{"title":"Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies","authors":"Achara Tiong, Hector A. Vergara","doi":"10.1016/j.ijcip.2023.100623","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100623","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100623"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wensheng Wang , Faezeh Karimi , Kaveh Khalilpour , David Green , Manos Varvarigos
{"title":"Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)","authors":"Wensheng Wang , Faezeh Karimi , Kaveh Khalilpour , David Green , Manos Varvarigos","doi":"10.1016/j.ijcip.2023.100600","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100600","url":null,"abstract":"<div><p>This study explores network science algorithms for the robustness analysis of electricity networks. We first investigate the characteristics of key network models including random graphs, small-world, and scale-free networks. Then, various measures are explored for the robustness of such networks against failure or attack, utilizing topological features<span> and percolation theory. Both weighted and unweighted scenarios are studied, with network voltage considered as the edge weight. For a case study, we investigate the network characteristics as well as the robustness of the Australian National Electricity Market (NEM) network on the basis of these models and theories.</span></p><p><span>The NEM is the world's longest interconnected power system, with an end-to-end distance of over 5000 km between the state of Queensland in the north and the state of South Australia. Our data contains 2375 transmission lines and 1538 nodes as generators or large demand customers. Our study shows that the NEM as an </span>unweighted network is a small-world network (with exponential degree distribution). However, as a weighted network (considering the voltage capacity of nodes), it has a scale-free topology (following a power-law degree distribution). Robustness analysis revealed that the NEM presents relatively stronger robustness when facing random errors than when facing intentional attacks to nodes with a high degree centrality. It also revealed the sensitivity of the scale-free network to deliberate attacks directed toward important “hubs” (interconnected nodes).</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100600"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Ahmadian Ramaki, A. G. Bafghi, Abbas Rasoolzadegan Barforoush
{"title":"CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks","authors":"Ali Ahmadian Ramaki, A. G. Bafghi, Abbas Rasoolzadegan Barforoush","doi":"10.1016/j.ijcip.2023.100620","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100620","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100620"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerable underground entrance understanding for visual surveillance systems","authors":"Luping Wang , Hui Wei , Yun Hao","doi":"10.1016/j.ijcip.2023.100589","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100589","url":null,"abstract":"<div><p><span>Protecting critical infrastructure through visual surveillance is of vital importance, especially in underground entrance environments where large chunks of sloping glass ceilings are particularly susceptible to various types of terrorist activity. However, owing to the diversity of underground entrance environments, understanding them remains a challenge. Traditional 3D layout and object pose estimation that are evaluated on 3D point clouds or RGB-D data are energy-consuming and difficult to account for semantic information in environments. In this study, we present a methodology to understand underground entrance environments, and to recover their </span>3D reconstruction<span> from a monocular camera. Clusters of sloping angle projections are extracted. Through their corresponding vanishing points (VPs), surfaces of sloping structures are estimated. Relative geometric constraints of different planes are built to bridge the gap between 2D sloping surfaces and 3D reconstruction without precise depth or point clouds. An underground entrance scene is approximated by Manhattan and sloping non-Manhattan structures in 3D reconstruction. The approach requires no prior training, and it requires neither the camera being calibrated nor the camera internal parameters being constant. Compared to the ground truth, the percentage of incorrectly understood pixels were measured and the results demonstrated that the method can successfully understand underground entrance scenes, meeting the requirements in safety monitoring for critical infrastructures from a resource-constrained surveillance camera.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100589"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering","authors":"Mohamed Salama, Wael ElDakhakhni, M. Tait","doi":"10.1016/j.ijcip.2023.100622","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100622","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100622"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editorial on Protection vs Resilience by Prof. Roberto Setola","authors":"Roberto Setola","doi":"10.1016/S1874-5482(23)00021-5","DOIUrl":"https://doi.org/10.1016/S1874-5482(23)00021-5","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100608"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Holmes, Agustin Palao, Mercedez Callenes, Neil Ortiz Silva, Alvaro Cardenas
{"title":"Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990-2018","authors":"J. Holmes, Agustin Palao, Mercedez Callenes, Neil Ortiz Silva, Alvaro Cardenas","doi":"10.1016/j.ijcip.2023.100621","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100621","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100621"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch","authors":"Shuliang Wang, Qiqi Dong","doi":"10.1016/j.ijcip.2023.100602","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100602","url":null,"abstract":"<div><p><span><span>A resilience enhancement strategy based on subnetting is proposed to improve the robustness and repair ability of multi-source power grids. Firstly, based on the characteristics of renewable energy and the principle of </span>cascading failure, the network is divided into multiple stable and sustainable subnets by using the power flow data and island operation conditions in the system, and the key nodes in the subnet are identified by the index of interval electrical </span>betweenness<span>. Considering the three stages of the resilience cycle, the nodes that should be protected or repaired are determined at each time scale, and four different attack and repair strategies are established on this basis. To verify the effectiveness of the proposed method, the robustness and resilience of power networks with and without renewable energy are evaluated from different perspectives, and the impact of this method on improving network resilience is quantitatively evaluated. Finally, the improved IEEE 118-bus system is simulated. The results show that the attack and repair strategies based on subnetting have significant effects on both multi-source power grids and traditional power grids. The resilience enhancement method proposed in this paper can identify grid weaknesses and formulate repair measures that can provide support for improving the defense and resilience of the power grid.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100602"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faizan E Mustafa , Ijaz Ahmed , Abdul Basit , Um-E-Habiba Alvi , Saddam Hussain Malik , Atif Mahmood , Paghunda Roheela Ali
{"title":"A review on effective alarm management systems for industrial process control: Barriers and opportunities","authors":"Faizan E Mustafa , Ijaz Ahmed , Abdul Basit , Um-E-Habiba Alvi , Saddam Hussain Malik , Atif Mahmood , Paghunda Roheela Ali","doi":"10.1016/j.ijcip.2023.100599","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100599","url":null,"abstract":"<div><p><span>The effective robust management of plant requires the implementation of industrial alarm systems in a very significant capacity. The core objective of alarms is to warn the operator of critical operational deviations and these operational anomalies can sometimes result in operators receiving significantly more alarms in a short period of time than they can manage, which is known as alarm flooding. In the case of any system malfunction, the alarms triggering and operators </span>performance measure<span> together important levels of security. Over the course of the last few decades, there has been a significant acceleration in the development of industrial automation technology, which has resulted in an increase in the total number of process sensors deployed within a specific plant. Moreover, the extensive integration of automation and security-based sensors has increased the system’s complexity and introduced a variety of operational challenges in industrial facilities. Consequently, this extensive integration has led to ineffectual system reliability, which further raised operator load volume and increased the chances of fatal conditions in certain situations. This review paper addresses the history of alarm management including major incidents that occurred in the last five decades, the development of the life cycle of alarm management, standards, and principles adopted for alarm management, techniques and methodologies developed for managing alarms, and current challenges that arise from modern control system integration.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100599"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A threat modeling language for generating attack graphs of substation automation systems","authors":"Engla Rencelj Ling, Mathias Ekstedt","doi":"10.1016/j.ijcip.2023.100601","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100601","url":null,"abstract":"<div><p>The substation automation system consists of many different complex assets and data flows. The system is also often externally connected to allow for remote management. The complexity and remote access to the substation automation system makes it vulnerable to cyber attacks. It also makes it difficult to assess the overall security of the system. One method of assessing the potential threats against a system is threat modeling. In this paper we create a language for producing threat models specifically for the substation automation systems. We focus on the method used to create the language where we review industry designs, build the language based on existing languages and consider attack scenarios from a literature study. Finally we present the language, model two different attack scenarios and generate attack graphs from the threat models.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100601"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}