Search dblp for Publications

export results for "stream:streams/journals/ijcip:"

 download as .bib file

@article{DBLP:journals/ijcip/AalirezaeiKK23,
  author       = {Armin Aalirezaei and
                  Golam Kabir and
                  Md Saiful Arif Khan},
  title        = {Dynamic predictive analysis of the consequences of gas pipeline failures
                  using a Bayesian network},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {43},
  pages        = {100638},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100638},
  doi          = {10.1016/J.IJCIP.2023.100638},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/AalirezaeiKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AshworthSS23,
  author       = {James Ashworth and
                  Jason Staggs and
                  Sujeet Shenoi},
  title        = {Radio frequency identification and tracking of vehicles and drivers
                  by exploiting keyless entry systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {40},
  pages        = {100587},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100587},
  doi          = {10.1016/J.IJCIP.2022.100587},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/AshworthSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AvivF23,
  author       = {Itzhak Aviv and
                  Uri Ferri},
  title        = {Russian-Ukraine armed conflict: Lessons learned on the digital ecosystem},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {43},
  pages        = {100637},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100637},
  doi          = {10.1016/J.IJCIP.2023.100637},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/AvivF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BitirgenF23,
  author       = {K{\"{u}}bra Bitirgen and
                  {\"{U}}mm{\"{u}}han Basaran Filik},
  title        = {A hybrid deep learning model for discrimination of physical disturbance
                  and cyber-attack detection in smart grid},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {40},
  pages        = {100582},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100582},
  doi          = {10.1016/J.IJCIP.2022.100582},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BitirgenF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BoedingHSLP23,
  author       = {Matthew Boeding and
                  Michael Hempel and
                  Hamid Sharif and
                  Juan Lopez Jr. and
                  Kalyan Perumalla},
  title        = {A flexible {OT} testbed for evaluating on-device implementations of
                  {IEC-61850} {GOOSE}},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100618},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100618},
  doi          = {10.1016/J.IJCIP.2023.100618},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BoedingHSLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ChenLZHQ23,
  author       = {Jiarui Chen and
                  Yiqin Lu and
                  Yang Zhang and
                  Fang Huang and
                  Jiancheng Qin},
  title        = {A management knowledge graph approach for critical infrastructure
                  protection: Ontology design, information extraction and relation prediction},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {43},
  pages        = {100634},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100634},
  doi          = {10.1016/J.IJCIP.2023.100634},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ChenLZHQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/EtxezarretaGIZ23,
  author       = {Xabier Etxezarreta and
                  I{\~{n}}aki Garitano and
                  Mikel Iturbe and
                  Urko Zurutuza},
  title        = {Software-Defined Networking approaches for intrusion response in Industrial
                  Control Systems: {A} survey},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100615},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100615},
  doi          = {10.1016/J.IJCIP.2023.100615},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/EtxezarretaGIZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FanTL23,
  author       = {Bing Fan and
                  Hongtao Tan and
                  Yaqun Li},
  title        = {Critical link identification algorithm for power communication networks
                  in {SDN} architecture},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {40},
  pages        = {100584},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100584},
  doi          = {10.1016/J.IJCIP.2022.100584},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/FanTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GaoYSC23,
  author       = {Xin Gao and
                  Yunxia Ye and
                  Wenxin Su and
                  Linyan Chen},
  title        = {Assessing the comprehensive importance of power grid nodes based on
                  {DEA}},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100614},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100614},
  doi          = {10.1016/J.IJCIP.2023.100614},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/GaoYSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GulcanE23,
  author       = {Tolga Ahmet G{\"{u}}lcan and
                  Kadir Emrah Erginer},
  title        = {National and international maritime situational awareness model examples
                  and the effects of North Stream Pipelines sabotage},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100624},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100624},
  doi          = {10.1016/J.IJCIP.2023.100624},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/GulcanE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HeinrichGAK23,
  author       = {Markus Heinrich and
                  Arwed G{\"{o}}lz and
                  Tolga Arul and
                  Stefan Katzenbeisser},
  title        = {Rule-based anomaly detection for railway signalling networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100603},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100603},
  doi          = {10.1016/J.IJCIP.2023.100603},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HeinrichGAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HenriquesCCS23,
  author       = {Jo{\~{a}}o Henriques and
                  Filipe Caldeira and
                  Tiago Cruz and
                  Paulo Sim{\~{o}}es},
  title        = {A forensics and compliance auditing framework for critical infrastructure
                  protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100613},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100613},
  doi          = {10.1016/J.IJCIP.2023.100613},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HenriquesCCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HolmesPCSC23,
  author       = {Jennifer S. Holmes and
                  Agustin Palao and
                  Mercedez Callenes and
                  Neil Ortiz Silva and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {Attacking the grid: Lessons from a guerrilla conflict and efforts
                  for peace in Colombia: 1990-2018},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100621},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100621},
  doi          = {10.1016/J.IJCIP.2023.100621},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HolmesPCSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JungYM23,
  author       = {Sejin Jung and
                  Junbeom Yoo and
                  Sam Malek},
  title        = {A systematic co-engineering of safety and security analysis in requirements
                  engineering process},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {43},
  pages        = {100642},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100642},
  doi          = {10.1016/J.IJCIP.2023.100642},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/JungYM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KavallieratosK23,
  author       = {Georgios Kavallieratos and
                  Sokratis K. Katsikas},
  title        = {An exploratory analysis of the last frontier: {A} systematic literature
                  review of cybersecurity in space},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {43},
  pages        = {100640},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100640},
  doi          = {10.1016/J.IJCIP.2023.100640},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KavallieratosK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KhanGBKG23,
  author       = {Suleman Khan and
                  Gurjot Singh Gaba and
                  An Braeken and
                  Pardeep Kumar and
                  Andrei V. Gurtov},
  title        = {{AKAASH:} {A} realizable authentication, key agreement, and secure
                  handover approach for controller-pilot data link communications},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100619},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100619},
  doi          = {10.1016/J.IJCIP.2023.100619},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KhanGBKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LinN23,
  author       = {Chih{-}Yuan Lin and
                  Simin Nadjm{-}Tehrani},
  title        = {Protocol study and anomaly detection for server-driven traffic in
                  {SCADA} networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100612},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100612},
  doi          = {10.1016/J.IJCIP.2023.100612},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LinN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LingE23,
  author       = {Engla Rencelj Ling and
                  Mathias Ekstedt},
  title        = {A threat modeling language for generating attack graphs of substation
                  automation systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {41},
  pages        = {100601},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100601},
  doi          = {10.1016/J.IJCIP.2023.100601},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LingE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MaierHTF23,
  author       = {Matthew J. Maier and
                  Hunter S. Hayden and
                  Michael A. Temple and
                  Matthew C. Fickus},
  title        = {Ensuring the longevity of WirelessHART devices in industrial automation
                  and control systems using distinct native attribute fingerprinting},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {43},
  pages        = {100641},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100641},
  doi          = {10.1016/J.IJCIP.2023.100641},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MaierHTF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MargossianKS23,
  author       = {Harag Margossian and
                  Ronald Kfouri and
                  Rita Saliba},
  title        = {Measurement protection to prevent cyber-physical attacks against power
                  system State Estimation},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {43},
  pages        = {100643},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100643},
  doi          = {10.1016/J.IJCIP.2023.100643},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MargossianKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MoradiKHSG23,
  author       = {Shohreh Moradi and
                  Md Muzahid Khan and
                  Niamat Ullah Ibne Hossain and
                  Mohammad Shamsuddoha and
                  Alex Gorod},
  title        = {Modeling and assessing seismic resilience leveraging systems dynamic
                  approach: {A} case study of society 5.0},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {43},
  pages        = {100639},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100639},
  doi          = {10.1016/J.IJCIP.2023.100639},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MoradiKHSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MustafaABAMMA23,
  author       = {Faizan E. Mustafa and
                  Ijaz Ahmed and
                  Abdul Basit and
                  Um{-}E.{-}Habiba Alvi and
                  Saddam Hussain Malik and
                  Atif Mahmood and
                  Paghunda Roheela Ali},
  title        = {A review on effective alarm management systems for industrial process
                  control: Barriers and opportunities},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {41},
  pages        = {100599},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100599},
  doi          = {10.1016/J.IJCIP.2023.100599},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/MustafaABAMMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RamakiBR23,
  author       = {Ali Ahmadian Ramaki and
                  Abbas Ghaemi Bafghi and
                  Abbas Rasoolzadegan},
  title        = {{CAPTAIN:} Community-based Advanced Persistent Threat Analysis in
                  {IT} Networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100620},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100620},
  doi          = {10.1016/J.IJCIP.2023.100620},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RamakiBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SalamaET23,
  author       = {Mohamed Salama and
                  Wael El{-}Dakhakhni and
                  Michael Tait},
  title        = {Systemic risk mitigation strategy for power grid cascade failures
                  using constrained spectral clustering},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100622},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100622},
  doi          = {10.1016/J.IJCIP.2023.100622},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SalamaET23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Setola23,
  author       = {Roberto Setola},
  title        = {Editorial on Protection vs Resilience by Prof. Roberto Setola},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {41},
  pages        = {100608},
  year         = {2023},
  url          = {https://doi.org/10.1016/S1874-5482(23)00021-5},
  doi          = {10.1016/S1874-5482(23)00021-5},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Setola23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Setola23a,
  author       = {Roberto Setola},
  title        = {New threats and research problems for critical infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100629},
  year         = {2023},
  url          = {https://doi.org/10.1016/S1874-5482(23)00042-2},
  doi          = {10.1016/S1874-5482(23)00042-2},
  timestamp    = {Sun, 01 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Setola23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Setola23b,
  author       = {Roberto Setola},
  title        = {Systemic cyber risk},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {43},
  pages        = {100652},
  year         = {2023},
  url          = {https://doi.org/10.1016/S1874-5482(23)00065-3},
  doi          = {10.1016/S1874-5482(23)00065-3},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Setola23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TiongV23,
  author       = {Achara Tiong and
                  Hector A. Vergara},
  title        = {A two-stage stochastic multi-objective resilience optimization model
                  for network expansion of interdependent power-water networks under
                  disruption},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {40},
  pages        = {100588},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100588},
  doi          = {10.1016/J.IJCIP.2023.100588},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/TiongV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TiongV23a,
  author       = {Achara Tiong and
                  Hector A. Vergara},
  title        = {Evaluation of network expansion decisions for resilient interdependent
                  critical infrastructures with different topologies},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100623},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100623},
  doi          = {10.1016/J.IJCIP.2023.100623},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/TiongV23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/VargasT23,
  author       = {Paola Vargas and
                  Iris Tien},
  title        = {Impacts of 5G on cyber-physical risks for interdependent connected
                  smart critical infrastructure systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100617},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100617},
  doi          = {10.1016/J.IJCIP.2023.100617},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/VargasT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WangD23,
  author       = {Shuliang Wang and
                  Qiqi Dong},
  title        = {A multi-source power grid's resilience enhancement strategy based
                  on subnet division and power dispatch},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {41},
  pages        = {100602},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100602},
  doi          = {10.1016/J.IJCIP.2023.100602},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/WangD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WangKKGV23,
  author       = {Wensheng Wang and
                  Faezeh Karimi and
                  Kaveh Khalilpour and
                  David G. Green and
                  Manos Varvarigos},
  title        = {Robustness analysis of electricity networks against failure or attack:
                  The case of the Australian National Electricity Market {(NEM)}},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {41},
  pages        = {100600},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100600},
  doi          = {10.1016/J.IJCIP.2023.100600},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/WangKKGV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WangPLL23,
  author       = {Ziqi Wang and
                  Yulong Pei and
                  Jing Liu and
                  Hehang Liu},
  title        = {Vulnerability analysis of urban road networks based on traffic situation},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {41},
  pages        = {100590},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100590},
  doi          = {10.1016/J.IJCIP.2023.100590},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/WangPLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WangSZDGC23,
  author       = {Shuliang Wang and
                  Jingya Sun and
                  Jianhua Zhang and
                  Qiqi Dong and
                  Xifeng Gu and
                  Chen Chen},
  title        = {Attack-Defense game analysis of critical infrastructure network based
                  on Cournot model with fixed operating nodes},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {40},
  pages        = {100583},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100583},
  doi          = {10.1016/J.IJCIP.2022.100583},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/WangSZDGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WangWH23,
  author       = {Luping Wang and
                  Hui Wei and
                  Yun Hao},
  title        = {Vulnerable underground entrance understanding for visual surveillance
                  systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {41},
  pages        = {100589},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100589},
  doi          = {10.1016/J.IJCIP.2023.100589},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/WangWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/YangBLWBD23,
  author       = {Zhuyu Yang and
                  Bruno Barroca and
                  Katia Laffr{\'{e}}chine and
                  Alexandre Weppe and
                  Aur{\'{e}}lia Bony{-}Dandrieux and
                  Nicolas Daclin},
  title        = {A multi-criteria framework for critical infrastructure systems resilience},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {42},
  pages        = {100616},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ijcip.2023.100616},
  doi          = {10.1016/J.IJCIP.2023.100616},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/YangBLWBD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AliSS22,
  author       = {Busyairah Syd Ali and
                  Sam Saji and
                  Moon Ting Su},
  title        = {An assessment of frameworks for heterogeneous aircraft operations
                  in low-altitude airspace},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100528},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100528},
  doi          = {10.1016/J.IJCIP.2022.100528},
  timestamp    = {Sun, 24 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/AliSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AmpratwumOT22,
  author       = {Godslove Ampratwum and
                  Robert Osei{-}Kyei and
                  Vivian W. Y. Tam},
  title        = {Exploring the concept of public-private partnership in building critical
                  infrastructure resilience against unexpected events: {A} systematic
                  review},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {39},
  pages        = {100556},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100556},
  doi          = {10.1016/J.IJCIP.2022.100556},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/AmpratwumOT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BachmannVBB22,
  author       = {Ivana Bachmann and
                  Valeria Vald{\'{e}}s and
                  Javier Bustos{-}Jim{\'{e}}nez and
                  Benjamin Bustos},
  title        = {Effect of adding physical links on the robustness of the Internet
                  modeled as a physical-logical interdependent network using simple
                  strategies},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {36},
  pages        = {100483},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100483},
  doi          = {10.1016/J.IJCIP.2021.100483},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/BachmannVBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Baldoni22,
  author       = {Roberto Baldoni},
  title        = {Managing the cyber risk in a multipolar world},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {39},
  pages        = {100578},
  year         = {2022},
  url          = {https://doi.org/10.1016/S1874-5482(22)00062-2},
  doi          = {10.1016/S1874-5482(22)00062-2},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Baldoni22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BaxleyBGC22,
  author       = {Stuart Baxley and
                  Nicholas Bastin and
                  Deniz Gurkan and
                  William Arthur Conklin},
  title        = {Feasibility of critical infrastructure protection using network functions
                  for programmable and decoupled {ICS} policy enforcement over {WAN}},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {39},
  pages        = {100573},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100573},
  doi          = {10.1016/J.IJCIP.2022.100573},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BaxleyBGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BerghoutBM22,
  author       = {Tarek Berghout and
                  Mohamed Benbouzid and
                  S. M. Muyeen},
  title        = {Machine learning for cybersecurity in smart grids: {A} comprehensive
                  review-based study on methods, solutions, and prospects},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100547},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100547},
  doi          = {10.1016/J.IJCIP.2022.100547},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BerghoutBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BolbotKBBM22,
  author       = {Victor Bolbot and
                  Ketki Kulkarni and
                  P{\"{a}}ivi Brunou and
                  Osiris A. Valdez Banda and
                  Mashrura Musharraf},
  title        = {Developments and research directions in maritime cybersecurity: {A}
                  systematic literature review and bibliometric analysis},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {39},
  pages        = {100571},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100571},
  doi          = {10.1016/J.IJCIP.2022.100571},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/BolbotKBBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ChatzisS22,
  author       = {Petros Chatzis and
                  Eliana Stavrou},
  title        = {Cyber-threat landscape of border control infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {36},
  pages        = {100503},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100503},
  doi          = {10.1016/J.IJCIP.2021.100503},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ChatzisS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ChenZCHW22,
  author       = {Shun Chen and
                  Xudong Zhao and
                  Zhilong Chen and
                  Benwei Hou and
                  Yipeng Wu},
  title        = {A game-theoretic method to optimize allocation of defensive resource
                  to protect urban water treatment plants against physical attacks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {36},
  pages        = {100494},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100494},
  doi          = {10.1016/J.IJCIP.2021.100494},
  timestamp    = {Mon, 14 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ChenZCHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/DonnellyAT22,
  author       = {Peter Donnelly and
                  Mabrouka Abuhmida and
                  Christopher Tubb},
  title        = {The drift of industrial control systems to pseudo security},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100535},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100535},
  doi          = {10.1016/J.IJCIP.2022.100535},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/DonnellyAT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FiroozjaeiMBG22,
  author       = {Mahdi Daghmehchi Firoozjaei and
                  Nastaran Mahmoudyar and
                  Yaser Baseri and
                  Ali A. Ghorbani},
  title        = {An evaluation framework for industrial control system cyber incidents},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {36},
  pages        = {100487},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100487},
  doi          = {10.1016/J.IJCIP.2021.100487},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/FiroozjaeiMBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FrankenRRR22,
  author       = {Jonas Franken and
                  Thomas Reinhold and
                  Lilian Reichert and
                  Christian Reuter},
  title        = {The digital divide in state vulnerability to submarine communications
                  cable failure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100522},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100522},
  doi          = {10.1016/J.IJCIP.2022.100522},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/FrankenRRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Ghafory-Ashtiany22,
  author       = {Mohsen Ghafory{-}Ashtiany and
                  Mahban Arghavani},
  title        = {Physical performance of power grids against earthquakes: from framework
                  to implementation},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {39},
  pages        = {100550},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100550},
  doi          = {10.1016/J.IJCIP.2022.100550},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Ghafory-Ashtiany22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HallerGFBCF22,
  author       = {Piroska Haller and
                  B{\'{e}}la Genge and
                  Fabrizio Forloni and
                  Gianmarco Baldini and
                  Massimo Carriero and
                  Georgios Fontaras},
  title        = {VetaDetect: Vehicle tampering detection with closed-loop model ensemble},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100525},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100525},
  doi          = {10.1016/J.IJCIP.2022.100525},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HallerGFBCF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HallerGFBCF22a,
  author       = {Piroska Haller and
                  B{\'{e}}la Genge and
                  Fabrizio Forloni and
                  Gianmarco Baldini and
                  Massimo Carriero and
                  Georgios Fontaras},
  title        = {Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop
                  model ensemble' International Journal of Critical Infrastructure Protection,
                  37 (2022), 100525},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100543},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100543},
  doi          = {10.1016/J.IJCIP.2022.100543},
  timestamp    = {Wed, 21 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HallerGFBCF22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HanLS22,
  author       = {Sang Min Han and
                  Chanyoung Lee and
                  Poong Hyun Seong},
  title        = {Estimating the frequency of cyber threats to nuclear power plants
                  based on operating experience analysis},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100523},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100523},
  doi          = {10.1016/J.IJCIP.2022.100523},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HanLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HuffLM22,
  author       = {Johnathon Huff and
                  William B. Leonard and
                  Hugh R. Medal},
  title        = {The wireless network jamming problem subject to protocol interference
                  using directional antennas and with battery capacity constraints},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {39},
  pages        = {100572},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100572},
  doi          = {10.1016/J.IJCIP.2022.100572},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HuffLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KechagiasCPA22,
  author       = {Evripidis P. Kechagias and
                  Georgios Chatzistelios and
                  Georgios A. Papadopoulos and
                  Panagiotis Apostolou},
  title        = {Digital transformation of the maritime industry: {A} cybersecurity
                  systemic approach},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100526},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100526},
  doi          = {10.1016/J.IJCIP.2022.100526},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KechagiasCPA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KumarKST22,
  author       = {Rajesh Kumar and
                  Rohan Kela and
                  Siddhant Singh and
                  Rolando Trujillo{-}Rasua},
  title        = {{APT} attacks on industrial control systems: {A} tale of three incidents},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100521},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100521},
  doi          = {10.1016/J.IJCIP.2022.100521},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KumarKST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiG22,
  author       = {Ruiying Li and
                  Ying Gao},
  title        = {On the component resilience importance measures for infrastructure
                  systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {36},
  pages        = {100481},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100481},
  doi          = {10.1016/J.IJCIP.2021.100481},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiuGZWA22,
  author       = {Zhiqiang Liu and
                  Mohi{-}Ud{-}Din Ghulam and
                  Jiangbin Zheng and
                  Sifei Wang and
                  Muhammad Asim},
  title        = {A novel deep learning based security assessment framework for enhanced
                  security in swarm network environment},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100540},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100540},
  doi          = {10.1016/J.IJCIP.2022.100540},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiuGZWA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MaccaroneC22,
  author       = {Lee T. Maccarone and
                  Daniel G. Cole},
  title        = {Bayesian games for the cybersecurity of nuclear power plants},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100493},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100493},
  doi          = {10.1016/J.IJCIP.2021.100493},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/MaccaroneC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MajidiHK22,
  author       = {Seyed Hossein Majidi and
                  Shahrzad Hadayeghparast and
                  Hadis Karimipour},
  title        = {{FDI} attack detection using extra trees algorithm and deep learning
                  algorithm-autoencoder in smart grid},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100508},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100508},
  doi          = {10.1016/J.IJCIP.2022.100508},
  timestamp    = {Sun, 24 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/MajidiHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Martinez-Pastor22,
  author       = {Beatriz Martinez{-}Pastor and
                  Mar{\'{\i}}a Nogal and
                  Alan O'Connor and
                  Rui Teixeira},
  title        = {Identifying critical and vulnerable links: {A} new approach using
                  the Fisher information matrix},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {39},
  pages        = {100570},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100570},
  doi          = {10.1016/J.IJCIP.2022.100570},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Martinez-Pastor22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MaurerGEGSG22,
  author       = {Nils M{\"{a}}urer and
                  Tobias Guggemos and
                  Thomas Ewert and
                  Thomas Gr{\"{a}}upl and
                  Corinna Schmitt and
                  Sophia Grundner{-}Culemann},
  title        = {Security in Digital Aeronautical Communications {A} Comprehensive
                  Gap Analysis},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100549},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100549},
  doi          = {10.1016/J.IJCIP.2022.100549},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/MaurerGEGSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/NadirMS22,
  author       = {Ibrahim Nadir and
                  Haroon Mahmood and
                  Ghalib Asadullah Shah},
  title        = {A taxonomy of IoT firmware security and principal firmware analysis
                  techniques},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100552},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100552},
  doi          = {10.1016/J.IJCIP.2022.100552},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/NadirMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/NwekeWW22,
  author       = {Livinus Obiora Nweke and
                  Goitom K. Weldehawaryat and
                  Stephen D. Wolthusen},
  title        = {Corrigendum to Threat Modelling of Cyber-Physical Systems Using an
                  Applied {\(\pi\)}-Calculus},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {36},
  pages        = {100506},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100506},
  doi          = {10.1016/J.IJCIP.2021.100506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/NwekeWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PanthiD22,
  author       = {Manikant Panthi and
                  Tanmoy Kanti Das},
  title        = {Intelligent Intrusion Detection Scheme for Smart Power-Grid Using
                  Optimized Ensemble Learning on Selected Features},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {39},
  pages        = {100567},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100567},
  doi          = {10.1016/J.IJCIP.2022.100567},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/PanthiD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RahmanMKAD22,
  author       = {Ayesha Rahman and
                  Ghulam Mustafa and
                  Abdul Qayyum Khan and
                  Muhammad Abid and
                  Muhammad Hanif Durad},
  title        = {Launch of denial of service attacks on the modbus/TCP protocol and
                  development of its protection mechanisms},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {39},
  pages        = {100568},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100568},
  doi          = {10.1016/J.IJCIP.2022.100568},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RahmanMKAD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RehmanAS22,
  author       = {Obaid Ur Rehman and
                  Yousaf Ali and
                  Muhammad Sabir},
  title        = {Risk assessment and mitigation for electric power sectors: {A} developing
                  country's perspective},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {36},
  pages        = {100507},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100507},
  doi          = {10.1016/J.IJCIP.2021.100507},
  timestamp    = {Mon, 14 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RehmanAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RudysAAKZG22,
  author       = {Saulius Rudys and
                  Jurgis Aleksandravicius and
                  Rimvydas Aleksiejunas and
                  Andriy Konovaltsev and
                  Chen Zhu and
                  Lukasz A. Greda},
  title        = {Physical layer protection for {ADS-B} against spoofing and jamming},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100555},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100555},
  doi          = {10.1016/J.IJCIP.2022.100555},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RudysAAKZG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SousaMM22,
  author       = {{\'{A}}lan e Sousa and
                  Nadhir Messai and
                  Noureddine Manamanni},
  title        = {Load-altering attack detection on smart grid using functional observers},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100518},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100518},
  doi          = {10.1016/J.IJCIP.2022.100518},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SousaMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StavesABGGH22,
  author       = {Alexander Staves and
                  Tom Anderson and
                  Harry Balderstone and
                  Benjamin Green and
                  Antonios Gouglidis and
                  David Hutchison},
  title        = {A Cyber Incident Response and Recovery Framework to Support Operators
                  of Industrial Control Systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100505},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100505},
  doi          = {10.1016/J.IJCIP.2021.100505},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/StavesABGGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StrightCK22,
  author       = {Jim Stright and
                  Peter Cheetham and
                  Charalambos Konstantinou},
  title        = {Defensive cost-benefit analysis of smart grid digital functionalities},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {36},
  pages        = {100489},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100489},
  doi          = {10.1016/J.IJCIP.2021.100489},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/StrightCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/UmerJJM22,
  author       = {Muhammad Azmi Umer and
                  Khurum Nazir Junejo and
                  Muhammad Taha Jilani and
                  Aditya P. Mathur},
  title        = {Machine learning for intrusion detection in industrial control systems:
                  Applications, challenges, and recommendations},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100516},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100516},
  doi          = {10.1016/J.IJCIP.2022.100516},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/UmerJJM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ValueianVK22,
  author       = {Meysam Valueian and
                  Mojtaba Vahidi{-}Asl and
                  Alireza Khalilian},
  title        = {SituRepair: Incorporating machine-learning fault class prediction
                  to inform situational multiple fault automatic program repair},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100527},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100527},
  doi          = {10.1016/J.IJCIP.2022.100527},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ValueianVK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WangCZGH22,
  author       = {Shuliang Wang and
                  Chen Chen and
                  Jianhua Zhang and
                  Xifeng Gu and
                  Xiaodi Huang},
  title        = {Vulnerability assessment of urban road traffic systems based on traffic
                  flow},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100536},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100536},
  doi          = {10.1016/J.IJCIP.2022.100536},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/WangCZGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WangHBSS22,
  author       = {Wu Wang and
                  Fouzi Harrou and
                  Benamar Bouyeddou and
                  Sidi{-}Mohammed Senouci and
                  Ying Sun},
  title        = {Cyber-attacks detection in industrial systems using artificial intelligence-driven
                  methods},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100542},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100542},
  doi          = {10.1016/J.IJCIP.2022.100542},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/WangHBSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/YangHMXYG22,
  author       = {Jun Yang and
                  Leixiong Huang and
                  Haoming Ma and
                  Zhihui Xu and
                  Ming Yang and
                  Shaoqiang Guo},
  title        = {A 2D-graph model-based heuristic approach to visual backtracking security
                  vulnerabilities in physical protection systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {38},
  pages        = {100554},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100554},
  doi          = {10.1016/J.IJCIP.2022.100554},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/YangHMXYG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZalitisDZGKVFFB22,
  author       = {Ivars Zalitis and
                  Aleksandrs Dolgicers and
                  Laila Zemite and
                  Sebastian Ganter and
                  Vytis Kopustinskas and
                  Bogdan I. Vamanu and
                  J{\"{o}}rg Finger and
                  Clemente Fuggini and
                  Ilmars Bode and
                  Jevgenijs Kozadajevs and
                  Ivo H{\"{a}}ring},
  title        = {Mitigation of the impact of disturbances in gas transmission systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {39},
  pages        = {100569},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100569},
  doi          = {10.1016/J.IJCIP.2022.100569},
  timestamp    = {Sun, 19 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZalitisDZGKVFFB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZhangA22,
  author       = {Ning Zhang and
                  Alice Alipour},
  title        = {Flood risk assessment and application of risk curves for design of
                  mitigation strategies},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {36},
  pages        = {100490},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100490},
  doi          = {10.1016/J.IJCIP.2021.100490},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZhangA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AdepuM21,
  author       = {Sridhar Adepu and
                  Aditya Mathur},
  title        = {SafeCI: Avoiding process anomalies in critical infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100435},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100435},
  doi          = {10.1016/J.IJCIP.2021.100435},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/AdepuM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AliabadiSVG21,
  author       = {Maryam Raiyat Aliabadi and
                  Margo I. Seltzer and
                  Mojtaba Vahidi{-}Asl and
                  Ramak Ghavamizadeh},
  title        = {ARTINALI{\#}: An Efficient Intrusion Detection Technique for Resource-Constrained
                  Cyber-Physical Systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100430},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100430},
  doi          = {10.1016/J.IJCIP.2021.100430},
  timestamp    = {Thu, 20 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/AliabadiSVG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BhuiyanMNH21,
  author       = {Tanveer Hossain Bhuiyan and
                  Hugh R. Medal and
                  Apurba K. Nandi and
                  Mahantesh Halappanavar},
  title        = {Risk-averse bi-level stochastic network interdiction model for cyber-security
                  risk management},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {32},
  pages        = {100408},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100408},
  doi          = {10.1016/J.IJCIP.2021.100408},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/BhuiyanMNH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/CalleMMP21,
  author       = {Eusebi Calle and
                  David Mart{\'{\i}}nez and
                  Mariusz Mycek and
                  Michal Pi{\'{o}}ro},
  title        = {Resilient backup controller placement in distributed {SDN} under critical
                  targeted attacks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100422},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100422},
  doi          = {10.1016/J.IJCIP.2021.100422},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/CalleMMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ChekoleOC21,
  author       = {Eyasu Getahun Chekole and
                  Mart{\'{\i}}n Ochoa and
                  Sudipta Chattopadhyay},
  title        = {{SCOPE:} Secure Compiling of PLCs in Cyber-Physical Systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100431},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100431},
  doi          = {10.1016/J.IJCIP.2021.100431},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ChekoleOC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/DaweriAA21,
  author       = {Muataz Salam Al Daweri and
                  Salwani Abdullah and
                  Khairul Akram Zainol Ariffin},
  title        = {A homogeneous ensemble based dynamic artificial neural network for
                  solving the intrusion detection problem},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100449},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100449},
  doi          = {10.1016/J.IJCIP.2021.100449},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/DaweriAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FortiCSBAC21,
  author       = {Alessandro {Cantelli Forti} and
                  Amerigo Capria and
                  Anna Lisa Saverino and
                  Fabrizio Berizzi and
                  Davide Adami and
                  Christian Callegari},
  title        = {Critical infrastructure protection system design based on {SCOUT}
                  multitech seCurity system for intercOnnected space control groUnd
                  staTions},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {32},
  pages        = {100407},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100407},
  doi          = {10.1016/J.IJCIP.2020.100407},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/FortiCSBAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HanZCWSZ21,
  author       = {Lin Han and
                  Xudong Zhao and
                  Zhilong Chen and
                  Yipeng Wu and
                  Xiaochao Su and
                  Ning Zhang},
  title        = {Optimal allocation of defensive resources to defend urban power networks
                  against different types of attackers},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100467},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100467},
  doi          = {10.1016/J.IJCIP.2021.100467},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HanZCWSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HuiMS21,
  author       = {Henry Hui and
                  Kieran McLaughlin and
                  Sakir Sezer},
  title        = {Vulnerability analysis of {S7} PLCs: Manipulating the security mechanism},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100470},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100470},
  doi          = {10.1016/J.IJCIP.2021.100470},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HuiMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HussainFAS21,
  author       = {Shahbaz Hussain and
                  Javier Hernandez Fernandez and
                  Abdulla Khalid Al{-}Ali and
                  Abdullatif Shikfa},
  title        = {Vulnerabilities and countermeasures in electrical substations},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100406},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100406},
  doi          = {10.1016/J.IJCIP.2020.100406},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HussainFAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JenaGK21,
  author       = {Prasanta Kumar Jena and
                  Subhojit Ghosh and
                  Ebha Koley},
  title        = {Design of a coordinated cyber-physical attack in IoT based smart grid
                  under limited intruder accessibility},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100484},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100484},
  doi          = {10.1016/J.IJCIP.2021.100484},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/JenaGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JiaWPCSC21,
  author       = {Yifan Jia and
                  Jingyi Wang and
                  Christopher M. Poskitt and
                  Sudipta Chattopadhyay and
                  Jun Sun and
                  Yuqi Chen},
  title        = {Adversarial attacks and mitigation for anomaly detectors of cyber-physical
                  systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100452},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100452},
  doi          = {10.1016/J.IJCIP.2021.100452},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/JiaWPCSC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Kalam21,
  author       = {Anas Abou El Kalam},
  title        = {Securing {SCADA} and critical industrial systems: From needs to security
                  mechanisms},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {32},
  pages        = {100394},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100394},
  doi          = {10.1016/J.IJCIP.2020.100394},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Kalam21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KarimiRH21,
  author       = {Masoumeh Karimi and
                  Sajad Najafi Ravadanegh and
                  Mahmoud{-}Reza Haghifam},
  title        = {A study on resilient and cost-based design in power distribution network
                  against severe hurricane},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100469},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100469},
  doi          = {10.1016/J.IJCIP.2021.100469},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KarimiRH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KhazaeiA21,
  author       = {Javad Khazaei and
                  M. Hadi Amini},
  title        = {Protection of large-scale smart grids against false data injection
                  cyberattacks leading to blackouts},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100457},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100457},
  doi          = {10.1016/J.IJCIP.2021.100457},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KhazaeiA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KizhakkedathT21,
  author       = {Akhila Kizhakkedath and
                  Kang Tai},
  title        = {Vulnerability analysis of critical infrastructure network},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100472},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100472},
  doi          = {10.1016/J.IJCIP.2021.100472},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KizhakkedathT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiLW21,
  author       = {Kaiwen Li and
                  Kai Liu and
                  Ming Wang},
  title        = {Robustness of the Chinese power grid to cascading failures under attack
                  and defense strategies},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100432},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100432},
  doi          = {10.1016/J.IJCIP.2021.100432},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiWLHDGC21,
  author       = {Fei Li and
                  Jing Wang and
                  Hui Li and
                  Qian Hu and
                  Wenxuan Dan and
                  Liangquan Ge and
                  David Cohen},
  title        = {Evaluation on nuclear emergency response strategies in the Asia-Pacific
                  region},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100447},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100447},
  doi          = {10.1016/J.IJCIP.2021.100447},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiWLHDGC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LuiijfK21,
  author       = {Eric A. M. Luiijf and
                  Marieke H. A. Klaver},
  title        = {Analysis and lessons identified on critical infrastructures and dependencies
                  from an empirical data set},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100471},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100471},
  doi          = {10.1016/J.IJCIP.2021.100471},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LuiijfK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MedjekTDR21,
  author       = {Faiza Medjek and
                  Djamel Tandjaoui and
                  Nabil Djedjig and
                  Imed Romdhani},
  title        = {Fault-tolerant AI-driven Intrusion Detection System for the Internet
                  of Things},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100436},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100436},
  doi          = {10.1016/J.IJCIP.2021.100436},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MedjekTDR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MillerSMSG21,
  author       = {Thomas Miller and
                  Alexander Staves and
                  Sam Maesschalck and
                  Miriam Sturdee and
                  Benjamin Green},
  title        = {Looking back to look forward: Lessons learnt from cyber-attacks on
                  Industrial Control Systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100464},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100464},
  doi          = {10.1016/J.IJCIP.2021.100464},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/MillerSMSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/NwekeWW21,
  author       = {Livinus Obiora Nweke and
                  Goitom K. Weldehawaryat and
                  Stephen D. Wolthusen},
  title        = {Threat Modelling of Cyber-Physical Systems Using an Applied {\(\pi\)}-Calculus},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100466},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100466},
  doi          = {10.1016/J.IJCIP.2021.100466},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/NwekeWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/OlivaFSTZ21,
  author       = {Gabriele Oliva and
                  Luca Faramondi and
                  Roberto Setola and
                  Marco Tesei and
                  Enrico Zio},
  title        = {A multi-criteria model for the security assessment of large-infrastructure
                  construction sites},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100460},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100460},
  doi          = {10.1016/J.IJCIP.2021.100460},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/OlivaFSTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PirbhulalGK21,
  author       = {Sandeep Pirbhulal and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {A Systematic Literature Review on {RAMS} analysis for critical infrastructures
                  protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100427},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100427},
  doi          = {10.1016/J.IJCIP.2021.100427},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/PirbhulalGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PlotnekS21,
  author       = {Jordan J. Plotnek and
                  Jill Slay},
  title        = {Power systems resilience: Definition and taxonomy with a view towards
                  metrics},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100411},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100411},
  doi          = {10.1016/J.IJCIP.2021.100411},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/PlotnekS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PriyankaTPM21,
  author       = {E. B. Priyanka and
                  S. Thangavel and
                  P. H. Prasad and
                  R. Mohanasundaram},
  title        = {IoT fusion based model predictive pid control approach for oil pipeline
                  infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100485},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100485},
  doi          = {10.1016/J.IJCIP.2021.100485},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/PriyankaTPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RandallA21,
  author       = {Rick G. Randall and
                  Stuart Allen},
  title        = {Cybersecurity professionals information sharing sources and networks
                  in the {U.S.} electrical power industry},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100454},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100454},
  doi          = {10.1016/J.IJCIP.2021.100454},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RandallA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SafariPK21,
  author       = {Mohammad Safari and
                  Elham Parvinnia and
                  Alireza Keshavarz{-}Haddad},
  title        = {Industrial intrusion detection based on the behavior of rotating machine},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100424},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100424},
  doi          = {10.1016/J.IJCIP.2021.100424},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SafariPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Sellevag21,
  author       = {Stig Rune Sellev{\aa}g},
  title        = {Changes in inoperability for interdependent industry sectors in Norway
                  from 2012 to 2017},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {32},
  pages        = {100405},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100405},
  doi          = {10.1016/J.IJCIP.2020.100405},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Sellevag21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SilvaPCM21,
  author       = {Rovedy Aparecida Busquim e Silva and
                  Jos{\'{e}} Roberto Castilho Piqueira and
                  J. J. Cruz and
                  R. P. Marques},
  title        = {Cybersecurity Assessment Framework for Digital Interface Between Safety
                  and Security at Nuclear Power Plants},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100453},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100453},
  doi          = {10.1016/J.IJCIP.2021.100453},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SilvaPCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SinghM21,
  author       = {Neeraj Kumar Singh and
                  Vasundhara Mahajan},
  title        = {End-User Privacy Protection Scheme from cyber intrusion in smart grid
                  advanced metering infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100410},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100410},
  doi          = {10.1016/J.IJCIP.2021.100410},
  timestamp    = {Thu, 10 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SinghM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SoaresASG21,
  author       = {Nielson Soares and
                  Eduardo Pestana de Aguiar and
                  Amanda Campos Souza and
                  Leonardo Goliatt},
  title        = {Unsupervised machine learning techniques to prevent faults in railroad
                  switch machines},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100423},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100423},
  doi          = {10.1016/J.IJCIP.2021.100423},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SoaresASG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SohouenouN21,
  author       = {Philippe Y. R. Sohouenou and
                  Luis A. C. Neves},
  title        = {Assessing the effects of link-repair sequences on road network resilience},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100448},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100448},
  doi          = {10.1016/J.IJCIP.2021.100448},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SohouenouN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TornyeviadziNMS21,
  author       = {Hoese Michel Tornyeviadzi and
                  Fabrice Abunde Neba and
                  Hadi Mohammed and
                  Razak Seidu},
  title        = {Nodal vulnerability assessment of water distribution networks: An
                  integrated Fuzzy {AHP-TOPSIS} approach},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100434},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100434},
  doi          = {10.1016/J.IJCIP.2021.100434},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/TornyeviadziNMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/VavraHLD21,
  author       = {Jan V{\'{a}}vra and
                  Martin Hromada and
                  Ludek Luk{\'{a}}s and
                  Jacek Dworzecki},
  title        = {Adaptive anomaly detection system based on machine learning algorithms
                  in an industrial control environment},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100446},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100446},
  doi          = {10.1016/J.IJCIP.2021.100446},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/VavraHLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WangGLZ21,
  author       = {Shuliang Wang and
                  Xifeng Gu and
                  Shengyang Luan and
                  Mingwei Zhao},
  title        = {Resilience analysis of interdependent critical infrastructure systems
                  considering deep learning and network theory},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100459},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100459},
  doi          = {10.1016/J.IJCIP.2021.100459},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/WangGLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Williams21,
  author       = {James Bryan Williams},
  title        = {Critical flow centrality measures on interdependent networks with
                  time-varying demands},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100462},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100462},
  doi          = {10.1016/J.IJCIP.2021.100462},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Williams21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/YadavP21,
  author       = {Geeta Yadav and
                  Kolin Paul},
  title        = {Architecture and security of {SCADA} systems: {A} review},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {34},
  pages        = {100433},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100433},
  doi          = {10.1016/J.IJCIP.2021.100433},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/YadavP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZhangN21,
  author       = {Yifan Zhang and
                  S. Thomas Ng},
  title        = {A hypothesis-driven framework for resilience analysis of public transport
                  network under compound failure scenarios},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {35},
  pages        = {100455},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100455},
  doi          = {10.1016/J.IJCIP.2021.100455},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZhangN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AbediR20,
  author       = {Amin Abedi and
                  Franco Romerio},
  title        = {Multi-period vulnerability analysis of power grids under multiple
                  outages: An AC-based bilevel optimization approach},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {30},
  pages        = {100365},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100365},
  doi          = {10.1016/J.IJCIP.2020.100365},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/AbediR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AhmadianSS20,
  author       = {Mohammad Mehdi Ahmadian and
                  Mehdi Shajari and
                  Mohammad Ali Shafiee},
  title        = {Industrial control system security taxonomic framework with application
                  to a comprehensive incidents survey},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {29},
  pages        = {100356},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100356},
  doi          = {10.1016/J.IJCIP.2020.100356},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/AhmadianSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AoudiA20,
  author       = {Wissam Aoudi and
                  Magnus Almgren},
  title        = {A scalable specification-agnostic multi-sensor anomaly detection system
                  for IIoT environments},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {30},
  pages        = {100377},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100377},
  doi          = {10.1016/J.IJCIP.2020.100377},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/AoudiA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Cavalieri20,
  author       = {Francesco Cavalieri},
  title        = {Seismic risk assessment of natural gas networks with steady-state
                  flow computation},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {28},
  pages        = {100339},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100339},
  doi          = {10.1016/J.IJCIP.2020.100339},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Cavalieri20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ChoubinehWC20,
  author       = {Abouzar Choubineh and
                  David A. Wood and
                  Zahak Choubineh},
  title        = {Applying separately cost-sensitive learning and Fisher's discriminant
                  analysis to address the class imbalance problem: {A} case study involving
                  a virtual gas pipeline {SCADA} system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {29},
  pages        = {100357},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100357},
  doi          = {10.1016/J.IJCIP.2020.100357},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ChoubinehWC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FangFD20,
  author       = {Yuanjie Fang and
                  Minrui Fei and
                  Dajun Du},
  title        = {Linear time invariant system fault isolation: {A} static compensation
                  decoupling method},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {31},
  pages        = {100392},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100392},
  doi          = {10.1016/J.IJCIP.2020.100392},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/FangFD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FaramondiOS20,
  author       = {Luca Faramondi and
                  Gabriele Oliva and
                  Roberto Setola},
  title        = {Multi-criteria node criticality assessment framework for critical
                  infrastructure networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {28},
  pages        = {100338},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100338},
  doi          = {10.1016/J.IJCIP.2020.100338},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/FaramondiOS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GentileMNB20,
  author       = {Ugo Gentile and
                  Stefano Marrone and
                  Roberto Nardone and
                  Emanuele Bellini},
  title        = {Computer-aided security assessment of water networks monitoring platforms},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {31},
  pages        = {100390},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100390},
  doi          = {10.1016/J.IJCIP.2020.100390},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/GentileMNB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GonzalezDM20,
  author       = {Santiago G. Gonz{\'{a}}lez and
                  Sebasti{\'{a}}n Dormido and
                  Jos{\'{e}} S{\'{a}}nchez Moreno},
  title        = {Obtaining high preventive and resilience capacities in critical infrastructure
                  by industrial automation cells},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {29},
  pages        = {100355},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100355},
  doi          = {10.1016/J.IJCIP.2020.100355},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/GonzalezDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KampovaLR20,
  author       = {Katar{\'{\i}}na Kampov{\'{a}} and
                  Tom{\'{a}}s Lovecek and
                  David Rehak},
  title        = {Quantitative approach to physical protection systems assessment of
                  critical infrastructure elements: Use case in the Slovak Republic},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {30},
  pages        = {100376},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100376},
  doi          = {10.1016/J.IJCIP.2020.100376},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KampovaLR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KraidiSMB20,
  author       = {Layth Kraidi and
                  Raj Shah and
                  Wilfred Matipa and
                  Fiona Borthwick},
  title        = {Using stakeholders' judgement and fuzzy logic theory to analyze the
                  risk influencing factors in oil and gas pipeline projects: Case study
                  in Iraq, Stage {II}},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {28},
  pages        = {100337},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100337},
  doi          = {10.1016/J.IJCIP.2020.100337},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KraidiSMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiuHLT20,
  author       = {Wu Liu and
                  Longxuan Hui and
                  Yuting Lu and
                  Jinsong Tang},
  title        = {Developing an evaluation method for SCADA-Controlled urban gas infrastructure
                  hierarchical design using multi-level fuzzy comprehensive evaluation},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {30},
  pages        = {100375},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100375},
  doi          = {10.1016/J.IJCIP.2020.100375},
  timestamp    = {Wed, 11 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiuHLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LoLHCT20,
  author       = {Huai{-}Wei Lo and
                  James Jiann{-}Haw Liou and
                  Chun{-}Nen Huang and
                  Yen{-}Ching Chuang and
                  Gwo{-}Hshiung Tzeng},
  title        = {A new soft computing approach for analyzing the influential relationships
                  of critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {28},
  pages        = {100336},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100336},
  doi          = {10.1016/J.IJCIP.2019.100336},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LoLHCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/NdondaS20,
  author       = {Gorby Kabasele Ndonda and
                  Ramin Sadre},
  title        = {Network trace generation for flow-based {IDS} evaluation in control
                  and automation systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {31},
  pages        = {100385},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100385},
  doi          = {10.1016/J.IJCIP.2020.100385},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/NdondaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/OttenburgerCJBT20,
  author       = {Sadeeb Simon Ottenburger and
                  H{\"{u}}seyin Kem{\^{a}}l {\c{C}}akmak and
                  Wilfried Jakob and
                  Andreas Blattmann and
                  Dmytro Trybushnyi and
                  Wolfgang Raskob and
                  Uwe G. K{\"{u}}hnapfel and
                  Veit Hagenmeyer},
  title        = {A novel optimization method for urban resilient and fair power distribution
                  preventing critical network states},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {29},
  pages        = {100354},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100354},
  doi          = {10.1016/J.IJCIP.2020.100354},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/OttenburgerCJBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PetersenLFSLTB20,
  author       = {Laura Petersen and
                  Emma Lundin and
                  Laure Fallou and
                  Johan Sj{\"{o}}str{\"{o}}m and
                  David Lange and
                  Rui Teixeira and
                  Alexandre Bonavita},
  title        = {Resilience for whom? The general public's tolerance levels as {CI}
                  resilience criteria},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {28},
  pages        = {100340},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100340},
  doi          = {10.1016/J.IJCIP.2020.100340},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/PetersenLFSLTB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RamanSM20,
  author       = {M. R. Gauthama Raman and
                  Nivethitha Somu and
                  Aditya P. Mathur},
  title        = {A multilayer perceptron model for anomaly detection in water treatment
                  plants},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {31},
  pages        = {100393},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100393},
  doi          = {10.1016/J.IJCIP.2020.100393},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RamanSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ShresthaJNR20,
  author       = {Manish Shrestha and
                  Christian Johansen and
                  Josef Noll and
                  Davide Roverso},
  title        = {A Methodology for Security Classification applied to Smart Grid Infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {28},
  pages        = {100342},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100342},
  doi          = {10.1016/J.IJCIP.2020.100342},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ShresthaJNR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SohouenouCCNP20,
  author       = {Philippe Y. R. Sohouenou and
                  Panayotis Christidis and
                  Aris Christodoulou and
                  Luis A. C. Neves and
                  Davide Lo Presti},
  title        = {Using a random road graph model to understand road networks robustness
                  to link failures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {29},
  pages        = {100353},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100353},
  doi          = {10.1016/J.IJCIP.2020.100353},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SohouenouCCNP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Strous20,
  author       = {Leon Strous},
  title        = {{IJCIP} Editorial March 2020 - Volume 28},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {28},
  pages        = {100343},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100343},
  doi          = {10.1016/J.IJCIP.2020.100343},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Strous20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Strous20a,
  author       = {Leon Strous},
  title        = {{IJCIP} Editorial June 2020 - Volume 29},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {29},
  pages        = {100366},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100366},
  doi          = {10.1016/J.IJCIP.2020.100366},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Strous20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/UmerMJA20,
  author       = {Muhammad Azmi Umer and
                  Aditya Mathur and
                  Khurum Nazir Junejo and
                  Sridhar Adepu},
  title        = {Generating invariants using design and data-centric approaches for
                  distributed attack detection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {28},
  pages        = {100341},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100341},
  doi          = {10.1016/J.IJCIP.2020.100341},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/UmerMJA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZhangASZH20,
  author       = {Yanjie Zhang and
                  Bilal M. Ayyub and
                  Yalda Saadat and
                  Dongming Zhang and
                  Hongwei Huang},
  title        = {A double-weighted vulnerability assessment model for metrorail transit
                  networks and its application in Shanghai metro},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {29},
  pages        = {100358},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100358},
  doi          = {10.1016/J.IJCIP.2020.100358},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZhangASZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZhengDLLZ20,
  author       = {Jianqin Zheng and
                  Yuanhao Dai and
                  Yongtu Liang and
                  Qi Liao and
                  Haoran Zhang},
  title        = {An online real-time estimation tool of leakage parameters for hazardous
                  liquid pipelines},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {31},
  pages        = {100389},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100389},
  doi          = {10.1016/J.IJCIP.2020.100389},
  timestamp    = {Fri, 26 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZhengDLLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZhouYNXL20,
  author       = {Shenghua Zhou and
                  Yifan Yang and
                  S. Thomas Ng and
                  J. Frank Xu and
                  Dezhi Li},
  title        = {Integrating data-driven and physics-based approaches to characterize
                  failures of interdependent infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {31},
  pages        = {100391},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ijcip.2020.100391},
  doi          = {10.1016/J.IJCIP.2020.100391},
  timestamp    = {Thu, 14 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZhouYNXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Ali19,
  author       = {Busyairah Syd Ali},
  title        = {Traffic management for drones flying in the city},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100310},
  doi          = {10.1016/J.IJCIP.2019.100310},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Ali19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BarretoCHPR19,
  author       = {Carlos A. Barreto and
                  Alvaro A. C{\'{a}}rdenas and
                  Jennifer S. Holmes and
                  Agustin Palao and
                  Juan Carlos Restrepo},
  title        = {A business that can't lose: Investing in attacks against the Colombian
                  power grid},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.05.006},
  doi          = {10.1016/J.IJCIP.2019.05.006},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BarretoCHPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BellRP19,
  author       = {Alison J. C. Bell and
                  M. Brooke Rogers and
                  Julia M. Pearce},
  title        = {The insider threat: Behavioral indicators and factors influencing
                  likelihood of intervention},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {166--176},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.12.001},
  doi          = {10.1016/J.IJCIP.2018.12.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BellRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/CBASI19,
  author       = {Pramod T. C and
                  Kianoosh G. Boroojeni and
                  M. Hadi Amini and
                  N. R. Sunitha and
                  S. S. Iyengar},
  title        = {Key pre-distribution scheme with join leave support for {SCADA} systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {111--125},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.011},
  doi          = {10.1016/J.IJCIP.2018.10.011},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/CBASI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/DemirNS19,
  author       = {Kubilay Demir and
                  Ferdaus Nayyer and
                  Neeraj Suri},
  title        = {{MPTCP-H:} {A} DDoS attack resilient transport protocol to secure
                  wide area measurement systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {84--101},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.02.003},
  doi          = {10.1016/J.IJCIP.2019.02.003},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/DemirNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FarsiFT19,
  author       = {Hamed Farsi and
                  Ali Fanian and
                  Zahra Taghiyarrenani},
  title        = {A novel online state-based anomaly detection system for process control
                  networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {27},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100323},
  doi          = {10.1016/J.IJCIP.2019.100323},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/FarsiFT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GalbraithI19,
  author       = {John W. Galbraith and
                  Luca Iuliani},
  title        = {Measures of robustness for networked critical infrastructure: An empirical
                  comparison on four electrical grids},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {27},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100326},
  doi          = {10.1016/J.IJCIP.2019.100326},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GalbraithI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GariupP19,
  author       = {Monica Gariup and
                  Jakub Piskorski},
  title        = {The challenge of detecting false documents at the border: Exploring
                  the performance of humans, machines and their interaction},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {100--110},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.005},
  doi          = {10.1016/J.IJCIP.2018.10.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GariupP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GazizulinCBK19,
  author       = {Dmitri Gazizulin and
                  Evyatar Cohen and
                  Jacob Bortman and
                  Renata Klein},
  title        = {Critical rotating machinery protection by integration of a "fuse"
                  bearing},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {27},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100305},
  doi          = {10.1016/J.IJCIP.2019.100305},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/GazizulinCBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Ghavami19,
  author       = {Seyed Morsal Ghavami},
  title        = {Multi-criteria spatial decision support system for identifying strategic
                  roads in disaster situations},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {23--36},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.004},
  doi          = {10.1016/J.IJCIP.2018.10.004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Ghavami19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GravetoRCS19,
  author       = {Vitor Graveto and
                  Lu{\'{\i}}s Rosa and
                  Tiago Cruz and
                  Paulo Sim{\~{o}}es},
  title        = {A stealth monitoring mechanism for cyber-physical systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {126--143},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.006},
  doi          = {10.1016/J.IJCIP.2018.10.006},
  timestamp    = {Fri, 12 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GravetoRCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HallerGD19,
  author       = {Piroska Haller and
                  B{\'{e}}la Genge and
                  Adrian{-}Vasile Duka},
  title        = {On the practical integration of anomaly detection techniques in industrial
                  control applications},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {48--68},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.008},
  doi          = {10.1016/J.IJCIP.2018.10.008},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HallerGD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HanPL19,
  author       = {Choong{-}Hee Han and
                  Soon{-}Tai Park and
                  Sang{-}Joon Lee},
  title        = {The Enhanced Security Control model for critical infrastructures with
                  the blocking prioritization process to cyber threats in power system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100312},
  doi          = {10.1016/J.IJCIP.2019.100312},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HanPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HanZ19,
  author       = {Fangyuan Han and
                  Enrico Zio},
  title        = {A multi-perspective framework of analysis of critical infrastructures
                  with respect to supply service, controllability and topology},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {1--13},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.009},
  doi          = {10.1016/J.IJCIP.2018.10.009},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HanZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HerreraM19,
  author       = {Luis{-}Carlos Herrera and
                  Olaf Maennel},
  title        = {A comprehensive instrument for identifying critical information infrastructure
                  services},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {50--61},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.02.001},
  doi          = {10.1016/J.IJCIP.2019.02.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HerreraM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HossainJHMB19,
  author       = {Niamat Ullah Ibne Hossain and
                  Ra'ed M. Jaradat and
                  Seyedmohsen Hosseini and
                  Mohammad Marufuzzaman and
                  Randy K. Buchanan},
  title        = {A framework for modeling and assessing system resilience using a Bayesian
                  network: {A} case study of an interdependent electrical infrastructure
                  system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {62--83},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.02.002},
  doi          = {10.1016/J.IJCIP.2019.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HossainJHMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KimaniOL19,
  author       = {Kenneth Kimani and
                  Vitalice Oduol and
                  Kibet Langat},
  title        = {Cyber security challenges for IoT-based smart grid networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {36--49},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.01.001},
  doi          = {10.1016/J.IJCIP.2019.01.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KimaniOL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KleinK19,
  author       = {Peter Klein and
                  Fabian Klein},
  title        = {Dynamics of interdependent critical infrastructures - {A} mathematical
                  model with unexpected results},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {69--77},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.11.002},
  doi          = {10.1016/J.IJCIP.2018.11.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KleinK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KraidiSMB19,
  author       = {Layth Kraidi and
                  Raj Shah and
                  Wilfred Matipa and
                  Fiona Borthwick},
  title        = {Analyzing the critical risk factors associated with oil and gas pipeline
                  projects in Iraq},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {14--22},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.010},
  doi          = {10.1016/J.IJCIP.2018.10.010},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KraidiSMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LandegrenJS19,
  author       = {Finn Erik Landegren and
                  Jonas Johansson and
                  Olof Samuelsson},
  title        = {Quality of supply regulations versus societal priorities regarding
                  electricity outage consequences: Case study in a Swedish context},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100307},
  doi          = {10.1016/J.IJCIP.2019.100307},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LandegrenJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiFLXNZ19,
  author       = {Zhengbing Li and
                  Huixia Feng and
                  Yongtu Liang and
                  Ning Xu and
                  Siming Nie and
                  Haoran Zhang},
  title        = {A leakage risk assessment method for hazardous liquid pipeline based
                  on Markov chain Monte Carlo},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {27},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100325},
  doi          = {10.1016/J.IJCIP.2019.100325},
  timestamp    = {Fri, 26 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiFLXNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiW19,
  author       = {Tengyao Li and
                  Buhong Wang},
  title        = {Sequential collaborative detection strategy on {ADS-B} data attack},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {78--99},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.11.003},
  doi          = {10.1016/J.IJCIP.2018.11.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Mao0P19,
  author       = {Quan Mao and
                  Nan Li and
                  Feniosky Pe{\~{n}}a{-}Mora},
  title        = {Quality function deployment-based framework for improving the resilience
                  of critical infrastructure systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100304},
  doi          = {10.1016/J.IJCIP.2019.100304},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Mao0P19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MishraPM19,
  author       = {Vishrut Kumar Mishra and
                  Venkata Reddy Palleti and
                  Aditya Mathur},
  title        = {A modeling framework for critical infrastructure and its application
                  in detecting cyber-attacks on a water distribution system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.05.001},
  doi          = {10.1016/J.IJCIP.2019.05.001},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MishraPM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RanabhatCGHY19,
  author       = {Bikash Ranabhat and
                  Joseph Clements and
                  Jacob Gatlin and
                  Kuang{-}Ting Hsiao and
                  Mark Yampolskiy},
  title        = {Optimal sabotage attack on composite material parts},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.05.004},
  doi          = {10.1016/J.IJCIP.2019.05.004},
  timestamp    = {Thu, 28 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RanabhatCGHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RehakSHL19,
  author       = {David Rehak and
                  Pavel Senovsky and
                  Martin Hromada and
                  Tom{\'{a}}s Lovecek},
  title        = {Complex approach to assessing resilience of critical infrastructure
                  elements},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {125--138},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.03.003},
  doi          = {10.1016/J.IJCIP.2019.03.003},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RehakSHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Robles-DuraznoM19,
  author       = {Andres Robles{-}Durazno and
                  Naghmeh Moradpoor and
                  James McWhinnie and
                  Gordon Russell and
                  Inaki Maneru{-}Marin},
  title        = {{PLC} memory attack detection and response in a clean water supply
                  system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.05.003},
  doi          = {10.1016/J.IJCIP.2019.05.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Robles-DuraznoM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RodofileRF19,
  author       = {Nicholas R. Rodofile and
                  Kenneth Radke and
                  Ernest Foo},
  title        = {Extending the cyber-attack landscape for SCADA-based critical infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {14--35},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.01.002},
  doi          = {10.1016/J.IJCIP.2019.01.002},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RodofileRF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SandorGSMH19,
  author       = {Hunor S{\'{a}}ndor and
                  B{\'{e}}la Genge and
                  Zolt{\'{a}}n Sz{\'{a}}nt{\'{o}} and
                  Lorinc M{\'{a}}rton and
                  Piroska Haller},
  title        = {Cyber attack detection and mitigation: Software Defined Survivable
                  Industrial Control Systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {152--168},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.04.002},
  doi          = {10.1016/J.IJCIP.2019.04.002},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SandorGSMH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SaraeianSM19,
  author       = {Shideh Saraeian and
                  Babak Shirazi and
                  Homayun Motameni},
  title        = {Adaptive control of criticality infrastructure in automatic closed-loop
                  supply chain considering uncertainty},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {102--124},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.02.004},
  doi          = {10.1016/J.IJCIP.2019.02.004},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SaraeianSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ShengliY19,
  author       = {Shengli Liu and
                  Yongtu Liang},
  title        = {Exploring the temporal structure of time series data for hazardous
                  liquid pipeline incidents based on complex network theory},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100308},
  doi          = {10.1016/J.IJCIP.2019.100308},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ShengliY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Sportiello19,
  author       = {Luigi Sportiello},
  title        = {"Internet of Smart Cards": {A} pocket attacks scenario},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.05.005},
  doi          = {10.1016/J.IJCIP.2019.05.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Sportiello19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StockmanDGP19,
  author       = {Melissa Stockman and
                  Dipankar Dwivedi and
                  Reinhard Gentz and
                  Sean Peisert},
  title        = {Detecting control system misbehavior by fingerprinting programmable
                  logic controller functionality},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100306},
  doi          = {10.1016/J.IJCIP.2019.100306},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/StockmanDGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Strous19,
  author       = {Leon Strous},
  title        = {{IJCIP} Editorial March 2019 - Volume 24},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {iii--iv},
  year         = {2019},
  url          = {https://doi.org/10.1016/S1874-5482(19)30022-8},
  doi          = {10.1016/S1874-5482(19)30022-8},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Strous19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Strous19a,
  author       = {Leon Strous},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {iii--v},
  year         = {2019},
  url          = {https://doi.org/10.1016/S1874-5482(19)30072-1},
  doi          = {10.1016/S1874-5482(19)30072-1},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Strous19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Strous19b,
  author       = {Leon Strous},
  title        = {{IJCIP} Editorial December 2019 - Volume 27},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {27},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100333},
  doi          = {10.1016/J.IJCIP.2019.100333},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Strous19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SugumarM19,
  author       = {Gayathri Sugumar and
                  Aditya Mathur},
  title        = {A method for testing distributed anomaly detectors},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {27},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.100324},
  doi          = {10.1016/J.IJCIP.2019.100324},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SugumarM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ThompsonFNCHR19,
  author       = {James R. Thompson and
                  Damon Frezza and
                  Burhan Necioglu and
                  Michael L. Cohen and
                  Kenneth C. Hoffman and
                  Kristine Rosfjord},
  title        = {Interdependent Critical Infrastructure Model {(ICIM):} An agent-based
                  model of power and water infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {144--165},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.12.002},
  doi          = {10.1016/J.IJCIP.2018.12.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ThompsonFNCHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Tichy19,
  author       = {Luk{\'{a}}s Tich{\'{y}}},
  title        = {Energy infrastructure as a target of terrorist attacks from the Islamic
                  state in Iraq and Syria},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {1--13},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.01.003},
  doi          = {10.1016/J.IJCIP.2019.01.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Tichy19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TidwellLBGPM19,
  author       = {Vincent C. Tidwell and
                  Thomas S. Lowry and
                  David Binning and
                  Jenny Graves and
                  William J. Peplinski and
                  Roger Mitchell},
  title        = {Framework for shared drinking water risk assessment},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {24},
  pages        = {37--47},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.007},
  doi          = {10.1016/J.IJCIP.2018.10.007},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/TidwellLBGPM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TomaszewskiRMZ19,
  author       = {Michal Tomaszewski and
                  Bogdan Ruszczak and
                  Pawel Michalski and
                  Slawomir Zator},
  title        = {The study of weather conditions favourable to the accretion of icing
                  that pose a threat to transmission power lines},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {25},
  pages        = {139--151},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.04.001},
  doi          = {10.1016/J.IJCIP.2019.04.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/TomaszewskiRMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WangZ0S19,
  author       = {Fei Wang and
                  Xia{-}zhong Zheng and
                  Nan Li and
                  Xuesong Shen},
  title        = {Systemic vulnerability assessment of urban water distribution networks
                  considering failure scenario uncertainty},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {26},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ijcip.2019.05.002},
  doi          = {10.1016/J.IJCIP.2019.05.002},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/WangZ0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AdamskyABCCCGFG18,
  author       = {Florian Adamsky and
                  Matthieu Aubigny and
                  Federica Battisti and
                  Marco Carli and
                  Federico Cimorelli and
                  Tiago Cruz and
                  Alessandro Di Giorgio and
                  Chiara Foglietta and
                  A. Galli and
                  Alessandro Giuseppi and
                  Francesco Liberati and
                  Alessandro Neri and
                  Stefano Panzieri and
                  Federica Pascucci and
                  Jorge Proen{\c{c}}a and
                  P. Pucci and
                  Lu{\'{\i}}s Rosa and
                  Ridha Soua},
  title        = {Integrated protection of industrial control systems from cyber-attacks:
                  the {ATENA} approach},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {21},
  pages        = {72--82},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.04.004},
  doi          = {10.1016/J.IJCIP.2018.04.004},
  timestamp    = {Thu, 08 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/AdamskyABCCCGFG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AichhornEUMS18,
  author       = {Andreas Aichhorn and
                  Bernhard Etzlinger and
                  Andreas Unterweger and
                  Ren{\'{e}} Mayrhofer and
                  Andreas Springer},
  title        = {Design, implementation, and evaluation of secure communication for
                  line current differential protection systems over packet switched
                  networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {68--78},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.06.005},
  doi          = {10.1016/J.IJCIP.2018.06.005},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/AichhornEUMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BaldiniSCM18,
  author       = {Gianmarco Baldini and
                  Luigi Sportiello and
                  Michel Chiaramello and
                  Vincent Mahieu},
  title        = {Regulated applications for the road transportation infrastructure:
                  The case study of the smart tachograph in the European Union},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {21},
  pages        = {3--21},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.02.001},
  doi          = {10.1016/J.IJCIP.2018.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BaldiniSCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BalogluD18,
  author       = {Ulas Baran Baloglu and
                  Yakup Demir},
  title        = {Lightweight privacy-preserving data aggregation scheme for smart grid
                  metering infrastructure protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {16--24},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.04.005},
  doi          = {10.1016/J.IJCIP.2018.04.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BalogluD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BanerjeeBS18,
  author       = {Joydeep Banerjee and
                  Kaustav Basu and
                  Arunabha Sen},
  title        = {On hardening problems in critical infrastructure systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {49--67},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.08.001},
  doi          = {10.1016/J.IJCIP.2018.08.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BanerjeeBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/CherifiH18,
  author       = {Tarek Cherifi and
                  Latifa Hamami},
  title        = {A practical implementation of unconditional security for the {IEC}
                  60780-5-101 {SCADA} protocol},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {68--84},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.12.001},
  doi          = {10.1016/J.IJCIP.2017.12.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/CherifiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ClotetML18,
  author       = {Xavier Clotet and
                  Jos{\'{e}} Moyano and
                  Gladys Le{\'{o}}n},
  title        = {A real-time anomaly-based {IDS} for cyber-attack detection at the
                  industrial process level of Critical Infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {11--20},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.08.002},
  doi          = {10.1016/J.IJCIP.2018.08.002},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ClotetML18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/DemirIVS18,
  author       = {Kubilay Demir and
                  Hatem Ismail and
                  Tsvetoslava Vateva{-}Gurova and
                  Neeraj Suri},
  title        = {Securing the cloud-assisted smart grid},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {100--111},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.08.004},
  doi          = {10.1016/J.IJCIP.2018.08.004},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/DemirIVS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FaramondiSPPO18,
  author       = {Luca Faramondi and
                  Roberto Setola and
                  Stefano Panzieri and
                  Federica Pascucci and
                  Gabriele Oliva},
  title        = {Finding critical nodes in infrastructure networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {3--15},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.11.004},
  doi          = {10.1016/J.IJCIP.2017.11.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/FaramondiSPPO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GhalebZA18,
  author       = {Asem Ghaleb and
                  Sami Zhioua and
                  Ahmad Almulhem},
  title        = {On {PLC} network security},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {62--69},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.05.004},
  doi          = {10.1016/J.IJCIP.2018.05.004},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GhalebZA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Guo18,
  author       = {Meirong Guo},
  title        = {China's cybersecurity legislation, it's relevance to critical infrastructures
                  and the challenges it faces},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {139--149},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.06.006},
  doi          = {10.1016/J.IJCIP.2018.06.006},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Guo18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Hagen18,
  author       = {Janne Merete Hagen},
  title        = {Building resilience against cyber threats in the energy sector},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {26--27},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.11.003},
  doi          = {10.1016/J.IJCIP.2017.11.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Hagen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Harasta18,
  author       = {Jakub Harasta},
  title        = {Legally critical: Defining critical infrastructure in an interconnected
                  world},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {21},
  pages        = {47--56},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.05.007},
  doi          = {10.1016/J.IJCIP.2018.05.007},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Harasta18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/IslamAI18,
  author       = {Md. Shafiqul Islam and
                  Md. Mobasher Ahmed and
                  Saad Islam},
  title        = {A conceptual system architecture for countering the civilian unmanned
                  aerial vehicles threat to nuclear facilities},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {139--149},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.003},
  doi          = {10.1016/J.IJCIP.2018.10.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/IslamAI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JieWFDSY18,
  author       = {Xinchun Jie and
                  Haikuan Wang and
                  Minrui Fei and
                  Dajun Du and
                  Qing Sun and
                  Tai C. Yang},
  title        = {Anomaly behavior detection and reliability assessment of control systems
                  based on association rules},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {90--99},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.06.001},
  doi          = {10.1016/J.IJCIP.2018.06.001},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/JieWFDSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KabirRAAB18,
  author       = {Muhammad Nomani Kabir and
                  Md. Arafatur Rahman and
                  Saiful Azad and
                  Mohamed Mostafa A. Azim and
                  Md. Zakirul Alam Bhuiyan},
  title        = {A connection probability model for communications networks under regional
                  failures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {16--25},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.11.002},
  doi          = {10.1016/J.IJCIP.2017.11.002},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KabirRAAB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KauerKT18,
  author       = {Florian Kauer and
                  Emil Kallias and
                  Volker Turau},
  title        = {A dual-radio approach for reliable emergency signaling in critical
                  infrastructure assets with large wireless networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {21},
  pages        = {33--46},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.02.002},
  doi          = {10.1016/J.IJCIP.2018.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KauerKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KhaliliSKP18,
  author       = {Abdullah Khalili and
                  Ashkan Sami and
                  Amin Khozaei and
                  Saber Pouresmaeeli},
  title        = {{SIDS:} State-based intrusion detection for stage-based cyber physical
                  systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {113--124},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.06.003},
  doi          = {10.1016/J.IJCIP.2018.06.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KhaliliSKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LahzaRF18,
  author       = {Hassan Fareed M. Lahza and
                  Kenneth Radke and
                  Ernest Foo},
  title        = {Applying domain-specific knowledge to construct features for detecting
                  distributed denial-of-service attacks on the {GOOSE} and {MMS} protocols},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {48--67},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.12.002},
  doi          = {10.1016/J.IJCIP.2017.12.002},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LahzaRF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LamT18,
  author       = {Chi Yung Lam and
                  Kang Tai},
  title        = {Modeling infrastructure interdependencies by integrating network and
                  fuzzy set theory},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {51--61},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.05.005},
  doi          = {10.1016/J.IJCIP.2018.05.005},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LamT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LandegrenHM18,
  author       = {Finn Erik Landegren and
                  Martin H{\"{o}}st and
                  Peter M{\"{o}}ller},
  title        = {Simulation based assessment of resilience of two large-scale socio-technical
                  {IT} networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {112--125},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.08.003},
  doi          = {10.1016/J.IJCIP.2018.08.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LandegrenHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Leszczyna18,
  author       = {Rafal Leszczyna},
  title        = {Standards on cyber security assessment of smart grid},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {70--89},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.05.006},
  doi          = {10.1016/J.IJCIP.2018.05.006},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Leszczyna18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiuWZWY18,
  author       = {Kai Liu and
                  Ming Wang and
                  Weihua Zhu and
                  Jinshan Wu and
                  Xiaoyong Yan},
  title        = {Vulnerability analysis of an urban gas pipeline network considering
                  pipeline-road dependency},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {79--89},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.08.008},
  doi          = {10.1016/J.IJCIP.2018.08.008},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiuWZWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MohandesHSMK18,
  author       = {Baraa Mohandes and
                  Reem Al Hammadi and
                  Wasiu Sanusi and
                  Toufic Mezher and
                  Sameh El Khatib},
  title        = {Advancing cyber-physical sustainability through integrated analysis
                  of smart power systems: {A} case study on electric vehicles},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {33--48},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.002},
  doi          = {10.1016/J.IJCIP.2018.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MohandesHSMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PalletiJS18,
  author       = {Venkata Reddy Palleti and
                  Jude Victor Joseph and
                  Arlindo Silva},
  title        = {A contribution of axiomatic design principles to the analysis and
                  impact of attacks on critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {21--32},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.08.007},
  doi          = {10.1016/J.IJCIP.2018.08.007},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/PalletiJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PsaltoglouC18,
  author       = {Artemis Psaltoglou and
                  Eusebi Calle},
  title        = {Enhanced connectivity index - {A} new measure for identifying critical
                  points in urban public transportation networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {21},
  pages        = {22--32},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.02.003},
  doi          = {10.1016/J.IJCIP.2018.02.003},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/PsaltoglouC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PuuskaRTLKOV18,
  author       = {Samir Puuska and
                  Lauri Rummukainen and
                  Jussi Timonen and
                  Lauri Laaperi and
                  Markus Klemetti and
                  Lauri Oksama and
                  Jouko Vankka},
  title        = {Nationwide critical infrastructure monitoring using a common operating
                  picture framework},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {28--47},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2017.11.005},
  doi          = {10.1016/J.IJCIP.2017.11.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/PuuskaRTLKOV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RamezaniMSH18,
  author       = {Abouzar Ramezani and
                  Mohammad Reza Malek and
                  Habib Sahami and
                  Reza Hosnavi},
  title        = {Developing a spatial methodology to reduce the vulnerability of critical
                  infrastructures against intelligent air-based threats},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {126--138},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.10.001},
  doi          = {10.1016/J.IJCIP.2018.10.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RamezaniMSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RebahiCTHPM18,
  author       = {Yacine Rebahi and
                  Kin Tsun Chiu and
                  Nikolay Tcholtchev and
                  Simon Hohberg and
                  Evangelos Pallis and
                  Evangelos K. Markakis},
  title        = {Towards a next generation 112 testbed: The {EMYNOS} ESInet},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {39--50},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.05.001},
  doi          = {10.1016/J.IJCIP.2018.05.001},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RebahiCTHPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RehakSHLN18,
  author       = {David Rehak and
                  Pavel Senovsky and
                  Martin Hromada and
                  Tom{\'{a}}s Lovecek and
                  Petr Novotn{\'{y}}},
  title        = {Cascading Impact Assessment in a Critical Infrastructure System},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {125--138},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.06.004},
  doi          = {10.1016/J.IJCIP.2018.06.004},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RehakSHLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SeppanenLZTV18,
  author       = {Hannes Sepp{\"{a}}nen and
                  Pekka Luokkala and
                  Zhe Zhang and
                  Paulus Torkki and
                  Kirsi Virrantaus},
  title        = {Critical infrastructure vulnerability - {A} method for identifying
                  the infrastructure service failure interdependencies},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {25--38},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.05.002},
  doi          = {10.1016/J.IJCIP.2018.05.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SeppanenLZTV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi18,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {20},
  pages        = {1--2},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.02.004},
  doi          = {10.1016/J.IJCIP.2018.02.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SkandhakumarRSD18,
  author       = {Nimalaprakasan Skandhakumar and
                  Jason Reid and
                  Farzad Salim and
                  Ed Dawson},
  title        = {A policy model for access control using building information models},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {1--10},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.08.005},
  doi          = {10.1016/J.IJCIP.2018.08.005},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SkandhakumarRSD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Strous18,
  author       = {Leon Strous},
  title        = {{IJCIP} Editorial June 2018},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {21},
  pages        = {1--2},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.05.003},
  doi          = {10.1016/J.IJCIP.2018.05.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Strous18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Strous18a,
  author       = {Leon Strous},
  title        = {{IJCIP} Editorial December 2018 - Volume 23},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {iii--v},
  year         = {2018},
  url          = {https://doi.org/10.1016/S1874-5482(18)30172-0},
  doi          = {10.1016/S1874-5482(18)30172-0},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Strous18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TsavdaroglouABH18,
  author       = {Margarita Tsavdaroglou and
                  Saad H. S. Al{-}Jibouri and
                  Thomas Bles and
                  Johannes I. M. Halman},
  title        = {Proposed methodology for risk analysis of interdependent critical
                  infrastructures to extreme weather events},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {21},
  pages        = {57--71},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.04.002},
  doi          = {10.1016/J.IJCIP.2018.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/TsavdaroglouABH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Verma18,
  author       = {Pramode K. Verma},
  title        = {The natural impact of artificial intelligence},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {150--151},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.08.009},
  doi          = {10.1016/J.IJCIP.2018.08.009},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Verma18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZhaoLF18,
  author       = {Chen Zhao and
                  Nan Li and
                  DongPing Fang},
  title        = {Criticality assessment of urban interdependent lifeline systems using
                  a biased PageRank algorithm and a multilayer weighted directed network
                  model},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {100--112},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.06.002},
  doi          = {10.1016/J.IJCIP.2018.06.002},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZhaoLF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZimmermannWS18,
  author       = {Martin Zimmermann and
                  Martina Winker and
                  Engelbert Schramm},
  title        = {Vulnerability analysis of critical infrastructures in the case of
                  a semi-centralised water reuse system in Qingdao, China},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {22},
  pages        = {4--15},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.04.003},
  doi          = {10.1016/J.IJCIP.2018.04.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZimmermannWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZouYZBTWY18,
  author       = {Bowen Zou and
                  Ming Yang and
                  Yuxin Zhang and
                  Emi{-}Reynolds Benjamin and
                  Ke Tan and
                  Wenfei Wu and
                  Hidekazu Yoshikawa},
  title        = {Evaluation of vulnerable path: Using heuristic path-finding algorithm
                  in physical protection system of nuclear power plant},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {23},
  pages        = {90--99},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijcip.2018.08.006},
  doi          = {10.1016/J.IJCIP.2018.08.006},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZouYZBTWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ArroyoBGR17,
  author       = {Jose R. Gutierrez del Arroyo and
                  Jason M. Bindewald and
                  Scott R. Graham and
                  Mason Rice},
  title        = {Enabling Bluetooth Low Energy auditing through synchronized tracking
                  of multiple connections},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {18},
  pages        = {58--70},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.03.006},
  doi          = {10.1016/J.IJCIP.2017.03.006},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ArroyoBGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BrownSV17,
  author       = {Charlotte Brown and
                  Erica Seville and
                  John J. Vargo},
  title        = {Measuring the organizational resilience of critical infrastructure
                  providers: {A} New Zealand case study},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {18},
  pages        = {37--49},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.05.002},
  doi          = {10.1016/J.IJCIP.2017.05.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BrownSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ChavesRDP17,
  author       = {Andrew Chaves and
                  Mason Rice and
                  Stephen Dunlap and
                  John M. Pecarina},
  title        = {Improving the cyber resilience of industrial control systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {17},
  pages        = {30--48},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.03.005},
  doi          = {10.1016/J.IJCIP.2017.03.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ChavesRDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FialkoffOPT17,
  author       = {Marc R. Fialkoff and
                  Olufemi A. Omitaomu and
                  Steven K. Peterson and
                  Mark A. Tuttle},
  title        = {Using geographic information science to evaluate legal restrictions
                  on freight transportation routing in disruptive scenarios},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {17},
  pages        = {60--74},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2016.12.001},
  doi          = {10.1016/J.IJCIP.2016.12.001},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/FialkoffOPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HansenSS17,
  author       = {Aaron Hansen and
                  Jason Staggs and
                  Sujeet Shenoi},
  title        = {Security analysis of an advanced metering infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {18},
  pages        = {3--19},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.03.004},
  doi          = {10.1016/J.IJCIP.2017.03.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HansenSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JannatiB17,
  author       = {Hoda Jannati and
                  Behnam Bahrak},
  title        = {An improved authentication protocol for distributed mobile cloud computing
                  services},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {19},
  pages        = {59--67},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.10.003},
  doi          = {10.1016/J.IJCIP.2017.10.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/JannatiB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JarmakiewiczPM17,
  author       = {Jacek Jarmakiewicz and
                  Krzysztof Parobczak and
                  Krzysztof Maslanka},
  title        = {Cybersecurity protection for power grid control infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {18},
  pages        = {20--33},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.07.002},
  doi          = {10.1016/J.IJCIP.2017.07.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/JarmakiewiczPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KumariS17,
  author       = {Anita Kumari and
                  Anil Kumar Sharma},
  title        = {Infrastructure financing and development: {A} bibliometric review},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {16},
  pages        = {49--65},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2016.11.005},
  doi          = {10.1016/J.IJCIP.2016.11.005},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KumariS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiuZZ17,
  author       = {Xiaoxue Liu and
                  Jiexin Zhang and
                  Peidong Zhu},
  title        = {Modeling cyber-physical attacks based on probabilistic colored Petri
                  nets and mixed-strategy game theory},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {16},
  pages        = {13--25},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2016.11.002},
  doi          = {10.1016/J.IJCIP.2016.11.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiuZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LombardiHAK17,
  author       = {Pio Lombardi and
                  Kathleen H{\"{a}}nsch and
                  Bartlomiej Arendarski and
                  Przemyslaw Komarnicki},
  title        = {Information and power terminals: {A} reliable microgrid infrastructure
                  for use in disaster scenarios},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {19},
  pages        = {49--58},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.10.005},
  doi          = {10.1016/J.IJCIP.2017.10.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LombardiHAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Luiijf17,
  author       = {H. A. M. (Eric) Luiijf},
  title        = {Smart grids: And the bad news is?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {18},
  pages        = {34--36},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.07.003},
  doi          = {10.1016/J.IJCIP.2017.07.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Luiijf17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ManeshK17,
  author       = {Mohsen Riahi Manesh and
                  Naima Kaabouch},
  title        = {Analysis of vulnerabilities, attacks, countermeasures and overall
                  risk of the Automatic Dependent Surveillance-Broadcast {(ADS-B)} system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {19},
  pages        = {16--31},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.10.002},
  doi          = {10.1016/J.IJCIP.2017.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ManeshK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Martin-LirasPFA17,
  author       = {Luis Mart{\'{\i}}n{-}Liras and
                  Miguel A. Prada and
                  Juan J. Fuertes{-}Mart{\'{\i}}nez and
                  Antonio Mor{\'{a}}n {\'{A}}lvarez and
                  Seraf{\'{\i}}n Alonso and
                  Manuel Dom{\'{\i}}nguez{-}Gonz{\'{a}}lez},
  title        = {Comparative analysis of the security of configuration protocols for
                  industrial control devices},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {19},
  pages        = {4--15},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.10.001},
  doi          = {10.1016/J.IJCIP.2017.10.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Martin-LirasPFA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Moore17,
  author       = {Tyler Moore},
  title        = {On the harms arising from the Equifax data breach of 2017},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {19},
  pages        = {47--48},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.10.004},
  doi          = {10.1016/J.IJCIP.2017.10.004},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Moore17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Peter17,
  author       = {Ada S. Peter},
  title        = {Cyber resilience preparedness of Africa's top-12 emerging economies},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {17},
  pages        = {49--59},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.03.002},
  doi          = {10.1016/J.IJCIP.2017.03.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Peter17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Romero-FazC17,
  author       = {David Romero{-}Faz and
                  Alberto Camarero{-}Orive},
  title        = {Risk assessment of critical infrastructures - New parameters for commercial
                  ports},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {18},
  pages        = {50--57},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.07.001},
  doi          = {10.1016/J.IJCIP.2017.07.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Romero-FazC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RuedaC17,
  author       = {Diego F. Rueda and
                  Eusebi Calle},
  title        = {Using interdependency matrices to mitigate targeted attacks on interdependent
                  networks: {A} case study involving a power grid and backbone telecommunications
                  networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {16},
  pages        = {3--12},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2016.11.004},
  doi          = {10.1016/J.IJCIP.2016.11.004},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RuedaC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Ryan17,
  author       = {Daniel J. Ryan},
  title        = {Engineering sustainable critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {17},
  pages        = {28--29},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2016.11.003},
  doi          = {10.1016/J.IJCIP.2016.11.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Ryan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi17,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {16},
  pages        = {1--2},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.02.001},
  doi          = {10.1016/J.IJCIP.2017.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi17a,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {17},
  pages        = {1--2},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.05.001},
  doi          = {10.1016/J.IJCIP.2017.05.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi17b,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {18},
  pages        = {1--2},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.08.001},
  doi          = {10.1016/J.IJCIP.2017.08.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi17c,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {19},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.11.001},
  doi          = {10.1016/J.IJCIP.2017.11.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi17c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SkorupskiU17,
  author       = {Jacek Skorupski and
                  Piotr Uchronski},
  title        = {A fuzzy model for evaluating metal detection equipment at airport
                  security screening checkpoints},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {16},
  pages        = {39--48},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2016.11.001},
  doi          = {10.1016/J.IJCIP.2016.11.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SkorupskiU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StaggsFS17,
  author       = {Jason Staggs and
                  David F. Ferraiolo and
                  Sujeet Shenoi},
  title        = {Wind farm security: attack surface, targets, scenarios and mitigation},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {17},
  pages        = {3--14},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.03.001},
  doi          = {10.1016/J.IJCIP.2017.03.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/StaggsFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StineRDP17,
  author       = {Ian Stine and
                  Mason Rice and
                  Stephen Dunlap and
                  John M. Pecarina},
  title        = {A cyber risk scoring system for medical devices},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {19},
  pages        = {32--46},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.04.001},
  doi          = {10.1016/J.IJCIP.2017.04.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/StineRDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Verma17,
  author       = {Pramode K. Verma},
  title        = {Unconditional security through quantum uncertainty},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {16},
  pages        = {36--38},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2016.09.001},
  doi          = {10.1016/J.IJCIP.2016.09.001},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Verma17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WarnierDKP17,
  author       = {Martijn Warnier and
                  Stefan Dulman and
                  Yakup Ko{\c{c}} and
                  Eric J. Pauwels},
  title        = {Distributed monitoring for the prevention of cascading failures in
                  operational power grids},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {17},
  pages        = {15--27},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2017.03.003},
  doi          = {10.1016/J.IJCIP.2017.03.003},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/WarnierDKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZhuZMZT17,
  author       = {Ruijin Zhu and
                  Baofeng Zhang and
                  Junjie Mao and
                  Quan{-}Xin Zhang and
                  Yu{-}an Tan},
  title        = {A methodology for determining the image base of ARM-based industrial
                  control system firmware},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {16},
  pages        = {26--35},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ijcip.2016.12.002},
  doi          = {10.1016/J.IJCIP.2016.12.002},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZhuZMZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Ali16,
  author       = {Busyairah Syd Ali},
  title        = {System specifications for developing an Automatic Dependent Surveillance-Broadcast
                  {(ADS-B)} monitoring system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {15},
  pages        = {40--46},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.06.004},
  doi          = {10.1016/J.IJCIP.2016.06.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Ali16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BarbosaSP16,
  author       = {Rafael Ramos Regis Barbosa and
                  Ramin Sadre and
                  Aiko Pras},
  title        = {Exploiting traffic periodicity in industrial control networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {13},
  pages        = {52--62},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.02.004},
  doi          = {10.1016/J.IJCIP.2016.02.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BarbosaSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BoumaRBJH16,
  author       = {Henri Bouma and
                  Jeroen van Rest and
                  Kim van Buul{-}Besseling and
                  Jacomien G. M. de Jong and
                  Anton Havekes},
  title        = {Integrated roadmap for the rapid finding and tracking of people at
                  large airports},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {12},
  pages        = {61--74},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2015.11.002},
  doi          = {10.1016/J.IJCIP.2015.11.002},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BoumaRBJH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Bronk16,
  author       = {Chris Bronk},
  title        = {Imagining the limits of complexity in computerized critical infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {15},
  pages        = {38--39},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.08.001},
  doi          = {10.1016/J.IJCIP.2016.08.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Bronk16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ChopadeB16,
  author       = {Pravin Chopade and
                  Marwan Bikdash},
  title        = {New centrality measures for assessing smart grid vulnerabilities and
                  predicting brownouts and blackouts},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {12},
  pages        = {29--45},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2015.12.001},
  doi          = {10.1016/J.IJCIP.2015.12.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ChopadeB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/DunlapBLRM16,
  author       = {Stephen Dunlap and
                  Jonathan Butts and
                  Juan Lopez Jr. and
                  Mason Rice and
                  Barry E. Mullins},
  title        = {Using timing-based side channels for anomaly detection in industrial
                  control systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {15},
  pages        = {12--26},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.07.003},
  doi          = {10.1016/J.IJCIP.2016.07.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/DunlapBLRM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GengeHK16,
  author       = {B{\'{e}}la Genge and
                  Piroska Haller and
                  Istv{\'{a}}n Kiss},
  title        = {A framework for designing resilient distributed intrusion detection
                  systems for critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {15},
  pages        = {3--11},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.06.003},
  doi          = {10.1016/J.IJCIP.2016.06.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GengeHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Hagen16,
  author       = {Janne Merete Hagen},
  title        = {Cyber security - The Norwegian way},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {14},
  pages        = {41--42},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.05.002},
  doi          = {10.1016/J.IJCIP.2016.05.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Hagen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KarabacakYB16,
  author       = {Bilge Karabacak and
                  Sevgi {\"{O}}zkan Yildirim and
                  Nazife Baykal},
  title        = {A vulnerability-driven cyber security maturity model for measuring
                  national critical infrastructure protection preparedness},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {15},
  pages        = {47--59},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.10.001},
  doi          = {10.1016/J.IJCIP.2016.10.001},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KarabacakYB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LineTJ16,
  author       = {Maria Bartnes Line and
                  Inger Anne T{\o}ndel and
                  Martin Gilje Jaatun},
  title        = {Current practices and challenges in industrial control organizations
                  regarding information security incident management - Does size matter?
                  Information security incident management in large and small industrial
                  control organizations},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {12},
  pages        = {12--26},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2015.12.003},
  doi          = {10.1016/J.IJCIP.2015.12.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LineTJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Moore16,
  author       = {Tyler Moore},
  title        = {The dangers of cyber security folk wisdom},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {12},
  pages        = {27--28},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2015.11.001},
  doi          = {10.1016/J.IJCIP.2015.11.001},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Moore16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/NicolaVBD16,
  author       = {Antonio De Nicola and
                  Maria Luisa Villani and
                  Maria Cristina Brugnoli and
                  Gregorio D'Agostino},
  title        = {A methodology for modeling and measuring interdependencies of information
                  and communications systems used for public administration and eGovernment
                  services},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {14},
  pages        = {18--27},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.06.001},
  doi          = {10.1016/J.IJCIP.2016.06.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/NicolaVBD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Piggin16,
  author       = {Richard Piggin},
  title        = {Cyber security trends: What should keep CEOs awake at night},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {13},
  pages        = {36--38},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.02.001},
  doi          = {10.1016/J.IJCIP.2016.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Piggin16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RehakMHB16,
  author       = {David Rehak and
                  Jiri Markuci and
                  Martin Hromada and
                  Karla Barcova},
  title        = {Quantitative evaluation of the synergistic effects of failures in
                  a critical infrastructure system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {14},
  pages        = {3--17},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.06.002},
  doi          = {10.1016/J.IJCIP.2016.06.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RehakMHB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SarnoGMV16,
  author       = {Cesario Di Sarno and
                  Alessia Garofalo and
                  Ilaria Matteucci and
                  Marco Vallini},
  title        = {A novel security information and event management system for enhancing
                  cyber security in a hydroelectric dam},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {13},
  pages        = {39--51},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.03.002},
  doi          = {10.1016/J.IJCIP.2016.03.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SarnoGMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi16,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {12},
  pages        = {1--3},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.01.001},
  doi          = {10.1016/J.IJCIP.2016.01.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi16a,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {13},
  pages        = {1--2},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.04.002},
  doi          = {10.1016/J.IJCIP.2016.04.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi16b,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {14},
  pages        = {1--2},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.07.002},
  doi          = {10.1016/J.IJCIP.2016.07.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi16c,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {15},
  pages        = {1--2},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.10.002},
  doi          = {10.1016/J.IJCIP.2016.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StergiopoulosKT16,
  author       = {George Stergiopoulos and
                  Panayiotis Kotzanikolaou and
                  Marianthi Theocharidou and
                  Georgia Lykou and
                  Dimitris Gritzalis},
  title        = {Time-based critical infrastructure dependency analysis for large-scale
                  and cross-sectoral failures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {12},
  pages        = {46--60},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2015.12.002},
  doi          = {10.1016/J.IJCIP.2015.12.002},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/StergiopoulosKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SunLY16,
  author       = {Qinying Sun and
                  Xiang{-}Yang Li and
                  Feng Yu},
  title        = {Designing an emergency continuity plan for a megacity government:
                  {A} conceptual framework for coping with natural catastrophes},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {13},
  pages        = {28--35},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.03.001},
  doi          = {10.1016/J.IJCIP.2016.03.001},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SunLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/UrreaMK16,
  author       = {Claudio Urrea and
                  Claudio Morales and
                  John Kern},
  title        = {Implementation of error detection and correction in the Modbus-RTU
                  serial protocol},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {15},
  pages        = {27--37},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.07.001},
  doi          = {10.1016/J.IJCIP.2016.07.001},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/UrreaMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Wang16,
  author       = {Shih{-}Hsu Wang},
  title        = {An analytical model for benchmarking the development of national infrastructure
                  items against those in similar countries},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {13},
  pages        = {3--18},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.02.002},
  doi          = {10.1016/J.IJCIP.2016.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Wang16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WhiteBGBC16,
  author       = {Richard White and
                  Aaron Burkhart and
                  Randy George and
                  Terrance E. Boult and
                  Edward Chow},
  title        = {Towards comparable cross-sector risk analyses: {A} re-examination
                  of the Risk Analysis and Management for Critical Asset Protection
                  {(RAMCAP)} methodology},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {14},
  pages        = {28--40},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.05.001},
  doi          = {10.1016/J.IJCIP.2016.05.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/WhiteBGBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Windelberg16,
  author       = {Marjorie Windelberg},
  title        = {Objectives for managing cyber supply chain risk},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {12},
  pages        = {4--11},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2015.11.003},
  doi          = {10.1016/J.IJCIP.2015.11.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Windelberg16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/YampolskiySKOSY16,
  author       = {Mark Yampolskiy and
                  Anthony Skjellum and
                  Michael Kretzschmar and
                  Ruel A. Overfelt and
                  Kenneth R. Sloan and
                  Alec Yasinsac},
  title        = {Using 3D printers as weapons},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {14},
  pages        = {58--71},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2015.12.004},
  doi          = {10.1016/J.IJCIP.2015.12.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/YampolskiySKOSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/YoonDBRR16,
  author       = {Jungsang Yoon and
                  Stephen Dunlap and
                  Jonathan Butts and
                  Mason Rice and
                  Benjamin W. P. Ramsey},
  title        = {Evaluating the readiness of cyber first responders responsible for
                  critical infrastructure protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {13},
  pages        = {19--27},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.02.003},
  doi          = {10.1016/J.IJCIP.2016.02.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/YoonDBRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/YoungLRRM16,
  author       = {Derek Young and
                  Juan Lopez Jr. and
                  Mason Rice and
                  Benjamin W. P. Ramsey and
                  Robert McTasney},
  title        = {A framework for incorporating insurance in critical infrastructure
                  cyber risk strategies},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {14},
  pages        = {43--57},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijcip.2016.04.001},
  doi          = {10.1016/J.IJCIP.2016.04.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/YoungLRRM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AlcarazZ15,
  author       = {Cristina Alcaraz and
                  Sherali Zeadally},
  title        = {Critical infrastructure protection: Requirements and challenges for
                  the 21st century},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {8},
  pages        = {53--66},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2014.12.002},
  doi          = {10.1016/J.IJCIP.2014.12.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/AlcarazZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Arce15,
  author       = {Daniel G. Arce},
  title        = {WikiLeaks and the risks to critical foreign dependencies},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {11},
  pages        = {3--11},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.07.004},
  doi          = {10.1016/J.IJCIP.2015.07.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Arce15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Bronk15,
  author       = {Chris Bronk},
  title        = {Two securities: How contemporary cyber geopolitics impacts critical
                  infrastructure protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {8},
  pages        = {24--26},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2014.12.001},
  doi          = {10.1016/J.IJCIP.2014.12.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Bronk15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ErezW15,
  author       = {Noam Erez and
                  Avishai Wool},
  title        = {Control variable classification, modeling and anomaly detection in
                  Modbus/TCP {SCADA} systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {10},
  pages        = {59--70},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.05.001},
  doi          = {10.1016/J.IJCIP.2015.05.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ErezW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GengeGH15,
  author       = {B{\'{e}}la Genge and
                  Flavius Graur and
                  Piroska Haller},
  title        = {Experimental assessment of network design approaches for protecting
                  industrial control systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {11},
  pages        = {24--38},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.07.005},
  doi          = {10.1016/J.IJCIP.2015.07.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GengeGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GengeKH15,
  author       = {B{\'{e}}la Genge and
                  Istv{\'{a}}n Kiss and
                  Piroska Haller},
  title        = {A system dynamics approach for assessing the impact of cyber attacks
                  on critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {10},
  pages        = {3--17},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.04.001},
  doi          = {10.1016/J.IJCIP.2015.04.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GengeKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/George15,
  author       = {Richard George},
  title        = {Why we should worry about the supply chain},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {11},
  pages        = {22--23},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.05.002},
  doi          = {10.1016/J.IJCIP.2015.05.002},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/George15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HahnTLC15,
  author       = {Adam Hahn and
                  Roshan K. Thomas and
                  Ivan Lozano and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {A multi-layered and kill-chain based security analysis framework for
                  cyber-physical systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {11},
  pages        = {39--50},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.08.003},
  doi          = {10.1016/J.IJCIP.2015.08.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HahnTLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Jannati15,
  author       = {Hoda Jannati},
  title        = {Analysis of relay, terrorist fraud and distance fraud attacks on {RFID}
                  systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {11},
  pages        = {51--61},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.08.001},
  doi          = {10.1016/J.IJCIP.2015.08.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Jannati15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Johansson15,
  author       = {Vicki Johansson},
  title        = {Policy networks - {A} threat to procedural and expert-based decision
                  making and the quality of public risk decisions?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {9},
  pages        = {3--12},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.02.003},
  doi          = {10.1016/J.IJCIP.2015.02.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Johansson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KnowlesPHDJ15,
  author       = {William Knowles and
                  Daniel Prince and
                  David Hutchison and
                  Jules Ferdinand Pagna Disso and
                  Kevin Jones},
  title        = {A survey of cyber security management in industrial control systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {9},
  pages        = {52--80},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.02.002},
  doi          = {10.1016/J.IJCIP.2015.02.002},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KnowlesPHDJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LaugeHS15,
  author       = {Ana Laug{\'{e}} and
                  Josune Hernantes and
                  Jose M. Sarriegi},
  title        = {Critical infrastructure dependencies: {A} holistic, dynamic and quantitative
                  approach},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {8},
  pages        = {16--23},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2014.12.004},
  doi          = {10.1016/J.IJCIP.2014.12.004},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LaugeHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/NanS15,
  author       = {Cen Nan and
                  Giovanni Sansavini},
  title        = {Multilayer hybrid modeling framework for the performance assessment
                  of interdependent critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {10},
  pages        = {18--33},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.04.003},
  doi          = {10.1016/J.IJCIP.2015.04.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/NanS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/NegeriKB15,
  author       = {Ebisa Negeri and
                  Fernando Kuipers and
                  Nico Baken},
  title        = {Designing reliable and resilient smart low-voltage grids},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {9},
  pages        = {24--37},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2014.12.006},
  doi          = {10.1016/J.IJCIP.2014.12.006},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/NegeriKB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Piggin15,
  author       = {Richard Piggin},
  title        = {Are industrial control systems ready for the cloud?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {9},
  pages        = {38--40},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2014.12.005},
  doi          = {10.1016/J.IJCIP.2014.12.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Piggin15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RamseySMTB15,
  author       = {Benjamin W. P. Ramsey and
                  Tyler D. Stubbs and
                  Barry E. Mullins and
                  Michael A. Temple and
                  Mark A. Buckner},
  title        = {Wireless infrastructure protection using low-cost radio frequency
                  fingerprinting receivers},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {8},
  pages        = {27--39},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2014.11.002},
  doi          = {10.1016/J.IJCIP.2014.11.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RamseySMTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RomanowskiRSMSA15,
  author       = {Carol J. Romanowski and
                  Rajendra K. Raj and
                  Jennifer Schneider and
                  Sumita Mishra and
                  Vinay Shivshankar and
                  Srikant Ayengar and
                  Fernando Cueva},
  title        = {Regional response to large-scale emergency events: Building on historical
                  data},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {11},
  pages        = {12--21},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.07.003},
  doi          = {10.1016/J.IJCIP.2015.07.003},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RomanowskiRSMSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RuijvenMB15,
  author       = {Theo van Ruijven and
                  Igor Mayer and
                  Mark de Bruijne},
  title        = {Multidisciplinary coordination of on-scene command teams in virtual
                  emergency exercises},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {9},
  pages        = {13--23},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.02.005},
  doi          = {10.1016/J.IJCIP.2015.02.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RuijvenMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Ryan15,
  author       = {Daniel J. Ryan},
  title        = {Regulating the safety and security of the critical information commons},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {10},
  pages        = {45--46},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.04.004},
  doi          = {10.1016/J.IJCIP.2015.04.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Ryan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi15,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {8},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2014.12.003},
  doi          = {10.1016/J.IJCIP.2014.12.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi15a,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {9},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.02.004},
  doi          = {10.1016/J.IJCIP.2015.02.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi15b,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {10},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.07.001},
  doi          = {10.1016/J.IJCIP.2015.07.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi15c,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {11},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.10.001},
  doi          = {10.1016/J.IJCIP.2015.10.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StergiopoulosKT15,
  author       = {George Stergiopoulos and
                  Panayiotis Kotzanikolaou and
                  Marianthi Theocharidou and
                  Dimitris Gritzalis},
  title        = {Risk mitigation strategies for critical infrastructures based on graph
                  centrality analysis},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {10},
  pages        = {34--44},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.05.003},
  doi          = {10.1016/J.IJCIP.2015.05.003},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/StergiopoulosKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StoneTB15,
  author       = {Samuel J. Stone and
                  Michael A. Temple and
                  Rusty O. Baldwin},
  title        = {Detecting anomalous programmable logic controller behavior using RF-based
                  Hilbert transform features and a correlation-based verification process},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {9},
  pages        = {41--51},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.02.001},
  doi          = {10.1016/J.IJCIP.2015.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/StoneTB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WinnRDLM15,
  author       = {Michael Winn and
                  Mason Rice and
                  Stephen Dunlap and
                  Juan Lopez Jr. and
                  Barry E. Mullins},
  title        = {Constructing cost-effective and targetable industrial control system
                  honeypots for production networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {10},
  pages        = {47--58},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.04.002},
  doi          = {10.1016/J.IJCIP.2015.04.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/WinnRDLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/YampolskiyHKXS15,
  author       = {Mark Yampolskiy and
                  P{\'{e}}ter Horv{\'{a}}th and
                  Xenofon D. Koutsoukos and
                  Yuan Xue and
                  Janos Sztipanovits},
  title        = {A language for describing attacks on cyber-physical systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {8},
  pages        = {40--52},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2014.09.003},
  doi          = {10.1016/J.IJCIP.2014.09.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/YampolskiyHKXS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ZhangLL15,
  author       = {Zhili Zhang and
                  Xiangyang Li and
                  Hengyun Li},
  title        = {A quantitative approach for assessing the critical nodal and linear
                  elements of a railway infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {8},
  pages        = {3--15},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2014.11.001},
  doi          = {10.1016/J.IJCIP.2014.11.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ZhangLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ArmandoMV14,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Security considerations related to the use of mobile devices in the
                  operation of critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {247--256},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.10.002},
  doi          = {10.1016/J.IJCIP.2014.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ArmandoMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BodenheimBDM14,
  author       = {Roland Bodenheim and
                  Jonathan Butts and
                  Stephen Dunlap and
                  Barry E. Mullins},
  title        = {Evaluation of the ability of the Shodan search engine to identify
                  Internet-facing industrial control devices},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {114--123},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.03.001},
  doi          = {10.1016/J.IJCIP.2014.03.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BodenheimBDM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/CoppolinoDR14,
  author       = {Luigi Coppolino and
                  Salvatore D'Antonio and
                  Luigi Romano},
  title        = {Exposing vulnerabilities in electric power grids: An experimental
                  approach},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {51--60},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.01.003},
  doi          = {10.1016/J.IJCIP.2014.01.003},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/CoppolinoDR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FarleyW14,
  author       = {Ryan Farley and
                  Xinyuan Wang},
  title        = {Exploiting VoIP softphone vulnerabilities to disable host computers:
                  Attacks and mitigation},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {141--154},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.07.001},
  doi          = {10.1016/J.IJCIP.2014.07.001},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/FarleyW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/George14,
  author       = {Richard George},
  title        = {Observations from a Cyber Tabletop},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {112--113},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.004},
  doi          = {10.1016/J.IJCIP.2014.04.004},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/George14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GianiBP14,
  author       = {Annarita Giani and
                  Russell Bent and
                  Feng Pan},
  title        = {Phasor measurement unit selection for unobservable electric power
                  data integrity attack detection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {155--164},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.06.001},
  doi          = {10.1016/J.IJCIP.2014.06.001},
  timestamp    = {Mon, 18 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/GianiBP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Hagerott14,
  author       = {Mark Hagerott},
  title        = {Stuxnet and the vital role of critical infrastructure operators and
                  engineers},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {244--246},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.09.001},
  doi          = {10.1016/J.IJCIP.2014.09.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Hagerott14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JaradatK14,
  author       = {Ra'ed M. Jaradat and
                  Charles B. Keating},
  title        = {Fragility of oil as a critical infrastructure problem},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {86--99},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.005},
  doi          = {10.1016/J.IJCIP.2014.04.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/JaradatK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KatinaPBH14,
  author       = {Polinpapilinho F. Katina and
                  C. Ariel Pinto and
                  Joseph M. Bradley and
                  Patrick T. Hester},
  title        = {Interdependency-induced risk with applications to healthcare},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {12--26},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.01.005},
  doi          = {10.1016/J.IJCIP.2014.01.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KatinaPBH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KrotofilCLG14,
  author       = {Marina Krotofil and
                  Alvaro A. C{\'{a}}rdenas and
                  Jason Larsen and
                  Dieter Gollmann},
  title        = {Vulnerabilities of cyber-physical systems to stale data - Determining
                  the optimal time to launch attacks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {213--232},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.10.003},
  doi          = {10.1016/J.IJCIP.2014.10.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KrotofilCLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Luiijf14,
  author       = {Eric A. M. Luiijf},
  title        = {Are we in love with cyber insecurity?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {165--166},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.07.002},
  doi          = {10.1016/J.IJCIP.2014.07.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Luiijf14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Nunes-VazL14,
  author       = {Rick Nunes{-}Vaz and
                  Steven Lord},
  title        = {Designing physical security for complex infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {178--192},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.06.003},
  doi          = {10.1016/J.IJCIP.2014.06.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Nunes-VazL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RanaS14,
  author       = {Antonia Rana and
                  Luigi Sportiello},
  title        = {Implementation of security and privacy in ePassports and the extended
                  access control infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {233--243},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.10.001},
  doi          = {10.1016/J.IJCIP.2014.10.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RanaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RowlandRS14,
  author       = {Jill Rowland and
                  Mason Rice and
                  Sujeet Shenoi},
  title        = {The anatomy of a cyber power},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {3--11},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.01.001},
  doi          = {10.1016/J.IJCIP.2014.01.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RowlandRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RowlandRS14a,
  author       = {Jill Rowland and
                  Mason Rice and
                  Sujeet Shenoi},
  title        = {Whither cyberpower?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {124--137},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.001},
  doi          = {10.1016/J.IJCIP.2014.04.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RowlandRS14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SchuettBD14,
  author       = {Carl Schuett and
                  Jonathan Butts and
                  Stephen Dunlap},
  title        = {An evaluation of modification attacks on programmable logic controllers},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {61--68},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.01.004},
  doi          = {10.1016/J.IJCIP.2014.01.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SchuettBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi14,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {1--2},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.02.002},
  doi          = {10.1016/J.IJCIP.2014.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi14a,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {69--70},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.006},
  doi          = {10.1016/J.IJCIP.2014.04.006},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi14b,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {139--140},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.07.004},
  doi          = {10.1016/J.IJCIP.2014.07.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi14c,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {211--212},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.10.004},
  doi          = {10.1016/J.IJCIP.2014.10.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi14c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Siler-EvansHSLT14,
  author       = {Kyle Siler{-}Evans and
                  Alex Hanson and
                  Cecily Sunday and
                  Nathan Leonard and
                  Michele Tumminello},
  title        = {Analysis of pipeline accidents in the United States from 1968 to 2009},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {257--269},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.09.002},
  doi          = {10.1016/J.IJCIP.2014.09.002},
  timestamp    = {Mon, 01 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Siler-EvansHSLT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SinghGO14,
  author       = {Abhishek Narain Singh and
                  M. P. Gupta and
                  Amitabh Ojha},
  title        = {Identifying critical infrastructure sectors and their dependencies:
                  An Indian scenario},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {71--85},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.003},
  doi          = {10.1016/J.IJCIP.2014.04.003},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SinghGO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Smith14,
  author       = {Kendal Smith},
  title        = {Designing flexible curricula to enhance critical infrastructure security
                  and resilience},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {48--50},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.01.002},
  doi          = {10.1016/J.IJCIP.2014.01.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Smith14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TuncerL14,
  author       = {Necibe Tuncer and
                  Trang T. Le},
  title        = {Effect of air travel on the spread of an avian influenza pandemic
                  to the United States},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {1},
  pages        = {27--47},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.02.001},
  doi          = {10.1016/J.IJCIP.2014.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/TuncerL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WardKLC14,
  author       = {David Ward and
                  Naouma Kourti and
                  Alessandro Lazari and
                  Piotr Cofta},
  title        = {Trust building and the European Reference Network for Critical Infrastructure
                  Protection community},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {193--210},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.07.003},
  doi          = {10.1016/J.IJCIP.2014.07.003},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/WardKLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WhiteBC14,
  author       = {Richard White and
                  Terrance E. Boult and
                  Edward Chow},
  title        = {A computational asset vulnerability model for the strategic protection
                  of the critical infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {3},
  pages        = {167--177},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.06.002},
  doi          = {10.1016/J.IJCIP.2014.06.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/WhiteBC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Yates14,
  author       = {Athol Yates},
  title        = {A framework for studying mortality arising from critical infrastructure
                  loss},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {2},
  pages        = {100--111},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.04.002},
  doi          = {10.1016/J.IJCIP.2014.04.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Yates14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ArmbrusterEW13,
  author       = {Ginger Armbruster and
                  Barbara Endicott{-}Popovsky and
                  Jan Whittington},
  title        = {Threats to municipal information systems posed by aging infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {3-4},
  pages        = {123--131},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.08.001},
  doi          = {10.1016/J.IJCIP.2013.08.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ArmbrusterEW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BarbosaSP13,
  author       = {Rafael Ramos Regis Barbosa and
                  Ramin Sadre and
                  Aiko Pras},
  title        = {Flow whitelisting in {SCADA} networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {3-4},
  pages        = {150--158},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.08.003},
  doi          = {10.1016/J.IJCIP.2013.08.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BarbosaSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BasnightBLD13,
  author       = {Zachry Basnight and
                  Jonathan Butts and
                  Juan Lopez Jr. and
                  Thomas Dub{\'{e}}},
  title        = {Firmware modification attacks on programmable logic controllers},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {2},
  pages        = {76--84},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.04.004},
  doi          = {10.1016/J.IJCIP.2013.04.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BasnightBLD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Correa-HenaoYL13,
  author       = {Gabriel J. Correa{-}Henao and
                  Jos{\'{e}} M. Yusta and
                  Roberto Lacal{-}Ar{\'{a}}ntegui},
  title        = {Using interconnected risk maps to assess the threats faced by electricity
                  infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {3-4},
  pages        = {197--216},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.10.002},
  doi          = {10.1016/J.IJCIP.2013.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Correa-HenaoYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FinkeBMG13,
  author       = {Cindy Finke and
                  Jonathan Butts and
                  Robert F. Mills and
                  Michael R. Grimaila},
  title        = {Enhancing the security of aircraft surveillance in the next generation
                  air traffic control system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {1},
  pages        = {3--11},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.02.001},
  doi          = {10.1016/J.IJCIP.2013.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/FinkeBMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GengeS13,
  author       = {B{\'{e}}la Genge and
                  Christos Siaterlis},
  title        = {Analysis of the effects of distributed denial-of-service attacks on
                  {MPLS} networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {2},
  pages        = {87--95},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.04.001},
  doi          = {10.1016/J.IJCIP.2013.04.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GengeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GivensB13,
  author       = {Austen D. Givens and
                  Nathan E. Busch},
  title        = {Realizing the promise of public-private partnerships in {U.S.} critical
                  infrastructure protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {1},
  pages        = {39--50},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.02.002},
  doi          = {10.1016/J.IJCIP.2013.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GivensB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GoldenbergW13,
  author       = {Niv Goldenberg and
                  Avishai Wool},
  title        = {Accurate modeling of Modbus/TCP for intrusion detection in {SCADA}
                  systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {2},
  pages        = {63--75},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.05.001},
  doi          = {10.1016/J.IJCIP.2013.05.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GoldenbergW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HiebSG13,
  author       = {Jeffrey L. Hieb and
                  Jacob Schreiver and
                  James H. Graham},
  title        = {A security-hardened appliance for implementing authentication and
                  access control in {SCADA} infrastructures with legacy field devices},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {1},
  pages        = {12--24},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.01.001},
  doi          = {10.1016/J.IJCIP.2013.01.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HiebSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LewisWCK13,
  author       = {Adam M. Lewis and
                  David Ward and
                  Lukasz Cyra and
                  Naouma Kourti},
  title        = {European Reference Network for Critical Infrastructure Protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {1},
  pages        = {51--60},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.02.004},
  doi          = {10.1016/J.IJCIP.2013.02.004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/LewisWCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Luiijf13,
  author       = {Eric A. M. Luiijf},
  title        = {Why are we so unconsciously insecure?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {3-4},
  pages        = {179--181},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.10.003},
  doi          = {10.1016/J.IJCIP.2013.10.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Luiijf13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MarroneNTDVSCM13,
  author       = {Stefano Marrone and
                  Roberto Nardone and
                  Annarita Tedesco and
                  Pasquale D'Amore and
                  Valeria Vittorini and
                  Roberto Setola and
                  Francesca De Cillis and
                  Nicola Mazzocca},
  title        = {Vulnerability modeling and analysis for critical infrastructure protection
                  applications},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {3-4},
  pages        = {217--227},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.10.001},
  doi          = {10.1016/J.IJCIP.2013.10.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/MarroneNTDVSCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Moore13,
  author       = {Tyler Moore},
  title        = {The promise and perils of digital currencies},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {3-4},
  pages        = {147--149},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.08.002},
  doi          = {10.1016/J.IJCIP.2013.08.002},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Moore13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/NepalJ13,
  author       = {Rabindra Nepal and
                  Tooraj Jamasb},
  title        = {Security of European electricity systems: Conceptualizing the assessment
                  criteria and core indicators},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {3-4},
  pages        = {182--196},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.07.001},
  doi          = {10.1016/J.IJCIP.2013.07.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/NepalJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Palmatier13,
  author       = {Thomas E. Palmatier},
  title        = {Building secure critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {2},
  pages        = {85--86},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.04.003},
  doi          = {10.1016/J.IJCIP.2013.04.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Palmatier13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/PapaCM13,
  author       = {Stephen M. Papa and
                  William D. Casper and
                  Tyler Moore},
  title        = {Securing wastewater facilities from accidental and intentional harm:
                  {A} cost-benefit analysis},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {2},
  pages        = {96--106},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.05.002},
  doi          = {10.1016/J.IJCIP.2013.05.002},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/PapaCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi13,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {1},
  pages        = {1--2},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.02.003},
  doi          = {10.1016/J.IJCIP.2013.02.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi13a,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {2},
  pages        = {61--62},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.05.003},
  doi          = {10.1016/J.IJCIP.2013.05.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi13b,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {3-4},
  pages        = {121--122},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.10.004},
  doi          = {10.1016/J.IJCIP.2013.10.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SoodE13,
  author       = {Aditya K. Sood and
                  Richard J. Enbody},
  title        = {Crimeware-as-a-service - {A} survey of commoditized crimeware in the
                  underground market},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {1},
  pages        = {28--38},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.01.002},
  doi          = {10.1016/J.IJCIP.2013.01.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SoodE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Sportiello13,
  author       = {Luigi Sportiello},
  title        = {A methodology for designing robust and efficient hybrid monitoring
                  systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {3-4},
  pages        = {132--146},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.09.001},
  doi          = {10.1016/J.IJCIP.2013.09.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Sportiello13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Verma13,
  author       = {Pramode K. Verma},
  title        = {The role of the network in implementing security and privacy},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {1},
  pages        = {25--27},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2012.12.001},
  doi          = {10.1016/J.IJCIP.2012.12.001},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Verma13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/VlacheasSDCIG13,
  author       = {Panagiotis Vlacheas and
                  Vera Stavroulaki and
                  Panagiotis Demestichas and
                  Scott Cadzow and
                  Demosthenes Ikonomou and
                  Slawomir Gorniak},
  title        = {Towards end-to-end network resilience},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {3-4},
  pages        = {159--178},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.08.004},
  doi          = {10.1016/J.IJCIP.2013.08.004},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/VlacheasSDCIG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/YatesS13,
  author       = {Justin Yates and
                  Sujeevraja Sanjeevi},
  title        = {A length-based, multiple-resource formulation for shortest path network
                  interdiction problems in the transportation sector},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {2},
  pages        = {107--119},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.04.002},
  doi          = {10.1016/J.IJCIP.2013.04.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/YatesS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AlcarazL12,
  author       = {Cristina Alcaraz and
                  Javier L{\'{o}}pez},
  title        = {Analysis of requirements for critical control systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {3-4},
  pages        = {137--145},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.08.003},
  doi          = {10.1016/J.IJCIP.2012.08.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/AlcarazL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ArmbrusterEW12,
  author       = {Ginger Armbruster and
                  Barbara Endicott{-}Popovsky and
                  Jan Whittington},
  title        = {Are we prepared for the economic risk resulting from telecom hotel
                  disruptions?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {2},
  pages        = {55--65},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.05.003},
  doi          = {10.1016/J.IJCIP.2012.05.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ArmbrusterEW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BeccutiCGDDF12,
  author       = {Marco Beccuti and
                  Silvano Chiaradonna and
                  Felicita Di Giandomenico and
                  Susanna Donatelli and
                  Giovanna Dondossola and
                  Giuliana Franceschinis},
  title        = {Quantification of dependencies between electrical and information
                  infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {1},
  pages        = {14--27},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.01.003},
  doi          = {10.1016/J.IJCIP.2012.01.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BeccutiCGDDF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BurmesterMC12,
  author       = {Mike Burmester and
                  Emmanouil Magkos and
                  Vassilios Chrissikopoulos},
  title        = {Modeling security in cyber-physical systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {3-4},
  pages        = {118--126},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.08.002},
  doi          = {10.1016/J.IJCIP.2012.08.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BurmesterMC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/CastrucciNCAKAHSSC12,
  author       = {Marco Castrucci and
                  Alessandro Neri and
                  Filipe Caldeira and
                  Jocelyn Aubert and
                  Djamel Khadraoui and
                  Matthieu Aubigny and
                  Carlo Harpes and
                  Paulo Sim{\~{o}}es and
                  Vincenzo Suraci and
                  Paolo Capodieci},
  title        = {Design and implementation of a mediation system enabling secure communication
                  among Critical Infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {2},
  pages        = {86--97},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.04.001},
  doi          = {10.1016/J.IJCIP.2012.04.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/CastrucciNCAKAHSSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Deccio12,
  author       = {Casey T. Deccio},
  title        = {Maintenance, mishaps and mending in deployments of the domain name
                  system security extensions {(DNSSEC)}},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {2},
  pages        = {98--103},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.05.002},
  doi          = {10.1016/J.IJCIP.2012.05.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Deccio12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Fidler12,
  author       = {David P. Fidler},
  title        = {Tinker, Tailor, Soldier, Duqu: Why cyberespionage is more dangerous
                  than you think},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {1},
  pages        = {28--29},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2011.12.001},
  doi          = {10.1016/J.IJCIP.2011.12.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Fidler12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GuernseyRS12,
  author       = {Daniel Guernsey and
                  Mason Rice and
                  Sujeet Shenoi},
  title        = {Implementing novel reactive defense functionality in {MPLS} networks
                  using hyperspeed signaling},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {1},
  pages        = {40--52},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.02.001},
  doi          = {10.1016/J.IJCIP.2012.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GuernseyRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HowserM12,
  author       = {Gerry Howser and
                  Bruce M. McMillin},
  title        = {Modeling and reasoning about the security of drive-by-wire automobile
                  systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {3-4},
  pages        = {127--134},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.09.001},
  doi          = {10.1016/J.IJCIP.2012.09.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HowserM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KocJG12,
  author       = {Yakup Ko{\c{c}} and
                  Almerima Jamakovic and
                  Bart Gijsen},
  title        = {A global reference model of the domain name system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {3-4},
  pages        = {108--117},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.08.001},
  doi          = {10.1016/J.IJCIP.2012.08.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/KocJG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Miller12,
  author       = {Robert A. Miller},
  title        = {Cyber war realities - What lies ahead},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {2},
  pages        = {84--85},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2011.08.003},
  doi          = {10.1016/J.IJCIP.2011.08.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Miller12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/OkhraviCRH12,
  author       = {Hamed Okhravi and
                  Adam Comella and
                  Eric Robinson and
                  Joshua W. Haines},
  title        = {Creating a cyber moving target for critical infrastructure applications
                  using platform diversity},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {1},
  pages        = {30--39},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.01.002},
  doi          = {10.1016/J.IJCIP.2012.01.002},
  timestamp    = {Sun, 22 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/OkhraviCRH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RahimiZ12,
  author       = {Sanaz Rahimi and
                  Mehdi R. Zargham},
  title        = {Analysis of the security of {VPN} configurations in industrial control
                  environments},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {1},
  pages        = {3--13},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.01.001},
  doi          = {10.1016/J.IJCIP.2012.01.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RahimiZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ReavesM12,
  author       = {Bradley Reaves and
                  Thomas H. Morris},
  title        = {Analysis and mitigation of vulnerabilities in short-range wireless
                  communications for industrial control systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {3-4},
  pages        = {154--174},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.10.001},
  doi          = {10.1016/J.IJCIP.2012.10.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ReavesM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ReevesRLBS12,
  author       = {Jason Reeves and
                  Ashwin Ramaswamy and
                  Michael E. Locasto and
                  Sergey Bratus and
                  Sean W. Smith},
  title        = {Intrusion detection for resource-constrained embedded control systems
                  in the power grid},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {2},
  pages        = {74--83},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.02.002},
  doi          = {10.1016/J.IJCIP.2012.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ReevesRLBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi12,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {1},
  pages        = {1--2},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.02.003},
  doi          = {10.1016/J.IJCIP.2012.02.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi12a,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {2},
  pages        = {53--54},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.06.001},
  doi          = {10.1016/J.IJCIP.2012.06.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi12b,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {3-4},
  pages        = {105--107},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.10.002},
  doi          = {10.1016/J.IJCIP.2012.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ShepardHF12,
  author       = {Daniel P. Shepard and
                  Todd E. Humphreys and
                  Aaron A. Fansler},
  title        = {Evaluation of the vulnerability of phasor measurement units to {GPS}
                  spoofing attacks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {3-4},
  pages        = {146--153},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.09.003},
  doi          = {10.1016/J.IJCIP.2012.09.003},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ShepardHF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StoneT12,
  author       = {Samuel J. Stone and
                  Michael A. Temple},
  title        = {Radio-frequency-based anomaly detection for programmable logic controllers
                  in the critical infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {2},
  pages        = {66--73},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.05.001},
  doi          = {10.1016/J.IJCIP.2012.05.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/StoneT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Yasinsac12,
  author       = {Alec Yasinsac},
  title        = {Precision in elections - Extracting a precise result from an inherently
                  imprecise process},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {5},
  number       = {3-4},
  pages        = {135--136},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijcip.2012.09.002},
  doi          = {10.1016/J.IJCIP.2012.09.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Yasinsac12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BeitollahiD11,
  author       = {Hakem Beitollahi and
                  Geert Deconinck},
  title        = {A dependable architecture to mitigate distributed denial of service
                  attacks on network-based control systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {3-4},
  pages        = {107--123},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.06.003},
  doi          = {10.1016/J.IJCIP.2011.06.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BeitollahiD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ChiaradonnaGL11,
  author       = {Silvano Chiaradonna and
                  Felicita Di Giandomenico and
                  Paolo Lollini},
  title        = {Definition, implementation and application of a model-based framework
                  for analyzing interdependencies in electric power systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {1},
  pages        = {24--40},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.03.001},
  doi          = {10.1016/J.IJCIP.2011.03.001},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ChiaradonnaGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Conklin11,
  author       = {William Arthur Conklin},
  title        = {Control systems personnel are from Mars; {IT} personnel are from Venus},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {2},
  pages        = {76--77},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.06.004},
  doi          = {10.1016/J.IJCIP.2011.06.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Conklin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GerstenfeldB11,
  author       = {Arthur Gerstenfeld and
                  Paul D. Berger},
  title        = {A decision-analysis approach for optimal airport security},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {1},
  pages        = {14--21},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.01.002},
  doi          = {10.1016/J.IJCIP.2011.01.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GerstenfeldB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LuiijfAZ11,
  author       = {Eric A. M. Luiijf and
                  Manou Ali and
                  Annemarie Zielstra},
  title        = {Assessing and improving {SCADA} security in the Dutch drinking water
                  sector},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {3-4},
  pages        = {124--134},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.08.002},
  doi          = {10.1016/J.IJCIP.2011.08.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LuiijfAZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MahoneyG11,
  author       = {William R. Mahoney and
                  Robin A. Gandhi},
  title        = {An integrated framework for control system simulation and regulatory
                  compliance monitoring},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {1},
  pages        = {41--53},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.03.002},
  doi          = {10.1016/J.IJCIP.2011.03.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MahoneyG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/McCallieBM11,
  author       = {Donald McCallie and
                  Jonathan Butts and
                  Robert F. Mills},
  title        = {Security analysis of the {ADS-B} implementation in the next generation
                  air transportation system},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {2},
  pages        = {78--87},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.06.001},
  doi          = {10.1016/J.IJCIP.2011.06.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/McCallieBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Miller11,
  author       = {Robert A. Miller},
  title        = {Cyber war and the dangers of preemption},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {1},
  pages        = {22--23},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.01.001},
  doi          = {10.1016/J.IJCIP.2011.01.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Miller11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MorrisSRGPR11,
  author       = {Thomas H. Morris and
                  Anurag Srivastava and
                  Bradley Reaves and
                  Wei Gao and
                  Kalyan Pavurapu and
                  Ram Reddi},
  title        = {A control system testbed to validate critical infrastructure protection
                  concepts},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {2},
  pages        = {88--103},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.06.005},
  doi          = {10.1016/J.IJCIP.2011.06.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MorrisSRGPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/OlivaPS11,
  author       = {Gabriele Oliva and
                  Stefano Panzieri and
                  Roberto Setola},
  title        = {Fuzzy dynamic input-output inoperability model},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {3-4},
  pages        = {165--175},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.09.003},
  doi          = {10.1016/J.IJCIP.2011.09.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/OlivaPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RebahiTTALTB11,
  author       = {Yacine Rebahi and
                  Tran Quang Thanh and
                  Mao Tong and
                  Fernando L{\'{o}}pez Aguilar and
                  Jos{\'{e}} Manuel L{\'{o}}pez L{\'{o}}pez and
                  Luis A. Teixeira and
                  Nelson Blanco},
  title        = {An {IP} based platform for emergency calls and reporting},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {3-4},
  pages        = {137--153},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.10.001},
  doi          = {10.1016/J.IJCIP.2011.10.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RebahiTTALTB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RiceBS11,
  author       = {Mason Rice and
                  Jonathan Butts and
                  Sujeet Shenoi},
  title        = {A signaling framework to deter aggression in cyberspace},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {2},
  pages        = {57--65},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.03.003},
  doi          = {10.1016/J.IJCIP.2011.03.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RiceBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RiceMS11,
  author       = {Mason Rice and
                  Robert Miller and
                  Sujeet Shenoi},
  title        = {May the {US} government monitor private critical infrastructure assets
                  to combat foreign cyberspace threats?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {1},
  pages        = {3--13},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.02.001},
  doi          = {10.1016/J.IJCIP.2011.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RiceMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Rrushi11,
  author       = {Julian L. Rrushi},
  title        = {An exploration of defensive deception in industrial communication
                  networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {2},
  pages        = {66--75},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.06.002},
  doi          = {10.1016/J.IJCIP.2011.06.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Rrushi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi11,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {1},
  pages        = {1--2},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.03.004},
  doi          = {10.1016/J.IJCIP.2011.03.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi11a,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {2},
  pages        = {55--56},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.08.001},
  doi          = {10.1016/J.IJCIP.2011.08.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi11b,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {3-4},
  pages        = {105--106},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.10.002},
  doi          = {10.1016/J.IJCIP.2011.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Sinha11,
  author       = {Anshuman Sinha},
  title        = {A survey of system security in contactless electronic passports},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {3-4},
  pages        = {154--164},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.09.002},
  doi          = {10.1016/J.IJCIP.2011.09.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Sinha11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Verma11,
  author       = {Pramode K. Verma},
  title        = {The elusive goal of net neutrality},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {3-4},
  pages        = {135--136},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.09.001},
  doi          = {10.1016/J.IJCIP.2011.09.001},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Verma11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AkellaTM10,
  author       = {Ravi Akella and
                  Han Tang and
                  Bruce M. McMillin},
  title        = {Analysis of information flow security in cyber-physical systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {3-4},
  pages        = {157--173},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.09.001},
  doi          = {10.1016/J.IJCIP.2010.09.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/AkellaTM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BaldiniFMLPBRMSS10,
  author       = {Gianmarco Baldini and
                  Igor Nai Fovino and
                  Marcelo Masera and
                  Marco Luise and
                  Vincenzo Pellegrini and
                  Enzo Bagagli and
                  Giuseppe Rubino and
                  Raffaele Malangone and
                  Marcoccio Stefano and
                  Fabio Senesi},
  title        = {An early warning system for detecting {GSM-R} wireless interference
                  in the high-speed railway infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {3-4},
  pages        = {140--156},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.10.003},
  doi          = {10.1016/J.IJCIP.2010.10.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BaldiniFMLPBRMSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ChakravarthyHB10,
  author       = {Rasika Chakravarthy and
                  Carl H. Hauser and
                  David E. Bakken},
  title        = {Long-lived authentication protocols for process control systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {3-4},
  pages        = {174--181},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.10.001},
  doi          = {10.1016/J.IJCIP.2010.10.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ChakravarthyHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Clavadetscher10,
  author       = {Carl J. Clavadetscher},
  title        = {Building national resilience capabilities},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {1},
  pages        = {27--28},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2009.08.001},
  doi          = {10.1016/J.IJCIP.2009.08.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Clavadetscher10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Cohen10,
  author       = {Fred Cohen},
  title        = {What makes critical infrastructures Critical?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {2},
  pages        = {53--54},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.06.002},
  doi          = {10.1016/J.IJCIP.2010.06.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Cohen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Crowther10,
  author       = {Kenneth G. Crowther},
  title        = {Risk-informed assessment of regional preparedness: {A} case study
                  of emergency potable water for hurricane response in Southeast Virginia},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {2},
  pages        = {83--98},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.03.001},
  doi          = {10.1016/J.IJCIP.2010.03.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Crowther10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HareG10,
  author       = {Forrest Hare and
                  Jonathan Goldstein},
  title        = {The interdependent security problem in the defense industrial base:
                  An agent-based model on a social network},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {3-4},
  pages        = {128--139},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.07.001},
  doi          = {10.1016/J.IJCIP.2010.07.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HareG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HenryLZ10,
  author       = {Matthew H. Henry and
                  Ryan M. Layer and
                  David R. Zaret},
  title        = {Coupled Petri nets for computer network risk analysis},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {2},
  pages        = {67--75},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.05.002},
  doi          = {10.1016/J.IJCIP.2010.05.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HenryLZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JeneliusWH10,
  author       = {Erik Jenelius and
                  Jonas Westin and
                  {\AA}ke J. Holmgren},
  title        = {Critical infrastructure protection under imperfect attacker perception},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {1},
  pages        = {16--26},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2009.10.002},
  doi          = {10.1016/J.IJCIP.2009.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/JeneliusWH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Miller10,
  author       = {Robert A. Miller},
  title        = {Infrastructure war: Chaos without carnage?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {3-4},
  pages        = {101--102},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.06.001},
  doi          = {10.1016/J.IJCIP.2010.06.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Miller10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Moore10,
  author       = {Tyler Moore},
  title        = {The economics of cybersecurity: Principles and policy options},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {3-4},
  pages        = {103--117},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.10.002},
  doi          = {10.1016/J.IJCIP.2010.10.002},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Moore10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/OlivaPS10,
  author       = {Gabriele Oliva and
                  Stefano Panzieri and
                  Roberto Setola},
  title        = {Agent-based input-output interdependency model},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {2},
  pages        = {76--82},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.05.001},
  doi          = {10.1016/J.IJCIP.2010.05.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/OlivaPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Pietre-CambacedesC10,
  author       = {Ludovic Pi{\`{e}}tre{-}Cambac{\'{e}}d{\`{e}}s and
                  Claude Chaudet},
  title        = {The {SEMA} referential framework: Avoiding ambiguities in the terms
                  "security" and "safety"},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {2},
  pages        = {55--66},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.06.003},
  doi          = {10.1016/J.IJCIP.2010.06.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Pietre-CambacedesC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RiceBMS10,
  author       = {Mason Rice and
                  Jonathan Butts and
                  Robert Miller and
                  Sujeet Shenoi},
  title        = {An analysis of the legality of government-mandated computer inoculations},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {1},
  pages        = {5--15},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.02.002},
  doi          = {10.1016/J.IJCIP.2010.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RiceBMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RiceBMS10a,
  author       = {Mason Rice and
                  Jonathan Butts and
                  Robert Miller and
                  Sujeet Shenoi},
  title        = {Applying public health strategies to the protection of cyberspace},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {3-4},
  pages        = {118--127},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.07.002},
  doi          = {10.1016/J.IJCIP.2010.07.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RiceBMS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Robinson10,
  author       = {Neil Robinson},
  title        = {Where policy and preferences diverge},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {1},
  pages        = {3--4},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.02.003},
  doi          = {10.1016/J.IJCIP.2010.02.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Robinson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi10,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {1},
  pages        = {1--2},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.03.002},
  doi          = {10.1016/J.IJCIP.2010.03.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi10a,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {2},
  pages        = {51--52},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.06.004},
  doi          = {10.1016/J.IJCIP.2010.06.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi10b,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {3-4},
  pages        = {99--100},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.11.001},
  doi          = {10.1016/J.IJCIP.2010.11.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Stewart10,
  author       = {Mark G. Stewart},
  title        = {Risk-informed decision support for assessing the costs and benefits
                  of counter-terrorism protective measures for infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {1},
  pages        = {29--40},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2009.09.001},
  doi          = {10.1016/J.IJCIP.2009.09.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Stewart10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TschofenigASA10,
  author       = {Hannes Tschofenig and
                  Mayutan Arumaithurai and
                  Henning Schulzrinne and
                  Bernard Aboba},
  title        = {How secure is the next generation of IP-based emergency services architecture?},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {3},
  number       = {1},
  pages        = {41--50},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ijcip.2010.02.001},
  doi          = {10.1016/J.IJCIP.2010.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/TschofenigASA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AnwarMGC09,
  author       = {Zahid Anwar and
                  Mirko Montanari and
                  Alejandro Gutierrez and
                  Roy H. Campbell},
  title        = {Budget constrained optimal security hardening of control networks
                  for critical cyber-infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {1-2},
  pages        = {13--25},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.02.001},
  doi          = {10.1016/J.IJCIP.2009.02.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/AnwarMGC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/BompardNX09,
  author       = {Ettore Bompard and
                  Roberto Napoli and
                  Fei Xue},
  title        = {Analysis of structural vulnerabilities in power transmission grids},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {1-2},
  pages        = {5--12},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.02.002},
  doi          = {10.1016/J.IJCIP.2009.02.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/BompardNX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/CaveltyS09,
  author       = {Myriam Dunn Cavelty and
                  Manuel Suter},
  title        = {Public-Private Partnerships are no silver bullet: An expanded governance
                  model for Critical Infrastructure Protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {4},
  pages        = {179--187},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.08.006},
  doi          = {10.1016/J.IJCIP.2009.08.006},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/CaveltyS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/FovinoCMT09,
  author       = {Igor Nai Fovino and
                  Andrea Carcano and
                  Marcelo Masera and
                  Alberto Trombetta},
  title        = {An experimental investigation of malware attacks on {SCADA} systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {4},
  pages        = {139--145},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.10.001},
  doi          = {10.1016/J.IJCIP.2009.10.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/FovinoCMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GraysonGBSS09,
  author       = {Denise Grayson and
                  Daniel Guernsey and
                  Jonathan Butts and
                  Michael Spainhower and
                  Sujeet Shenoi},
  title        = {Analysis of security threats to {MPLS} virtual private networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {4},
  pages        = {146--153},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.08.002},
  doi          = {10.1016/J.IJCIP.2009.08.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GraysonGBSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HuangCALTS09,
  author       = {Yu{-}Lun Huang and
                  Alvaro A. C{\'{a}}rdenas and
                  Saurabh Amin and
                  Zong{-}Syun Lin and
                  Hsin{-}Yi Tsai and
                  Shankar Sastry},
  title        = {Understanding the physical and economic consequences of attacks on
                  control systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {3},
  pages        = {73--83},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.06.001},
  doi          = {10.1016/J.IJCIP.2009.06.001},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/HuangCALTS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/JaatunALTL09,
  author       = {Martin Gilje Jaatun and
                  Eirik Albrechtsen and
                  Maria B. Line and
                  Inger Anne T{\o}ndel and
                  Odd Helge Longva},
  title        = {A framework for incident response management in the petroleum industry},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {1-2},
  pages        = {26--37},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.02.004},
  doi          = {10.1016/J.IJCIP.2009.02.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/JaatunALTL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/KalamDBK09,
  author       = {Anas Abou El Kalam and
                  Yves Deswarte and
                  Amine Ba{\"{\i}}na and
                  Mohamed Ka{\^{a}}niche},
  title        = {PolyOrBAC: {A} security framework for Critical Infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {4},
  pages        = {154--169},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.08.005},
  doi          = {10.1016/J.IJCIP.2009.08.005},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/KalamDBK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Miller09,
  author       = {Robert A. Miller},
  title        = {There's infrastructure and ...critical infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {1-2},
  pages        = {3--4},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.02.003},
  doi          = {10.1016/J.IJCIP.2009.02.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Miller09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Miller09a,
  author       = {Robert A. Miller},
  title        = {Standing in line for swine flu vaccine},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {4},
  pages        = {137--138},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.09.003},
  doi          = {10.1016/J.IJCIP.2009.09.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Miller09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/OkhraviN09,
  author       = {Hamed Okhravi and
                  David M. Nicol},
  title        = {Application of trusted network technology to industrial control networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {3},
  pages        = {84--94},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.07.001},
  doi          = {10.1016/J.IJCIP.2009.07.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/OkhraviN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RestrepoSZ09,
  author       = {Carlos E. Restrepo and
                  Jeffrey S. Simonoff and
                  Rae Zimmerman},
  title        = {Causes, cost consequences, and risk implications of accidents in {US}
                  hazardous liquid pipeline infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {1-2},
  pages        = {38--50},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2008.09.001},
  doi          = {10.1016/J.IJCIP.2008.09.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/RestrepoSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/RichGQSRH09,
  author       = {Eliot H. Rich and
                  Jose J. Gonzalez and
                  Ying Qian and
                  Finn Olav Sveen and
                  Jaziar Radianti and
                  Stefanie A. Hillen},
  title        = {Emergent vulnerabilities in Integrated Operations: {A} proactive simulation
                  study of economic risk},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {3},
  pages        = {110--123},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.07.002},
  doi          = {10.1016/J.IJCIP.2009.07.002},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/RichGQSRH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SetolaPS09,
  author       = {Roberto Setola and
                  Stefano De Porcellinis and
                  Marino Sforna},
  title        = {Critical infrastructure dependency assessment using the input-output
                  inoperability model},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {4},
  pages        = {170--178},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.09.002},
  doi          = {10.1016/J.IJCIP.2009.09.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SetolaPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi09,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {1-2},
  pages        = {1--2},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.03.001},
  doi          = {10.1016/J.IJCIP.2009.03.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi09a,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {3},
  pages        = {69--70},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.08.004},
  doi          = {10.1016/J.IJCIP.2009.08.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi09b,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {4},
  pages        = {135--136},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.10.003},
  doi          = {10.1016/J.IJCIP.2009.10.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SveenTS09,
  author       = {Finn Olav Sveen and
                  Jos{\'{e}} Manuel Torres and
                  Jose M. Sarriegi},
  title        = {Blind information security strategy},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {3},
  pages        = {95--109},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.07.003},
  doi          = {10.1016/J.IJCIP.2009.07.003},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/SveenTS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Tolone09,
  author       = {William J. Tolone},
  title        = {Interactive visualizations for critical infrastructure analysis},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {3},
  pages        = {124--134},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.07.004},
  doi          = {10.1016/J.IJCIP.2009.07.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Tolone09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Verma09,
  author       = {Pramode K. Verma},
  title        = {George Orwell's Nineteen Eighty-Four - {A} retrospective and prospective
                  twenty-five years later},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {3},
  pages        = {71--72},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2009.08.003},
  doi          = {10.1016/J.IJCIP.2009.08.003},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/Verma09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/WienekeK09,
  author       = {Monika Wieneke and
                  Wolfgang Koch},
  title        = {Combined person tracking and classification in a network of chemical
                  sensors},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {2},
  number       = {1-2},
  pages        = {51--67},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ijcip.2008.11.003},
  doi          = {10.1016/J.IJCIP.2008.11.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/WienekeK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Assaf08,
  author       = {Dan Assaf},
  title        = {Models of critical information infrastructure protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {6--14},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.08.004},
  doi          = {10.1016/J.IJCIP.2008.08.004},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Assaf08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/CravenO08,
  author       = {Paul Vincent Craven and
                  Paul W. Oman},
  title        = {Modeling the {NAJPTC} network using {NS-2}},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {29--36},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.08.002},
  doi          = {10.1016/J.IJCIP.2008.08.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/CravenO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Crowther08,
  author       = {Kenneth G. Crowther},
  title        = {Decentralized risk management for strategic preparedness of critical
                  infrastructure through decomposition of the inoperability input-output
                  model},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {53--67},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.08.009},
  doi          = {10.1016/J.IJCIP.2008.08.009},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Crowther08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/George08,
  author       = {Richard George},
  title        = {Critical infrastructure protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {4--5},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.08.010},
  doi          = {10.1016/J.IJCIP.2008.08.010},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/George08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HartongGW08,
  author       = {Mark Hartong and
                  Rajni Goel and
                  Duminda Wijesekera},
  title        = {Security and the {US} rail infrastructure},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {15--28},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.08.006},
  doi          = {10.1016/J.IJCIP.2008.08.006},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HartongGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/HuitsingCPS08,
  author       = {Peter Huitsing and
                  Rodrigo Chandia and
                  Mauricio Papa and
                  Sujeet Shenoi},
  title        = {Attack taxonomies for the Modbus protocols},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {37--44},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.08.003},
  doi          = {10.1016/J.IJCIP.2008.08.003},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/HuitsingCPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/LiuWC08,
  author       = {Debin Liu and
                  XiaoFeng Wang and
                  L. Jean Camp},
  title        = {Game-theoretic modeling and analysis of insider threats},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {75--80},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.08.001},
  doi          = {10.1016/J.IJCIP.2008.08.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/LiuWC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Macaulay08,
  author       = {Tyson Macaulay},
  title        = {Assessing operational risk in the financial sector, using interdependency
                  metrics},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {45--52},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.08.008},
  doi          = {10.1016/J.IJCIP.2008.08.008},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Macaulay08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/Shenoi08,
  author       = {Sujeet Shenoi},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {1--2},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.11.001},
  doi          = {10.1016/J.IJCIP.2008.11.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/Shenoi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/SpainhowerBGS08,
  author       = {Michael Spainhower and
                  Jonathan Butts and
                  Daniel Guernsey and
                  Sujeet Shenoi},
  title        = {Security analysis of {RSVP-TE} signaling in {MPLS} networks},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {68--74},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.08.005},
  doi          = {10.1016/J.IJCIP.2008.08.005},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/SpainhowerBGS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/StrousR08,
  author       = {Leon Strous and
                  Kai Rannenberg},
  title        = {Editorial},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {3},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.11.002},
  doi          = {10.1016/J.IJCIP.2008.11.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/StrousR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/TheoharidouXG08,
  author       = {Marianthi Theoharidou and
                  Dimitra Xidara and
                  Dimitris Gritzalis},
  title        = {A {CBK} for Information Security and Critical Information and Communication
                  Infrastructure Protection},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {1},
  pages        = {81--96},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ijcip.2008.08.007},
  doi          = {10.1016/J.IJCIP.2008.08.007},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/TheoharidouXG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics