Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/ijcip:"
@article{DBLP:journals/ijcip/AalirezaeiKK23, author = {Armin Aalirezaei and Golam Kabir and Md Saiful Arif Khan}, title = {Dynamic predictive analysis of the consequences of gas pipeline failures using a Bayesian network}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {43}, pages = {100638}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100638}, doi = {10.1016/J.IJCIP.2023.100638}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/AalirezaeiKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AshworthSS23, author = {James Ashworth and Jason Staggs and Sujeet Shenoi}, title = {Radio frequency identification and tracking of vehicles and drivers by exploiting keyless entry systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {40}, pages = {100587}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2022.100587}, doi = {10.1016/J.IJCIP.2022.100587}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/AshworthSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AvivF23, author = {Itzhak Aviv and Uri Ferri}, title = {Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {43}, pages = {100637}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100637}, doi = {10.1016/J.IJCIP.2023.100637}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/AvivF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BitirgenF23, author = {K{\"{u}}bra Bitirgen and {\"{U}}mm{\"{u}}han Basaran Filik}, title = {A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {40}, pages = {100582}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2022.100582}, doi = {10.1016/J.IJCIP.2022.100582}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BitirgenF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BoedingHSLP23, author = {Matthew Boeding and Michael Hempel and Hamid Sharif and Juan Lopez Jr. and Kalyan Perumalla}, title = {A flexible {OT} testbed for evaluating on-device implementations of {IEC-61850} {GOOSE}}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100618}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100618}, doi = {10.1016/J.IJCIP.2023.100618}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BoedingHSLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChenLZHQ23, author = {Jiarui Chen and Yiqin Lu and Yang Zhang and Fang Huang and Jiancheng Qin}, title = {A management knowledge graph approach for critical infrastructure protection: Ontology design, information extraction and relation prediction}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {43}, pages = {100634}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100634}, doi = {10.1016/J.IJCIP.2023.100634}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ChenLZHQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/EtxezarretaGIZ23, author = {Xabier Etxezarreta and I{\~{n}}aki Garitano and Mikel Iturbe and Urko Zurutuza}, title = {Software-Defined Networking approaches for intrusion response in Industrial Control Systems: {A} survey}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100615}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100615}, doi = {10.1016/J.IJCIP.2023.100615}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/EtxezarretaGIZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FanTL23, author = {Bing Fan and Hongtao Tan and Yaqun Li}, title = {Critical link identification algorithm for power communication networks in {SDN} architecture}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {40}, pages = {100584}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2022.100584}, doi = {10.1016/J.IJCIP.2022.100584}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/FanTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GaoYSC23, author = {Xin Gao and Yunxia Ye and Wenxin Su and Linyan Chen}, title = {Assessing the comprehensive importance of power grid nodes based on {DEA}}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100614}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100614}, doi = {10.1016/J.IJCIP.2023.100614}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/GaoYSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GulcanE23, author = {Tolga Ahmet G{\"{u}}lcan and Kadir Emrah Erginer}, title = {National and international maritime situational awareness model examples and the effects of North Stream Pipelines sabotage}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100624}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100624}, doi = {10.1016/J.IJCIP.2023.100624}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/GulcanE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HeinrichGAK23, author = {Markus Heinrich and Arwed G{\"{o}}lz and Tolga Arul and Stefan Katzenbeisser}, title = {Rule-based anomaly detection for railway signalling networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100603}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100603}, doi = {10.1016/J.IJCIP.2023.100603}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HeinrichGAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HenriquesCCS23, author = {Jo{\~{a}}o Henriques and Filipe Caldeira and Tiago Cruz and Paulo Sim{\~{o}}es}, title = {A forensics and compliance auditing framework for critical infrastructure protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100613}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100613}, doi = {10.1016/J.IJCIP.2023.100613}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HenriquesCCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HolmesPCSC23, author = {Jennifer S. Holmes and Agustin Palao and Mercedez Callenes and Neil Ortiz Silva and Alvaro A. C{\'{a}}rdenas}, title = {Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990-2018}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100621}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100621}, doi = {10.1016/J.IJCIP.2023.100621}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HolmesPCSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JungYM23, author = {Sejin Jung and Junbeom Yoo and Sam Malek}, title = {A systematic co-engineering of safety and security analysis in requirements engineering process}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {43}, pages = {100642}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100642}, doi = {10.1016/J.IJCIP.2023.100642}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/JungYM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KavallieratosK23, author = {Georgios Kavallieratos and Sokratis K. Katsikas}, title = {An exploratory analysis of the last frontier: {A} systematic literature review of cybersecurity in space}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {43}, pages = {100640}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100640}, doi = {10.1016/J.IJCIP.2023.100640}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KavallieratosK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KhanGBKG23, author = {Suleman Khan and Gurjot Singh Gaba and An Braeken and Pardeep Kumar and Andrei V. Gurtov}, title = {{AKAASH:} {A} realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100619}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100619}, doi = {10.1016/J.IJCIP.2023.100619}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KhanGBKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LinN23, author = {Chih{-}Yuan Lin and Simin Nadjm{-}Tehrani}, title = {Protocol study and anomaly detection for server-driven traffic in {SCADA} networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100612}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100612}, doi = {10.1016/J.IJCIP.2023.100612}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LinN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LingE23, author = {Engla Rencelj Ling and Mathias Ekstedt}, title = {A threat modeling language for generating attack graphs of substation automation systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {41}, pages = {100601}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100601}, doi = {10.1016/J.IJCIP.2023.100601}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LingE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MaierHTF23, author = {Matthew J. Maier and Hunter S. Hayden and Michael A. Temple and Matthew C. Fickus}, title = {Ensuring the longevity of WirelessHART devices in industrial automation and control systems using distinct native attribute fingerprinting}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {43}, pages = {100641}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100641}, doi = {10.1016/J.IJCIP.2023.100641}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/MaierHTF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MargossianKS23, author = {Harag Margossian and Ronald Kfouri and Rita Saliba}, title = {Measurement protection to prevent cyber-physical attacks against power system State Estimation}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {43}, pages = {100643}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100643}, doi = {10.1016/J.IJCIP.2023.100643}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/MargossianKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MoradiKHSG23, author = {Shohreh Moradi and Md Muzahid Khan and Niamat Ullah Ibne Hossain and Mohammad Shamsuddoha and Alex Gorod}, title = {Modeling and assessing seismic resilience leveraging systems dynamic approach: {A} case study of society 5.0}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {43}, pages = {100639}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100639}, doi = {10.1016/J.IJCIP.2023.100639}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/MoradiKHSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MustafaABAMMA23, author = {Faizan E. Mustafa and Ijaz Ahmed and Abdul Basit and Um{-}E.{-}Habiba Alvi and Saddam Hussain Malik and Atif Mahmood and Paghunda Roheela Ali}, title = {A review on effective alarm management systems for industrial process control: Barriers and opportunities}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {41}, pages = {100599}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100599}, doi = {10.1016/J.IJCIP.2023.100599}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/MustafaABAMMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RamakiBR23, author = {Ali Ahmadian Ramaki and Abbas Ghaemi Bafghi and Abbas Rasoolzadegan}, title = {{CAPTAIN:} Community-based Advanced Persistent Threat Analysis in {IT} Networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100620}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100620}, doi = {10.1016/J.IJCIP.2023.100620}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/RamakiBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SalamaET23, author = {Mohamed Salama and Wael El{-}Dakhakhni and Michael Tait}, title = {Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100622}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100622}, doi = {10.1016/J.IJCIP.2023.100622}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/SalamaET23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Setola23, author = {Roberto Setola}, title = {Editorial on Protection vs Resilience by Prof. Roberto Setola}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {41}, pages = {100608}, year = {2023}, url = {https://doi.org/10.1016/S1874-5482(23)00021-5}, doi = {10.1016/S1874-5482(23)00021-5}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Setola23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Setola23a, author = {Roberto Setola}, title = {New threats and research problems for critical infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100629}, year = {2023}, url = {https://doi.org/10.1016/S1874-5482(23)00042-2}, doi = {10.1016/S1874-5482(23)00042-2}, timestamp = {Sun, 01 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Setola23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Setola23b, author = {Roberto Setola}, title = {Systemic cyber risk}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {43}, pages = {100652}, year = {2023}, url = {https://doi.org/10.1016/S1874-5482(23)00065-3}, doi = {10.1016/S1874-5482(23)00065-3}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Setola23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TiongV23, author = {Achara Tiong and Hector A. Vergara}, title = {A two-stage stochastic multi-objective resilience optimization model for network expansion of interdependent power-water networks under disruption}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {40}, pages = {100588}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100588}, doi = {10.1016/J.IJCIP.2023.100588}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/TiongV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TiongV23a, author = {Achara Tiong and Hector A. Vergara}, title = {Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100623}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100623}, doi = {10.1016/J.IJCIP.2023.100623}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/TiongV23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/VargasT23, author = {Paola Vargas and Iris Tien}, title = {Impacts of 5G on cyber-physical risks for interdependent connected smart critical infrastructure systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100617}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100617}, doi = {10.1016/J.IJCIP.2023.100617}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/VargasT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WangD23, author = {Shuliang Wang and Qiqi Dong}, title = {A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {41}, pages = {100602}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100602}, doi = {10.1016/J.IJCIP.2023.100602}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WangD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WangKKGV23, author = {Wensheng Wang and Faezeh Karimi and Kaveh Khalilpour and David G. Green and Manos Varvarigos}, title = {Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market {(NEM)}}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {41}, pages = {100600}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100600}, doi = {10.1016/J.IJCIP.2023.100600}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WangKKGV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WangPLL23, author = {Ziqi Wang and Yulong Pei and Jing Liu and Hehang Liu}, title = {Vulnerability analysis of urban road networks based on traffic situation}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {41}, pages = {100590}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100590}, doi = {10.1016/J.IJCIP.2023.100590}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WangPLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WangSZDGC23, author = {Shuliang Wang and Jingya Sun and Jianhua Zhang and Qiqi Dong and Xifeng Gu and Chen Chen}, title = {Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {40}, pages = {100583}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2022.100583}, doi = {10.1016/J.IJCIP.2022.100583}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WangSZDGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WangWH23, author = {Luping Wang and Hui Wei and Yun Hao}, title = {Vulnerable underground entrance understanding for visual surveillance systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {41}, pages = {100589}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100589}, doi = {10.1016/J.IJCIP.2023.100589}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WangWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/YangBLWBD23, author = {Zhuyu Yang and Bruno Barroca and Katia Laffr{\'{e}}chine and Alexandre Weppe and Aur{\'{e}}lia Bony{-}Dandrieux and Nicolas Daclin}, title = {A multi-criteria framework for critical infrastructure systems resilience}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {42}, pages = {100616}, year = {2023}, url = {https://doi.org/10.1016/j.ijcip.2023.100616}, doi = {10.1016/J.IJCIP.2023.100616}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/YangBLWBD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AliSS22, author = {Busyairah Syd Ali and Sam Saji and Moon Ting Su}, title = {An assessment of frameworks for heterogeneous aircraft operations in low-altitude airspace}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100528}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100528}, doi = {10.1016/J.IJCIP.2022.100528}, timestamp = {Sun, 24 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/AliSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AmpratwumOT22, author = {Godslove Ampratwum and Robert Osei{-}Kyei and Vivian W. Y. Tam}, title = {Exploring the concept of public-private partnership in building critical infrastructure resilience against unexpected events: {A} systematic review}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {39}, pages = {100556}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100556}, doi = {10.1016/J.IJCIP.2022.100556}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/AmpratwumOT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BachmannVBB22, author = {Ivana Bachmann and Valeria Vald{\'{e}}s and Javier Bustos{-}Jim{\'{e}}nez and Benjamin Bustos}, title = {Effect of adding physical links on the robustness of the Internet modeled as a physical-logical interdependent network using simple strategies}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {36}, pages = {100483}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100483}, doi = {10.1016/J.IJCIP.2021.100483}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/BachmannVBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Baldoni22, author = {Roberto Baldoni}, title = {Managing the cyber risk in a multipolar world}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {39}, pages = {100578}, year = {2022}, url = {https://doi.org/10.1016/S1874-5482(22)00062-2}, doi = {10.1016/S1874-5482(22)00062-2}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Baldoni22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BaxleyBGC22, author = {Stuart Baxley and Nicholas Bastin and Deniz Gurkan and William Arthur Conklin}, title = {Feasibility of critical infrastructure protection using network functions for programmable and decoupled {ICS} policy enforcement over {WAN}}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {39}, pages = {100573}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100573}, doi = {10.1016/J.IJCIP.2022.100573}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BaxleyBGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BerghoutBM22, author = {Tarek Berghout and Mohamed Benbouzid and S. M. Muyeen}, title = {Machine learning for cybersecurity in smart grids: {A} comprehensive review-based study on methods, solutions, and prospects}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100547}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100547}, doi = {10.1016/J.IJCIP.2022.100547}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BerghoutBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BolbotKBBM22, author = {Victor Bolbot and Ketki Kulkarni and P{\"{a}}ivi Brunou and Osiris A. Valdez Banda and Mashrura Musharraf}, title = {Developments and research directions in maritime cybersecurity: {A} systematic literature review and bibliometric analysis}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {39}, pages = {100571}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100571}, doi = {10.1016/J.IJCIP.2022.100571}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/BolbotKBBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChatzisS22, author = {Petros Chatzis and Eliana Stavrou}, title = {Cyber-threat landscape of border control infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {36}, pages = {100503}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100503}, doi = {10.1016/J.IJCIP.2021.100503}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ChatzisS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChenZCHW22, author = {Shun Chen and Xudong Zhao and Zhilong Chen and Benwei Hou and Yipeng Wu}, title = {A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {36}, pages = {100494}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100494}, doi = {10.1016/J.IJCIP.2021.100494}, timestamp = {Mon, 14 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ChenZCHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/DonnellyAT22, author = {Peter Donnelly and Mabrouka Abuhmida and Christopher Tubb}, title = {The drift of industrial control systems to pseudo security}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100535}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100535}, doi = {10.1016/J.IJCIP.2022.100535}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/DonnellyAT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FiroozjaeiMBG22, author = {Mahdi Daghmehchi Firoozjaei and Nastaran Mahmoudyar and Yaser Baseri and Ali A. Ghorbani}, title = {An evaluation framework for industrial control system cyber incidents}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {36}, pages = {100487}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100487}, doi = {10.1016/J.IJCIP.2021.100487}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/FiroozjaeiMBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FrankenRRR22, author = {Jonas Franken and Thomas Reinhold and Lilian Reichert and Christian Reuter}, title = {The digital divide in state vulnerability to submarine communications cable failure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100522}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100522}, doi = {10.1016/J.IJCIP.2022.100522}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/FrankenRRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Ghafory-Ashtiany22, author = {Mohsen Ghafory{-}Ashtiany and Mahban Arghavani}, title = {Physical performance of power grids against earthquakes: from framework to implementation}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {39}, pages = {100550}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100550}, doi = {10.1016/J.IJCIP.2022.100550}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Ghafory-Ashtiany22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HallerGFBCF22, author = {Piroska Haller and B{\'{e}}la Genge and Fabrizio Forloni and Gianmarco Baldini and Massimo Carriero and Georgios Fontaras}, title = {VetaDetect: Vehicle tampering detection with closed-loop model ensemble}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100525}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100525}, doi = {10.1016/J.IJCIP.2022.100525}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HallerGFBCF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HallerGFBCF22a, author = {Piroska Haller and B{\'{e}}la Genge and Fabrizio Forloni and Gianmarco Baldini and Massimo Carriero and Georgios Fontaras}, title = {Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100543}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100543}, doi = {10.1016/J.IJCIP.2022.100543}, timestamp = {Wed, 21 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HallerGFBCF22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HanLS22, author = {Sang Min Han and Chanyoung Lee and Poong Hyun Seong}, title = {Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100523}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100523}, doi = {10.1016/J.IJCIP.2022.100523}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HanLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HuffLM22, author = {Johnathon Huff and William B. Leonard and Hugh R. Medal}, title = {The wireless network jamming problem subject to protocol interference using directional antennas and with battery capacity constraints}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {39}, pages = {100572}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100572}, doi = {10.1016/J.IJCIP.2022.100572}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HuffLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KechagiasCPA22, author = {Evripidis P. Kechagias and Georgios Chatzistelios and Georgios A. Papadopoulos and Panagiotis Apostolou}, title = {Digital transformation of the maritime industry: {A} cybersecurity systemic approach}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100526}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100526}, doi = {10.1016/J.IJCIP.2022.100526}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KechagiasCPA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KumarKST22, author = {Rajesh Kumar and Rohan Kela and Siddhant Singh and Rolando Trujillo{-}Rasua}, title = {{APT} attacks on industrial control systems: {A} tale of three incidents}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100521}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100521}, doi = {10.1016/J.IJCIP.2022.100521}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KumarKST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LiG22, author = {Ruiying Li and Ying Gao}, title = {On the component resilience importance measures for infrastructure systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {36}, pages = {100481}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100481}, doi = {10.1016/J.IJCIP.2021.100481}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LiG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LiuGZWA22, author = {Zhiqiang Liu and Mohi{-}Ud{-}Din Ghulam and Jiangbin Zheng and Sifei Wang and Muhammad Asim}, title = {A novel deep learning based security assessment framework for enhanced security in swarm network environment}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100540}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100540}, doi = {10.1016/J.IJCIP.2022.100540}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LiuGZWA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MaccaroneC22, author = {Lee T. Maccarone and Daniel G. Cole}, title = {Bayesian games for the cybersecurity of nuclear power plants}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100493}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100493}, doi = {10.1016/J.IJCIP.2021.100493}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/MaccaroneC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MajidiHK22, author = {Seyed Hossein Majidi and Shahrzad Hadayeghparast and Hadis Karimipour}, title = {{FDI} attack detection using extra trees algorithm and deep learning algorithm-autoencoder in smart grid}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100508}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100508}, doi = {10.1016/J.IJCIP.2022.100508}, timestamp = {Sun, 24 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/MajidiHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Martinez-Pastor22, author = {Beatriz Martinez{-}Pastor and Mar{\'{\i}}a Nogal and Alan O'Connor and Rui Teixeira}, title = {Identifying critical and vulnerable links: {A} new approach using the Fisher information matrix}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {39}, pages = {100570}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100570}, doi = {10.1016/J.IJCIP.2022.100570}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Martinez-Pastor22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MaurerGEGSG22, author = {Nils M{\"{a}}urer and Tobias Guggemos and Thomas Ewert and Thomas Gr{\"{a}}upl and Corinna Schmitt and Sophia Grundner{-}Culemann}, title = {Security in Digital Aeronautical Communications {A} Comprehensive Gap Analysis}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100549}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100549}, doi = {10.1016/J.IJCIP.2022.100549}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/MaurerGEGSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/NadirMS22, author = {Ibrahim Nadir and Haroon Mahmood and Ghalib Asadullah Shah}, title = {A taxonomy of IoT firmware security and principal firmware analysis techniques}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100552}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100552}, doi = {10.1016/J.IJCIP.2022.100552}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/NadirMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/NwekeWW22, author = {Livinus Obiora Nweke and Goitom K. Weldehawaryat and Stephen D. Wolthusen}, title = {Corrigendum to Threat Modelling of Cyber-Physical Systems Using an Applied {\(\pi\)}-Calculus}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {36}, pages = {100506}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100506}, doi = {10.1016/J.IJCIP.2021.100506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/NwekeWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PanthiD22, author = {Manikant Panthi and Tanmoy Kanti Das}, title = {Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {39}, pages = {100567}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100567}, doi = {10.1016/J.IJCIP.2022.100567}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/PanthiD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RahmanMKAD22, author = {Ayesha Rahman and Ghulam Mustafa and Abdul Qayyum Khan and Muhammad Abid and Muhammad Hanif Durad}, title = {Launch of denial of service attacks on the modbus/TCP protocol and development of its protection mechanisms}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {39}, pages = {100568}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100568}, doi = {10.1016/J.IJCIP.2022.100568}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RahmanMKAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RehmanAS22, author = {Obaid Ur Rehman and Yousaf Ali and Muhammad Sabir}, title = {Risk assessment and mitigation for electric power sectors: {A} developing country's perspective}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {36}, pages = {100507}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100507}, doi = {10.1016/J.IJCIP.2021.100507}, timestamp = {Mon, 14 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RehmanAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RudysAAKZG22, author = {Saulius Rudys and Jurgis Aleksandravicius and Rimvydas Aleksiejunas and Andriy Konovaltsev and Chen Zhu and Lukasz A. Greda}, title = {Physical layer protection for {ADS-B} against spoofing and jamming}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100555}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100555}, doi = {10.1016/J.IJCIP.2022.100555}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RudysAAKZG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SousaMM22, author = {{\'{A}}lan e Sousa and Nadhir Messai and Noureddine Manamanni}, title = {Load-altering attack detection on smart grid using functional observers}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100518}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100518}, doi = {10.1016/J.IJCIP.2022.100518}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/SousaMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StavesABGGH22, author = {Alexander Staves and Tom Anderson and Harry Balderstone and Benjamin Green and Antonios Gouglidis and David Hutchison}, title = {A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100505}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100505}, doi = {10.1016/J.IJCIP.2021.100505}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/StavesABGGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StrightCK22, author = {Jim Stright and Peter Cheetham and Charalambos Konstantinou}, title = {Defensive cost-benefit analysis of smart grid digital functionalities}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {36}, pages = {100489}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100489}, doi = {10.1016/J.IJCIP.2021.100489}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/StrightCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/UmerJJM22, author = {Muhammad Azmi Umer and Khurum Nazir Junejo and Muhammad Taha Jilani and Aditya P. Mathur}, title = {Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100516}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100516}, doi = {10.1016/J.IJCIP.2022.100516}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/UmerJJM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ValueianVK22, author = {Meysam Valueian and Mojtaba Vahidi{-}Asl and Alireza Khalilian}, title = {SituRepair: Incorporating machine-learning fault class prediction to inform situational multiple fault automatic program repair}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {37}, pages = {100527}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100527}, doi = {10.1016/J.IJCIP.2022.100527}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ValueianVK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WangCZGH22, author = {Shuliang Wang and Chen Chen and Jianhua Zhang and Xifeng Gu and Xiaodi Huang}, title = {Vulnerability assessment of urban road traffic systems based on traffic flow}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100536}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100536}, doi = {10.1016/J.IJCIP.2022.100536}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WangCZGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WangHBSS22, author = {Wu Wang and Fouzi Harrou and Benamar Bouyeddou and Sidi{-}Mohammed Senouci and Ying Sun}, title = {Cyber-attacks detection in industrial systems using artificial intelligence-driven methods}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100542}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100542}, doi = {10.1016/J.IJCIP.2022.100542}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WangHBSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/YangHMXYG22, author = {Jun Yang and Leixiong Huang and Haoming Ma and Zhihui Xu and Ming Yang and Shaoqiang Guo}, title = {A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {38}, pages = {100554}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100554}, doi = {10.1016/J.IJCIP.2022.100554}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/YangHMXYG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZalitisDZGKVFFB22, author = {Ivars Zalitis and Aleksandrs Dolgicers and Laila Zemite and Sebastian Ganter and Vytis Kopustinskas and Bogdan I. Vamanu and J{\"{o}}rg Finger and Clemente Fuggini and Ilmars Bode and Jevgenijs Kozadajevs and Ivo H{\"{a}}ring}, title = {Mitigation of the impact of disturbances in gas transmission systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {39}, pages = {100569}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2022.100569}, doi = {10.1016/J.IJCIP.2022.100569}, timestamp = {Sun, 19 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ZalitisDZGKVFFB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZhangA22, author = {Ning Zhang and Alice Alipour}, title = {Flood risk assessment and application of risk curves for design of mitigation strategies}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {36}, pages = {100490}, year = {2022}, url = {https://doi.org/10.1016/j.ijcip.2021.100490}, doi = {10.1016/J.IJCIP.2021.100490}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ZhangA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AdepuM21, author = {Sridhar Adepu and Aditya Mathur}, title = {SafeCI: Avoiding process anomalies in critical infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100435}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100435}, doi = {10.1016/J.IJCIP.2021.100435}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/AdepuM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AliabadiSVG21, author = {Maryam Raiyat Aliabadi and Margo I. Seltzer and Mojtaba Vahidi{-}Asl and Ramak Ghavamizadeh}, title = {ARTINALI{\#}: An Efficient Intrusion Detection Technique for Resource-Constrained Cyber-Physical Systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100430}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100430}, doi = {10.1016/J.IJCIP.2021.100430}, timestamp = {Thu, 20 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/AliabadiSVG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BhuiyanMNH21, author = {Tanveer Hossain Bhuiyan and Hugh R. Medal and Apurba K. Nandi and Mahantesh Halappanavar}, title = {Risk-averse bi-level stochastic network interdiction model for cyber-security risk management}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {32}, pages = {100408}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100408}, doi = {10.1016/J.IJCIP.2021.100408}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/BhuiyanMNH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/CalleMMP21, author = {Eusebi Calle and David Mart{\'{\i}}nez and Mariusz Mycek and Michal Pi{\'{o}}ro}, title = {Resilient backup controller placement in distributed {SDN} under critical targeted attacks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100422}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100422}, doi = {10.1016/J.IJCIP.2021.100422}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/CalleMMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChekoleOC21, author = {Eyasu Getahun Chekole and Mart{\'{\i}}n Ochoa and Sudipta Chattopadhyay}, title = {{SCOPE:} Secure Compiling of PLCs in Cyber-Physical Systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100431}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100431}, doi = {10.1016/J.IJCIP.2021.100431}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ChekoleOC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/DaweriAA21, author = {Muataz Salam Al Daweri and Salwani Abdullah and Khairul Akram Zainol Ariffin}, title = {A homogeneous ensemble based dynamic artificial neural network for solving the intrusion detection problem}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100449}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100449}, doi = {10.1016/J.IJCIP.2021.100449}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/DaweriAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FortiCSBAC21, author = {Alessandro {Cantelli Forti} and Amerigo Capria and Anna Lisa Saverino and Fabrizio Berizzi and Davide Adami and Christian Callegari}, title = {Critical infrastructure protection system design based on {SCOUT} multitech seCurity system for intercOnnected space control groUnd staTions}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {32}, pages = {100407}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2020.100407}, doi = {10.1016/J.IJCIP.2020.100407}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/FortiCSBAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HanZCWSZ21, author = {Lin Han and Xudong Zhao and Zhilong Chen and Yipeng Wu and Xiaochao Su and Ning Zhang}, title = {Optimal allocation of defensive resources to defend urban power networks against different types of attackers}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100467}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100467}, doi = {10.1016/J.IJCIP.2021.100467}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HanZCWSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HuiMS21, author = {Henry Hui and Kieran McLaughlin and Sakir Sezer}, title = {Vulnerability analysis of {S7} PLCs: Manipulating the security mechanism}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100470}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100470}, doi = {10.1016/J.IJCIP.2021.100470}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HuiMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HussainFAS21, author = {Shahbaz Hussain and Javier Hernandez Fernandez and Abdulla Khalid Al{-}Ali and Abdullatif Shikfa}, title = {Vulnerabilities and countermeasures in electrical substations}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100406}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2020.100406}, doi = {10.1016/J.IJCIP.2020.100406}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HussainFAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JenaGK21, author = {Prasanta Kumar Jena and Subhojit Ghosh and Ebha Koley}, title = {Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100484}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100484}, doi = {10.1016/J.IJCIP.2021.100484}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/JenaGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JiaWPCSC21, author = {Yifan Jia and Jingyi Wang and Christopher M. Poskitt and Sudipta Chattopadhyay and Jun Sun and Yuqi Chen}, title = {Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100452}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100452}, doi = {10.1016/J.IJCIP.2021.100452}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/JiaWPCSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Kalam21, author = {Anas Abou El Kalam}, title = {Securing {SCADA} and critical industrial systems: From needs to security mechanisms}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {32}, pages = {100394}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2020.100394}, doi = {10.1016/J.IJCIP.2020.100394}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Kalam21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KarimiRH21, author = {Masoumeh Karimi and Sajad Najafi Ravadanegh and Mahmoud{-}Reza Haghifam}, title = {A study on resilient and cost-based design in power distribution network against severe hurricane}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100469}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100469}, doi = {10.1016/J.IJCIP.2021.100469}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KarimiRH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KhazaeiA21, author = {Javad Khazaei and M. Hadi Amini}, title = {Protection of large-scale smart grids against false data injection cyberattacks leading to blackouts}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100457}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100457}, doi = {10.1016/J.IJCIP.2021.100457}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KhazaeiA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KizhakkedathT21, author = {Akhila Kizhakkedath and Kang Tai}, title = {Vulnerability analysis of critical infrastructure network}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100472}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100472}, doi = {10.1016/J.IJCIP.2021.100472}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KizhakkedathT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LiLW21, author = {Kaiwen Li and Kai Liu and Ming Wang}, title = {Robustness of the Chinese power grid to cascading failures under attack and defense strategies}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100432}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100432}, doi = {10.1016/J.IJCIP.2021.100432}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LiLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LiWLHDGC21, author = {Fei Li and Jing Wang and Hui Li and Qian Hu and Wenxuan Dan and Liangquan Ge and David Cohen}, title = {Evaluation on nuclear emergency response strategies in the Asia-Pacific region}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100447}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100447}, doi = {10.1016/J.IJCIP.2021.100447}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LiWLHDGC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LuiijfK21, author = {Eric A. M. Luiijf and Marieke H. A. Klaver}, title = {Analysis and lessons identified on critical infrastructures and dependencies from an empirical data set}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100471}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100471}, doi = {10.1016/J.IJCIP.2021.100471}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LuiijfK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MedjekTDR21, author = {Faiza Medjek and Djamel Tandjaoui and Nabil Djedjig and Imed Romdhani}, title = {Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100436}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100436}, doi = {10.1016/J.IJCIP.2021.100436}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/MedjekTDR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MillerSMSG21, author = {Thomas Miller and Alexander Staves and Sam Maesschalck and Miriam Sturdee and Benjamin Green}, title = {Looking back to look forward: Lessons learnt from cyber-attacks on Industrial Control Systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100464}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100464}, doi = {10.1016/J.IJCIP.2021.100464}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/MillerSMSG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/NwekeWW21, author = {Livinus Obiora Nweke and Goitom K. Weldehawaryat and Stephen D. Wolthusen}, title = {Threat Modelling of Cyber-Physical Systems Using an Applied {\(\pi\)}-Calculus}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100466}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100466}, doi = {10.1016/J.IJCIP.2021.100466}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/NwekeWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/OlivaFSTZ21, author = {Gabriele Oliva and Luca Faramondi and Roberto Setola and Marco Tesei and Enrico Zio}, title = {A multi-criteria model for the security assessment of large-infrastructure construction sites}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100460}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100460}, doi = {10.1016/J.IJCIP.2021.100460}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/OlivaFSTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PirbhulalGK21, author = {Sandeep Pirbhulal and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {A Systematic Literature Review on {RAMS} analysis for critical infrastructures protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100427}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100427}, doi = {10.1016/J.IJCIP.2021.100427}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/PirbhulalGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PlotnekS21, author = {Jordan J. Plotnek and Jill Slay}, title = {Power systems resilience: Definition and taxonomy with a view towards metrics}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100411}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100411}, doi = {10.1016/J.IJCIP.2021.100411}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/PlotnekS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PriyankaTPM21, author = {E. B. Priyanka and S. Thangavel and P. H. Prasad and R. Mohanasundaram}, title = {IoT fusion based model predictive pid control approach for oil pipeline infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100485}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100485}, doi = {10.1016/J.IJCIP.2021.100485}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/PriyankaTPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RandallA21, author = {Rick G. Randall and Stuart Allen}, title = {Cybersecurity professionals information sharing sources and networks in the {U.S.} electrical power industry}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100454}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100454}, doi = {10.1016/J.IJCIP.2021.100454}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/RandallA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SafariPK21, author = {Mohammad Safari and Elham Parvinnia and Alireza Keshavarz{-}Haddad}, title = {Industrial intrusion detection based on the behavior of rotating machine}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100424}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100424}, doi = {10.1016/J.IJCIP.2021.100424}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SafariPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Sellevag21, author = {Stig Rune Sellev{\aa}g}, title = {Changes in inoperability for interdependent industry sectors in Norway from 2012 to 2017}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {32}, pages = {100405}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2020.100405}, doi = {10.1016/J.IJCIP.2020.100405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Sellevag21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SilvaPCM21, author = {Rovedy Aparecida Busquim e Silva and Jos{\'{e}} Roberto Castilho Piqueira and J. J. Cruz and R. P. Marques}, title = {Cybersecurity Assessment Framework for Digital Interface Between Safety and Security at Nuclear Power Plants}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100453}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100453}, doi = {10.1016/J.IJCIP.2021.100453}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/SilvaPCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SinghM21, author = {Neeraj Kumar Singh and Vasundhara Mahajan}, title = {End-User Privacy Protection Scheme from cyber intrusion in smart grid advanced metering infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100410}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100410}, doi = {10.1016/J.IJCIP.2021.100410}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SinghM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SoaresASG21, author = {Nielson Soares and Eduardo Pestana de Aguiar and Amanda Campos Souza and Leonardo Goliatt}, title = {Unsupervised machine learning techniques to prevent faults in railroad switch machines}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100423}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100423}, doi = {10.1016/J.IJCIP.2021.100423}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/SoaresASG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SohouenouN21, author = {Philippe Y. R. Sohouenou and Luis A. C. Neves}, title = {Assessing the effects of link-repair sequences on road network resilience}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100448}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100448}, doi = {10.1016/J.IJCIP.2021.100448}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SohouenouN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TornyeviadziNMS21, author = {Hoese Michel Tornyeviadzi and Fabrice Abunde Neba and Hadi Mohammed and Razak Seidu}, title = {Nodal vulnerability assessment of water distribution networks: An integrated Fuzzy {AHP-TOPSIS} approach}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100434}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100434}, doi = {10.1016/J.IJCIP.2021.100434}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/TornyeviadziNMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/VavraHLD21, author = {Jan V{\'{a}}vra and Martin Hromada and Ludek Luk{\'{a}}s and Jacek Dworzecki}, title = {Adaptive anomaly detection system based on machine learning algorithms in an industrial control environment}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100446}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100446}, doi = {10.1016/J.IJCIP.2021.100446}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/VavraHLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WangGLZ21, author = {Shuliang Wang and Xifeng Gu and Shengyang Luan and Mingwei Zhao}, title = {Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100459}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100459}, doi = {10.1016/J.IJCIP.2021.100459}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/WangGLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Williams21, author = {James Bryan Williams}, title = {Critical flow centrality measures on interdependent networks with time-varying demands}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100462}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100462}, doi = {10.1016/J.IJCIP.2021.100462}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Williams21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/YadavP21, author = {Geeta Yadav and Kolin Paul}, title = {Architecture and security of {SCADA} systems: {A} review}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100433}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100433}, doi = {10.1016/J.IJCIP.2021.100433}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/YadavP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZhangN21, author = {Yifan Zhang and S. Thomas Ng}, title = {A hypothesis-driven framework for resilience analysis of public transport network under compound failure scenarios}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {35}, pages = {100455}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100455}, doi = {10.1016/J.IJCIP.2021.100455}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ZhangN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AbediR20, author = {Amin Abedi and Franco Romerio}, title = {Multi-period vulnerability analysis of power grids under multiple outages: An AC-based bilevel optimization approach}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {30}, pages = {100365}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100365}, doi = {10.1016/J.IJCIP.2020.100365}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/AbediR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AhmadianSS20, author = {Mohammad Mehdi Ahmadian and Mehdi Shajari and Mohammad Ali Shafiee}, title = {Industrial control system security taxonomic framework with application to a comprehensive incidents survey}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {29}, pages = {100356}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100356}, doi = {10.1016/J.IJCIP.2020.100356}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/AhmadianSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AoudiA20, author = {Wissam Aoudi and Magnus Almgren}, title = {A scalable specification-agnostic multi-sensor anomaly detection system for IIoT environments}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {30}, pages = {100377}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100377}, doi = {10.1016/J.IJCIP.2020.100377}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/AoudiA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Cavalieri20, author = {Francesco Cavalieri}, title = {Seismic risk assessment of natural gas networks with steady-state flow computation}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100339}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100339}, doi = {10.1016/J.IJCIP.2020.100339}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Cavalieri20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChoubinehWC20, author = {Abouzar Choubineh and David A. Wood and Zahak Choubineh}, title = {Applying separately cost-sensitive learning and Fisher's discriminant analysis to address the class imbalance problem: {A} case study involving a virtual gas pipeline {SCADA} system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {29}, pages = {100357}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100357}, doi = {10.1016/J.IJCIP.2020.100357}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ChoubinehWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FangFD20, author = {Yuanjie Fang and Minrui Fei and Dajun Du}, title = {Linear time invariant system fault isolation: {A} static compensation decoupling method}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {31}, pages = {100392}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100392}, doi = {10.1016/J.IJCIP.2020.100392}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/FangFD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FaramondiOS20, author = {Luca Faramondi and Gabriele Oliva and Roberto Setola}, title = {Multi-criteria node criticality assessment framework for critical infrastructure networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100338}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100338}, doi = {10.1016/J.IJCIP.2020.100338}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/FaramondiOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GentileMNB20, author = {Ugo Gentile and Stefano Marrone and Roberto Nardone and Emanuele Bellini}, title = {Computer-aided security assessment of water networks monitoring platforms}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {31}, pages = {100390}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100390}, doi = {10.1016/J.IJCIP.2020.100390}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/GentileMNB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GonzalezDM20, author = {Santiago G. Gonz{\'{a}}lez and Sebasti{\'{a}}n Dormido and Jos{\'{e}} S{\'{a}}nchez Moreno}, title = {Obtaining high preventive and resilience capacities in critical infrastructure by industrial automation cells}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {29}, pages = {100355}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100355}, doi = {10.1016/J.IJCIP.2020.100355}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/GonzalezDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KampovaLR20, author = {Katar{\'{\i}}na Kampov{\'{a}} and Tom{\'{a}}s Lovecek and David Rehak}, title = {Quantitative approach to physical protection systems assessment of critical infrastructure elements: Use case in the Slovak Republic}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {30}, pages = {100376}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100376}, doi = {10.1016/J.IJCIP.2020.100376}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KampovaLR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KraidiSMB20, author = {Layth Kraidi and Raj Shah and Wilfred Matipa and Fiona Borthwick}, title = {Using stakeholders' judgement and fuzzy logic theory to analyze the risk influencing factors in oil and gas pipeline projects: Case study in Iraq, Stage {II}}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100337}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100337}, doi = {10.1016/J.IJCIP.2020.100337}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KraidiSMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LiuHLT20, author = {Wu Liu and Longxuan Hui and Yuting Lu and Jinsong Tang}, title = {Developing an evaluation method for SCADA-Controlled urban gas infrastructure hierarchical design using multi-level fuzzy comprehensive evaluation}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {30}, pages = {100375}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100375}, doi = {10.1016/J.IJCIP.2020.100375}, timestamp = {Wed, 11 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LiuHLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LoLHCT20, author = {Huai{-}Wei Lo and James Jiann{-}Haw Liou and Chun{-}Nen Huang and Yen{-}Ching Chuang and Gwo{-}Hshiung Tzeng}, title = {A new soft computing approach for analyzing the influential relationships of critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100336}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2019.100336}, doi = {10.1016/J.IJCIP.2019.100336}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LoLHCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/NdondaS20, author = {Gorby Kabasele Ndonda and Ramin Sadre}, title = {Network trace generation for flow-based {IDS} evaluation in control and automation systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {31}, pages = {100385}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100385}, doi = {10.1016/J.IJCIP.2020.100385}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/NdondaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/OttenburgerCJBT20, author = {Sadeeb Simon Ottenburger and H{\"{u}}seyin Kem{\^{a}}l {\c{C}}akmak and Wilfried Jakob and Andreas Blattmann and Dmytro Trybushnyi and Wolfgang Raskob and Uwe G. K{\"{u}}hnapfel and Veit Hagenmeyer}, title = {A novel optimization method for urban resilient and fair power distribution preventing critical network states}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {29}, pages = {100354}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100354}, doi = {10.1016/J.IJCIP.2020.100354}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/OttenburgerCJBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PetersenLFSLTB20, author = {Laura Petersen and Emma Lundin and Laure Fallou and Johan Sj{\"{o}}str{\"{o}}m and David Lange and Rui Teixeira and Alexandre Bonavita}, title = {Resilience for whom? The general public's tolerance levels as {CI} resilience criteria}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100340}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100340}, doi = {10.1016/J.IJCIP.2020.100340}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/PetersenLFSLTB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RamanSM20, author = {M. R. Gauthama Raman and Nivethitha Somu and Aditya P. Mathur}, title = {A multilayer perceptron model for anomaly detection in water treatment plants}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {31}, pages = {100393}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100393}, doi = {10.1016/J.IJCIP.2020.100393}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/RamanSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ShresthaJNR20, author = {Manish Shrestha and Christian Johansen and Josef Noll and Davide Roverso}, title = {A Methodology for Security Classification applied to Smart Grid Infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100342}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100342}, doi = {10.1016/J.IJCIP.2020.100342}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ShresthaJNR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SohouenouCCNP20, author = {Philippe Y. R. Sohouenou and Panayotis Christidis and Aris Christodoulou and Luis A. C. Neves and Davide Lo Presti}, title = {Using a random road graph model to understand road networks robustness to link failures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {29}, pages = {100353}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100353}, doi = {10.1016/J.IJCIP.2020.100353}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/SohouenouCCNP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Strous20, author = {Leon Strous}, title = {{IJCIP} Editorial March 2020 - Volume 28}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100343}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100343}, doi = {10.1016/J.IJCIP.2020.100343}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Strous20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Strous20a, author = {Leon Strous}, title = {{IJCIP} Editorial June 2020 - Volume 29}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {29}, pages = {100366}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100366}, doi = {10.1016/J.IJCIP.2020.100366}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Strous20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/UmerMJA20, author = {Muhammad Azmi Umer and Aditya Mathur and Khurum Nazir Junejo and Sridhar Adepu}, title = {Generating invariants using design and data-centric approaches for distributed attack detection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {28}, pages = {100341}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100341}, doi = {10.1016/J.IJCIP.2020.100341}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/UmerMJA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZhangASZH20, author = {Yanjie Zhang and Bilal M. Ayyub and Yalda Saadat and Dongming Zhang and Hongwei Huang}, title = {A double-weighted vulnerability assessment model for metrorail transit networks and its application in Shanghai metro}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {29}, pages = {100358}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100358}, doi = {10.1016/J.IJCIP.2020.100358}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ZhangASZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZhengDLLZ20, author = {Jianqin Zheng and Yuanhao Dai and Yongtu Liang and Qi Liao and Haoran Zhang}, title = {An online real-time estimation tool of leakage parameters for hazardous liquid pipelines}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {31}, pages = {100389}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100389}, doi = {10.1016/J.IJCIP.2020.100389}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ZhengDLLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZhouYNXL20, author = {Shenghua Zhou and Yifan Yang and S. Thomas Ng and J. Frank Xu and Dezhi Li}, title = {Integrating data-driven and physics-based approaches to characterize failures of interdependent infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {31}, pages = {100391}, year = {2020}, url = {https://doi.org/10.1016/j.ijcip.2020.100391}, doi = {10.1016/J.IJCIP.2020.100391}, timestamp = {Thu, 14 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ZhouYNXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Ali19, author = {Busyairah Syd Ali}, title = {Traffic management for drones flying in the city}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100310}, doi = {10.1016/J.IJCIP.2019.100310}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Ali19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BarretoCHPR19, author = {Carlos A. Barreto and Alvaro A. C{\'{a}}rdenas and Jennifer S. Holmes and Agustin Palao and Juan Carlos Restrepo}, title = {A business that can't lose: Investing in attacks against the Colombian power grid}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.05.006}, doi = {10.1016/J.IJCIP.2019.05.006}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BarretoCHPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BellRP19, author = {Alison J. C. Bell and M. Brooke Rogers and Julia M. Pearce}, title = {The insider threat: Behavioral indicators and factors influencing likelihood of intervention}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {166--176}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.12.001}, doi = {10.1016/J.IJCIP.2018.12.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BellRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/CBASI19, author = {Pramod T. C and Kianoosh G. Boroojeni and M. Hadi Amini and N. R. Sunitha and S. S. Iyengar}, title = {Key pre-distribution scheme with join leave support for {SCADA} systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {111--125}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.10.011}, doi = {10.1016/J.IJCIP.2018.10.011}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/CBASI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/DemirNS19, author = {Kubilay Demir and Ferdaus Nayyer and Neeraj Suri}, title = {{MPTCP-H:} {A} DDoS attack resilient transport protocol to secure wide area measurement systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {84--101}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.02.003}, doi = {10.1016/J.IJCIP.2019.02.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/DemirNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FarsiFT19, author = {Hamed Farsi and Ali Fanian and Zahra Taghiyarrenani}, title = {A novel online state-based anomaly detection system for process control networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {27}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100323}, doi = {10.1016/J.IJCIP.2019.100323}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/FarsiFT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GalbraithI19, author = {John W. Galbraith and Luca Iuliani}, title = {Measures of robustness for networked critical infrastructure: An empirical comparison on four electrical grids}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {27}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100326}, doi = {10.1016/J.IJCIP.2019.100326}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GalbraithI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GariupP19, author = {Monica Gariup and Jakub Piskorski}, title = {The challenge of detecting false documents at the border: Exploring the performance of humans, machines and their interaction}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {100--110}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.10.005}, doi = {10.1016/J.IJCIP.2018.10.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GariupP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GazizulinCBK19, author = {Dmitri Gazizulin and Evyatar Cohen and Jacob Bortman and Renata Klein}, title = {Critical rotating machinery protection by integration of a "fuse" bearing}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {27}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100305}, doi = {10.1016/J.IJCIP.2019.100305}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/GazizulinCBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Ghavami19, author = {Seyed Morsal Ghavami}, title = {Multi-criteria spatial decision support system for identifying strategic roads in disaster situations}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {23--36}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.10.004}, doi = {10.1016/J.IJCIP.2018.10.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Ghavami19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GravetoRCS19, author = {Vitor Graveto and Lu{\'{\i}}s Rosa and Tiago Cruz and Paulo Sim{\~{o}}es}, title = {A stealth monitoring mechanism for cyber-physical systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {126--143}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.10.006}, doi = {10.1016/J.IJCIP.2018.10.006}, timestamp = {Fri, 12 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GravetoRCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HallerGD19, author = {Piroska Haller and B{\'{e}}la Genge and Adrian{-}Vasile Duka}, title = {On the practical integration of anomaly detection techniques in industrial control applications}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {48--68}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.10.008}, doi = {10.1016/J.IJCIP.2018.10.008}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HallerGD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HanPL19, author = {Choong{-}Hee Han and Soon{-}Tai Park and Sang{-}Joon Lee}, title = {The Enhanced Security Control model for critical infrastructures with the blocking prioritization process to cyber threats in power system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100312}, doi = {10.1016/J.IJCIP.2019.100312}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HanPL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HanZ19, author = {Fangyuan Han and Enrico Zio}, title = {A multi-perspective framework of analysis of critical infrastructures with respect to supply service, controllability and topology}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {1--13}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.10.009}, doi = {10.1016/J.IJCIP.2018.10.009}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HanZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HerreraM19, author = {Luis{-}Carlos Herrera and Olaf Maennel}, title = {A comprehensive instrument for identifying critical information infrastructure services}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {50--61}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.02.001}, doi = {10.1016/J.IJCIP.2019.02.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HerreraM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HossainJHMB19, author = {Niamat Ullah Ibne Hossain and Ra'ed M. Jaradat and Seyedmohsen Hosseini and Mohammad Marufuzzaman and Randy K. Buchanan}, title = {A framework for modeling and assessing system resilience using a Bayesian network: {A} case study of an interdependent electrical infrastructure system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {62--83}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.02.002}, doi = {10.1016/J.IJCIP.2019.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HossainJHMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KimaniOL19, author = {Kenneth Kimani and Vitalice Oduol and Kibet Langat}, title = {Cyber security challenges for IoT-based smart grid networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {36--49}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.01.001}, doi = {10.1016/J.IJCIP.2019.01.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KimaniOL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KleinK19, author = {Peter Klein and Fabian Klein}, title = {Dynamics of interdependent critical infrastructures - {A} mathematical model with unexpected results}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {69--77}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.11.002}, doi = {10.1016/J.IJCIP.2018.11.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KleinK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KraidiSMB19, author = {Layth Kraidi and Raj Shah and Wilfred Matipa and Fiona Borthwick}, title = {Analyzing the critical risk factors associated with oil and gas pipeline projects in Iraq}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {14--22}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.10.010}, doi = {10.1016/J.IJCIP.2018.10.010}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KraidiSMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LandegrenJS19, author = {Finn Erik Landegren and Jonas Johansson and Olof Samuelsson}, title = {Quality of supply regulations versus societal priorities regarding electricity outage consequences: Case study in a Swedish context}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100307}, doi = {10.1016/J.IJCIP.2019.100307}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LandegrenJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LiFLXNZ19, author = {Zhengbing Li and Huixia Feng and Yongtu Liang and Ning Xu and Siming Nie and Haoran Zhang}, title = {A leakage risk assessment method for hazardous liquid pipeline based on Markov chain Monte Carlo}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {27}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100325}, doi = {10.1016/J.IJCIP.2019.100325}, timestamp = {Fri, 26 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LiFLXNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LiW19, author = {Tengyao Li and Buhong Wang}, title = {Sequential collaborative detection strategy on {ADS-B} data attack}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {78--99}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.11.003}, doi = {10.1016/J.IJCIP.2018.11.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LiW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Mao0P19, author = {Quan Mao and Nan Li and Feniosky Pe{\~{n}}a{-}Mora}, title = {Quality function deployment-based framework for improving the resilience of critical infrastructure systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100304}, doi = {10.1016/J.IJCIP.2019.100304}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Mao0P19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MishraPM19, author = {Vishrut Kumar Mishra and Venkata Reddy Palleti and Aditya Mathur}, title = {A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.05.001}, doi = {10.1016/J.IJCIP.2019.05.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/MishraPM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RanabhatCGHY19, author = {Bikash Ranabhat and Joseph Clements and Jacob Gatlin and Kuang{-}Ting Hsiao and Mark Yampolskiy}, title = {Optimal sabotage attack on composite material parts}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.05.004}, doi = {10.1016/J.IJCIP.2019.05.004}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RanabhatCGHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RehakSHL19, author = {David Rehak and Pavel Senovsky and Martin Hromada and Tom{\'{a}}s Lovecek}, title = {Complex approach to assessing resilience of critical infrastructure elements}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {125--138}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.03.003}, doi = {10.1016/J.IJCIP.2019.03.003}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/RehakSHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Robles-DuraznoM19, author = {Andres Robles{-}Durazno and Naghmeh Moradpoor and James McWhinnie and Gordon Russell and Inaki Maneru{-}Marin}, title = {{PLC} memory attack detection and response in a clean water supply system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.05.003}, doi = {10.1016/J.IJCIP.2019.05.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Robles-DuraznoM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RodofileRF19, author = {Nicholas R. Rodofile and Kenneth Radke and Ernest Foo}, title = {Extending the cyber-attack landscape for SCADA-based critical infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {14--35}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.01.002}, doi = {10.1016/J.IJCIP.2019.01.002}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/RodofileRF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SandorGSMH19, author = {Hunor S{\'{a}}ndor and B{\'{e}}la Genge and Zolt{\'{a}}n Sz{\'{a}}nt{\'{o}} and Lorinc M{\'{a}}rton and Piroska Haller}, title = {Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {152--168}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.04.002}, doi = {10.1016/J.IJCIP.2019.04.002}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/SandorGSMH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SaraeianSM19, author = {Shideh Saraeian and Babak Shirazi and Homayun Motameni}, title = {Adaptive control of criticality infrastructure in automatic closed-loop supply chain considering uncertainty}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {102--124}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.02.004}, doi = {10.1016/J.IJCIP.2019.02.004}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/SaraeianSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ShengliY19, author = {Shengli Liu and Yongtu Liang}, title = {Exploring the temporal structure of time series data for hazardous liquid pipeline incidents based on complex network theory}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100308}, doi = {10.1016/J.IJCIP.2019.100308}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ShengliY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Sportiello19, author = {Luigi Sportiello}, title = {"Internet of Smart Cards": {A} pocket attacks scenario}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.05.005}, doi = {10.1016/J.IJCIP.2019.05.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Sportiello19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StockmanDGP19, author = {Melissa Stockman and Dipankar Dwivedi and Reinhard Gentz and Sean Peisert}, title = {Detecting control system misbehavior by fingerprinting programmable logic controller functionality}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100306}, doi = {10.1016/J.IJCIP.2019.100306}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/StockmanDGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Strous19, author = {Leon Strous}, title = {{IJCIP} Editorial March 2019 - Volume 24}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {iii--iv}, year = {2019}, url = {https://doi.org/10.1016/S1874-5482(19)30022-8}, doi = {10.1016/S1874-5482(19)30022-8}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Strous19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Strous19a, author = {Leon Strous}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {iii--v}, year = {2019}, url = {https://doi.org/10.1016/S1874-5482(19)30072-1}, doi = {10.1016/S1874-5482(19)30072-1}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Strous19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Strous19b, author = {Leon Strous}, title = {{IJCIP} Editorial December 2019 - Volume 27}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {27}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100333}, doi = {10.1016/J.IJCIP.2019.100333}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Strous19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SugumarM19, author = {Gayathri Sugumar and Aditya Mathur}, title = {A method for testing distributed anomaly detectors}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {27}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.100324}, doi = {10.1016/J.IJCIP.2019.100324}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SugumarM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ThompsonFNCHR19, author = {James R. Thompson and Damon Frezza and Burhan Necioglu and Michael L. Cohen and Kenneth C. Hoffman and Kristine Rosfjord}, title = {Interdependent Critical Infrastructure Model {(ICIM):} An agent-based model of power and water infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {144--165}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.12.002}, doi = {10.1016/J.IJCIP.2018.12.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ThompsonFNCHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Tichy19, author = {Luk{\'{a}}s Tich{\'{y}}}, title = {Energy infrastructure as a target of terrorist attacks from the Islamic state in Iraq and Syria}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {1--13}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.01.003}, doi = {10.1016/J.IJCIP.2019.01.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Tichy19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TidwellLBGPM19, author = {Vincent C. Tidwell and Thomas S. Lowry and David Binning and Jenny Graves and William J. Peplinski and Roger Mitchell}, title = {Framework for shared drinking water risk assessment}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {24}, pages = {37--47}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2018.10.007}, doi = {10.1016/J.IJCIP.2018.10.007}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/TidwellLBGPM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TomaszewskiRMZ19, author = {Michal Tomaszewski and Bogdan Ruszczak and Pawel Michalski and Slawomir Zator}, title = {The study of weather conditions favourable to the accretion of icing that pose a threat to transmission power lines}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {25}, pages = {139--151}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.04.001}, doi = {10.1016/J.IJCIP.2019.04.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/TomaszewskiRMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WangZ0S19, author = {Fei Wang and Xia{-}zhong Zheng and Nan Li and Xuesong Shen}, title = {Systemic vulnerability assessment of urban water distribution networks considering failure scenario uncertainty}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {26}, year = {2019}, url = {https://doi.org/10.1016/j.ijcip.2019.05.002}, doi = {10.1016/J.IJCIP.2019.05.002}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WangZ0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AdamskyABCCCGFG18, author = {Florian Adamsky and Matthieu Aubigny and Federica Battisti and Marco Carli and Federico Cimorelli and Tiago Cruz and Alessandro Di Giorgio and Chiara Foglietta and A. Galli and Alessandro Giuseppi and Francesco Liberati and Alessandro Neri and Stefano Panzieri and Federica Pascucci and Jorge Proen{\c{c}}a and P. Pucci and Lu{\'{\i}}s Rosa and Ridha Soua}, title = {Integrated protection of industrial control systems from cyber-attacks: the {ATENA} approach}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {21}, pages = {72--82}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.04.004}, doi = {10.1016/J.IJCIP.2018.04.004}, timestamp = {Thu, 08 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/AdamskyABCCCGFG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AichhornEUMS18, author = {Andreas Aichhorn and Bernhard Etzlinger and Andreas Unterweger and Ren{\'{e}} Mayrhofer and Andreas Springer}, title = {Design, implementation, and evaluation of secure communication for line current differential protection systems over packet switched networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {68--78}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.06.005}, doi = {10.1016/J.IJCIP.2018.06.005}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/AichhornEUMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BaldiniSCM18, author = {Gianmarco Baldini and Luigi Sportiello and Michel Chiaramello and Vincent Mahieu}, title = {Regulated applications for the road transportation infrastructure: The case study of the smart tachograph in the European Union}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {21}, pages = {3--21}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.02.001}, doi = {10.1016/J.IJCIP.2018.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BaldiniSCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BalogluD18, author = {Ulas Baran Baloglu and Yakup Demir}, title = {Lightweight privacy-preserving data aggregation scheme for smart grid metering infrastructure protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {16--24}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.04.005}, doi = {10.1016/J.IJCIP.2018.04.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BalogluD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BanerjeeBS18, author = {Joydeep Banerjee and Kaustav Basu and Arunabha Sen}, title = {On hardening problems in critical infrastructure systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {49--67}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.08.001}, doi = {10.1016/J.IJCIP.2018.08.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BanerjeeBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/CherifiH18, author = {Tarek Cherifi and Latifa Hamami}, title = {A practical implementation of unconditional security for the {IEC} 60780-5-101 {SCADA} protocol}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {20}, pages = {68--84}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2017.12.001}, doi = {10.1016/J.IJCIP.2017.12.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/CherifiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ClotetML18, author = {Xavier Clotet and Jos{\'{e}} Moyano and Gladys Le{\'{o}}n}, title = {A real-time anomaly-based {IDS} for cyber-attack detection at the industrial process level of Critical Infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {11--20}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.08.002}, doi = {10.1016/J.IJCIP.2018.08.002}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ClotetML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/DemirIVS18, author = {Kubilay Demir and Hatem Ismail and Tsvetoslava Vateva{-}Gurova and Neeraj Suri}, title = {Securing the cloud-assisted smart grid}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {100--111}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.08.004}, doi = {10.1016/J.IJCIP.2018.08.004}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/DemirIVS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FaramondiSPPO18, author = {Luca Faramondi and Roberto Setola and Stefano Panzieri and Federica Pascucci and Gabriele Oliva}, title = {Finding critical nodes in infrastructure networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {20}, pages = {3--15}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2017.11.004}, doi = {10.1016/J.IJCIP.2017.11.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/FaramondiSPPO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GhalebZA18, author = {Asem Ghaleb and Sami Zhioua and Ahmad Almulhem}, title = {On {PLC} network security}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {62--69}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.05.004}, doi = {10.1016/J.IJCIP.2018.05.004}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GhalebZA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Guo18, author = {Meirong Guo}, title = {China's cybersecurity legislation, it's relevance to critical infrastructures and the challenges it faces}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {139--149}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.06.006}, doi = {10.1016/J.IJCIP.2018.06.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Guo18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Hagen18, author = {Janne Merete Hagen}, title = {Building resilience against cyber threats in the energy sector}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {20}, pages = {26--27}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2017.11.003}, doi = {10.1016/J.IJCIP.2017.11.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Hagen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Harasta18, author = {Jakub Harasta}, title = {Legally critical: Defining critical infrastructure in an interconnected world}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {21}, pages = {47--56}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.05.007}, doi = {10.1016/J.IJCIP.2018.05.007}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Harasta18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/IslamAI18, author = {Md. Shafiqul Islam and Md. Mobasher Ahmed and Saad Islam}, title = {A conceptual system architecture for countering the civilian unmanned aerial vehicles threat to nuclear facilities}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {139--149}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.10.003}, doi = {10.1016/J.IJCIP.2018.10.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/IslamAI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JieWFDSY18, author = {Xinchun Jie and Haikuan Wang and Minrui Fei and Dajun Du and Qing Sun and Tai C. Yang}, title = {Anomaly behavior detection and reliability assessment of control systems based on association rules}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {90--99}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.06.001}, doi = {10.1016/J.IJCIP.2018.06.001}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/JieWFDSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KabirRAAB18, author = {Muhammad Nomani Kabir and Md. Arafatur Rahman and Saiful Azad and Mohamed Mostafa A. Azim and Md. Zakirul Alam Bhuiyan}, title = {A connection probability model for communications networks under regional failures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {20}, pages = {16--25}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2017.11.002}, doi = {10.1016/J.IJCIP.2017.11.002}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KabirRAAB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KauerKT18, author = {Florian Kauer and Emil Kallias and Volker Turau}, title = {A dual-radio approach for reliable emergency signaling in critical infrastructure assets with large wireless networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {21}, pages = {33--46}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.02.002}, doi = {10.1016/J.IJCIP.2018.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KauerKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KhaliliSKP18, author = {Abdullah Khalili and Ashkan Sami and Amin Khozaei and Saber Pouresmaeeli}, title = {{SIDS:} State-based intrusion detection for stage-based cyber physical systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {113--124}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.06.003}, doi = {10.1016/J.IJCIP.2018.06.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KhaliliSKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LahzaRF18, author = {Hassan Fareed M. Lahza and Kenneth Radke and Ernest Foo}, title = {Applying domain-specific knowledge to construct features for detecting distributed denial-of-service attacks on the {GOOSE} and {MMS} protocols}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {20}, pages = {48--67}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2017.12.002}, doi = {10.1016/J.IJCIP.2017.12.002}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LahzaRF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LamT18, author = {Chi Yung Lam and Kang Tai}, title = {Modeling infrastructure interdependencies by integrating network and fuzzy set theory}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {51--61}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.05.005}, doi = {10.1016/J.IJCIP.2018.05.005}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LamT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LandegrenHM18, author = {Finn Erik Landegren and Martin H{\"{o}}st and Peter M{\"{o}}ller}, title = {Simulation based assessment of resilience of two large-scale socio-technical {IT} networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {112--125}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.08.003}, doi = {10.1016/J.IJCIP.2018.08.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LandegrenHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Leszczyna18, author = {Rafal Leszczyna}, title = {Standards on cyber security assessment of smart grid}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {70--89}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.05.006}, doi = {10.1016/J.IJCIP.2018.05.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Leszczyna18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LiuWZWY18, author = {Kai Liu and Ming Wang and Weihua Zhu and Jinshan Wu and Xiaoyong Yan}, title = {Vulnerability analysis of an urban gas pipeline network considering pipeline-road dependency}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {79--89}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.08.008}, doi = {10.1016/J.IJCIP.2018.08.008}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LiuWZWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MohandesHSMK18, author = {Baraa Mohandes and Reem Al Hammadi and Wasiu Sanusi and Toufic Mezher and Sameh El Khatib}, title = {Advancing cyber-physical sustainability through integrated analysis of smart power systems: {A} case study on electric vehicles}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {33--48}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.10.002}, doi = {10.1016/J.IJCIP.2018.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/MohandesHSMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PalletiJS18, author = {Venkata Reddy Palleti and Jude Victor Joseph and Arlindo Silva}, title = {A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {21--32}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.08.007}, doi = {10.1016/J.IJCIP.2018.08.007}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/PalletiJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PsaltoglouC18, author = {Artemis Psaltoglou and Eusebi Calle}, title = {Enhanced connectivity index - {A} new measure for identifying critical points in urban public transportation networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {21}, pages = {22--32}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.02.003}, doi = {10.1016/J.IJCIP.2018.02.003}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/PsaltoglouC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PuuskaRTLKOV18, author = {Samir Puuska and Lauri Rummukainen and Jussi Timonen and Lauri Laaperi and Markus Klemetti and Lauri Oksama and Jouko Vankka}, title = {Nationwide critical infrastructure monitoring using a common operating picture framework}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {20}, pages = {28--47}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2017.11.005}, doi = {10.1016/J.IJCIP.2017.11.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/PuuskaRTLKOV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RamezaniMSH18, author = {Abouzar Ramezani and Mohammad Reza Malek and Habib Sahami and Reza Hosnavi}, title = {Developing a spatial methodology to reduce the vulnerability of critical infrastructures against intelligent air-based threats}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {126--138}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.10.001}, doi = {10.1016/J.IJCIP.2018.10.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/RamezaniMSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RebahiCTHPM18, author = {Yacine Rebahi and Kin Tsun Chiu and Nikolay Tcholtchev and Simon Hohberg and Evangelos Pallis and Evangelos K. Markakis}, title = {Towards a next generation 112 testbed: The {EMYNOS} ESInet}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {39--50}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.05.001}, doi = {10.1016/J.IJCIP.2018.05.001}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RebahiCTHPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RehakSHLN18, author = {David Rehak and Pavel Senovsky and Martin Hromada and Tom{\'{a}}s Lovecek and Petr Novotn{\'{y}}}, title = {Cascading Impact Assessment in a Critical Infrastructure System}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {125--138}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.06.004}, doi = {10.1016/J.IJCIP.2018.06.004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/RehakSHLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SeppanenLZTV18, author = {Hannes Sepp{\"{a}}nen and Pekka Luokkala and Zhe Zhang and Paulus Torkki and Kirsi Virrantaus}, title = {Critical infrastructure vulnerability - {A} method for identifying the infrastructure service failure interdependencies}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {25--38}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.05.002}, doi = {10.1016/J.IJCIP.2018.05.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SeppanenLZTV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi18, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {20}, pages = {1--2}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.02.004}, doi = {10.1016/J.IJCIP.2018.02.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SkandhakumarRSD18, author = {Nimalaprakasan Skandhakumar and Jason Reid and Farzad Salim and Ed Dawson}, title = {A policy model for access control using building information models}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {1--10}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.08.005}, doi = {10.1016/J.IJCIP.2018.08.005}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/SkandhakumarRSD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Strous18, author = {Leon Strous}, title = {{IJCIP} Editorial June 2018}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {21}, pages = {1--2}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.05.003}, doi = {10.1016/J.IJCIP.2018.05.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Strous18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Strous18a, author = {Leon Strous}, title = {{IJCIP} Editorial December 2018 - Volume 23}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {iii--v}, year = {2018}, url = {https://doi.org/10.1016/S1874-5482(18)30172-0}, doi = {10.1016/S1874-5482(18)30172-0}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Strous18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TsavdaroglouABH18, author = {Margarita Tsavdaroglou and Saad H. S. Al{-}Jibouri and Thomas Bles and Johannes I. M. Halman}, title = {Proposed methodology for risk analysis of interdependent critical infrastructures to extreme weather events}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {21}, pages = {57--71}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.04.002}, doi = {10.1016/J.IJCIP.2018.04.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/TsavdaroglouABH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Verma18, author = {Pramode K. Verma}, title = {The natural impact of artificial intelligence}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {150--151}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.08.009}, doi = {10.1016/J.IJCIP.2018.08.009}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Verma18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZhaoLF18, author = {Chen Zhao and Nan Li and DongPing Fang}, title = {Criticality assessment of urban interdependent lifeline systems using a biased PageRank algorithm and a multilayer weighted directed network model}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {100--112}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.06.002}, doi = {10.1016/J.IJCIP.2018.06.002}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ZhaoLF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZimmermannWS18, author = {Martin Zimmermann and Martina Winker and Engelbert Schramm}, title = {Vulnerability analysis of critical infrastructures in the case of a semi-centralised water reuse system in Qingdao, China}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {22}, pages = {4--15}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.04.003}, doi = {10.1016/J.IJCIP.2018.04.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ZimmermannWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZouYZBTWY18, author = {Bowen Zou and Ming Yang and Yuxin Zhang and Emi{-}Reynolds Benjamin and Ke Tan and Wenfei Wu and Hidekazu Yoshikawa}, title = {Evaluation of vulnerable path: Using heuristic path-finding algorithm in physical protection system of nuclear power plant}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {23}, pages = {90--99}, year = {2018}, url = {https://doi.org/10.1016/j.ijcip.2018.08.006}, doi = {10.1016/J.IJCIP.2018.08.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ZouYZBTWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ArroyoBGR17, author = {Jose R. Gutierrez del Arroyo and Jason M. Bindewald and Scott R. Graham and Mason Rice}, title = {Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {18}, pages = {58--70}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.03.006}, doi = {10.1016/J.IJCIP.2017.03.006}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ArroyoBGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BrownSV17, author = {Charlotte Brown and Erica Seville and John J. Vargo}, title = {Measuring the organizational resilience of critical infrastructure providers: {A} New Zealand case study}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {18}, pages = {37--49}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.05.002}, doi = {10.1016/J.IJCIP.2017.05.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BrownSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChavesRDP17, author = {Andrew Chaves and Mason Rice and Stephen Dunlap and John M. Pecarina}, title = {Improving the cyber resilience of industrial control systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {17}, pages = {30--48}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.03.005}, doi = {10.1016/J.IJCIP.2017.03.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ChavesRDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FialkoffOPT17, author = {Marc R. Fialkoff and Olufemi A. Omitaomu and Steven K. Peterson and Mark A. Tuttle}, title = {Using geographic information science to evaluate legal restrictions on freight transportation routing in disruptive scenarios}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {17}, pages = {60--74}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2016.12.001}, doi = {10.1016/J.IJCIP.2016.12.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/FialkoffOPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HansenSS17, author = {Aaron Hansen and Jason Staggs and Sujeet Shenoi}, title = {Security analysis of an advanced metering infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {18}, pages = {3--19}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.03.004}, doi = {10.1016/J.IJCIP.2017.03.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HansenSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JannatiB17, author = {Hoda Jannati and Behnam Bahrak}, title = {An improved authentication protocol for distributed mobile cloud computing services}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {19}, pages = {59--67}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.10.003}, doi = {10.1016/J.IJCIP.2017.10.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/JannatiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JarmakiewiczPM17, author = {Jacek Jarmakiewicz and Krzysztof Parobczak and Krzysztof Maslanka}, title = {Cybersecurity protection for power grid control infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {18}, pages = {20--33}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.07.002}, doi = {10.1016/J.IJCIP.2017.07.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/JarmakiewiczPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KumariS17, author = {Anita Kumari and Anil Kumar Sharma}, title = {Infrastructure financing and development: {A} bibliometric review}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {16}, pages = {49--65}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2016.11.005}, doi = {10.1016/J.IJCIP.2016.11.005}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KumariS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LiuZZ17, author = {Xiaoxue Liu and Jiexin Zhang and Peidong Zhu}, title = {Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {16}, pages = {13--25}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2016.11.002}, doi = {10.1016/J.IJCIP.2016.11.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LiuZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LombardiHAK17, author = {Pio Lombardi and Kathleen H{\"{a}}nsch and Bartlomiej Arendarski and Przemyslaw Komarnicki}, title = {Information and power terminals: {A} reliable microgrid infrastructure for use in disaster scenarios}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {19}, pages = {49--58}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.10.005}, doi = {10.1016/J.IJCIP.2017.10.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LombardiHAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Luiijf17, author = {H. A. M. (Eric) Luiijf}, title = {Smart grids: And the bad news is?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {18}, pages = {34--36}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.07.003}, doi = {10.1016/J.IJCIP.2017.07.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Luiijf17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ManeshK17, author = {Mohsen Riahi Manesh and Naima Kaabouch}, title = {Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast {(ADS-B)} system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {19}, pages = {16--31}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.10.002}, doi = {10.1016/J.IJCIP.2017.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ManeshK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Martin-LirasPFA17, author = {Luis Mart{\'{\i}}n{-}Liras and Miguel A. Prada and Juan J. Fuertes{-}Mart{\'{\i}}nez and Antonio Mor{\'{a}}n {\'{A}}lvarez and Seraf{\'{\i}}n Alonso and Manuel Dom{\'{\i}}nguez{-}Gonz{\'{a}}lez}, title = {Comparative analysis of the security of configuration protocols for industrial control devices}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {19}, pages = {4--15}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.10.001}, doi = {10.1016/J.IJCIP.2017.10.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Martin-LirasPFA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Moore17, author = {Tyler Moore}, title = {On the harms arising from the Equifax data breach of 2017}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {19}, pages = {47--48}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.10.004}, doi = {10.1016/J.IJCIP.2017.10.004}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Moore17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Peter17, author = {Ada S. Peter}, title = {Cyber resilience preparedness of Africa's top-12 emerging economies}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {17}, pages = {49--59}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.03.002}, doi = {10.1016/J.IJCIP.2017.03.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Peter17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Romero-FazC17, author = {David Romero{-}Faz and Alberto Camarero{-}Orive}, title = {Risk assessment of critical infrastructures - New parameters for commercial ports}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {18}, pages = {50--57}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.07.001}, doi = {10.1016/J.IJCIP.2017.07.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Romero-FazC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RuedaC17, author = {Diego F. Rueda and Eusebi Calle}, title = {Using interdependency matrices to mitigate targeted attacks on interdependent networks: {A} case study involving a power grid and backbone telecommunications networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {16}, pages = {3--12}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2016.11.004}, doi = {10.1016/J.IJCIP.2016.11.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/RuedaC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Ryan17, author = {Daniel J. Ryan}, title = {Engineering sustainable critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {17}, pages = {28--29}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2016.11.003}, doi = {10.1016/J.IJCIP.2016.11.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Ryan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi17, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {16}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.02.001}, doi = {10.1016/J.IJCIP.2017.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi17a, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {17}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.05.001}, doi = {10.1016/J.IJCIP.2017.05.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi17b, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {18}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.08.001}, doi = {10.1016/J.IJCIP.2017.08.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi17c, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {19}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.11.001}, doi = {10.1016/J.IJCIP.2017.11.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi17c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SkorupskiU17, author = {Jacek Skorupski and Piotr Uchronski}, title = {A fuzzy model for evaluating metal detection equipment at airport security screening checkpoints}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {16}, pages = {39--48}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2016.11.001}, doi = {10.1016/J.IJCIP.2016.11.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SkorupskiU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StaggsFS17, author = {Jason Staggs and David F. Ferraiolo and Sujeet Shenoi}, title = {Wind farm security: attack surface, targets, scenarios and mitigation}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {17}, pages = {3--14}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.03.001}, doi = {10.1016/J.IJCIP.2017.03.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/StaggsFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StineRDP17, author = {Ian Stine and Mason Rice and Stephen Dunlap and John M. Pecarina}, title = {A cyber risk scoring system for medical devices}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {19}, pages = {32--46}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.04.001}, doi = {10.1016/J.IJCIP.2017.04.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/StineRDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Verma17, author = {Pramode K. Verma}, title = {Unconditional security through quantum uncertainty}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {16}, pages = {36--38}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2016.09.001}, doi = {10.1016/J.IJCIP.2016.09.001}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Verma17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WarnierDKP17, author = {Martijn Warnier and Stefan Dulman and Yakup Ko{\c{c}} and Eric J. Pauwels}, title = {Distributed monitoring for the prevention of cascading failures in operational power grids}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {17}, pages = {15--27}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2017.03.003}, doi = {10.1016/J.IJCIP.2017.03.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/WarnierDKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZhuZMZT17, author = {Ruijin Zhu and Baofeng Zhang and Junjie Mao and Quan{-}Xin Zhang and Yu{-}an Tan}, title = {A methodology for determining the image base of ARM-based industrial control system firmware}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {16}, pages = {26--35}, year = {2017}, url = {https://doi.org/10.1016/j.ijcip.2016.12.002}, doi = {10.1016/J.IJCIP.2016.12.002}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ZhuZMZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Ali16, author = {Busyairah Syd Ali}, title = {System specifications for developing an Automatic Dependent Surveillance-Broadcast {(ADS-B)} monitoring system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {15}, pages = {40--46}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.06.004}, doi = {10.1016/J.IJCIP.2016.06.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Ali16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BarbosaSP16, author = {Rafael Ramos Regis Barbosa and Ramin Sadre and Aiko Pras}, title = {Exploiting traffic periodicity in industrial control networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {13}, pages = {52--62}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.02.004}, doi = {10.1016/J.IJCIP.2016.02.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BarbosaSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BoumaRBJH16, author = {Henri Bouma and Jeroen van Rest and Kim van Buul{-}Besseling and Jacomien G. M. de Jong and Anton Havekes}, title = {Integrated roadmap for the rapid finding and tracking of people at large airports}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {12}, pages = {61--74}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2015.11.002}, doi = {10.1016/J.IJCIP.2015.11.002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BoumaRBJH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Bronk16, author = {Chris Bronk}, title = {Imagining the limits of complexity in computerized critical infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {15}, pages = {38--39}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.08.001}, doi = {10.1016/J.IJCIP.2016.08.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Bronk16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChopadeB16, author = {Pravin Chopade and Marwan Bikdash}, title = {New centrality measures for assessing smart grid vulnerabilities and predicting brownouts and blackouts}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {12}, pages = {29--45}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2015.12.001}, doi = {10.1016/J.IJCIP.2015.12.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ChopadeB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/DunlapBLRM16, author = {Stephen Dunlap and Jonathan Butts and Juan Lopez Jr. and Mason Rice and Barry E. Mullins}, title = {Using timing-based side channels for anomaly detection in industrial control systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {15}, pages = {12--26}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.07.003}, doi = {10.1016/J.IJCIP.2016.07.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/DunlapBLRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GengeHK16, author = {B{\'{e}}la Genge and Piroska Haller and Istv{\'{a}}n Kiss}, title = {A framework for designing resilient distributed intrusion detection systems for critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {15}, pages = {3--11}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.06.003}, doi = {10.1016/J.IJCIP.2016.06.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GengeHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Hagen16, author = {Janne Merete Hagen}, title = {Cyber security - The Norwegian way}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {14}, pages = {41--42}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.05.002}, doi = {10.1016/J.IJCIP.2016.05.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Hagen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KarabacakYB16, author = {Bilge Karabacak and Sevgi {\"{O}}zkan Yildirim and Nazife Baykal}, title = {A vulnerability-driven cyber security maturity model for measuring national critical infrastructure protection preparedness}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {15}, pages = {47--59}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.10.001}, doi = {10.1016/J.IJCIP.2016.10.001}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KarabacakYB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LineTJ16, author = {Maria Bartnes Line and Inger Anne T{\o}ndel and Martin Gilje Jaatun}, title = {Current practices and challenges in industrial control organizations regarding information security incident management - Does size matter? Information security incident management in large and small industrial control organizations}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {12}, pages = {12--26}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2015.12.003}, doi = {10.1016/J.IJCIP.2015.12.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LineTJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Moore16, author = {Tyler Moore}, title = {The dangers of cyber security folk wisdom}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {12}, pages = {27--28}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2015.11.001}, doi = {10.1016/J.IJCIP.2015.11.001}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Moore16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/NicolaVBD16, author = {Antonio De Nicola and Maria Luisa Villani and Maria Cristina Brugnoli and Gregorio D'Agostino}, title = {A methodology for modeling and measuring interdependencies of information and communications systems used for public administration and eGovernment services}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {14}, pages = {18--27}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.06.001}, doi = {10.1016/J.IJCIP.2016.06.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/NicolaVBD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Piggin16, author = {Richard Piggin}, title = {Cyber security trends: What should keep CEOs awake at night}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {13}, pages = {36--38}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.02.001}, doi = {10.1016/J.IJCIP.2016.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Piggin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RehakMHB16, author = {David Rehak and Jiri Markuci and Martin Hromada and Karla Barcova}, title = {Quantitative evaluation of the synergistic effects of failures in a critical infrastructure system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {14}, pages = {3--17}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.06.002}, doi = {10.1016/J.IJCIP.2016.06.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RehakMHB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SarnoGMV16, author = {Cesario Di Sarno and Alessia Garofalo and Ilaria Matteucci and Marco Vallini}, title = {A novel security information and event management system for enhancing cyber security in a hydroelectric dam}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {13}, pages = {39--51}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.03.002}, doi = {10.1016/J.IJCIP.2016.03.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/SarnoGMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi16, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {12}, pages = {1--3}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.01.001}, doi = {10.1016/J.IJCIP.2016.01.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi16a, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {13}, pages = {1--2}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.04.002}, doi = {10.1016/J.IJCIP.2016.04.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi16b, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {14}, pages = {1--2}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.07.002}, doi = {10.1016/J.IJCIP.2016.07.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi16c, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {15}, pages = {1--2}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.10.002}, doi = {10.1016/J.IJCIP.2016.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StergiopoulosKT16, author = {George Stergiopoulos and Panayiotis Kotzanikolaou and Marianthi Theocharidou and Georgia Lykou and Dimitris Gritzalis}, title = {Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {12}, pages = {46--60}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2015.12.002}, doi = {10.1016/J.IJCIP.2015.12.002}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/StergiopoulosKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SunLY16, author = {Qinying Sun and Xiang{-}Yang Li and Feng Yu}, title = {Designing an emergency continuity plan for a megacity government: {A} conceptual framework for coping with natural catastrophes}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {13}, pages = {28--35}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.03.001}, doi = {10.1016/J.IJCIP.2016.03.001}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SunLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/UrreaMK16, author = {Claudio Urrea and Claudio Morales and John Kern}, title = {Implementation of error detection and correction in the Modbus-RTU serial protocol}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {15}, pages = {27--37}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.07.001}, doi = {10.1016/J.IJCIP.2016.07.001}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/UrreaMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Wang16, author = {Shih{-}Hsu Wang}, title = {An analytical model for benchmarking the development of national infrastructure items against those in similar countries}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {13}, pages = {3--18}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.02.002}, doi = {10.1016/J.IJCIP.2016.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Wang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WhiteBGBC16, author = {Richard White and Aaron Burkhart and Randy George and Terrance E. Boult and Edward Chow}, title = {Towards comparable cross-sector risk analyses: {A} re-examination of the Risk Analysis and Management for Critical Asset Protection {(RAMCAP)} methodology}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {14}, pages = {28--40}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.05.001}, doi = {10.1016/J.IJCIP.2016.05.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/WhiteBGBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Windelberg16, author = {Marjorie Windelberg}, title = {Objectives for managing cyber supply chain risk}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {12}, pages = {4--11}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2015.11.003}, doi = {10.1016/J.IJCIP.2015.11.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Windelberg16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/YampolskiySKOSY16, author = {Mark Yampolskiy and Anthony Skjellum and Michael Kretzschmar and Ruel A. Overfelt and Kenneth R. Sloan and Alec Yasinsac}, title = {Using 3D printers as weapons}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {14}, pages = {58--71}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2015.12.004}, doi = {10.1016/J.IJCIP.2015.12.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/YampolskiySKOSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/YoonDBRR16, author = {Jungsang Yoon and Stephen Dunlap and Jonathan Butts and Mason Rice and Benjamin W. P. Ramsey}, title = {Evaluating the readiness of cyber first responders responsible for critical infrastructure protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {13}, pages = {19--27}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.02.003}, doi = {10.1016/J.IJCIP.2016.02.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/YoonDBRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/YoungLRRM16, author = {Derek Young and Juan Lopez Jr. and Mason Rice and Benjamin W. P. Ramsey and Robert McTasney}, title = {A framework for incorporating insurance in critical infrastructure cyber risk strategies}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {14}, pages = {43--57}, year = {2016}, url = {https://doi.org/10.1016/j.ijcip.2016.04.001}, doi = {10.1016/J.IJCIP.2016.04.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/YoungLRRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AlcarazZ15, author = {Cristina Alcaraz and Sherali Zeadally}, title = {Critical infrastructure protection: Requirements and challenges for the 21st century}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {8}, pages = {53--66}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2014.12.002}, doi = {10.1016/J.IJCIP.2014.12.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/AlcarazZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Arce15, author = {Daniel G. Arce}, title = {WikiLeaks and the risks to critical foreign dependencies}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {11}, pages = {3--11}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.07.004}, doi = {10.1016/J.IJCIP.2015.07.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Arce15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Bronk15, author = {Chris Bronk}, title = {Two securities: How contemporary cyber geopolitics impacts critical infrastructure protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {8}, pages = {24--26}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2014.12.001}, doi = {10.1016/J.IJCIP.2014.12.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Bronk15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ErezW15, author = {Noam Erez and Avishai Wool}, title = {Control variable classification, modeling and anomaly detection in Modbus/TCP {SCADA} systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {10}, pages = {59--70}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.05.001}, doi = {10.1016/J.IJCIP.2015.05.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ErezW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GengeGH15, author = {B{\'{e}}la Genge and Flavius Graur and Piroska Haller}, title = {Experimental assessment of network design approaches for protecting industrial control systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {11}, pages = {24--38}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.07.005}, doi = {10.1016/J.IJCIP.2015.07.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GengeGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GengeKH15, author = {B{\'{e}}la Genge and Istv{\'{a}}n Kiss and Piroska Haller}, title = {A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {10}, pages = {3--17}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.04.001}, doi = {10.1016/J.IJCIP.2015.04.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GengeKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/George15, author = {Richard George}, title = {Why we should worry about the supply chain}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {11}, pages = {22--23}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.05.002}, doi = {10.1016/J.IJCIP.2015.05.002}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/George15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HahnTLC15, author = {Adam Hahn and Roshan K. Thomas and Ivan Lozano and Alvaro A. C{\'{a}}rdenas}, title = {A multi-layered and kill-chain based security analysis framework for cyber-physical systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {11}, pages = {39--50}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.08.003}, doi = {10.1016/J.IJCIP.2015.08.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HahnTLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Jannati15, author = {Hoda Jannati}, title = {Analysis of relay, terrorist fraud and distance fraud attacks on {RFID} systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {11}, pages = {51--61}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.08.001}, doi = {10.1016/J.IJCIP.2015.08.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Jannati15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Johansson15, author = {Vicki Johansson}, title = {Policy networks - {A} threat to procedural and expert-based decision making and the quality of public risk decisions?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {9}, pages = {3--12}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.02.003}, doi = {10.1016/J.IJCIP.2015.02.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Johansson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KnowlesPHDJ15, author = {William Knowles and Daniel Prince and David Hutchison and Jules Ferdinand Pagna Disso and Kevin Jones}, title = {A survey of cyber security management in industrial control systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {9}, pages = {52--80}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.02.002}, doi = {10.1016/J.IJCIP.2015.02.002}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KnowlesPHDJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LaugeHS15, author = {Ana Laug{\'{e}} and Josune Hernantes and Jose M. Sarriegi}, title = {Critical infrastructure dependencies: {A} holistic, dynamic and quantitative approach}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {8}, pages = {16--23}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2014.12.004}, doi = {10.1016/J.IJCIP.2014.12.004}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LaugeHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/NanS15, author = {Cen Nan and Giovanni Sansavini}, title = {Multilayer hybrid modeling framework for the performance assessment of interdependent critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {10}, pages = {18--33}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.04.003}, doi = {10.1016/J.IJCIP.2015.04.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/NanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/NegeriKB15, author = {Ebisa Negeri and Fernando Kuipers and Nico Baken}, title = {Designing reliable and resilient smart low-voltage grids}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {9}, pages = {24--37}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2014.12.006}, doi = {10.1016/J.IJCIP.2014.12.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/NegeriKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Piggin15, author = {Richard Piggin}, title = {Are industrial control systems ready for the cloud?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {9}, pages = {38--40}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2014.12.005}, doi = {10.1016/J.IJCIP.2014.12.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Piggin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RamseySMTB15, author = {Benjamin W. P. Ramsey and Tyler D. Stubbs and Barry E. Mullins and Michael A. Temple and Mark A. Buckner}, title = {Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {8}, pages = {27--39}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2014.11.002}, doi = {10.1016/J.IJCIP.2014.11.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RamseySMTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RomanowskiRSMSA15, author = {Carol J. Romanowski and Rajendra K. Raj and Jennifer Schneider and Sumita Mishra and Vinay Shivshankar and Srikant Ayengar and Fernando Cueva}, title = {Regional response to large-scale emergency events: Building on historical data}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {11}, pages = {12--21}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.07.003}, doi = {10.1016/J.IJCIP.2015.07.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/RomanowskiRSMSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RuijvenMB15, author = {Theo van Ruijven and Igor Mayer and Mark de Bruijne}, title = {Multidisciplinary coordination of on-scene command teams in virtual emergency exercises}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {9}, pages = {13--23}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.02.005}, doi = {10.1016/J.IJCIP.2015.02.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RuijvenMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Ryan15, author = {Daniel J. Ryan}, title = {Regulating the safety and security of the critical information commons}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {10}, pages = {45--46}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.04.004}, doi = {10.1016/J.IJCIP.2015.04.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Ryan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi15, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {8}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2014.12.003}, doi = {10.1016/J.IJCIP.2014.12.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi15a, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {9}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.02.004}, doi = {10.1016/J.IJCIP.2015.02.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi15b, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {10}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.07.001}, doi = {10.1016/J.IJCIP.2015.07.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi15c, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {11}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.10.001}, doi = {10.1016/J.IJCIP.2015.10.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StergiopoulosKT15, author = {George Stergiopoulos and Panayiotis Kotzanikolaou and Marianthi Theocharidou and Dimitris Gritzalis}, title = {Risk mitigation strategies for critical infrastructures based on graph centrality analysis}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {10}, pages = {34--44}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.05.003}, doi = {10.1016/J.IJCIP.2015.05.003}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/StergiopoulosKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StoneTB15, author = {Samuel J. Stone and Michael A. Temple and Rusty O. Baldwin}, title = {Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {9}, pages = {41--51}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.02.001}, doi = {10.1016/J.IJCIP.2015.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/StoneTB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WinnRDLM15, author = {Michael Winn and Mason Rice and Stephen Dunlap and Juan Lopez Jr. and Barry E. Mullins}, title = {Constructing cost-effective and targetable industrial control system honeypots for production networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {10}, pages = {47--58}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.04.002}, doi = {10.1016/J.IJCIP.2015.04.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/WinnRDLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/YampolskiyHKXS15, author = {Mark Yampolskiy and P{\'{e}}ter Horv{\'{a}}th and Xenofon D. Koutsoukos and Yuan Xue and Janos Sztipanovits}, title = {A language for describing attacks on cyber-physical systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {8}, pages = {40--52}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2014.09.003}, doi = {10.1016/J.IJCIP.2014.09.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/YampolskiyHKXS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ZhangLL15, author = {Zhili Zhang and Xiangyang Li and Hengyun Li}, title = {A quantitative approach for assessing the critical nodal and linear elements of a railway infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {8}, pages = {3--15}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2014.11.001}, doi = {10.1016/J.IJCIP.2014.11.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ZhangLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ArmandoMV14, author = {Alessandro Armando and Alessio Merlo and Luca Verderame}, title = {Security considerations related to the use of mobile devices in the operation of critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {247--256}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.10.002}, doi = {10.1016/J.IJCIP.2014.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ArmandoMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BodenheimBDM14, author = {Roland Bodenheim and Jonathan Butts and Stephen Dunlap and Barry E. Mullins}, title = {Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {114--123}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.03.001}, doi = {10.1016/J.IJCIP.2014.03.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BodenheimBDM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/CoppolinoDR14, author = {Luigi Coppolino and Salvatore D'Antonio and Luigi Romano}, title = {Exposing vulnerabilities in electric power grids: An experimental approach}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {51--60}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.01.003}, doi = {10.1016/J.IJCIP.2014.01.003}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/CoppolinoDR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FarleyW14, author = {Ryan Farley and Xinyuan Wang}, title = {Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {141--154}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.07.001}, doi = {10.1016/J.IJCIP.2014.07.001}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/FarleyW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/George14, author = {Richard George}, title = {Observations from a Cyber Tabletop}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {112--113}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.004}, doi = {10.1016/J.IJCIP.2014.04.004}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/George14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GianiBP14, author = {Annarita Giani and Russell Bent and Feng Pan}, title = {Phasor measurement unit selection for unobservable electric power data integrity attack detection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {155--164}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.06.001}, doi = {10.1016/J.IJCIP.2014.06.001}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/GianiBP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Hagerott14, author = {Mark Hagerott}, title = {Stuxnet and the vital role of critical infrastructure operators and engineers}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {244--246}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.09.001}, doi = {10.1016/J.IJCIP.2014.09.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Hagerott14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JaradatK14, author = {Ra'ed M. Jaradat and Charles B. Keating}, title = {Fragility of oil as a critical infrastructure problem}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {86--99}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.005}, doi = {10.1016/J.IJCIP.2014.04.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/JaradatK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KatinaPBH14, author = {Polinpapilinho F. Katina and C. Ariel Pinto and Joseph M. Bradley and Patrick T. Hester}, title = {Interdependency-induced risk with applications to healthcare}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {12--26}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.01.005}, doi = {10.1016/J.IJCIP.2014.01.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KatinaPBH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KrotofilCLG14, author = {Marina Krotofil and Alvaro A. C{\'{a}}rdenas and Jason Larsen and Dieter Gollmann}, title = {Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {213--232}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.10.003}, doi = {10.1016/J.IJCIP.2014.10.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KrotofilCLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Luiijf14, author = {Eric A. M. Luiijf}, title = {Are we in love with cyber insecurity?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {165--166}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.07.002}, doi = {10.1016/J.IJCIP.2014.07.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Luiijf14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Nunes-VazL14, author = {Rick Nunes{-}Vaz and Steven Lord}, title = {Designing physical security for complex infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {178--192}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.06.003}, doi = {10.1016/J.IJCIP.2014.06.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Nunes-VazL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RanaS14, author = {Antonia Rana and Luigi Sportiello}, title = {Implementation of security and privacy in ePassports and the extended access control infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {233--243}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.10.001}, doi = {10.1016/J.IJCIP.2014.10.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RanaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RowlandRS14, author = {Jill Rowland and Mason Rice and Sujeet Shenoi}, title = {The anatomy of a cyber power}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {3--11}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.01.001}, doi = {10.1016/J.IJCIP.2014.01.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RowlandRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RowlandRS14a, author = {Jill Rowland and Mason Rice and Sujeet Shenoi}, title = {Whither cyberpower?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {124--137}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.001}, doi = {10.1016/J.IJCIP.2014.04.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RowlandRS14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SchuettBD14, author = {Carl Schuett and Jonathan Butts and Stephen Dunlap}, title = {An evaluation of modification attacks on programmable logic controllers}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {61--68}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.01.004}, doi = {10.1016/J.IJCIP.2014.01.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SchuettBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi14, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {1--2}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.02.002}, doi = {10.1016/J.IJCIP.2014.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi14a, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {69--70}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.006}, doi = {10.1016/J.IJCIP.2014.04.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi14b, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {139--140}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.07.004}, doi = {10.1016/J.IJCIP.2014.07.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi14c, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {211--212}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.10.004}, doi = {10.1016/J.IJCIP.2014.10.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi14c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Siler-EvansHSLT14, author = {Kyle Siler{-}Evans and Alex Hanson and Cecily Sunday and Nathan Leonard and Michele Tumminello}, title = {Analysis of pipeline accidents in the United States from 1968 to 2009}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {257--269}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.09.002}, doi = {10.1016/J.IJCIP.2014.09.002}, timestamp = {Mon, 01 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Siler-EvansHSLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SinghGO14, author = {Abhishek Narain Singh and M. P. Gupta and Amitabh Ojha}, title = {Identifying critical infrastructure sectors and their dependencies: An Indian scenario}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {71--85}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.003}, doi = {10.1016/J.IJCIP.2014.04.003}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SinghGO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Smith14, author = {Kendal Smith}, title = {Designing flexible curricula to enhance critical infrastructure security and resilience}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {48--50}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.01.002}, doi = {10.1016/J.IJCIP.2014.01.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Smith14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TuncerL14, author = {Necibe Tuncer and Trang T. Le}, title = {Effect of air travel on the spread of an avian influenza pandemic to the United States}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {1}, pages = {27--47}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.02.001}, doi = {10.1016/J.IJCIP.2014.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/TuncerL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WardKLC14, author = {David Ward and Naouma Kourti and Alessandro Lazari and Piotr Cofta}, title = {Trust building and the European Reference Network for Critical Infrastructure Protection community}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {193--210}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.07.003}, doi = {10.1016/J.IJCIP.2014.07.003}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/WardKLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WhiteBC14, author = {Richard White and Terrance E. Boult and Edward Chow}, title = {A computational asset vulnerability model for the strategic protection of the critical infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {3}, pages = {167--177}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.06.002}, doi = {10.1016/J.IJCIP.2014.06.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/WhiteBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Yates14, author = {Athol Yates}, title = {A framework for studying mortality arising from critical infrastructure loss}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {2}, pages = {100--111}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.04.002}, doi = {10.1016/J.IJCIP.2014.04.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Yates14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ArmbrusterEW13, author = {Ginger Armbruster and Barbara Endicott{-}Popovsky and Jan Whittington}, title = {Threats to municipal information systems posed by aging infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {3-4}, pages = {123--131}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.08.001}, doi = {10.1016/J.IJCIP.2013.08.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ArmbrusterEW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BarbosaSP13, author = {Rafael Ramos Regis Barbosa and Ramin Sadre and Aiko Pras}, title = {Flow whitelisting in {SCADA} networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {3-4}, pages = {150--158}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.08.003}, doi = {10.1016/J.IJCIP.2013.08.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BarbosaSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BasnightBLD13, author = {Zachry Basnight and Jonathan Butts and Juan Lopez Jr. and Thomas Dub{\'{e}}}, title = {Firmware modification attacks on programmable logic controllers}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {2}, pages = {76--84}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.04.004}, doi = {10.1016/J.IJCIP.2013.04.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BasnightBLD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Correa-HenaoYL13, author = {Gabriel J. Correa{-}Henao and Jos{\'{e}} M. Yusta and Roberto Lacal{-}Ar{\'{a}}ntegui}, title = {Using interconnected risk maps to assess the threats faced by electricity infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {3-4}, pages = {197--216}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.10.002}, doi = {10.1016/J.IJCIP.2013.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Correa-HenaoYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FinkeBMG13, author = {Cindy Finke and Jonathan Butts and Robert F. Mills and Michael R. Grimaila}, title = {Enhancing the security of aircraft surveillance in the next generation air traffic control system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {1}, pages = {3--11}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.02.001}, doi = {10.1016/J.IJCIP.2013.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/FinkeBMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GengeS13, author = {B{\'{e}}la Genge and Christos Siaterlis}, title = {Analysis of the effects of distributed denial-of-service attacks on {MPLS} networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {2}, pages = {87--95}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.04.001}, doi = {10.1016/J.IJCIP.2013.04.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GengeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GivensB13, author = {Austen D. Givens and Nathan E. Busch}, title = {Realizing the promise of public-private partnerships in {U.S.} critical infrastructure protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {1}, pages = {39--50}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.02.002}, doi = {10.1016/J.IJCIP.2013.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GivensB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GoldenbergW13, author = {Niv Goldenberg and Avishai Wool}, title = {Accurate modeling of Modbus/TCP for intrusion detection in {SCADA} systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {2}, pages = {63--75}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.05.001}, doi = {10.1016/J.IJCIP.2013.05.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GoldenbergW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HiebSG13, author = {Jeffrey L. Hieb and Jacob Schreiver and James H. Graham}, title = {A security-hardened appliance for implementing authentication and access control in {SCADA} infrastructures with legacy field devices}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {1}, pages = {12--24}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.01.001}, doi = {10.1016/J.IJCIP.2013.01.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HiebSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LewisWCK13, author = {Adam M. Lewis and David Ward and Lukasz Cyra and Naouma Kourti}, title = {European Reference Network for Critical Infrastructure Protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {1}, pages = {51--60}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.02.004}, doi = {10.1016/J.IJCIP.2013.02.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/LewisWCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Luiijf13, author = {Eric A. M. Luiijf}, title = {Why are we so unconsciously insecure?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {3-4}, pages = {179--181}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.10.003}, doi = {10.1016/J.IJCIP.2013.10.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Luiijf13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MarroneNTDVSCM13, author = {Stefano Marrone and Roberto Nardone and Annarita Tedesco and Pasquale D'Amore and Valeria Vittorini and Roberto Setola and Francesca De Cillis and Nicola Mazzocca}, title = {Vulnerability modeling and analysis for critical infrastructure protection applications}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {3-4}, pages = {217--227}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.10.001}, doi = {10.1016/J.IJCIP.2013.10.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/MarroneNTDVSCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Moore13, author = {Tyler Moore}, title = {The promise and perils of digital currencies}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {3-4}, pages = {147--149}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.08.002}, doi = {10.1016/J.IJCIP.2013.08.002}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Moore13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/NepalJ13, author = {Rabindra Nepal and Tooraj Jamasb}, title = {Security of European electricity systems: Conceptualizing the assessment criteria and core indicators}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {3-4}, pages = {182--196}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.07.001}, doi = {10.1016/J.IJCIP.2013.07.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/NepalJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Palmatier13, author = {Thomas E. Palmatier}, title = {Building secure critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {2}, pages = {85--86}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.04.003}, doi = {10.1016/J.IJCIP.2013.04.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Palmatier13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/PapaCM13, author = {Stephen M. Papa and William D. Casper and Tyler Moore}, title = {Securing wastewater facilities from accidental and intentional harm: {A} cost-benefit analysis}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {2}, pages = {96--106}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.05.002}, doi = {10.1016/J.IJCIP.2013.05.002}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/PapaCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi13, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {1}, pages = {1--2}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.02.003}, doi = {10.1016/J.IJCIP.2013.02.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi13a, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {2}, pages = {61--62}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.05.003}, doi = {10.1016/J.IJCIP.2013.05.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi13b, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {3-4}, pages = {121--122}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.10.004}, doi = {10.1016/J.IJCIP.2013.10.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SoodE13, author = {Aditya K. Sood and Richard J. Enbody}, title = {Crimeware-as-a-service - {A} survey of commoditized crimeware in the underground market}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {1}, pages = {28--38}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.01.002}, doi = {10.1016/J.IJCIP.2013.01.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SoodE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Sportiello13, author = {Luigi Sportiello}, title = {A methodology for designing robust and efficient hybrid monitoring systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {3-4}, pages = {132--146}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.09.001}, doi = {10.1016/J.IJCIP.2013.09.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Sportiello13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Verma13, author = {Pramode K. Verma}, title = {The role of the network in implementing security and privacy}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {1}, pages = {25--27}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2012.12.001}, doi = {10.1016/J.IJCIP.2012.12.001}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Verma13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/VlacheasSDCIG13, author = {Panagiotis Vlacheas and Vera Stavroulaki and Panagiotis Demestichas and Scott Cadzow and Demosthenes Ikonomou and Slawomir Gorniak}, title = {Towards end-to-end network resilience}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {3-4}, pages = {159--178}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.08.004}, doi = {10.1016/J.IJCIP.2013.08.004}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/VlacheasSDCIG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/YatesS13, author = {Justin Yates and Sujeevraja Sanjeevi}, title = {A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {2}, pages = {107--119}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.04.002}, doi = {10.1016/J.IJCIP.2013.04.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/YatesS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AlcarazL12, author = {Cristina Alcaraz and Javier L{\'{o}}pez}, title = {Analysis of requirements for critical control systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {3-4}, pages = {137--145}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.08.003}, doi = {10.1016/J.IJCIP.2012.08.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/AlcarazL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ArmbrusterEW12, author = {Ginger Armbruster and Barbara Endicott{-}Popovsky and Jan Whittington}, title = {Are we prepared for the economic risk resulting from telecom hotel disruptions?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {2}, pages = {55--65}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.05.003}, doi = {10.1016/J.IJCIP.2012.05.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ArmbrusterEW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BeccutiCGDDF12, author = {Marco Beccuti and Silvano Chiaradonna and Felicita Di Giandomenico and Susanna Donatelli and Giovanna Dondossola and Giuliana Franceschinis}, title = {Quantification of dependencies between electrical and information infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {1}, pages = {14--27}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.01.003}, doi = {10.1016/J.IJCIP.2012.01.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BeccutiCGDDF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BurmesterMC12, author = {Mike Burmester and Emmanouil Magkos and Vassilios Chrissikopoulos}, title = {Modeling security in cyber-physical systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {3-4}, pages = {118--126}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.08.002}, doi = {10.1016/J.IJCIP.2012.08.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BurmesterMC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/CastrucciNCAKAHSSC12, author = {Marco Castrucci and Alessandro Neri and Filipe Caldeira and Jocelyn Aubert and Djamel Khadraoui and Matthieu Aubigny and Carlo Harpes and Paulo Sim{\~{o}}es and Vincenzo Suraci and Paolo Capodieci}, title = {Design and implementation of a mediation system enabling secure communication among Critical Infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {2}, pages = {86--97}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.04.001}, doi = {10.1016/J.IJCIP.2012.04.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/CastrucciNCAKAHSSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Deccio12, author = {Casey T. Deccio}, title = {Maintenance, mishaps and mending in deployments of the domain name system security extensions {(DNSSEC)}}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {2}, pages = {98--103}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.05.002}, doi = {10.1016/J.IJCIP.2012.05.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Deccio12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Fidler12, author = {David P. Fidler}, title = {Tinker, Tailor, Soldier, Duqu: Why cyberespionage is more dangerous than you think}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {1}, pages = {28--29}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2011.12.001}, doi = {10.1016/J.IJCIP.2011.12.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Fidler12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GuernseyRS12, author = {Daniel Guernsey and Mason Rice and Sujeet Shenoi}, title = {Implementing novel reactive defense functionality in {MPLS} networks using hyperspeed signaling}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {1}, pages = {40--52}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.02.001}, doi = {10.1016/J.IJCIP.2012.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GuernseyRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HowserM12, author = {Gerry Howser and Bruce M. McMillin}, title = {Modeling and reasoning about the security of drive-by-wire automobile systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {3-4}, pages = {127--134}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.09.001}, doi = {10.1016/J.IJCIP.2012.09.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HowserM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KocJG12, author = {Yakup Ko{\c{c}} and Almerima Jamakovic and Bart Gijsen}, title = {A global reference model of the domain name system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {3-4}, pages = {108--117}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.08.001}, doi = {10.1016/J.IJCIP.2012.08.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/KocJG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Miller12, author = {Robert A. Miller}, title = {Cyber war realities - What lies ahead}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {2}, pages = {84--85}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2011.08.003}, doi = {10.1016/J.IJCIP.2011.08.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Miller12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/OkhraviCRH12, author = {Hamed Okhravi and Adam Comella and Eric Robinson and Joshua W. Haines}, title = {Creating a cyber moving target for critical infrastructure applications using platform diversity}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {1}, pages = {30--39}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.01.002}, doi = {10.1016/J.IJCIP.2012.01.002}, timestamp = {Sun, 22 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/OkhraviCRH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RahimiZ12, author = {Sanaz Rahimi and Mehdi R. Zargham}, title = {Analysis of the security of {VPN} configurations in industrial control environments}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {1}, pages = {3--13}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.01.001}, doi = {10.1016/J.IJCIP.2012.01.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RahimiZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ReavesM12, author = {Bradley Reaves and Thomas H. Morris}, title = {Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {3-4}, pages = {154--174}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.10.001}, doi = {10.1016/J.IJCIP.2012.10.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ReavesM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ReevesRLBS12, author = {Jason Reeves and Ashwin Ramaswamy and Michael E. Locasto and Sergey Bratus and Sean W. Smith}, title = {Intrusion detection for resource-constrained embedded control systems in the power grid}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {2}, pages = {74--83}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.02.002}, doi = {10.1016/J.IJCIP.2012.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ReevesRLBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi12, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {1}, pages = {1--2}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.02.003}, doi = {10.1016/J.IJCIP.2012.02.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi12a, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {2}, pages = {53--54}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.06.001}, doi = {10.1016/J.IJCIP.2012.06.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi12b, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {3-4}, pages = {105--107}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.10.002}, doi = {10.1016/J.IJCIP.2012.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ShepardHF12, author = {Daniel P. Shepard and Todd E. Humphreys and Aaron A. Fansler}, title = {Evaluation of the vulnerability of phasor measurement units to {GPS} spoofing attacks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {3-4}, pages = {146--153}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.09.003}, doi = {10.1016/J.IJCIP.2012.09.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/ShepardHF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StoneT12, author = {Samuel J. Stone and Michael A. Temple}, title = {Radio-frequency-based anomaly detection for programmable logic controllers in the critical infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {2}, pages = {66--73}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.05.001}, doi = {10.1016/J.IJCIP.2012.05.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/StoneT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Yasinsac12, author = {Alec Yasinsac}, title = {Precision in elections - Extracting a precise result from an inherently imprecise process}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {5}, number = {3-4}, pages = {135--136}, year = {2012}, url = {https://doi.org/10.1016/j.ijcip.2012.09.002}, doi = {10.1016/J.IJCIP.2012.09.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Yasinsac12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BeitollahiD11, author = {Hakem Beitollahi and Geert Deconinck}, title = {A dependable architecture to mitigate distributed denial of service attacks on network-based control systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {3-4}, pages = {107--123}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.06.003}, doi = {10.1016/J.IJCIP.2011.06.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BeitollahiD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChiaradonnaGL11, author = {Silvano Chiaradonna and Felicita Di Giandomenico and Paolo Lollini}, title = {Definition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {1}, pages = {24--40}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.03.001}, doi = {10.1016/J.IJCIP.2011.03.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ChiaradonnaGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Conklin11, author = {William Arthur Conklin}, title = {Control systems personnel are from Mars; {IT} personnel are from Venus}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {2}, pages = {76--77}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.06.004}, doi = {10.1016/J.IJCIP.2011.06.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Conklin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GerstenfeldB11, author = {Arthur Gerstenfeld and Paul D. Berger}, title = {A decision-analysis approach for optimal airport security}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {1}, pages = {14--21}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.01.002}, doi = {10.1016/J.IJCIP.2011.01.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GerstenfeldB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LuiijfAZ11, author = {Eric A. M. Luiijf and Manou Ali and Annemarie Zielstra}, title = {Assessing and improving {SCADA} security in the Dutch drinking water sector}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {3-4}, pages = {124--134}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.08.002}, doi = {10.1016/J.IJCIP.2011.08.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LuiijfAZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MahoneyG11, author = {William R. Mahoney and Robin A. Gandhi}, title = {An integrated framework for control system simulation and regulatory compliance monitoring}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {1}, pages = {41--53}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.03.002}, doi = {10.1016/J.IJCIP.2011.03.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/MahoneyG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/McCallieBM11, author = {Donald McCallie and Jonathan Butts and Robert F. Mills}, title = {Security analysis of the {ADS-B} implementation in the next generation air transportation system}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {2}, pages = {78--87}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.06.001}, doi = {10.1016/J.IJCIP.2011.06.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/McCallieBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Miller11, author = {Robert A. Miller}, title = {Cyber war and the dangers of preemption}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {1}, pages = {22--23}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.01.001}, doi = {10.1016/J.IJCIP.2011.01.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Miller11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MorrisSRGPR11, author = {Thomas H. Morris and Anurag Srivastava and Bradley Reaves and Wei Gao and Kalyan Pavurapu and Ram Reddi}, title = {A control system testbed to validate critical infrastructure protection concepts}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {2}, pages = {88--103}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.06.005}, doi = {10.1016/J.IJCIP.2011.06.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/MorrisSRGPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/OlivaPS11, author = {Gabriele Oliva and Stefano Panzieri and Roberto Setola}, title = {Fuzzy dynamic input-output inoperability model}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {3-4}, pages = {165--175}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.09.003}, doi = {10.1016/J.IJCIP.2011.09.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/OlivaPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RebahiTTALTB11, author = {Yacine Rebahi and Tran Quang Thanh and Mao Tong and Fernando L{\'{o}}pez Aguilar and Jos{\'{e}} Manuel L{\'{o}}pez L{\'{o}}pez and Luis A. Teixeira and Nelson Blanco}, title = {An {IP} based platform for emergency calls and reporting}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {3-4}, pages = {137--153}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.10.001}, doi = {10.1016/J.IJCIP.2011.10.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RebahiTTALTB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RiceBS11, author = {Mason Rice and Jonathan Butts and Sujeet Shenoi}, title = {A signaling framework to deter aggression in cyberspace}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {2}, pages = {57--65}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.03.003}, doi = {10.1016/J.IJCIP.2011.03.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RiceBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RiceMS11, author = {Mason Rice and Robert Miller and Sujeet Shenoi}, title = {May the {US} government monitor private critical infrastructure assets to combat foreign cyberspace threats?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {1}, pages = {3--13}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.02.001}, doi = {10.1016/J.IJCIP.2011.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RiceMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Rrushi11, author = {Julian L. Rrushi}, title = {An exploration of defensive deception in industrial communication networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {2}, pages = {66--75}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.06.002}, doi = {10.1016/J.IJCIP.2011.06.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Rrushi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi11, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {1}, pages = {1--2}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.03.004}, doi = {10.1016/J.IJCIP.2011.03.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi11a, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {2}, pages = {55--56}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.08.001}, doi = {10.1016/J.IJCIP.2011.08.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi11b, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {3-4}, pages = {105--106}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.10.002}, doi = {10.1016/J.IJCIP.2011.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Sinha11, author = {Anshuman Sinha}, title = {A survey of system security in contactless electronic passports}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {3-4}, pages = {154--164}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.09.002}, doi = {10.1016/J.IJCIP.2011.09.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Sinha11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Verma11, author = {Pramode K. Verma}, title = {The elusive goal of net neutrality}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {3-4}, pages = {135--136}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.09.001}, doi = {10.1016/J.IJCIP.2011.09.001}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Verma11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AkellaTM10, author = {Ravi Akella and Han Tang and Bruce M. McMillin}, title = {Analysis of information flow security in cyber-physical systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {3-4}, pages = {157--173}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.09.001}, doi = {10.1016/J.IJCIP.2010.09.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/AkellaTM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BaldiniFMLPBRMSS10, author = {Gianmarco Baldini and Igor Nai Fovino and Marcelo Masera and Marco Luise and Vincenzo Pellegrini and Enzo Bagagli and Giuseppe Rubino and Raffaele Malangone and Marcoccio Stefano and Fabio Senesi}, title = {An early warning system for detecting {GSM-R} wireless interference in the high-speed railway infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {3-4}, pages = {140--156}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.10.003}, doi = {10.1016/J.IJCIP.2010.10.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BaldiniFMLPBRMSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChakravarthyHB10, author = {Rasika Chakravarthy and Carl H. Hauser and David E. Bakken}, title = {Long-lived authentication protocols for process control systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {3-4}, pages = {174--181}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.10.001}, doi = {10.1016/J.IJCIP.2010.10.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ChakravarthyHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Clavadetscher10, author = {Carl J. Clavadetscher}, title = {Building national resilience capabilities}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {1}, pages = {27--28}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2009.08.001}, doi = {10.1016/J.IJCIP.2009.08.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Clavadetscher10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Cohen10, author = {Fred Cohen}, title = {What makes critical infrastructures Critical?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {2}, pages = {53--54}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.06.002}, doi = {10.1016/J.IJCIP.2010.06.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Cohen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Crowther10, author = {Kenneth G. Crowther}, title = {Risk-informed assessment of regional preparedness: {A} case study of emergency potable water for hurricane response in Southeast Virginia}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {2}, pages = {83--98}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.03.001}, doi = {10.1016/J.IJCIP.2010.03.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Crowther10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HareG10, author = {Forrest Hare and Jonathan Goldstein}, title = {The interdependent security problem in the defense industrial base: An agent-based model on a social network}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {3-4}, pages = {128--139}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.07.001}, doi = {10.1016/J.IJCIP.2010.07.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HareG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HenryLZ10, author = {Matthew H. Henry and Ryan M. Layer and David R. Zaret}, title = {Coupled Petri nets for computer network risk analysis}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {2}, pages = {67--75}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.05.002}, doi = {10.1016/J.IJCIP.2010.05.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HenryLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JeneliusWH10, author = {Erik Jenelius and Jonas Westin and {\AA}ke J. Holmgren}, title = {Critical infrastructure protection under imperfect attacker perception}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {1}, pages = {16--26}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2009.10.002}, doi = {10.1016/J.IJCIP.2009.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/JeneliusWH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Miller10, author = {Robert A. Miller}, title = {Infrastructure war: Chaos without carnage?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {3-4}, pages = {101--102}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.06.001}, doi = {10.1016/J.IJCIP.2010.06.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Miller10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Moore10, author = {Tyler Moore}, title = {The economics of cybersecurity: Principles and policy options}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {3-4}, pages = {103--117}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.10.002}, doi = {10.1016/J.IJCIP.2010.10.002}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Moore10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/OlivaPS10, author = {Gabriele Oliva and Stefano Panzieri and Roberto Setola}, title = {Agent-based input-output interdependency model}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {2}, pages = {76--82}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.05.001}, doi = {10.1016/J.IJCIP.2010.05.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/OlivaPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Pietre-CambacedesC10, author = {Ludovic Pi{\`{e}}tre{-}Cambac{\'{e}}d{\`{e}}s and Claude Chaudet}, title = {The {SEMA} referential framework: Avoiding ambiguities in the terms "security" and "safety"}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {2}, pages = {55--66}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.06.003}, doi = {10.1016/J.IJCIP.2010.06.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Pietre-CambacedesC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RiceBMS10, author = {Mason Rice and Jonathan Butts and Robert Miller and Sujeet Shenoi}, title = {An analysis of the legality of government-mandated computer inoculations}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {1}, pages = {5--15}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.02.002}, doi = {10.1016/J.IJCIP.2010.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RiceBMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RiceBMS10a, author = {Mason Rice and Jonathan Butts and Robert Miller and Sujeet Shenoi}, title = {Applying public health strategies to the protection of cyberspace}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {3-4}, pages = {118--127}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.07.002}, doi = {10.1016/J.IJCIP.2010.07.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RiceBMS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Robinson10, author = {Neil Robinson}, title = {Where policy and preferences diverge}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {1}, pages = {3--4}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.02.003}, doi = {10.1016/J.IJCIP.2010.02.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Robinson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi10, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {1}, pages = {1--2}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.03.002}, doi = {10.1016/J.IJCIP.2010.03.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi10a, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {2}, pages = {51--52}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.06.004}, doi = {10.1016/J.IJCIP.2010.06.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi10b, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {3-4}, pages = {99--100}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.11.001}, doi = {10.1016/J.IJCIP.2010.11.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Stewart10, author = {Mark G. Stewart}, title = {Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {1}, pages = {29--40}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2009.09.001}, doi = {10.1016/J.IJCIP.2009.09.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Stewart10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TschofenigASA10, author = {Hannes Tschofenig and Mayutan Arumaithurai and Henning Schulzrinne and Bernard Aboba}, title = {How secure is the next generation of IP-based emergency services architecture?}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {3}, number = {1}, pages = {41--50}, year = {2010}, url = {https://doi.org/10.1016/j.ijcip.2010.02.001}, doi = {10.1016/J.IJCIP.2010.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/TschofenigASA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/AnwarMGC09, author = {Zahid Anwar and Mirko Montanari and Alejandro Gutierrez and Roy H. Campbell}, title = {Budget constrained optimal security hardening of control networks for critical cyber-infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {1-2}, pages = {13--25}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.02.001}, doi = {10.1016/J.IJCIP.2009.02.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/AnwarMGC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/BompardNX09, author = {Ettore Bompard and Roberto Napoli and Fei Xue}, title = {Analysis of structural vulnerabilities in power transmission grids}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {1-2}, pages = {5--12}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.02.002}, doi = {10.1016/J.IJCIP.2009.02.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/BompardNX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/CaveltyS09, author = {Myriam Dunn Cavelty and Manuel Suter}, title = {Public-Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {4}, pages = {179--187}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.08.006}, doi = {10.1016/J.IJCIP.2009.08.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/CaveltyS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/FovinoCMT09, author = {Igor Nai Fovino and Andrea Carcano and Marcelo Masera and Alberto Trombetta}, title = {An experimental investigation of malware attacks on {SCADA} systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {4}, pages = {139--145}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.10.001}, doi = {10.1016/J.IJCIP.2009.10.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/FovinoCMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GraysonGBSS09, author = {Denise Grayson and Daniel Guernsey and Jonathan Butts and Michael Spainhower and Sujeet Shenoi}, title = {Analysis of security threats to {MPLS} virtual private networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {4}, pages = {146--153}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.08.002}, doi = {10.1016/J.IJCIP.2009.08.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GraysonGBSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HuangCALTS09, author = {Yu{-}Lun Huang and Alvaro A. C{\'{a}}rdenas and Saurabh Amin and Zong{-}Syun Lin and Hsin{-}Yi Tsai and Shankar Sastry}, title = {Understanding the physical and economic consequences of attacks on control systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {3}, pages = {73--83}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.06.001}, doi = {10.1016/J.IJCIP.2009.06.001}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/HuangCALTS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JaatunALTL09, author = {Martin Gilje Jaatun and Eirik Albrechtsen and Maria B. Line and Inger Anne T{\o}ndel and Odd Helge Longva}, title = {A framework for incident response management in the petroleum industry}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {1-2}, pages = {26--37}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.02.004}, doi = {10.1016/J.IJCIP.2009.02.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/JaatunALTL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/KalamDBK09, author = {Anas Abou El Kalam and Yves Deswarte and Amine Ba{\"{\i}}na and Mohamed Ka{\^{a}}niche}, title = {PolyOrBAC: {A} security framework for Critical Infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {4}, pages = {154--169}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.08.005}, doi = {10.1016/J.IJCIP.2009.08.005}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/KalamDBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Miller09, author = {Robert A. Miller}, title = {There's infrastructure and ...critical infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {1-2}, pages = {3--4}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.02.003}, doi = {10.1016/J.IJCIP.2009.02.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Miller09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Miller09a, author = {Robert A. Miller}, title = {Standing in line for swine flu vaccine}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {4}, pages = {137--138}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.09.003}, doi = {10.1016/J.IJCIP.2009.09.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Miller09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/OkhraviN09, author = {Hamed Okhravi and David M. Nicol}, title = {Application of trusted network technology to industrial control networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {3}, pages = {84--94}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.07.001}, doi = {10.1016/J.IJCIP.2009.07.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/OkhraviN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RestrepoSZ09, author = {Carlos E. Restrepo and Jeffrey S. Simonoff and Rae Zimmerman}, title = {Causes, cost consequences, and risk implications of accidents in {US} hazardous liquid pipeline infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {1-2}, pages = {38--50}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2008.09.001}, doi = {10.1016/J.IJCIP.2008.09.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/RestrepoSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/RichGQSRH09, author = {Eliot H. Rich and Jose J. Gonzalez and Ying Qian and Finn Olav Sveen and Jaziar Radianti and Stefanie A. Hillen}, title = {Emergent vulnerabilities in Integrated Operations: {A} proactive simulation study of economic risk}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {3}, pages = {110--123}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.07.002}, doi = {10.1016/J.IJCIP.2009.07.002}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/RichGQSRH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SetolaPS09, author = {Roberto Setola and Stefano De Porcellinis and Marino Sforna}, title = {Critical infrastructure dependency assessment using the input-output inoperability model}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {4}, pages = {170--178}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.09.002}, doi = {10.1016/J.IJCIP.2009.09.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SetolaPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi09, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {1-2}, pages = {1--2}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.03.001}, doi = {10.1016/J.IJCIP.2009.03.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi09a, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {3}, pages = {69--70}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.08.004}, doi = {10.1016/J.IJCIP.2009.08.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi09b, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {4}, pages = {135--136}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.10.003}, doi = {10.1016/J.IJCIP.2009.10.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SveenTS09, author = {Finn Olav Sveen and Jos{\'{e}} Manuel Torres and Jose M. Sarriegi}, title = {Blind information security strategy}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {3}, pages = {95--109}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.07.003}, doi = {10.1016/J.IJCIP.2009.07.003}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/SveenTS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Tolone09, author = {William J. Tolone}, title = {Interactive visualizations for critical infrastructure analysis}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {3}, pages = {124--134}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.07.004}, doi = {10.1016/J.IJCIP.2009.07.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Tolone09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Verma09, author = {Pramode K. Verma}, title = {George Orwell's Nineteen Eighty-Four - {A} retrospective and prospective twenty-five years later}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {3}, pages = {71--72}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2009.08.003}, doi = {10.1016/J.IJCIP.2009.08.003}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcip/Verma09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/WienekeK09, author = {Monika Wieneke and Wolfgang Koch}, title = {Combined person tracking and classification in a network of chemical sensors}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {2}, number = {1-2}, pages = {51--67}, year = {2009}, url = {https://doi.org/10.1016/j.ijcip.2008.11.003}, doi = {10.1016/J.IJCIP.2008.11.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/WienekeK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Assaf08, author = {Dan Assaf}, title = {Models of critical information infrastructure protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {6--14}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.08.004}, doi = {10.1016/J.IJCIP.2008.08.004}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Assaf08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/CravenO08, author = {Paul Vincent Craven and Paul W. Oman}, title = {Modeling the {NAJPTC} network using {NS-2}}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {29--36}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.08.002}, doi = {10.1016/J.IJCIP.2008.08.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/CravenO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Crowther08, author = {Kenneth G. Crowther}, title = {Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input-output model}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {53--67}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.08.009}, doi = {10.1016/J.IJCIP.2008.08.009}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Crowther08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/George08, author = {Richard George}, title = {Critical infrastructure protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {4--5}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.08.010}, doi = {10.1016/J.IJCIP.2008.08.010}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/George08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HartongGW08, author = {Mark Hartong and Rajni Goel and Duminda Wijesekera}, title = {Security and the {US} rail infrastructure}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {15--28}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.08.006}, doi = {10.1016/J.IJCIP.2008.08.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HartongGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/HuitsingCPS08, author = {Peter Huitsing and Rodrigo Chandia and Mauricio Papa and Sujeet Shenoi}, title = {Attack taxonomies for the Modbus protocols}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {37--44}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.08.003}, doi = {10.1016/J.IJCIP.2008.08.003}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/HuitsingCPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/LiuWC08, author = {Debin Liu and XiaoFeng Wang and L. Jean Camp}, title = {Game-theoretic modeling and analysis of insider threats}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {75--80}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.08.001}, doi = {10.1016/J.IJCIP.2008.08.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/LiuWC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Macaulay08, author = {Tyson Macaulay}, title = {Assessing operational risk in the financial sector, using interdependency metrics}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {45--52}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.08.008}, doi = {10.1016/J.IJCIP.2008.08.008}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Macaulay08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/Shenoi08, author = {Sujeet Shenoi}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {1--2}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.11.001}, doi = {10.1016/J.IJCIP.2008.11.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/Shenoi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/SpainhowerBGS08, author = {Michael Spainhower and Jonathan Butts and Daniel Guernsey and Sujeet Shenoi}, title = {Security analysis of {RSVP-TE} signaling in {MPLS} networks}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {68--74}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.08.005}, doi = {10.1016/J.IJCIP.2008.08.005}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/SpainhowerBGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/StrousR08, author = {Leon Strous and Kai Rannenberg}, title = {Editorial}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {3}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.11.002}, doi = {10.1016/J.IJCIP.2008.11.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/StrousR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/TheoharidouXG08, author = {Marianthi Theoharidou and Dimitra Xidara and Dimitris Gritzalis}, title = {A {CBK} for Information Security and Critical Information and Communication Infrastructure Protection}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {1}, pages = {81--96}, year = {2008}, url = {https://doi.org/10.1016/j.ijcip.2008.08.007}, doi = {10.1016/J.IJCIP.2008.08.007}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/TheoharidouXG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.