International Journal of Critical Infrastructure Protection

Papers
(The median citation count of International Journal of Critical Infrastructure Protection is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Architecture and security of SCADA systems: A review111
Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems65
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations61
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects55
A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid41
FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid39
A multilayer perceptron model for anomaly detection in water treatment plants34
End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure31
Digital transformation of the maritime industry: A cybersecurity systemic approach29
Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis29
Cyber-attacks detection in industrial systems using artificial intelligence-driven methods28
Vulnerabilities and countermeasures in electrical substations27
An evaluation framework for industrial control system cyber incidents25
Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory24
An online real-time estimation tool of leakage parameters for hazardous liquid pipelines24
Power systems resilience: Definition and taxonomy with a view towards metrics24
A taxonomy of IoT firmware security and principal firmware analysis techniques23
Vulnerability assessment of urban road traffic systems based on traffic flow21
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things21
Nodal vulnerability assessment of water distribution networks: An integrated Fuzzy AHP-TOPSIS approach21
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems20
APT attacks on industrial control systems: A tale of three incidents20
Assessing the effects of link-repair sequences on road network resilience19
A Systematic Literature Review on RAMS analysis for critical infrastructures protection19
Vulnerability analysis of S7 PLCs: Manipulating the security mechanism18
Risk assessment and mitigation for electric power sectors: A developing country's perspective17
Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment17
Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features16
A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems16
On the component resilience importance measures for infrastructure systems15
Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set15
A review on effective alarm management systems for industrial process control: Barriers and opportunities15
Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts14
Risk-averse bi-level stochastic network interdiction model for cyber-security risk management14
A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem14
Resilient backup controller placement in distributed SDN under critical targeted attacks13
Securing SCADA and critical industrial systems: From needs to security mechanisms12
Flood risk assessment and application of risk curves for design of mitigation strategies12
Robustness of the Chinese power grid to cascading failures under attack and defense strategies12
Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review11
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey11
Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants11
IoT fusion based model predictive pid control approach for oil pipeline infrastructure9
A hypothesis-driven framework for resilience analysis of public transport network under compound failure scenarios9
Integrating data-driven and physics-based approaches to characterize failures of interdependent infrastructures9
Threat Modelling of Cyber–Physical Systems Using an Applied π-Calcul9
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis9
Unsupervised machine learning techniques to prevent faults in railroad switch machines8
Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem8
ARTINALI#: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems8
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems7
Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms7
Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility7
Vulnerability analysis of urban road networks based on traffic situation7
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems6
Effect of adding physical links on the robustness of the Internet modeled as a physical–logical interdependent network using simple strategies6
A multi-criteria model for the security assessment of large-infrastructure construction sites6
Defensive cost–benefit analysis of smart grid digital functionalities6
Optimal allocation of defensive resources to defend urban power networks against different types of attackers6
A forensics and compliance auditing framework for critical infrastructure protection6
VetaDetect: Vehicle tampering detection with closed-loop model ensemble6
Load-altering attack detection on smart grid using functional observers6
Industrial intrusion detection based on the behavior of rotating machine6
Vulnerability analysis of critical infrastructure network6
Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review6
A multi-criteria framework for critical infrastructure systems resilience5
Evaluation on nuclear emergency response strategies in the Asia-Pacific region5
An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space5
A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks5
A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power–water networks under disruption5
A study on resilient and cost-based design in power distribution network against severe hurricane5
Mitigation of the impact of disturbances in gas transmission systems5
Identifying critical and vulnerable links: A new approach using the Fisher information matrix5
Protocol study and anomaly detection for server-driven traffic in SCADA networks5
SafeCI: Avoiding process anomalies in critical infrastructure5
Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes5
Critical flow centrality measures on interdependent networks with time-varying demands4
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction4
Rule-based anomaly detection for railway signalling networks4
Network trace generation for flow-based IDS evaluation in control and automation systems4
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications4
Cybersecurity professionals information sharing sources and networks in the U.S. electrical power industry4
Physical layer protection for ADS-B against spoofing and jamming4
Computer-aided security assessment of water networks monitoring platforms4
The digital divide in state vulnerability to submarine communications cable failure3
Bayesian games for the cybersecurity of nuclear power plants3
Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)3
ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems3
A threat modeling language for generating attack graphs of substation automation systems3
An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace3
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks2
Linear time invariant system fault isolation: A static compensation decoupling method2
The drift of industrial control systems to pseudo security2
A comparison of onshore oil and gas transmission pipeline incident statistics in Canada and the United States2
Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis2
SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair2
Changes in inoperability for interdependent industry sectors in Norway from 2012 to 20172
A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE2
A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms2
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage2
A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions2
0.47386002540588