Contact information of Elsevier
Serial Information
Download restrictions: Full text for ScienceDirect subscribers only
Series handle: RePEc:eee:ijocip
ISSN: 1874-5482
Citations RSS feed: at CitEc
Impact factors
Access and download statisticsTop item:
Corrections
All material on this site has been provided by the respective publishers and authors. You can help
correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .
Content
2009, Volume 2, Issue 3
2009, Volume 2, Issue 1
- 5-12 Analysis of structural vulnerabilities in power transmission grids
by Bompard, Ettore & Napoli, Roberto & Xue, Fei
- 13-25 Budget constrained optimal security hardening of control networks for critical cyber-infrastructures
by Anwar, Zahid & Montanari, Mirko & Gutierrez, Alejandro & Campbell, Roy H.
- 26-37 A framework for incident response management in the petroleum industry
by Jaatun, Martin Gilje & Albrechtsen, Eirik & Line, Maria B. & Tøndel, Inger Anne & Longva, Odd Helge
- 38-50 Causes, cost consequences, and risk implications of accidents in US hazardous liquid pipeline infrastructure
by Restrepo, Carlos E. & Simonoff, Jeffrey S. & Zimmerman, Rae
- 51-67 Combined person tracking and classification in a network of chemical sensors
by Wieneke, Monika & Koch, Wolfgang
2008, Volume 1, Issue C
- 4-5 Critical infrastructure protection
by George, Richard
- 6-14 Models of critical information infrastructure protection
by Assaf, Dan
- 15-28 Security and the US rail infrastructure
by Hartong, Mark & Goel, Rajni & Wijesekera, Duminda
- 29-36 Modeling the NAJPTC network using NS-2
by Craven, Paul Vincent & Oman, Paul
- 37-44 Attack taxonomies for the Modbus protocols
by Huitsing, Peter & Chandia, Rodrigo & Papa, Mauricio & Shenoi, Sujeet
- 45-52 Assessing operational risk in the financial sector, using interdependency metrics
by Macaulay, Tyson
- 53-67 Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input–output model
by Crowther, Kenneth G.
- 68-74 Security analysis of RSVP-TE signaling in MPLS networks
by Spainhower, Michael & Butts, Jonathan & Guernsey, Daniel & Shenoi, Sujeet
- 75-80 Game-theoretic modeling and analysis of insider threats
by Liu, Debin & Wang, XiaoFeng & Camp, Jean
- 81-96 A CBK for Information Security and Critical Information and Communication Infrastructure Protection
by Theoharidou, Marianthi & Xidara, Dimitra & Gritzalis, Dimitris