Journal articles on the topic 'Critical Infrastructure Protection (CIP)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Critical Infrastructure Protection (CIP).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Tabansky, L. "Critical Infrastructure Protection." International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 80–87. http://dx.doi.org/10.4018/ijcwt.2013070106.
Full textBrem, Stefan. "Critical Infrastructure Protection from a National Perspective." European Journal of Risk Regulation 6, no. 2 (2015): 191–99. http://dx.doi.org/10.1017/s1867299x00004499.
Full textTrifunović, Darko. "Elements of Critical Infrastructure Resilience." National security and the future 20, no. 1-2 (2020): 51–61. http://dx.doi.org/10.37458/nstf.20.1-2.6.
Full textSchmitz, W. "Simulation and test: Instruments for Critical Infrastructure Protection (CIP)." Information Security Technical Report 12, no. 1 (2007): 2–15. http://dx.doi.org/10.1016/j.istr.2007.02.007.
Full textGroße, Christine, Pär M. Olausson, and Susanne Wallman-Lundåsen. "Left in the Dark: Obstacles to Studying and Performing Critical Infrastructure Protection." Electronic Journal of Business Research Methods 19, no. 2 (2021): pp58–70. http://dx.doi.org/10.34190/ejbrm.19.2.2509.
Full textYigit, Yagmur, Mohamed Amine Ferrag, Mohamed C. Ghanem, et al. "Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities." Sensors 25, no. 6 (2025): 1666. https://doi.org/10.3390/s25061666.
Full textWiater, Patricia. "On the notion of “Partnership” in Critical Infrastructure Protection." European Journal of Risk Regulation 6, no. 2 (2015): 255–62. http://dx.doi.org/10.1017/s1867299x00004554.
Full textMohammed, Amir, Fasil Muddeen, Lincoln Marine, and Craig J. Ramlal. "The Exigency for Resilient and Cyber-Secure Critical Infrastructure in the Caribbean." West Indian Journal of Engineering 45, no. 2 (2023): 35–49. http://dx.doi.org/10.47412/deox2766.
Full textNwizu, Udoka Ngozi. "Securing America’s Critical Infrastructure: Strengthening Compliance with NERC Cybersecurity Standards." Journal of Technology and Systems 7, no. 2 (2025): 33–47. https://doi.org/10.47941/jts.2636.
Full textSchweizer, Rainer J. "State Duties to Protect." European Journal of Risk Regulation 6, no. 2 (2015): 219–28. http://dx.doi.org/10.1017/s1867299x00004529.
Full textGarcía de Soto, Borja, Alexandru Georgescu, Bharadwaj Mantha, Žiga Turk, Abel Maciel, and Muammer Semih Sonkor. "Construction cybersecurity and critical infrastructure protection: new horizons for Construction 4.0." Journal of Information Technology in Construction 27 (June 16, 2022): 571–94. http://dx.doi.org/10.36680/j.itcon.2022.028.
Full textTodorović, Branislav, Darko Trifunović, Marina Todorović, and Mina Marković. "Problematika eksploatacije i održavanja vezana za zaštita kritične infrastrukture u domenu procesne industrije." Procesna tehnika 34, no. 1 (2022): 24. http://dx.doi.org/10.24094/ptc.022.34.1.24.
Full textBesenyő, János, and András Fehér. "CRITICAL INFRASTRUCTURE PROTECTION (CIP) AS NEW SOFT TARGETS: PRIVATE SECURITY VS. COMMON SECURITY." Journal of Security and Sustainability Issues 10, no. 1 (2020): 5–18. http://dx.doi.org/10.9770/jssi.2020.10.1(1).
Full textPschikal, A. "Sicherung strategischer Infrastrukturen – das europäische und das österreichische Programm CIP (Critical Infrastructure Protection)." e & i Elektrotechnik und Informationstechnik 127, no. 9 (2010): 242–44. http://dx.doi.org/10.1007/s00502-010-0760-z.
Full textHulak, Yevhen. "METHOD OF RATIONAL SYNTHESIS OF SUBSYSTEMS FOR CRYPTOGRAPHIC PROTECTION OF INFORMATION IN CRITICAL INFRASTRUCTURE NETWORKS." Cybersecurity: Education, Science, Technique 4, no. 24 (2024): 282–97. http://dx.doi.org/10.28925/2663-4023.2024.24.282297.
Full textChochia, Archil, Shota Gvineria, and Holger Mölder. "Building a Legislative Framework for Securing Georgia’s Strategic Assets." TalTech Journal of European Studies 14, no. 1 (2024): 271–302. http://dx.doi.org/10.2478/bjes-2024-0013.
Full textSaikrishna Tipparapu. "IAM based Audit Framework to enhance and protect the Critical Infrastructure for Distributed System." Journal of Information Systems Engineering and Management 10, no. 23s (2025): 721–36. https://doi.org/10.52783/jisem.v10i23s.3772.
Full textBorchert, Heiko. "It Takes Two to Tango." European Journal of Risk Regulation 6, no. 2 (2015): 208–18. http://dx.doi.org/10.1017/s1867299x00004517.
Full textGroße, Christine. "Multi-Level Planning for Enhancing Critical Infrastructure Resilience against Power Shortages—An Analysis of the Swedish System of Styrel." Infrastructures 6, no. 5 (2021): 71. http://dx.doi.org/10.3390/infrastructures6050071.
Full textTomasek, Randi, and Yanzhen Qu. "Cybersecurity Regulations in the Energy Industry: A Detriment or a Benefit?" European Journal of Electrical Engineering and Computer Science 9, no. 3 (2025): 9–15. https://doi.org/10.24018/ejece.2025.9.3.709.
Full textZaman, Dunya, and Mahdi Mazinani. "Cybersecurity in Smart Grids: Protecting Critical Infrastructure from Cyber Attacks." SHIFRA 2023 (August 18, 2023): 1–9. http://dx.doi.org/10.70470/shifra/2023/010.
Full textHouston Jr., Clemith J., and Douglas C. Sicker. "Maturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors." International Journal of Strategic Information Technology and Applications 5, no. 2 (2014): 44–63. http://dx.doi.org/10.4018/ijsita.2014040104.
Full textSuchismita, Chatterjee. "The Importance of Penetration Testing in the Oil and Gas Industry: Mitigating Cyber Risks and Ensuring NERC CIP Compliance." International Journal on Science and Technology 14, no. 3 (2023): 1–12. https://doi.org/10.5281/zenodo.14551772.
Full textHuang, Yih, David Arsenault, and Arun Sood. "SCIT-DNS: Critical infrastructure protection through secure DNS server dynamic updates." Journal of High Speed Networks 15, no. 1 (2006): 5–19. https://doi.org/10.3233/hsn-2006-274.
Full textAfiya, Nadien, Arfin Sudirman, and Falhan Hakiki. "One Channel System sebagai Sistem Keamanan Siber untuk Melindungi Pekerja Migran Indonesia di Malaysia." Indonesian Perspective 9, no. 1 (2024): 47–69. http://dx.doi.org/10.14710/ip.v9i1.60882.
Full textAlharbi, Fahad, and Denes Csala. "Saudi Arabia’s Solar and Wind Energy Penetration: Future Performance and Requirements." Energies 13, no. 3 (2020): 588. http://dx.doi.org/10.3390/en13030588.
Full textBARĆ, Marek. "Critical infrastructure protection." Scientific Bulletin of Flight Academy. Section: Economics, Management and Law 3;4 (February 25, 2021): 207–11. http://dx.doi.org/10.33251/2707-8620-2021-3-4-207-211.
Full textMadsen, Wayne. "Critical infrastructure protection." Computer Fraud & Security 1997, no. 3 (1997): 8–9. http://dx.doi.org/10.1016/s1361-3723(97)83576-2.
Full textJones, Andrew. "Critical infrastructure protection." Computer Fraud & Security 2007, no. 4 (2007): 11–15. http://dx.doi.org/10.1016/s1361-3723(07)70059-3.
Full textGeorge, Richard. "Critical infrastructure protection." International Journal of Critical Infrastructure Protection 1 (December 2008): 4–5. http://dx.doi.org/10.1016/j.ijcip.2008.08.010.
Full textGarrett, Terence M. "An analysis of U.S. Custom and Border Protection’s tripartite Mexico border security policy." Annales. Etyka w Życiu Gospodarczym 21, no. 4 (2018): 89–111. http://dx.doi.org/10.18778/1899-2226.21.4.07.
Full textNickolov, Eugene. "Critical Information Infrastructure Protection." Information & Security: An International Journal 17 (2005): 105–19. http://dx.doi.org/10.11610/isij.1707.
Full textTitis Adityo Nugroho, Aloysius Uwiyono, and Simona Bustani. "Legal politics of communal intellectual property regulation in the national legal framework." International Journal of Science and Research Archive 16, no. 1 (2025): 1008–14. https://doi.org/10.30574/ijsra.2025.16.1.2107.
Full textCIEKANOWSKI, ZBIGNIEW, Sławomir Żurawski, and Henryk Wyrębek. "CRITICAL INFRASTRUCTURE THREATS." Studia Administracji i Bezpieczeństwa 13, no. 13 (2023): 263–72. http://dx.doi.org/10.5604/01.3001.0016.2902.
Full textBECKVARD, HENRIK P. "PROTECTING CRITICAL INFRASTRUCTURE AND CRITICAL INFORMATION INFRASTRUCTURE." CONTEMPORARY MILITARY CHALLENGES 2022, no. 2 (2022): 15–28. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.24.2.1.
Full textSadowski, Józef. "The critical infrastructure protection. Legislation." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, no. 6 (2018): 1242–48. http://dx.doi.org/10.24136/atest.2018.260.
Full textTYBURSKA, Agata. "POLICE AND CRITICAL INFRASTRUCTURE PROTECTION." Scientific Journal of the Military University of Land Forces 161, no. 3 (2011): 143–62. http://dx.doi.org/10.5604/01.3001.0002.3052.
Full textSKALICKÁ, Petra. "CRITICAL INFRASTRUCTURE PROTECTION - CASE STUDY." Krízový Manažment 16, no. 2 (2017): 70–77. http://dx.doi.org/10.26552/krm.c.2017.2.70-77.
Full textWestrin, Peter. "Critical Information Infrastructure Protection (CIIP)." Information & Security: An International Journal 7 (2001): 67–79. http://dx.doi.org/10.11610/isij.0704.
Full textTrapolino, Scott L. "GIS for Critical Infrastructure Protection." Photogrammetric Engineering & Remote Sensing 83, no. 11 (2017): 733. http://dx.doi.org/10.14358/pers.83.10.733.
Full textTodd, Mike, Carl Colwill, and Dave Allen. "Benchmarking for Critical Infrastructure Protection." Information Security Technical Report 7, no. 2 (2002): 37–49. http://dx.doi.org/10.1016/s1363-4127(02)02005-8.
Full textShull, Casey, J. Eric Dietz, and C. Robert Kenley. "CRITICAL INFRASTRUCTURE PROTECTION AND RECOVERY." INSIGHT 19, no. 4 (2016): 47–49. http://dx.doi.org/10.1002/inst.12127.
Full textPavlov, Georgi, Teodora Gechkova, and Tiana Kaleeva. "CRITICAL INFRASTRUCTURE PROTECTION – STRATEGIC OPPORTUNITIES." International Journal for Quality Research 19, no. 1 (2025): 281–96. https://doi.org/10.24874/ijqr19.01-18.
Full textHruza, Petr. "Resilience and Protection of Critical Information Infrastructure Resilience and Protection of Critical Information Infrastructure." Communications - Scientific letters of the University of Zilina 20, no. 2 (2018): 110–14. http://dx.doi.org/10.26552/com.c.2018.2.110-114.
Full textKLYMENKO, Kateryna, and Maksym SAVOSTIANENKO. "Strengthening the protection of critical infrastructure: domestic realities and international cooperation." Naukovi pratsi NDFI 2021, no. 2 (2021): 44–68. http://dx.doi.org/10.33763/npndfi2021.02.044.
Full textAzarenko, O., Yu Honcharenko, M. Diviziniuk, A. Khmyrova, R. Shevchenko, and O. Shevchenko. "CHARACTERISATION OF METHODS OF PROTECTING THE STATE’S CRITICAL INFRASTRUCTURE FROM TERRORIST ACTIVITIES." Municipal economy of cities 1, no. 182 (2024): 202–9. http://dx.doi.org/10.33042/2522-1809-2024-1-182-202-209.
Full textSadowski, Józef. "The critical infrastructure protection. The genesis." AUTOBUSY – Technika, Eksploatacja, Systemy Transportowe 19, no. 6 (2018): 1237–41. http://dx.doi.org/10.24136/atest.2018.259.
Full textWarren, Matthew J., and Shona Leitch. "Critical supply chain systems and critical infrastructure protection." International Journal of Logistics Economics and Globalisation 2, no. 2 (2010): 107. http://dx.doi.org/10.1504/ijleg.2010.032427.
Full textAlexandru, Adriana, Victor Vevera, and Ella Magdalena Ciupercă. "National Security and Critical Infrastructure Protection." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 1 (2019): 8–13. http://dx.doi.org/10.2478/kbo-2019-0001.
Full textG. Quijano, Eduardo, David Ríos Insua, and Javier Cano. "Critical networked infrastructure protection from adversaries." Reliability Engineering & System Safety 179 (November 2018): 27–36. http://dx.doi.org/10.1016/j.ress.2016.10.015.
Full text