Contact information of Elsevier
Serial Information
Download restrictions: Full text for ScienceDirect subscribers only
Editor: Leon Strous
Series handle: RePEc:eee:ijocip
ISSN: 1874-5482
Citations RSS feed: at CitEc
Impact factors
Access and download statisticsTop item:
Corrections
All material on this site has been provided by the respective publishers and authors. You can help
correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .
Content
2011, Volume 4, Issue 3
- 107-123 A dependable architecture to mitigate distributed denial of service attacks on network-based control systems
by Beitollahi, Hakem & Deconinck, Geert
- 124-134 Assessing and improving SCADA security in the Dutch drinking water sector
by Luiijf, Eric & Ali, Manou & Zielstra, Annemarie
- 137-153 An IP based platform for emergency calls and reporting
by Rebahi, Yacine & Thanh, Tran Quang & Tong, Mao & López, Fernando & López, José Manuel & Teixeira, Luis A. & Blanco, Nelson
- 154-164 A survey of system security in contactless electronic passports
by Sinha, Anshuman
- 165-175 Fuzzy dynamic input–output inoperability model
by Oliva, Gabriele & Panzieri, Stefano & Setola, Roberto
2011, Volume 4, Issue 2
- 57-65 A signaling framework to deter aggression in cyberspace
by Rice, Mason & Butts, Jonathan & Shenoi, Sujeet
- 66-75 An exploration of defensive deception in industrial communication networks
by Rrushi, Julian L.
- 76-77 Control systems personnel are from Mars; IT personnel are from Venus
by Conklin, William Arthur
- 78-87 Security analysis of the ADS-B implementation in the next generation air transportation system
by McCallie, Donald & Butts, Jonathan & Mills, Robert
- 88-103 A control system testbed to validate critical infrastructure protection concepts
by Morris, Thomas & Srivastava, Anurag & Reaves, Bradley & Gao, Wei & Pavurapu, Kalyan & Reddi, Ram
2011, Volume 4, Issue 1
- 3-13 May the US government monitor private critical infrastructure assets to combat foreign cyberspace threats?
by Rice, Mason & Miller, Robert & Shenoi, Sujeet
- 14-21 A decision-analysis approach for optimal airport security
by Gerstenfeld, Arthur & Berger, Paul D.
- 24-40 Definition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems
by Chiaradonna, Silvano & Giandomenico, Felicita Di & Lollini, Paolo
- 41-53 An integrated framework for control system simulation and regulatory compliance monitoring
by Mahoney, William & Gandhi, Robin A.
2010, Volume 3, Issue 3
- 103-117 The economics of cybersecurity: Principles and policy options
by Moore, Tyler
- 118-127 Applying public health strategies to the protection of cyberspace
by Rice, Mason & Butts, Jonathan & Miller, Robert & Shenoi, Sujeet
- 128-139 The interdependent security problem in the defense industrial base: An agent-based model on a social network
by Hare, Forrest & Goldstein, Jonathan
- 140-156 An early warning system for detecting GSM-R wireless interference in the high-speed railway infrastructure
by Baldini, Gianmarco & Nai Fovino, Igor & Masera, Marcelo & Luise, Marco & Pellegrini, Vincenzo & Bagagli, Enzo & Rubino, Giuseppe & Malangone, Raffaele & Stefano, Marcoccio & Senesi, Fabio
- 157-173 Analysis of information flow security in cyber–physical systems
by Akella, Ravi & Tang, Han & McMillin, Bruce M.
- 174-181 Long-lived authentication protocols for process control systems
by Chakravarthy, Rasika & Hauser, Carl & Bakken, David E.
2010, Volume 3, Issue 2
2010, Volume 3, Issue 1
- 5-15 An analysis of the legality of government-mandated computer inoculations
by Rice, Mason & Butts, Jonathan & Miller, Robert & Shenoi, Sujeet
- 16-26 Critical infrastructure protection under imperfect attacker perception
by Jenelius, Erik & Westin, Jonas & Holmgren, Åke J.
- 29-40 Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure
by Stewart, Mark G.
- 41-50 How secure is the next generation of IP-based emergency services architecture?
by Tschofenig, Hannes & Arumaithurai, Mayutan & Schulzrinne, Henning & Aboba, Bernard
2009, Volume 2, Issue 4
- 139-145 An experimental investigation of malware attacks on SCADA systems
by Nai Fovino, Igor & Carcano, Andrea & Masera, Marcelo & Trombetta, Alberto
- 146-153 Analysis of security threats to MPLS virtual private networks
by Grayson, Denise & Guernsey, Daniel & Butts, Jonathan & Spainhower, Michael & Shenoi, Sujeet
- 154-169 PolyOrBAC: A security framework for Critical Infrastructures
by Abou El Kalam, A. & Deswarte, Y. & Baïna, A. & Kaâniche, M.
- 170-178 Critical infrastructure dependency assessment using the input–output inoperability model
by Setola, Roberto & De Porcellinis, Stefano & Sforna, Marino
- 179-187 Public–Private Partnerships are no silver bullet: An expanded governance model for Critical Infrastructure Protection
by Dunn-Cavelty, Myriam & Suter, Manuel
2009, Volume 2, Issue 3
- 73-83 Understanding the physical and economic consequences of attacks on control systems
by Huang, Yu-Lun & Cárdenas, Alvaro A. & Amin, Saurabh & Lin, Zong-Syun & Tsai, Hsin-Yi & Sastry, Shankar
- 84-94 Application of trusted network technology to industrial control networks
by Okhravi, Hamed & Nicol, David M.
- 95-109 Blind information security strategy
by Sveen, Finn Olav & Torres, Jose M. & Sarriegi, Jose M.
- 110-123 Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk
by Rich, Eliot & Gonzalez, Jose J. & Qian, Ying & Sveen, Finn Olav & Radianti, Jaziar & Hillen, Stefanie
- 124-134 Interactive visualizations for critical infrastructure analysis
by Tolone, William J.
2009, Volume 2, Issue 1
- 5-12 Analysis of structural vulnerabilities in power transmission grids
by Bompard, Ettore & Napoli, Roberto & Xue, Fei
- 13-25 Budget constrained optimal security hardening of control networks for critical cyber-infrastructures
by Anwar, Zahid & Montanari, Mirko & Gutierrez, Alejandro & Campbell, Roy H.
- 26-37 A framework for incident response management in the petroleum industry
by Jaatun, Martin Gilje & Albrechtsen, Eirik & Line, Maria B. & Tøndel, Inger Anne & Longva, Odd Helge
- 38-50 Causes, cost consequences, and risk implications of accidents in US hazardous liquid pipeline infrastructure
by Restrepo, Carlos E. & Simonoff, Jeffrey S. & Zimmerman, Rae
- 51-67 Combined person tracking and classification in a network of chemical sensors
by Wieneke, Monika & Koch, Wolfgang
2008, Volume 1, Issue C
- 4-5 Critical infrastructure protection
by George, Richard
- 6-14 Models of critical information infrastructure protection
by Assaf, Dan
- 15-28 Security and the US rail infrastructure
by Hartong, Mark & Goel, Rajni & Wijesekera, Duminda
- 29-36 Modeling the NAJPTC network using NS-2
by Craven, Paul Vincent & Oman, Paul
- 37-44 Attack taxonomies for the Modbus protocols
by Huitsing, Peter & Chandia, Rodrigo & Papa, Mauricio & Shenoi, Sujeet
- 45-52 Assessing operational risk in the financial sector, using interdependency metrics
by Macaulay, Tyson
- 53-67 Decentralized risk management for strategic preparedness of critical infrastructure through decomposition of the inoperability input–output model
by Crowther, Kenneth G.
- 68-74 Security analysis of RSVP-TE signaling in MPLS networks
by Spainhower, Michael & Butts, Jonathan & Guernsey, Daniel & Shenoi, Sujeet
- 75-80 Game-theoretic modeling and analysis of insider threats
by Liu, Debin & Wang, XiaoFeng & Camp, Jean
- 81-96 A CBK for Information Security and Critical Information and Communication Infrastructure Protection
by Theoharidou, Marianthi & Xidara, Dimitra & Gritzalis, Dimitris