


default search action
International Journal of Critical Infrastructure Protection, Volume 26
Volume 26, September 2019
- Andres Robles-Durazno
, Naghmeh Moradpoor, James McWhinnie, Gordon Russell
, Inaki Maneru-Marin:
PLC memory attack detection and response in a clean water supply system. - Fei Wang, Xia-zhong Zheng, Nan Li
, Xuesong Shen:
Systemic vulnerability assessment of urban water distribution networks considering failure scenario uncertainty. - Vishrut Kumar Mishra, Venkata Reddy Palleti
, Aditya Mathur:
A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system. - Bikash Ranabhat, Joseph Clements, Jacob Gatlin, Kuang-Ting Hsiao, Mark Yampolskiy:
Optimal sabotage attack on composite material parts. - Luigi Sportiello:
"Internet of Smart Cards": A pocket attacks scenario. - Quan Mao, Nan Li
, Feniosky Peña-Mora:
Quality function deployment-based framework for improving the resilience of critical infrastructure systems. - Carlos A. Barreto
, Alvaro A. Cárdenas
, Jennifer S. Holmes, Agustin Palao
, Juan Carlos Restrepo:
A business that can't lose: Investing in attacks against the Colombian power grid. - Finn Erik Landegren, Jonas Johansson
, Olof Samuelsson
:
Quality of supply regulations versus societal priorities regarding electricity outage consequences: Case study in a Swedish context. - Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz, Sean Peisert
:
Detecting control system misbehavior by fingerprinting programmable logic controller functionality. - Shengli Liu, Yongtu Liang:
Exploring the temporal structure of time series data for hazardous liquid pipeline incidents based on complex network theory. - Busyairah Syd Ali
:
Traffic management for drones flying in the city. - Choong-Hee Han
, Soon-Tai Park, Sang-Joon Lee:
The Enhanced Security Control model for critical infrastructures with the blocking prioritization process to cyber threats in power system.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.