International Journal of Critical Infrastructure Protection

Papers
(The median citation count of International Journal of Critical Infrastructure Protection is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Editorial124
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies114
Editorial Board90
Mitigation of the impact of disturbances in gas transmission systems87
An AutoML-based security defender for industrial control systems75
Corrigendum to ‘VetaDetect: Vehicle tampering detection with closed-loop model ensemble’ International Journal of Critical Infrastructure Protection, 37 (2022), 10052574
Dynamic protection of human-cyber-physical systems based on CPN and multi-agent reinforcement learning: Evidence from smart coal mines58
VetaDetect: Vehicle tampering detection with closed-loop model ensemble57
Identifying cyber attack vulnerabilities in the main lubricating oil system of marine propulsion units54
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage53
Physical performance of power grids against earthquakes: from framework to implementation49
IPSMInfer: Industrial proprietary protocol state machine inference from network traces41
Vulnerability assessment of urban road traffic systems based on traffic flow39
DSACR: A defense-based system with adaptive cyber resilience for industrial control systems35
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction34
Need for intensive care? A socio-technical systems perspective on water supply failure preparedness in German health care facilities32
Threat model for IEC 61850 based substation automation system32
Cyber winter29
Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis28
A comparative study of cyber security intrusion detection in healthcare systems28
A threat modeling language for generating attack graphs of substation automation systems26
APT attacks on industrial control systems: A tale of three incidents26
Editorial Board25
Systemic cyber risk24
Advances in UAV detection: integrating multi-sensor systems and AI for enhanced accuracy and efficiency24
Assessing the comprehensive importance of power grid nodes based on DEA24
Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)23
Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features21
Measuring spatial accessibility to critical infrastructure: The Access Road Identification model21
Assessing earthquake risks to lifeline infrastructure systems in the United States21
Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements20
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects19
FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid19
Technological advancements and innovations in enhancing resilience of electrical distribution systems19
Vulnerability assessment of interdependent road-power networks with probability-based coupling strategies18
Interdependencies and supply chain18
Rule-based anomaly detection for railway signalling networks17
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation16
Assessment of cross-border electricity interconnection projects using a MCDA method16
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks16
A review on effective alarm management systems for industrial process control: Barriers and opportunities16
Situation Awareness for Cyber Resilience: A review15
OptAML: Optimized adversarial machine learning on water treatment and distribution systems14
Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review14
Digital Twin-assisted anomaly detection for industrial scenarios14
Cyber attacks on critical infrastructures and satellite communications14
Resilience of interdependent infrastructure networks: Review and future directions12
Optimized unmanned aerial vehicle pathway system in disaster resilience network12
The drift of industrial control systems to pseudo security12
SuPOR: A lightweight stream cipher for confidentiality and attack-resilient visual data security in IoT11
Using Kolmogorov–Arnold network for cyber–physical system security: A fast and efficient approach11
Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review11
Evaluating regional emergency response capabilities using entropy weight and matter-element extension theory11
Dynamic optimization of multi-layered defenses inspired by Chakravyuh11
Artificial immunity-based energy theft detection for advanced metering infrastructures10
Robustness evaluation method and defense strategy of electricity-heat integrated energy system10
Securing smart city Internet of Vehicles via transformer integrated consensus ensemble learning and bio-inspired metaheuristics10
A forensics and compliance auditing framework for critical infrastructure protection10
Feature extraction and selection for flooding-based multi-class DDoS attacks detection in IoT network10
SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair10
Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city10
A multi-criteria framework for critical infrastructure systems resilience9
Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis9
A taxonomy of IoT firmware security and principal firmware analysis techniques9
Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator9
Developing security metrics for space systems: A study considering the NIST Cybersecurity Framework 2.0 and the NIS29
Vulnerability analysis of urban road networks based on traffic situation9
Editorial Board8
Interdependencies and third parties8
Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea8
From breach to bias: Measuring reputation value and trust recovery after cyber incidents in critical infrastructure8
FingerCI: Writing industrial process specifications from network traffic8
Protection of critical infrastructures in times of peace and war8
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis8
Digital twin application in lifecycle security of critical infrastructures: A systematic literature review7
Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity7
Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication7
Feasibility of critical infrastructure protection using network functions for programmable and decoupled ICS policy enforcement over WAN7
ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems7
Vulnerable underground entrance understanding for visual surveillance systems7
A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions7
Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences7
A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch6
Impact of Internet and mobile communication on cyber resilience: A multivariate adaptive regression spline modeling approach6
Quantification of seismic resilience of water distribution networks considering interdependency using Dempster-Shafer theory6
Securing the future: Integrating quantum computing and digital twin technologies into modern power & transportation systems for resilient smart cities against false data injection cyberattacks6
The digital divide in state vulnerability to submarine communications cable failure6
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey6
SIRT: A distinctive and smart invasion recognition tool (SIRT) for defending IoT integrated ICS from cyber-attacks6
Space cybersecurity challenges, mitigation techniques, anticipated readiness, and future directions5
STADe: An unsupervised time-windows method of detecting anomalies in oil and gas Industrial Cyber-Physical Systems (ICPS) networks5
Editorial5
The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints5
A novel deep learning based security assessment framework for enhanced security in swarm network environment5
A novel cost-based optimization model for electric power distribution systems resilience improvement under dust storms5
Resilience in cogeneration systems: Graphical analysis of novel indexes and system behavior under failure scenarios4
A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE4
Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990–20184
Measurement protection to prevent cyber–physical attacks against power system State Estimation4
Load-altering attack detection on smart grid using functional observers4
A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems4
A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid4
Evaluation of SDN security measures in the context of IEC 62443-3-34
0.29351902008057