International Journal of Critical Infrastructure Protection

Papers
(The TQCC of International Journal of Critical Infrastructure Protection is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Editorial108
Editorial Board107
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies84
Identifying cyber attack vulnerabilities in the main lubricating oil system of marine propulsion units81
An AutoML-based security defender for industrial control systems69
VetaDetect: Vehicle tampering detection with closed-loop model ensemble67
Corrigendum to ‘VetaDetect: Vehicle tampering detection with closed-loop model ensemble’ International Journal of Critical Infrastructure Protection, 37 (2022), 10052553
Mitigation of the impact of disturbances in gas transmission systems50
National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage49
Physical performance of power grids against earthquakes: from framework to implementation46
Vulnerability assessment of urban road traffic systems based on traffic flow42
IPSMInfer: Industrial proprietary protocol state machine inference from network traces38
DSACR: A defense-based system with adaptive cyber resilience for industrial control systems37
Need for intensive care? A socio-technical systems perspective on water supply failure preparedness in German health care facilities37
A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction32
Hardware-in-Loop (HIL) Testbed Design of Thermal Power Plant for Threat Modeling and Attack Vector Analysis25
Threat model for IEC 61850 based substation automation system25
APT attacks on industrial control systems: A tale of three incidents24
Advances in UAV detection: integrating multi-sensor systems and AI for enhanced accuracy and efficiency23
A threat modeling language for generating attack graphs of substation automation systems23
A comparative study of cyber security intrusion detection in healthcare systems23
Editorial Board22
Systemic cyber risk20
Assessing the comprehensive importance of power grid nodes based on DEA20
Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features19
An evaluation framework for industrial control system cyber incidents19
A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks19
Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)19
Assessing earthquake risks to lifeline infrastructure systems in the United States18
Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements18
Measuring spatial accessibility to critical infrastructure: The Access Road Identification model18
FDI attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid17
Technological advancements and innovations in enhancing resilience of electrical distribution systems17
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects17
Interdependencies and supply chain16
Enhancing urban system resilience to earthquake disasters: Impact of interdependence and resource allocation15
Rule-based anomaly detection for railway signalling networks15
Assessment of cross-border electricity interconnection projects using a MCDA method14
Vulnerability assessment of interdependent road-power networks with probability-based coupling strategies14
Chance-constrained vulnerability assessment of smart water distribution systems against stealthy false data injection attacks14
Situation Awareness for Cyber Resilience: A review14
A review on effective alarm management systems for industrial process control: Barriers and opportunities13
OptAML: Optimized adversarial machine learning on water treatment and distribution systems12
Digital Twin-assisted anomaly detection for industrial scenarios11
The drift of industrial control systems to pseudo security10
Optimized unmanned aerial vehicle pathway system in disaster resilience network10
Cyber attacks on critical infrastructures and satellite communications10
Resilience of interdependent infrastructure networks: Review and future directions10
Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review10
SuPOR: A lightweight stream cipher for confidentiality and attack-resilient visual data security in IoT9
Dynamic optimization of multi-layered defenses inspired by Chakravyuh9
Resilience quantification and recovery strategy simulation for urban underground logistics systems under node and link attacks: A case study of Nanjing city9
Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: A systematic review9
Evaluating regional emergency response capabilities using entropy weight and matter-element extension theory9
0.27967500686646