Protecting the critical information infrastructure | IEEE Journals & Magazine | IEEE Xplore