International Journal of Critical Infrastructure Protection

Papers
(The TQCC of International Journal of Critical Infrastructure Protection is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Interdependencies and third parties143
Load-altering attack detection on smart grid using functional observers81
Cyber risk assessment of cyber-enabled autonomous cargo vessel73
Bayesian games for the cybersecurity of nuclear power plants65
An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace61
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies56
Editorial50
Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment49
On the component resilience importance measures for infrastructure systems34
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis34
Rule-based anomaly detection for railway signalling networks33
Enterprise architecture modeling for cybersecurity analysis in critical infrastructures — A systematic literature review32
Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes31
A flexible OT testbed for evaluating on-device implementations of IEC-61850 GOOSE30
Assessment of cross-border electricity interconnection projects using a MCDA method29
FingerCI: Writing industrial process specifications from network traffic28
Evaluation of SDN security measures in the context of IEC 62443-3-328
A review on effective alarm management systems for industrial process control: Barriers and opportunities27
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation26
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks26
Robustness of the Chinese power grid to cascading failures under attack and defense strategies26
Cyber attacks on critical infrastructures and satellite communications24
Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems23
CABBA: Compatible Authenticated Bandwidth-efficient Broadcast protocol for ADS-B23
Simulation of multi-stage attack and defense mechanisms in smart grids19
OptAML: Optimized adversarial machine learning on water treatment and distribution systems18
Assessing the effects of link-repair sequences on road network resilience18
Cybersecurity and cyber-terrorism challenges to energy-related infrastructures – Cybersecurity frameworks and economics – Comprehensive review17
Corrigendum to ‘VetaDetect: Vehicle tampering detection with closed-loop model ensemble’ International Journal of Critical Infrastructure Protection, 37 (2022), 10052516
Advancing coordination in critical maritime infrastructure protection: Lessons from maritime piracy and cybersecurity16
Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied π-Calculus15
Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants14
A comparison of onshore oil and gas transmission pipeline incident statistics in Canada and the United States14
Mitigation of the impact of disturbances in gas transmission systems14
A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems14
A Systematic Literature Review on RAMS analysis for critical infrastructures protection14
VetaDetect: Vehicle tampering detection with closed-loop model ensemble14
Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems13
Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990–201813
Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems13
An exploratory analysis of the last frontier: A systematic literature review of cybersecurity in space12
Comprehensive vulnerability assessment for environmental facility depending on spatial characteristics in South Korea11
Obfuscation strategies for industrial control systems11
Editorial Board10
Editorial Board10
Editorial Board10
Digital Twin-assisted anomaly detection for industrial scenarios10
End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure10
Editorial Board9
Vulnerabilities and countermeasures in electrical substations9
An AutoML-based security defender for industrial control systems9
Editorial on Protection vs Resilience by Prof. Roberto Setola9
A tri-level optimization model for interdependent infrastructure network resilience against compound hazard events9
Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems9
Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review9
0.083065032958984