no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems
|
Yang, Jun |
|
|
38 |
C |
p. |
article |
2 |
A novel deep learning based security assessment framework for enhanced security in swarm network environment
|
Liu, Zhiqiang |
|
|
38 |
C |
p. |
article |
3 |
A taxonomy of IoT firmware security and principal firmware analysis techniques
|
Nadir, Ibrahim |
|
|
38 |
C |
p. |
article |
4 |
Corrigendum to ‘VetaDetect: Vehicle tampering detection with closed-loop model ensemble’ International Journal of Critical Infrastructure Protection, 37 (2022), 100525
|
Haller, Piroska |
|
|
38 |
C |
p. |
article |
5 |
Cyber-attacks detection in industrial systems using artificial intelligence-driven methods
|
Wang, Wu |
|
|
38 |
C |
p. |
article |
6 |
Editorial Board
|
|
|
|
38 |
C |
p. |
article |
7 |
Editorial for volume 38 IJCIP
|
|
|
|
38 |
C |
p. |
article |
8 |
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects
|
Berghout, Tarek |
|
|
38 |
C |
p. |
article |
9 |
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations
|
Umer, Muhammad Azmi |
|
|
38 |
C |
p. |
article |
10 |
Physical layer protection for ADS-B against spoofing and jamming
|
Rudys, Saulius |
|
|
38 |
C |
p. |
article |
11 |
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis
|
Mäurer, Nils |
|
|
38 |
C |
p. |
article |
12 |
The digital divide in state vulnerability to submarine communications cable failure
|
Franken, Jonas |
|
|
38 |
C |
p. |
article |
13 |
The drift of industrial control systems to pseudo security
|
Donnelly, Peter |
|
|
38 |
C |
p. |
article |
14 |
Vulnerability assessment of urban road traffic systems based on traffic flow
|
Wang, Shuliang |
|
|
38 |
C |
p. |
article |