International Journal of Critical Infrastructure Protection

Papers
(The H4-Index of International Journal of Critical Infrastructure Protection is 23. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Interdependencies and third parties143
Load-altering attack detection on smart grid using functional observers81
Cyber risk assessment of cyber-enabled autonomous cargo vessel73
Bayesian games for the cybersecurity of nuclear power plants65
An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace61
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies56
Editorial50
Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment49
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis34
On the component resilience importance measures for infrastructure systems34
Rule-based anomaly detection for railway signalling networks33
Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review32
Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes31
A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE30
Assessment of cross-border electricity interconnection projects using a MCDA method29
Evaluation of SDN security measures in the context of IEC 62443-3-328
FingerCI: Writing industrial process specifications from network traffic28
A review on effective alarm management systems for industrial process control: Barriers and opportunities27
Robustness of the Chinese power grid to cascading failures under attack and defense strategies26
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation26
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks26
Cyber attacks on critical infrastructures and satellite communications24
Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems23
CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B23
0.030839920043945