You are currently viewing a new version of our website. To view the old version click .

Cyber Security and Critical Infrastructures, 2nd Edition

Topic Information

Dear Colleagues,

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of these infrastructures have increased with the widespread use of information technologies. As critical national infrastructures are becoming more vulnerable to cyberattacks, their protection is becoming a significant issue for every organization as well as nation. The risks to continued operations from failing to upgrade aging infrastructures or not meeting mandated regulatory regimes are considered higher given the demonstrable impact of such circumstances.

Due to the rapid increase in sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cyber security of these infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioral aspects is essential to handle the cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. Moreover, the coronavirus pandemic has created new challenges for businesses as they adapt to an operating model in which working from home has become the ‘new normal’. Companies are accelerating their digital transformation, and cybersecurity is now a major concern.

The aim of this Topic is to gather both research and practical aspects of cyber security considerations in critical infrastructures. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry are welcome to contribute.

We seek original and high-quality submissions on one or more of the following topics (among others):

  • Security of supervisory control and data acquisition (SCADA) systems;
  • Cyber security of complex and distributed critical infrastructures;
  • Cyber security of industrial control systems;
  • Cyber security modeling and simulation;
  • Cyber threat modeling and analysis;
  • Safety–security interactions;
  • Cyber security engineering;
  • Behavioral modeling;
  • Network security and protocols;
  • Security, privacy, and legal issues of big data and the Internet of Things;
  • Cyber threat intelligence;
  • Situational awareness;
  • Attack modeling, prevention, mitigation, and defense;
  • Cyber-physical system security approaches and algorithms;
  • Critical infrastructure security policies, standards, and regulations;
  • Vulnerability and risk assessment methodologies for distributed critical infrastructures;
  • Risk management and cyber insurance;
  • Simulation and test beds for the security evaluation of critical infrastructures;
  • Resiliency and security of cyber systems;
  • Cyber security and privacy policies;
  • Hardware security solutions;
  • Incident response;
  • Encryption, authentication, availability assurance;
  • Human awareness and training;
  • Intrusion detection;
  • Trust and privacy preservation;
  • Secure communication protocols;
  • Malware analysis;
  • Attribution of cyberattacks;
  • Cyber warfare and peacekeeping;
  • Hybrid war;
  • Blockchain technology;
  • Supply chain security;
  • Ransomware;
  • Post-quantum crypto;
  • Zero-trust;
  • Supply chain attacks.

Dr. Mohamed Amine Ferrag
Prof. Dr. Leandros Maglaras
Prof. Dr. Helge Janicke
Topic Editors

Keywords

  • cybersecurity
  • critical infrastructures
  • cyber security and privacy policy
  • cyber-physical systems
  • industrial control systems
  • network security and protocols
  • cyber threat intelligence
  • intrusion detection
  • secure communication protocols
  • attribution of cyber attacks
  • simulation and test beds for security evaluation of critical infrastructures

Participating Journals

Applied Sciences
Open Access
82,627 Articles
Launched in 2011
2.5Impact Factor
5.5CiteScore
20 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking
Electronics
Open Access
26,726 Articles
Launched in 2012
2.6Impact Factor
6.1CiteScore
17 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking
Future Internet
Open Access
3,128 Articles
Launched in 2009
3.6Impact Factor
8.3CiteScore
17 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking
Journal of Cybersecurity and Privacy
Open Access
277 Articles
Launched in 2021
-Impact Factor
9.1CiteScore
24 DaysMedian Time to First Decision
-Highest JCR Category Ranking
Sensors
Open Access
74,257 Articles
Launched in 2001
3.5Impact Factor
8.2CiteScore
20 DaysMedian Time to First Decision
Q2Highest JCR Category Ranking

Published Papers