International Journal of Critical Infrastructure Protection

Papers
(The TQCC of International Journal of Critical Infrastructure Protection is 13. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Editorial152
Robustness of the Chinese power grid to cascading failures under attack and defense strategies85
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies83
An AutoML-based security defender for industrial control systems82
Vulnerabilities and countermeasures in electrical substations67
Corrigendum to ‘VetaDetect: Vehicle tampering detection with closed-loop model ensemble’ International Journal of Critical Infrastructure Protection, 37 (2022), 10052562
VetaDetect: Vehicle tampering detection with closed-loop model ensemble55
Mitigation of the impact of disturbances in gas transmission systems53
Vulnerability assessment of urban road traffic systems based on traffic flow41
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage37
Resilient backup controller placement in distributed SDN under critical targeted attacks37
Physical performance of power grids against earthquakes: from framework to implementation36
Vulnerability analysis of critical infrastructure network35
Need for intensive care? A socio-technical systems perspective on water supply failure preparedness in German health care facilities34
DSACR: A defense-based system with adaptive cyber resilience for industrial control systems30
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction30
A comparative study of cyber security intrusion detection in healthcare systems29
Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis29
APT attacks on industrial control systems: A tale of three incidents28
Assessing the comprehensive importance of power grid nodes based on DEA27
Editorial Board27
Systemic cyber risk27
A threat modeling language for generating attack graphs of substation automation systems26
Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory24
An evaluation framework for industrial control system cyber incidents22
Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)20
Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features19
A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks18
ARTINALI#: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems18
Rule-based anomaly detection for railway signalling networks17
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects17
Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements17
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation17
Technological advancements and innovations in enhancing resilience of electrical distribution systems17
Assessment of cross-border electricity interconnection projects using a MCDA method17
FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid17
A review on effective alarm management systems for industrial process control: Barriers and opportunities16
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks16
Editorial Board16
Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review15
OptAML: Optimized adversarial machine learning on water treatment and distribution systems15
Cyber attacks on critical infrastructures and satellite communications15
Digital Twin-assisted anomaly detection for industrial scenarios15
Optimized unmanned aerial vehicle pathway system in disaster resilience network14
End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure14
Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts13
The drift of industrial control systems to pseudo security13
Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review13
A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem13
0.018427133560181