


default search action
International Journal of Critical Infrastructure Protection, Volume 7
Volume 7, Number 1, March 2014
- Sujeet Shenoi:

Editorial. 1-2
- Jill Rowland, Mason Rice, Sujeet Shenoi:

The anatomy of a cyber power. 3-11 - Polinpapilinho F. Katina

, C. Ariel Pinto, Joseph M. Bradley, Patrick T. Hester:
Interdependency-induced risk with applications to healthcare. 12-26 - Necibe Tuncer

, Trang T. Le
:
Effect of air travel on the spread of an avian influenza pandemic to the United States. 27-47
- Kendal Smith:

Designing flexible curricula to enhance critical infrastructure security and resilience. 48-50
- Luigi Coppolino

, Salvatore D'Antonio, Luigi Romano:
Exposing vulnerabilities in electric power grids: An experimental approach. 51-60 - Carl Schuett, Jonathan Butts, Stephen Dunlap:

An evaluation of modification attacks on programmable logic controllers. 61-68
Volume 7, Number 2, June 2014
- Sujeet Shenoi:

Editorial. 69-70
- Abhishek Narain Singh

, M. P. Gupta, Amitabh Ojha:
Identifying critical infrastructure sectors and their dependencies: An Indian scenario. 71-85 - Ra'ed M. Jaradat, Charles B. Keating:

Fragility of oil as a critical infrastructure problem. 86-99 - Athol Yates

:
A framework for studying mortality arising from critical infrastructure loss. 100-111
- Richard George:

Observations from a Cyber Tabletop. 112-113
- Roland Bodenheim, Jonathan Butts, Stephen Dunlap, Barry E. Mullins:

Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. 114-123 - Jill Rowland, Mason Rice, Sujeet Shenoi:

Whither cyberpower? 124-137
Volume 7, Number 3, September 2014
- Sujeet Shenoi:

Editorial. 139-140
- Ryan Farley, Xinyuan Wang:

Exploiting VoIP softphone vulnerabilities to disable host computers: Attacks and mitigation. 141-154 - Annarita Giani, Russell Bent

, Feng Pan:
Phasor measurement unit selection for unobservable electric power data integrity attack detection. 155-164
- Eric A. M. Luiijf

:
Are we in love with cyber insecurity? 165-166
- Richard White, Terrance E. Boult, Edward Chow:

A computational asset vulnerability model for the strategic protection of the critical infrastructure. 167-177 - Rick Nunes-Vaz, Steven Lord

:
Designing physical security for complex infrastructures. 178-192 - David Ward, Naouma Kourti, Alessandro Lazari

, Piotr Cofta
:
Trust building and the European Reference Network for Critical Infrastructure Protection community. 193-210
Volume 7, Number 4, December 2014
- Sujeet Shenoi:

Editorial. 211-212
- Marina Krotofil, Alvaro A. Cárdenas, Jason Larsen, Dieter Gollmann:

Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks. 213-232 - Antonia Rana, Luigi Sportiello:

Implementation of security and privacy in ePassports and the extended access control infrastructure. 233-243
- Mark Hagerott:

Stuxnet and the vital role of critical infrastructure operators and engineers. 244-246
- Alessandro Armando

, Alessio Merlo, Luca Verderame
:
Security considerations related to the use of mobile devices in the operation of critical infrastructures. 247-256 - Kyle Siler-Evans, Alex Hanson, Cecily Sunday, Nathan Leonard, Michele Tumminello

:
Analysis of pipeline accidents in the United States from 1968 to 2009. 257-269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














