Rick & Lord, Steven
- 193-210 Trust building and the European Reference Network for Critical Infrastructure Protection community
by Ward, David & Kourti, Naouma & Lazari, Alessandro & Cofta, Piotr
2014, Volume 7, Issue 2
- 71-85 Identifying critical infrastructure sectors and their dependencies: An Indian scenario
by Singh, Abhishek Narain & Gupta, M.P. & Ojha, Amitabh
- 86-99 Fragility of oil as a critical infrastructure problem
by Jaradat, Ra’ed M. & Keating, Charles B.
- 100-111 A framework for studying mortality arising from critical infrastructure loss
by Yates, Athol
- 114-123 Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices
by Bodenheim, Roland & Butts, Jonathan & Dunlap, Stephen & Mullins, Barry
- 124-137 Whither cyberpower?
by Rowland, Jill & Rice, Mason & Shenoi, Sujeet
2014, Volume 7, Issue 1
- 3-11 The anatomy of a cyber power
by Rowland, Jill & Rice, Mason & Shenoi, Sujeet
- 12-26 Interdependency-induced risk with applications to healthcare
by Katina, Polinpapilinho F. & Ariel Pinto, C. & Bradley, Joseph M. & Hester, Patrick T.
- 27-47 Effect of air travel on the spread of an avian influenza pandemic to the United States
by Tuncer, Necibe & Le, Trang
- 51-60 Exposing vulnerabilities in electric power grids: An experimental approach
by Coppolino, Luigi & D׳Antonio, Salvatore & Romano, Luigi
- 61-68 An evaluation of modification attacks on programmable logic controllers
by Schuett, Carl & Butts, Jonathan & Dunlap, Stephen
2013, Volume 6, Issue 3
- 123-131 Threats to municipal information systems posed by aging infrastructure
by Armbruster, Ginger & Endicott-Popovsky, Barbara & Whittington, Jan
- 132-146 A methodology for designing robust and efficient hybrid monitoring systems
by Sportiello, Luigi
- 150-158 Flow whitelisting in SCADA networks
by Barbosa, Rafael Ramos Regis & Sadre, Ramin & Pras, Aiko
- 159-178 Towards end-to-end network resilience
by Vlacheas, Panagiotis & Stavroulaki, Vera & Demestichas, Panagiotis & Cadzow, Scott & Ikonomou, Demosthenes & Gorniak, Slawomir
- 182-196 Security of European electricity systems: Conceptualizing the assessment criteria and core indicators
by Nepal, Rabindra & Jamasb, Tooraj
- 197-216 Using interconnected risk maps to assess the threats faced by electricity infrastructures
by Correa-Henao, Gabriel J. & Yusta, Jose M. & Lacal-Arántegui, Roberto
- 217-227 Vulnerability modeling and analysis for critical infrastructure protection applications
by Marrone, Stefano & Nardone, Roberto & Tedesco, Annarita & D'Amore, Pasquale & Vittorini, Valeria & Setola, Roberto & De Cillis, Francesca & Mazzocca, Nicola
2013, Volume 6, Issue 2
- 63-75 Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
by Goldenberg, Niv & Wool, Avishai
- 76-84 Firmware modification attacks on programmable logic controllers
by Basnight, Zachry & Butts, Jonathan & Lopez, Juan & Dube, Thomas
- 87-95 Analysis of the effects of distributed denial-of-service attacks on MPLS networks
by Genge, Béla & Siaterlis, Christos
- 96-106 Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis
by Papa, Stephen & Casper, William & Moore, Tyler
- 107-119 A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector
by Yates, Justin & Sanjeevi, Sujeevraja
2013, Volume 6, Issue 1
- 3-11 Enhancing the security of aircraft surveillance in the next generation air traffic control system
by Finke, Cindy & Butts, Jonathan & Mills, Robert & Grimaila, Michael
- 12-24 A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices
by Hieb, Jeffrey L. & Schreiver, Jacob & Graham, James H.
- 28-38 Crimeware-as-a-service—A survey of commoditized crimeware in the underground market
by Sood, Aditya K. & Enbody, Richard J.
- 39-50 Realizing the promise of public-private partnerships in U.S. critical infrastructure protection
by Givens, Austen D. & Busch, Nathan E.
- 51-60 European Reference Network for Critical Infrastructure Protection
by Lewis, Adam M. & Ward, David & Cyra, Lukasz & Kourti, Naouma
2012, Volume 5, Issue 3
- 108-117 A global reference model of the domain name system
by Koç, Yakup & Jamakovic, Almerima & Gijsen, Bart
- 118-126 Modeling security in cyber–physical systems
by Burmester, Mike & Magkos, Emmanouil & Chrissikopoulos, Vassilis
- 127-134 Modeling and reasoning about the security of drive-by-wire automobile systems
by Howser, Gerry & McMillin, Bruce
- 137-145 Analysis of requirements for critical control systems
by Alcaraz, Cristina & Lopez, Javier
- 146-153 Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks
by Shepard, Daniel P. & Humphreys, Todd E. & Fansler, Aaron A.
- 154-174 Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems
by Reaves, Bradley & Morris, Thomas
2012, Volume 5, Issue 2
- 55-65 Are we prepared for the economic risk resulting from telecom hotel disruptions?
by Armbruster, Ginger & Endicott-Popovsky, Barbara & Whittington, Jan
- 66-73 Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure
by Stone, Samuel & Temple, Michael
- 74-83 Intrusion detection for resource-constrained embedded control systems in the power grid
by Reeves, Jason & Ramaswamy, Ashwin & Locasto, Michael & Bratus, Sergey & Smith, Sean
- 86-97 Design and implementation of a mediation system enabling secure communication among Critical Infrastructures
by Castrucci, Marco & Neri, Alessandro & Caldeira, Filipe & Aubert, Jocelyn & Khadraoui, Djamel & Aubigny, Matthieu & Harpes, Carlo & Simões, Paulo & Suraci, Vincenzo & Capodieci, Paolo
- 98-103 Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC)
by Deccio, Casey
2012, Volume 5, Issue 1
- 3-13 Analysis of the security of VPN configurations in industrial control environments
by Rahimi, Sanaz & Zargham, Mehdi
- 14-27 Quantification of dependencies between electrical and information infrastructures
by Beccuti, Marco & Chiaradonna, Silvano & Di Giandomenico, Felicita & Donatelli, Susanna & Dondossola, Giovanna & Franceschinis, Giuliana
- 30-39 Creating a cyber moving target for critical infrastructure applications using platform diversity
by Okhravi, Hamed & Comella, Adam & Robinson, Eric & Haines, Joshua
- 40-52 Implementing novel reactive defense functionality in MPLS networks using hyperspeed signaling
by Guernsey, Daniel & Rice, Mason & Shenoi, Sujeet
2011, Volume 4, Issue 3
- 107-123 A dependable architecture to mitigate distributed denial of service attacks on network-based control systems
by Beitollahi, Hakem & Deconinck, Geert
- 124-134 Assessing and improving SCADA security in the Dutch drinking water sector
by Luiijf, Eric & Ali, Manou & Zielstra, Annemarie
- 137-153 An IP based platform for emergency calls and reporting
by Rebahi, Yacine & Thanh, Tran Quang & Tong, Mao & López, Fernando & López, José Manuel & Teixeira, Luis A. & Blanco, Nelson
- 154-164 A survey of system security in contactless electronic passports
by Sinha, Anshuman
- 165-175 Fuzzy dynamic input–output inoperability model
by Oliva, Gabriele & Panzieri, Stefano & Setola, Roberto
2011, Volume 4, Issue 2
- 57-65 A signaling framework to deter aggression in cyberspace
by Rice, Mason & Butts, Jonathan & Shenoi, Sujeet
- 66-75 An exploration of defensive deception in industrial communication networks
by Rrushi, Julian L.
- 76-77 Control systems personnel are from Mars; IT personnel are from Venus
by Conklin, William Arthur
- 78-87 Security analysis of the ADS-B implementation in the next generation air transportation system
by McCallie, Donald & Butts, Jonathan & Mills, Robert
- 88-103 A control system testbed to validate critical infrastructure protection concepts
by Morris, Thomas & Srivastava, Anurag & Reaves, Bradley & Gao, Wei & Pavurapu, Kalyan & Reddi, Ram
2011, Volume 4, Issue 1
- 3-13 May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats?
by Rice, Mason & Miller, Robert & Shenoi, Sujeet
- 14-21 A decision-analysis approach for optimal airport security
by Gerstenfeld, Arthur & Berger, Paul D.
- 24-40 Definition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems
by Chiaradonna, Silvano & Giandomenico, Felicita Di & Lollini, Paolo
- 41-53 An integrated framework for control system simulation and regulatory compliance monitoring
by Mahoney, William & Gandhi, Robin A.
2010, Volume 3, Issue 3
- 103-117 The economics of cybersecurity: Principles and policy options
by Moore, Tyler
- 118-127 Applying public health strategies to the protection of cyberspace
by Rice, Mason & Butts, Jonathan & Miller, Robert & Shenoi, Sujeet
- 128-139 The interdependent security problem in the defense industrial base: An agent-based model on a social network
by Hare, Forrest & Goldstein, Jonathan
- 140-156 An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure
by Baldini, Gianmarco & Nai Fovino, Igor & Masera, Marcelo & Luise, Marco & Pellegrini, Vincenzo & Bagagli, Enzo & Rubino, Giuseppe & Malangone, Raffaele & Stefano, Marcoccio & Senesi, Fabio
- 157-173 Analysis of information flow security in cyber–physical systems
by Akella, Ravi & Tang, Han & McMillin, Bruce M.
- 174-181 Long-lived authentication protocols for process control systems
by Chakravarthy, Rasika & Hauser, Carl & Bakken, David E.
2010, Volume 3, Issue 2
2010, Volume 3, Issue 1
- 5-15 An analysis of the legality of government-mandated computer inoculations
by Rice, Mason & Butts, Jonathan & Miller, Robert & Shenoi, Sujeet
- 16-26 Critical infrastructure protection under imperfect attacker perception
by Jenelius, Erik & Westin, Jonas & Holmgren, Åke J.
- 29-40 Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure
by Stewart, Mark G.
- 41-50 How secure is the next generation of IP-based emergency services architecture?
by Tschofenig, Hannes & Arumaithurai, Mayutan & Schulzrinne, Henning & Aboba, Bernard
2009, Volume 2, Issue 4
- 139-145 An experimental investigation of malware attacks on SCADA systems
by Nai Fovino, Igor & Carcano, Andrea & Masera, Marcelo & Trombetta, Alberto
- 146-153 Analysis of security threats to MPLS virtual private networks
by Grayson, Denise & Guernsey, Daniel & Butts, Jonathan & Spainhower, Michael & Shenoi, Sujeet
- 154-169 PolyOrBAC: A security framework for Critical Infrastructures
by Abou El Kalam, A. & Deswarte, Y. & Baïna, A. & Kaâniche, M.
- 170-178 Critical infrastructure dependency assessment using the input–output inoperability model
by Setola, Roberto & De Porcellinis, Stefano & Sforna, Marino
- 179-187 Public–Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection
by Dunn-Cavelty, Myriam & Suter, Manuel
2009, Volume 2, Issue 3
- 73-83 Understanding the physical and economic consequences of attacks on control systems
by Huang, Yu-Lun & Cárdenas, Alvaro A. & Amin, Saurabh & Lin, Zong-Syun & Tsai, Hsin-Yi & Sastry, Shankar
- 84-94 Application of trusted network technology to industrial control networks
by Okhravi, Hamed & Nicol, David M.
- 95-109 Blind information security strategy
by Sveen, Finn Olav & Torres, Jose M. & Sarriegi, Jose M.
- 110-123 Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk
by Rich, Eliot & Gonzalez, Jose J. & Qian, Ying & Sveen, Finn Olav & Radianti, Jaziar & Hillen, Stefanie