International Journal of Critical Infrastructure Protection

Papers
(The median citation count of International Journal of Critical Infrastructure Protection is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Architecture and security of SCADA systems: A review88
Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems53
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations45
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects35
FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid31
A multilayer perceptron model for anomaly detection in water treatment plants29
Quantitative approach to physical protection systems assessment of critical infrastructure elements: Use case in the Slovak Republic29
End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure28
A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid28
Cyber-attacks detection in industrial systems using artificial intelligence-driven methods23
A double-weighted vulnerability assessment model for metrorail transit networks and its application in Shanghai metro22
An online real-time estimation tool of leakage parameters for hazardous liquid pipelines22
An evaluation framework for industrial control system cyber incidents22
Nodal vulnerability assessment of water distribution networks: An integrated Fuzzy AHP-TOPSIS approach21
Digital transformation of the maritime industry: A cybersecurity systemic approach21
Power systems resilience: Definition and taxonomy with a view towards metrics19
Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis18
Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory18
APT attacks on industrial control systems: A tale of three incidents18
A Systematic Literature Review on RAMS analysis for critical infrastructures protection17
Using a random road graph model to understand road networks robustness to link failures17
Vulnerabilities and countermeasures in electrical substations17
A taxonomy of IoT firmware security and principal firmware analysis techniques16
Industrial control system security taxonomic framework with application to a comprehensive incidents survey15
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems15
Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: A case study involving a virtual gas pipeline SCADA system15
Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts14
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things14
Vulnerability assessment of urban road traffic systems based on traffic flow14
On the component resilience importance measures for infrastructure systems14
Vulnerability analysis of S7 PLCs: Manipulating the security mechanism14
Assessing the effects of link-repair sequences on road network resilience14
Risk-averse bi-level stochastic network interdiction model for cyber-security risk management13
A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments13
Securing SCADA and critical industrial systems: From needs to security mechanisms13
Resilient backup controller placement in distributed SDN under critical targeted attacks12
Risk assessment and mitigation for electric power sectors: A developing country's perspective12
Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment12
A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem12
Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants11
Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features10
Developing an evaluation method for SCADA-Controlled urban gas infrastructure hierarchical design using multi-level fuzzy comprehensive evaluation10
A novel optimization method for urban resilient and fair power distribution preventing critical network states10
Flood risk assessment and application of risk curves for design of mitigation strategies9
A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems9
Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set9
A review on effective alarm management systems for industrial process control: Barriers and opportunities9
IoT fusion based model predictive pid control approach for oil pipeline infrastructure8
Robustness of the Chinese power grid to cascading failures under attack and defense strategies8
Multi-period vulnerability analysis of power grids under multiple outages: An AC-based bilevel optimization approach7
Unsupervised machine learning techniques to prevent faults in railroad switch machines7
ARTINALI#: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems7
Integrating data-driven and physics-based approaches to characterize failures of interdependent infrastructures7
Threat Modelling of Cyber–Physical Systems Using an Applied π-Calcul6
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems6
Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review6
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis6
Optimal allocation of defensive resources to defend urban power networks against different types of attackers6
Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility6
Vulnerability analysis of critical infrastructure network6
A forensics and compliance auditing framework for critical infrastructure protection5
A hypothesis-driven framework for resilience analysis of public transport network under compound failure scenarios5
Defensive cost–benefit analysis of smart grid digital functionalities5
Industrial intrusion detection based on the behavior of rotating machine4
Obtaining high preventive and resilience capacities in critical infrastructure by industrial automation cells4
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems4
Network trace generation for flow-based IDS evaluation in control and automation systems4
Computer-aided security assessment of water networks monitoring platforms4
VetaDetect: Vehicle tampering detection with closed-loop model ensemble4
Critical flow centrality measures on interdependent networks with time-varying demands4
Evaluation on nuclear emergency response strategies in the Asia-Pacific region4
A multi-criteria model for the security assessment of large-infrastructure construction sites4
Load-altering attack detection on smart grid using functional observers4
A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks3
A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power–water networks under disruption3
Physical layer protection for ADS-B against spoofing and jamming3
SafeCI: Avoiding process anomalies in critical infrastructure3
Rule-based anomaly detection for railway signalling networks3
Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem3
Cybersecurity professionals information sharing sources and networks in the U.S. electrical power industry3
Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms3
Mitigation of the impact of disturbances in gas transmission systems3
An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace3
Identifying critical and vulnerable links: A new approach using the Fisher information matrix3
Protocol study and anomaly detection for server-driven traffic in SCADA networks3
A study on resilient and cost-based design in power distribution network against severe hurricane3
Bayesian games for the cybersecurity of nuclear power plants3
0.01772403717041