International Journal of Critical Infrastructure Protection

Papers
(The median citation count of International Journal of Critical Infrastructure Protection is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Interdependencies and third parties143
Load-altering attack detection on smart grid using functional observers81
Cyber risk assessment of cyber-enabled autonomous cargo vessel73
Bayesian games for the cybersecurity of nuclear power plants65
An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace61
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies56
Editorial50
Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment49
On the component resilience importance measures for infrastructure systems34
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis34
Rule-based anomaly detection for railway signalling networks33
Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review32
Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes31
A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE30
Assessment of cross-border electricity interconnection projects using a MCDA method29
FingerCI: Writing industrial process specifications from network traffic28
Evaluation of SDN security measures in the context of IEC 62443-3-328
A review on effective alarm management systems for industrial process control: Barriers and opportunities27
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation26
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks26
Robustness of the Chinese power grid to cascading failures under attack and defense strategies26
Cyber attacks on critical infrastructures and satellite communications24
Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems23
CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B23
Simulation of multi-stage attack and defense mechanisms in smart grids19
OptAML: Optimized adversarial machine learning on water treatment and distribution systems18
Assessing the effects of link-repair sequences on road network resilience18
Cybersecurity and cyber-terrorism challenges to energy-related infrastructures – Cybersecurity frameworks and economics – Comprehensive review17
Corrigendum to ‘VetaDetect: Vehicle tampering detection with closed-loop model ensemble’ International Journal of Critical Infrastructure Protection, 37 (2022), 10052516
Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity16
Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus15
VetaDetect: Vehicle tampering detection with closed-loop model ensemble14
Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants14
A comparison of onshore oil and gas transmission pipeline incident statistics in Canada and the United States14
Mitigation of the impact of disturbances in gas transmission systems14
A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems14
A Systematic Literature Review on RAMS analysis for critical infrastructures protection14
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems13
Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems13
Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990–201813
An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space12
Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea11
Obfuscation strategies for industrial control systems11
Editorial Board10
Editorial Board10
Editorial Board10
Digital Twin-assisted anomaly detection for industrial scenarios10
End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure10
Editorial Board9
Vulnerabilities and countermeasures in electrical substations9
An AutoML-based security defender for industrial control systems9
Editorial on Protection vs Resilience by Prof. Roberto Setola9
A tri-level optimization model for interdependent infrastructure network resilience against compound hazard events9
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems9
Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review9
Feasibility of critical infrastructure protection using network functions for programmable and decoupled ICS policy enforcement over WAN8
Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences8
ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems8
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things7
Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network7
A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions7
Defensive cost–benefit analysis of smart grid digital functionalities7
The digital divide in state vulnerability to submarine communications cable failure6
Vulnerable underground entrance understanding for visual surveillance systems6
IoT fusion based model predictive pid control approach for oil pipeline infrastructure6
Resilient backup controller placement in distributed SDN under critical targeted attacks6
Physical performance of power grids against earthquakes: from framework to implementation6
Software-Defined Networking approaches for intrusion response in Industrial Control Systems: A survey6
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage6
False data injection in distribution system: Attacker's perspective6
Physical threats vs Cyber threats6
Optimized unmanned aerial vehicle pathway system in disaster resilience network6
A watchdog model for physics-based anomaly detection in digital substations6
A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem6
Editorial Board5
The drift of industrial control systems to pseudo security5
Developments and research directions in maritime cybersecurity: A systematic literature review and bibliometric analysis5
Power systems resilience: Definition and taxonomy with a view towards metrics5
SafeCI: Avoiding process anomalies in critical infrastructure5
Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering5
Editorial – Linking science and policy for addressing CI security and resilience challenges by Dr. Georgios Giannopoulos5
Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication5
Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts5
New threats and research problems for critical infrastructure5
Modeling flood propagation and cascading failures in interdependent transportation and stormwater networks5
Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis4
Threat Modelling of Cyber–Physical Systems Using an Applied π-Calcul4
Vulnerability assessment of urban road traffic systems based on traffic flow4
A real-time network based anomaly detection in industrial control systems4
A multi-criteria model for the security assessment of large-infrastructure construction sites4
Editorial Board4
SPARK and SAD: Leading-Edge Deep Learning Frameworks for Robust and Effective Intrusion Detection in SCADA Systems4
A study on resilient and cost-based design in power distribution network against severe hurricane4
Vulnerability analysis of critical infrastructure network3
Editorial Board3
Cyber-threat landscape of border control infrastructures3
CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks3
IJCIP Editorial December 2021 – Volume 353
Editorial Board3
0.040343999862671