Controls for protecting critical information infrastructure from cyberattacks | IEEE Conference Publication | IEEE Xplore