


default search action
International Journal of Critical Infrastructure Protection, Volume 38
Volume 38, September 2022
- Muhammad Azmi Umer
, Khurum Nazir Junejo
, Muhammad Taha Jilani
, Aditya P. Mathur:
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations. 100516 - Jonas Franken
, Thomas Reinhold
, Lilian Reichert, Christian Reuter
:
The digital divide in state vulnerability to submarine communications cable failure. 100522 - Peter Donnelly
, Mabrouka Abuhmida
, Christopher Tubb:
The drift of industrial control systems to pseudo security. 100535 - Shuliang Wang, Chen Chen, Jianhua Zhang, Xifeng Gu, Xiaodi Huang
:
Vulnerability assessment of urban road traffic systems based on traffic flow. 100536 - Zhiqiang Liu, Mohi-Ud-Din Ghulam
, Jiangbin Zheng
, Sifei Wang, Muhammad Asim
:
A novel deep learning based security assessment framework for enhanced security in swarm network environment. 100540 - Wu Wang
, Fouzi Harrou
, Benamar Bouyeddou, Sidi-Mohammed Senouci
, Ying Sun
:
Cyber-attacks detection in industrial systems using artificial intelligence-driven methods. 100542 - Piroska Haller, Béla Genge, Fabrizio Forloni, Gianmarco Baldini, Massimo Carriero, Georgios Fontaras:
Corrigendum to 'VetaDetect: Vehicle tampering detection with closed-loop model ensemble' International Journal of Critical Infrastructure Protection, 37 (2022), 100525. 100543 - Tarek Berghout
, Mohamed Benbouzid
, S. M. Muyeen:
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects. 100547 - Nils Mäurer
, Tobias Guggemos, Thomas Ewert, Thomas Gräupl
, Corinna Schmitt, Sophia Grundner-Culemann:
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis. 100549 - Ibrahim Nadir
, Haroon Mahmood
, Ghalib Asadullah Shah:
A taxonomy of IoT firmware security and principal firmware analysis techniques. 100552 - Jun Yang, Leixiong Huang, Haoming Ma, Zhihui Xu, Ming Yang, Shaoqiang Guo
:
A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems. 100554 - Saulius Rudys
, Jurgis Aleksandravicius, Rimvydas Aleksiejunas
, Andriy Konovaltsev, Chen Zhu
, Lukasz A. Greda:
Physical layer protection for ADS-B against spoofing and jamming. 100555

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.