International Journal of Critical Infrastructure Protection

Papers
(The H4-Index of International Journal of Critical Infrastructure Protection is 19. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Architecture and security of SCADA systems: A review85
Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems52
A Methodology for Security Classification applied to Smart Grid Infrastructures43
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations43
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects32
FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid29
A multilayer perceptron model for anomaly detection in water treatment plants29
Quantitative approach to physical protection systems assessment of critical infrastructure elements: Use case in the Slovak Republic29
A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid27
End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure27
Multi-criteria node criticality assessment framework for critical infrastructure networks22
An evaluation framework for industrial control system cyber incidents22
Cyber-attacks detection in industrial systems using artificial intelligence-driven methods21
An online real-time estimation tool of leakage parameters for hazardous liquid pipelines21
Digital transformation of the maritime industry: A cybersecurity systemic approach21
Nodal vulnerability assessment of water distribution networks: An integrated Fuzzy AHP-TOPSIS approach21
Using stakeholders’ judgement and fuzzy logic theory to analyze the risk influencing factors in oil and gas pipeline projects: Case study in Iraq, Stage II21
Generating invariants using design and data-centric approaches for distributed attack detection20
A double-weighted vulnerability assessment model for metrorail transit networks and its application in Shanghai metro20
Power systems resilience: Definition and taxonomy with a view towards metrics19
0.020746946334839