no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A business that can’t lose: Investing in attacks against the Colombian power grid
|
Barreto, Carlos |
|
|
26 |
C |
p. |
article |
2 |
A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system
|
Mishra, Vishrut Kumar |
|
|
26 |
C |
p. |
article |
3 |
Detecting control system misbehavior by fingerprinting programmable logic controller functionality
|
Stockman, Melissa |
|
|
26 |
C |
p. |
article |
4 |
Editorial
|
|
|
|
26 |
C |
p. |
article |
5 |
Editorial Board
|
|
|
|
26 |
C |
p. |
article |
6 |
Exploring the temporal structure of time series data for hazardous liquid pipeline incidents based on complex network theory
|
Shengli, Liu |
|
|
26 |
C |
p. |
article |
7 |
“Internet of Smart Cards”: A pocket attacks scenario
|
Sportiello, Luigi |
|
|
26 |
C |
p. |
article |
8 |
Optimal sabotage attack on composite material parts
|
Ranabhat, Bikash |
|
|
26 |
C |
p. |
article |
9 |
PLC memory attack detection and response in a clean water supply system
|
Robles-Durazno, Andres |
|
|
26 |
C |
p. |
article |
10 |
Publisher Note
|
|
|
|
26 |
C |
p. |
article |
11 |
Quality function deployment-based framework for improving the resilience of critical infrastructure systems
|
Mao, Quan |
|
|
26 |
C |
p. |
article |
12 |
Quality of supply regulations versus societal priorities regarding electricity outage consequences: Case study in a Swedish context
|
Landegren, Finn |
|
|
26 |
C |
p. |
article |
13 |
Systemic vulnerability assessment of urban water distribution networks considering failure scenario uncertainty
|
Wang, Fei |
|
|
26 |
C |
p. |
article |
14 |
The enhanced security control model for critical infrastructures with the blocking prioritization process to cyber threats in power system
|
Han, Choong-Hee |
|
|
26 |
C |
p. |
article |
15 |
Traffic management for drones flying in the city
|
Syd Ali, Busyairah |
|
|
26 |
C |
p. |
article |