International Journal of Critical Infrastructure Protection

Papers
(The median citation count of International Journal of Critical Infrastructure Protection is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-09-01 to 2024-09-01.)
ArticleCitations
Architecture and security of SCADA systems: A review107
Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems62
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations58
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects53
A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid40
FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid38
A multilayer perceptron model for anomaly detection in water treatment plants33
End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure31
Quantitative approach to physical protection systems assessment of critical infrastructure elements: Use case in the Slovak Republic31
Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis29
Digital transformation of the maritime industry: A cybersecurity systemic approach28
Cyber-attacks detection in industrial systems using artificial intelligence-driven methods27
Vulnerabilities and countermeasures in electrical substations26
An evaluation framework for industrial control system cyber incidents25
Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory24
An online real-time estimation tool of leakage parameters for hazardous liquid pipelines24
A taxonomy of IoT firmware security and principal firmware analysis techniques23
Power systems resilience: Definition and taxonomy with a view towards metrics23
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things21
Nodal vulnerability assessment of water distribution networks: An integrated Fuzzy AHP-TOPSIS approach21
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems19
APT attacks on industrial control systems: A tale of three incidents19
A Systematic Literature Review on RAMS analysis for critical infrastructures protection19
Vulnerability assessment of urban road traffic systems based on traffic flow19
Vulnerability analysis of S7 PLCs: Manipulating the security mechanism18
Risk assessment and mitigation for electric power sectors: A developing country's perspective17
Assessing the effects of link-repair sequences on road network resilience17
Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment16
A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments16
A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems15
Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features15
On the component resilience importance measures for infrastructure systems15
Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set15
A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem14
Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts14
Risk-averse bi-level stochastic network interdiction model for cyber-security risk management14
A review on effective alarm management systems for industrial process control: Barriers and opportunities14
Resilient backup controller placement in distributed SDN under critical targeted attacks13
Robustness of the Chinese power grid to cascading failures under attack and defense strategies12
Securing SCADA and critical industrial systems: From needs to security mechanisms12
Flood risk assessment and application of risk curves for design of mitigation strategies12
Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants11
Developing an evaluation method for SCADA-Controlled urban gas infrastructure hierarchical design using multi-level fuzzy comprehensive evaluation10
Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review10
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey9
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis9
Threat Modelling of Cyber–Physical Systems Using an Applied π-Calcul9
A hypothesis-driven framework for resilience analysis of public transport network under compound failure scenarios9
Integrating data-driven and physics-based approaches to characterize failures of interdependent infrastructures9
IoT fusion based model predictive pid control approach for oil pipeline infrastructure8
Vulnerability analysis of urban road networks based on traffic situation7
Unsupervised machine learning techniques to prevent faults in railroad switch machines7
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems7
Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem7
Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms7
ARTINALI#: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems7
Multi-period vulnerability analysis of power grids under multiple outages: An AC-based bilevel optimization approach7
Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility7
A multi-criteria model for the security assessment of large-infrastructure construction sites6
VetaDetect: Vehicle tampering detection with closed-loop model ensemble6
Optimal allocation of defensive resources to defend urban power networks against different types of attackers6
A forensics and compliance auditing framework for critical infrastructure protection6
Defensive cost–benefit analysis of smart grid digital functionalities6
Load-altering attack detection on smart grid using functional observers6
Industrial intrusion detection based on the behavior of rotating machine6
Vulnerability analysis of critical infrastructure network6
Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review6
SCOPE: Secure Compiling of PLCs in Cyber-Physical Systems6
Effect of adding physical links on the robustness of the Internet modeled as a physical–logical interdependent network using simple strategies6
Identifying critical and vulnerable links: A new approach using the Fisher information matrix5
Evaluation on nuclear emergency response strategies in the Asia-Pacific region5
Mitigation of the impact of disturbances in gas transmission systems5
A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks5
A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power–water networks under disruption5
A study on resilient and cost-based design in power distribution network against severe hurricane5
Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes5
A multi-criteria framework for critical infrastructure systems resilience5
Protocol study and anomaly detection for server-driven traffic in SCADA networks5
SafeCI: Avoiding process anomalies in critical infrastructure5
Critical flow centrality measures on interdependent networks with time-varying demands4
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications4
An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space4
Network trace generation for flow-based IDS evaluation in control and automation systems4
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction4
Cybersecurity professionals information sharing sources and networks in the U.S. electrical power industry4
Physical layer protection for ADS-B against spoofing and jamming4
Computer-aided security assessment of water networks monitoring platforms4
Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)3
ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems3
Bayesian games for the cybersecurity of nuclear power plants3
A threat modeling language for generating attack graphs of substation automation systems3
Rule-based anomaly detection for railway signalling networks3
The digital divide in state vulnerability to submarine communications cable failure3
An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace3
Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis2
The drift of industrial control systems to pseudo security2
A comparison of onshore oil and gas transmission pipeline incident statistics in Canada and the United States2
A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms2
Changes in inoperability for interdependent industry sectors in Norway from 2012 to 20172
A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE2
SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair2
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage2
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks2
0.026885986328125