International Journal of Critical Infrastructure Protection

Papers
(The median citation count of International Journal of Critical Infrastructure Protection is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Editorial171
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies92
Mitigation of the impact of disturbances in gas transmission systems90
Corrigendum to ‘VetaDetect: Vehicle tampering detection with closed-loop model ensemble’ International Journal of Critical Infrastructure Protection, 37 (2022), 10052590
An AutoML-based security defender for industrial control systems76
VetaDetect: Vehicle tampering detection with closed-loop model ensemble74
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage63
IPSMInfer: Industrial proprietary protocol state machine inference from network traces61
Physical performance of power grids against earthquakes: from framework to implementation48
Vulnerability analysis of critical infrastructure network43
Vulnerability assessment of urban road traffic systems based on traffic flow43
Need for intensive care? A socio-technical systems perspective on water supply failure preparedness in German health care facilities42
DSACR: A defense-based system with adaptive cyber resilience for industrial control systems38
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction37
A comparative study of cyber security intrusion detection in healthcare systems34
Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis34
APT attacks on industrial control systems: A tale of three incidents33
Systemic cyber risk33
Editorial Board31
An evaluation framework for industrial control system cyber incidents30
Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features29
Assessing the comprehensive importance of power grid nodes based on DEA29
A threat modeling language for generating attack graphs of substation automation systems27
Advances in UAV detection: integrating multi-sensor systems and AI for enhanced accuracy and efficiency23
Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)23
Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory23
A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks22
Assessing earthquake risks to lifeline infrastructure systems in the United States22
Measuring spatial accessibility to critical infrastructure: The Access Road Identification model20
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects19
Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements19
Technological advancements and innovations in enhancing resilience of electrical distribution systems19
Rule-based anomaly detection for railway signalling networks18
FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid18
Interdependencies and supply chain17
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks17
A review on effective alarm management systems for industrial process control: Barriers and opportunities17
Situation Awareness for Cyber Resilience: A review17
Assessment of cross-border electricity interconnection projects using a MCDA method17
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation16
OptAML: Optimized adversarial machine learning on water treatment and distribution systems16
Digital Twin-assisted anomaly detection for industrial scenarios16
End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure15
Cyber attacks on critical infrastructures and satellite communications15
Optimized unmanned aerial vehicle pathway system in disaster resilience network14
Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review14
A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem14
Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts13
The drift of industrial control systems to pseudo security13
Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review12
Evaluating regional emergency response capabilities using entropy weight and matter-element extension theory12
Evaluation on nuclear emergency response strategies in the Asia-Pacific region12
Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city12
Using Kolmogorov–Arnold network for cyber–physical system security: A fast and efficient approach11
Editorial Board11
A hypothesis-driven framework for resilience analysis of public transport network under compound failure scenarios11
SuPOR: A lightweight stream cipher for confidentiality and attack-resilient visual data security in IoT11
Announcement: Change in Editorship10
Vulnerability analysis of S7 PLCs: Manipulating the security mechanism9
Robustness evaluation method and defense strategy of electricity-heat integrated energy system9
Risk assessment and mitigation for electric power sectors: A developing country's perspective9
Effect of adding physical links on the robustness of the Internet modeled as a physical–logical interdependent network using simple strategies8
Critical flow centrality measures on interdependent networks with time-varying demands8
A forensics and compliance auditing framework for critical infrastructure protection8
Artificial immunity-based energy theft detection for advanced metering infrastructures8
SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair8
Vulnerability analysis of urban road networks based on traffic situation7
Cybersecurity professionals information sharing sources and networks in the U.S. electrical power industry7
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis7
Feasibility of critical infrastructure protection using network functions for programmable and decoupled ICS policy enforcement over WAN7
A multi-criteria framework for critical infrastructure systems resilience7
Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator7
FingerCI: Writing industrial process specifications from network traffic7
Editorial Board7
Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants7
Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis7
A taxonomy of IoT firmware security and principal firmware analysis techniques7
From breach to bias: Measuring reputation value and trust recovery after cyber incidents in critical infrastructure7
Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea7
Interdependencies and third parties7
A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions6
Vulnerable underground entrance understanding for visual surveillance systems6
Protection of critical infrastructures in times of peace and war6
ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems6
Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication6
Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences6
Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity6
Digital twin application in lifecycle security of critical infrastructures: A systematic literature review6
The digital divide in state vulnerability to submarine communications cable failure6
Impact of Internet and mobile communication on cyber resilience: A multivariate adaptive regression spline modeling approach5
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey5
Editorial Board5
Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility5
Threat Modelling of Cyber–Physical Systems Using an Applied π-Calcul5
Cyber-threat landscape of border control infrastructures4
SIRT: A distinctive and smart invasion recognition tool (SIRT) for defending IoT integrated ICS from cyber-attacks4
Measurement protection to prevent cyber–physical attacks against power system State Estimation4
A novel deep learning based security assessment framework for enhanced security in swarm network environment4
Resilience in cogeneration systems: Graphical analysis of novel indexes and system behavior under failure scenarios4
Nodal vulnerability assessment of water distribution networks: An integrated Fuzzy AHP-TOPSIS approach4
Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set4
Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions4
A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid4
Evaluation of SDN security measures in the context of IEC 62443-3-34
The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints4
A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch4
Editorial4
STADe: An unsupervised time-windows method of detecting anomalies in oil and gas Industrial Cyber-Physical Systems (ICPS) networks4
A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms4
3.0252339839935