International Journal of Critical Infrastructure Protection最新文献

筛选
英文 中文
Developing security metrics for space systems: A study considering the NIST Cybersecurity Framework 2.0 and the NIS2 开发空间系统的安全指标:考虑NIST网络安全框架2.0和NIS2的研究
IF 5.3 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2025-10-03 DOI: 10.1016/j.ijcip.2025.100805
Francesco Casaril, Letterio Galletta
{"title":"Developing security metrics for space systems: A study considering the NIST Cybersecurity Framework 2.0 and the NIS2","authors":"Francesco Casaril,&nbsp;Letterio Galletta","doi":"10.1016/j.ijcip.2025.100805","DOIUrl":"10.1016/j.ijcip.2025.100805","url":null,"abstract":"<div><div>Space-based assets are essential for critical societal functions across sectors like energy, transportation, communication, agriculture, and government. As these services become more integrated into daily life and reliance on cyber–physical systems grows, the interconnectivity and commercialization of space assets increases the attack surface and cybersecurity risks. Recent incidents affecting space infrastructure underscore the urgent need for robust cybersecurity measures. Legislators in the EU and other countries are addressing cyber risks to space and ground assets by developing minimum protection requirements. To support these measures, this paper evaluates whether existing security metrics in the literature cover all NIST functions, categories, and subcategories in the Cybersecurity Framework 2.0 (CSF 2.0). This framework provides a strong foundation for industry sectors and can serve as a baseline to ensure compliance with directives like NIS2. Our analysis reveals imbalances in academic discourse, with certain CSF 2.0 functions underrepresented. Then, we propose new metrics to address unaddressed NIST categories and adapt existing metrics to better suit the space domain. Considering practical challenges in implementing and monitoring these metrics, we propose a tool to facilitate their calculation and visualize security status. We also present a case study resembling real-world space infrastructure that demonstrates our tool’s applicability and the value of the designed metrics. Our research has managerial implications, supporting managers, CIOs, and CISOs in making informed decisions, helping companies understand their security levels, and complying with existing and forthcoming space sector regulations. We advocate for using security metrics to assess compliance with regulations like NIS2, CER, or upcoming space laws, demonstrating to policymakers that metrics can be integrated into policies to enhance their effectiveness.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"51 ","pages":"Article 100805"},"PeriodicalIF":5.3,"publicationDate":"2025-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145266573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel data–intelligence–driven three–stage dynamic model for resilience assessment in an emergency material support system 一种新的数据智能驱动的应急物资保障系统弹性评估三阶段动态模型
IF 5.3 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2025-09-13 DOI: 10.1016/j.ijcip.2025.100804
Weilan Suo , Wenjie Xu , Longfei Li , Xiaolei Sun
{"title":"A novel data–intelligence–driven three–stage dynamic model for resilience assessment in an emergency material support system","authors":"Weilan Suo ,&nbsp;Wenjie Xu ,&nbsp;Longfei Li ,&nbsp;Xiaolei Sun","doi":"10.1016/j.ijcip.2025.100804","DOIUrl":"10.1016/j.ijcip.2025.100804","url":null,"abstract":"<div><div>Resilience is a crucial benchmark in characterizing the comprehensive capability of the emergency material support system (EMSS) to respond to major risk events. Given the involvement of multiple stakeholders, multiple stages and dynamic evolution, EMSS resilience assessment remains a challenge. Therefore, we attempt to develop a novel data–intelligence–driven three–stage dynamic model based on multi–source text data and multi–expert knowledge. In Stage 1, a large language models–enhanced named entity recognition model is proposed to extract and analyze EMSS risk events, providing a foundational dataset for scenario construction. In Stage 2, an ontology–based scenario construction model is proposed to abstract risk events into ontological concepts, providing a feature reference for the hierarchical system of assessment criteria. In Stage 3, a feature–matching assessment model is proposed to quantify the profile of EMSS resilience, where the uncertainty and variability in experts’ perceptions of resilience feature are addressed. Subsequently, the model effectiveness is demonstrated in a case study, in which the key criteria and improvement paths for EMSS resilience are identified. This study provides a holistic solution and efficient methodology for EMSS resilience assessment, offering significant insights into a multifaceted recognition of EMSS resilience to risk scenarios.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"51 ","pages":"Article 100804"},"PeriodicalIF":5.3,"publicationDate":"2025-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection of critical infrastructures in times of peace and war 在和平与战争时期保护关键基础设施
IF 5.3 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2025-09-01 DOI: 10.1016/S1874-5482(25)00060-5
Roberto Setola
{"title":"Protection of critical infrastructures in times of peace and war","authors":"Roberto Setola","doi":"10.1016/S1874-5482(25)00060-5","DOIUrl":"10.1016/S1874-5482(25)00060-5","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"50 ","pages":"Article 100799"},"PeriodicalIF":5.3,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144922669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic optimization of multi-layered defenses inspired by Chakravyuh 受Chakravyuh启发的多层防御的动态优化
IF 5.3 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2025-08-30 DOI: 10.1016/j.ijcip.2025.100794
Kishore Dutta
{"title":"Dynamic optimization of multi-layered defenses inspired by Chakravyuh","authors":"Kishore Dutta","doi":"10.1016/j.ijcip.2025.100794","DOIUrl":"10.1016/j.ijcip.2025.100794","url":null,"abstract":"<div><div>As adversaries grow more sophisticated, critical infrastructure demands defense systems that not only react but also learn and adapt dynamically. This work introduces a novel reinforcement learning framework inspired by the ancient Indian <em>Chakravyuh</em> formation, integrating Q-learning, Markov decision processes, and network optimization to model multi-layered security under uncertainty. The system enables attackers to attempt sequential node breaches while defenders deploy adaptive traps and allocate resources through quantifiable metrics including ROI-driven investment and critical node vulnerability analysis. Results demonstrate both vulnerabilities and strengths: universal Layer 0 breaches occur (Mean Time to Breach = 52 episodes) due to uneven resource allocation quantified by a high Gini coefficient of 0.712. Despite this vulnerability, deeper layers remain highly resilient — with over 90% of attacks halted by Layer 1 and fewer than 5% of episodes resulting in breaches beyond Layer 2. Trap deployment achieves high efficiency, with approximately 82% of traps being triggered, especially during early episodes. However, efficiency declines over time as attackers adapt and avoid traps. Resource allocation patterns scale linearly, ensuring sustainable defense operations. These findings validate how the fusion of <em>Chakravyuh</em> strategy with modern reinforcement learning creates an adaptive defense system, simultaneously exposing perimeter vulnerabilities for targeted reinforcement and demonstrating effective deeper-layer security through optimized stochastic policies.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"51 ","pages":"Article 100794"},"PeriodicalIF":5.3,"publicationDate":"2025-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144919755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat model for IEC 61850 based substation automation system 基于IEC 61850的变电站自动化系统的威胁模型
IF 5.3 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2025-08-23 DOI: 10.1016/j.ijcip.2025.100789
Mihael Marović , Ante Đerek , Stjepan Groš , Ivan Kovačević
{"title":"Threat model for IEC 61850 based substation automation system","authors":"Mihael Marović ,&nbsp;Ante Đerek ,&nbsp;Stjepan Groš ,&nbsp;Ivan Kovačević","doi":"10.1016/j.ijcip.2025.100789","DOIUrl":"10.1016/j.ijcip.2025.100789","url":null,"abstract":"<div><div>Threat models have major importance in the area of computer systems security, as they can help identify oversights in the security requirements of a system and influence the design of protection mechanisms. The objective of this paper is to improve the understanding of threats specific to the substation automation system based on the IEC 61850 standard. This would make the discussion and understanding of the protection mechanisms for IEC 61850 more fruitful. So, in this paper, we have developed a detailed threat model for a substation automation system based on the IEC 61850 standard. The developed threat model is based on attack trees and provides a visual and comprehensive overview of potential attack scenarios. The construction of the attack tree follows a top-down approach, starting with the attacker’s goal and encompassing all potential sequences of steps to achieve this goal. When considering possible ways to achieve a goal, we utilise the MITRE ATT&amp;CK framework and take the specifics of the IEC 61850 substation automation system model into account. We used the threat model to discuss the effect of applying communication protection mechanisms to protect IEC 61850 substation automation system (SAS). While a few other threat models exist for IEC 61850 substation automation system, the model we presented here is significantly more comprehensive, it is adaptable and based on a novel threat modelling method that incorporates the MITRE attack pattern in the process of constructing an attack tree. One of the key findings of this article is the identification of the four fundamentally different ways to sabotage an IEC 61850 SAS. Other findings are related to the adaptivity of the attack tree, limitations of the attack tree, and mapping of known attacks on IEC 61850 SAS onto the attack tree.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"51 ","pages":"Article 100789"},"PeriodicalIF":5.3,"publicationDate":"2025-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144922855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilience of interdependent infrastructure networks: Review and future directions 相互依赖的基础设施网络的弹性:回顾和未来方向
IF 5.3 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2025-08-21 DOI: 10.1016/j.ijcip.2025.100793
Wenjing Tong , Hong Xian Li , Farnad Nasirzadeh , Fuyi Yao , Yingbo Ji
{"title":"Resilience of interdependent infrastructure networks: Review and future directions","authors":"Wenjing Tong ,&nbsp;Hong Xian Li ,&nbsp;Farnad Nasirzadeh ,&nbsp;Fuyi Yao ,&nbsp;Yingbo Ji","doi":"10.1016/j.ijcip.2025.100793","DOIUrl":"10.1016/j.ijcip.2025.100793","url":null,"abstract":"<div><div>Interdependent infrastructure systems are instrumental for facility operations. Existing research has emphasised the resilience of infrastructure networks from theoretical to methodological perspectives. This paper aims to identify the current trends and future directions using a mixed method combining bibliometric analysis and systematic review. 101 highly relevant articles are selected for analysis, and scientific literature maps are constructed to analyse co-authorship, co-citation, and keywords. In addition, systematic review is conducted to identify the main research themes, including characteristics analysis of interdependent infrastructure resilience, resilience assessment, and improvement strategies. The potential avenues for future research are also identified, including developing data-driven, interpretable resilience models using advanced algorithms; analysing performance evolution mechanisms integrating temporal and geographic perspectives, assessing resilience emphasising dynamic equilibrium states; improving the holistic resilience considering the trade-off of different targets. This research contributes to the body of knowledge of interdependent infrastructure resilience and exposes the research needs in this area.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"51 ","pages":"Article 100793"},"PeriodicalIF":5.3,"publicationDate":"2025-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144892319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability assessment of interdependent road-power networks with probability-based coupling strategies 基于概率耦合策略的道路电力网络脆弱性评估
IF 5.3 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2025-08-12 DOI: 10.1016/j.ijcip.2025.100792
Qiaojun Guo , Xin Gao , Damin Dong , Guangtai Zhang
{"title":"Vulnerability assessment of interdependent road-power networks with probability-based coupling strategies","authors":"Qiaojun Guo ,&nbsp;Xin Gao ,&nbsp;Damin Dong ,&nbsp;Guangtai Zhang","doi":"10.1016/j.ijcip.2025.100792","DOIUrl":"10.1016/j.ijcip.2025.100792","url":null,"abstract":"<div><div>The road network and power grid are vital components of urban infrastructures, but their interdependence significantly amplifies vulnerability. Thus, this paper studies the vulnerability of the interdependent road-power network constructed by a probability-based coupling strategies. First, the road network and the power grid are abstracted as two single networks, respectively, where user equilibrium and the Kirchhoff’s law are used to construct the cascading failure model. Then, to establish an effective interdependent relationship between them, we propose ranking proportion reflecting the ranking of a node in the single network and construct the interdependent link between networks through the probability determined by the difference of ranking proportion, thereby developing a probability-based framework for generating coupling strategies. This can produce coupling strategies with a specific assortativity coefficient based on various kinds of metrics. Finally, we use the real-world Shanghai road network and the IEEE 118-node power grid to conduct a case study on the vulnerability of the interdependent network with sixteen assortative and disassortative coupling strategies obtained by the proposed framework with four topological and functional metrics. Experimental results show that under intentional attacks, the interdependent network with disassortative coupling strategies regarding fluctuations of power loads exhibits slight vulnerability; under random failures, disassortative coupling strategies regarding the power load mitigate its vulnerability. In addition, there is little difference in the vulnerability of the interdependent network with assortative coupling strategies regardless of attack strategies. Besides, its vulnerability is more significant while adopting coupling strategies regarding classic topological metrics.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"51 ","pages":"Article 100792"},"PeriodicalIF":5.3,"publicationDate":"2025-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144887265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware security modules for sustainable energy systems: Targeted review 可持续能源系统的硬件安全模块:有针对性的审查
IF 5.3 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2025-08-12 DOI: 10.1016/j.ijcip.2025.100791
Yehia Ibrahim Alzoubi
{"title":"Hardware security modules for sustainable energy systems: Targeted review","authors":"Yehia Ibrahim Alzoubi","doi":"10.1016/j.ijcip.2025.100791","DOIUrl":"10.1016/j.ijcip.2025.100791","url":null,"abstract":"<div><div>As the global transition toward green energy intensifies, the integration of Hardware Security Modules (HSMs) into sustainable energy systems is emerging as a critical component for ensuring cybersecurity and operational resilience. HSMs are essential for safeguarding sensitive data, enabling secure communication, and maintaining the integrity of operations within smart grids and renewable energy infrastructures, which are increasingly susceptible to cyber threats. Despite the growing relevance of HSMs in this domain, there remains a significant gap in the academic literature concerning their specific adoption and optimization in sustainable energy contexts. This paper addresses this gap by providing a comprehensive analysis of the role and integration of HSMs in sustainable energy systems. It examines how HSMs enhance system security through advanced cryptographic protections, operational robustness, and secure data exchange. The study further explores key optimization strategies, such as energy-efficient circuit design, advanced process technologies, and duty-cycling mechanisms that align HSM functionality with energy sustainability goals. Additionally, the paper identifies and discusses major challenges affecting HSM deployment, such as cost constraints, energy consumption, and interoperability with legacy infrastructure. By synthesizing these findings, the paper unveils the strategic implementation of HSMs in sustainable energy frameworks and lays a foundation for future empirical investigations aimed at validating and extending the discussed approaches.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"50 ","pages":"Article 100791"},"PeriodicalIF":5.3,"publicationDate":"2025-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144841154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing cybersecurity in railways: Machine learning approaches for attack detection 加强铁路网络安全:攻击检测的机器学习方法
IF 5.3 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2025-08-08 DOI: 10.1016/j.ijcip.2025.100788
Beatriz Otero Calviño, Eva Rodriguez, Juan José Costa, Mercedes Oriol
{"title":"Enhancing cybersecurity in railways: Machine learning approaches for attack detection","authors":"Beatriz Otero Calviño,&nbsp;Eva Rodriguez,&nbsp;Juan José Costa,&nbsp;Mercedes Oriol","doi":"10.1016/j.ijcip.2025.100788","DOIUrl":"10.1016/j.ijcip.2025.100788","url":null,"abstract":"<div><div>Ensuring the security of railway systems is crucial to protecting both passengers and infrastructure from the increasing threat of cyberattacks. As these threats grow in complexity and frequency, the need for resilient attack detection systems becomes more pressing.</div><div>This study tackles the challenge of attack detection in railway systems using machine learning techniques. By integrating Generative Adversarial Networks (GANs), Convolutional Neural Networks (CNNs), and Transfer Learning (TL), we enhance detection accuracy and develop a robust approach capable of identifying both known and emerging threats. Our methodology utilized the Electra Modbus dataset as the source domain and was transferred to the Electra S7Comm dataset as the target domain. Experimental results highlight the effectiveness of GAN-based data augmentation in mitigating the scarcity of attack samples, enhancing both the robustness and generalizability of our detection models. Additionally, the application of pre-trained models through transfer learning played a crucial role in achieving superior performance. Our proposed solution can be deployed within railway networks to strengthen security measures, enabling proactive responses to cyber threats, safeguarding critical infrastructure, and ensuring uninterrupted operations.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"50 ","pages":"Article 100788"},"PeriodicalIF":5.3,"publicationDate":"2025-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144829738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How interdependent coupling affects the resilience of urban critical infrastructure(UCI) 相互依赖耦合如何影响城市关键基础设施的弹性
IF 5.3 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2025-08-05 DOI: 10.1016/j.ijcip.2025.100790
Li Guo , Jianing Hu , Mengjuan Luo , Shihao Ren , Xiaobin Dong , Pengcheng Li
{"title":"How interdependent coupling affects the resilience of urban critical infrastructure(UCI)","authors":"Li Guo ,&nbsp;Jianing Hu ,&nbsp;Mengjuan Luo ,&nbsp;Shihao Ren ,&nbsp;Xiaobin Dong ,&nbsp;Pengcheng Li","doi":"10.1016/j.ijcip.2025.100790","DOIUrl":"10.1016/j.ijcip.2025.100790","url":null,"abstract":"<div><div>Urban critical infrastructure systems do not exist in isolation. They are interdependent and interact with each other, constructing a multilayer network model can effectively and accurately simulate the relationship between these systems, to better understand and analyze their interactions and impact on the overall resilience of the system. This study constructs eight different coupling-type multilayer cascading failure models to explore the robustness patterns of interdependent coupling networks under two different coupling patterns (chain and triangle) and different coupling ratios. The research results indicate that (1) both chain and triangle coupling networks exhibit optimal adjustable capacity parameter values, but the optimal adjustable capacity values for these two coupling patterns are not the same; (2) the robustness of the triangle coupling network is superior to that of the chain coupling network, although, under degree-matching coupling types, the robustness of the two coupling patterns is similar; (3) under the same coupling pattern, different coupling types of multilayer networks exhibit differences in robustness, and the optimal inter-layer coupling types vary within different coupling ratio ranges; (4) under different coupling patterns, for the same coupling ratio range, the optimal inter-layer coupling types also differ. These findings provide a foundation for more precise modeling, thereby enabling the development of more effective strategies to enhance the resilience and reliability of interdependent urban critical infrastructure systems under varying coupling conditions.</div></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"51 ","pages":"Article 100790"},"PeriodicalIF":5.3,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144912267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信