{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T06:31:42Z","timestamp":1772519502677,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030839055","type":"print"},{"value":"9783030839062","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-83906-2_12","type":"book-chapter","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T23:05:04Z","timestamp":1629846304000},"page":"158-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["The Digital Twin as a Common Knowledge Base in DevOps to Support Continuous System Evolution"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8148-5024","authenticated-orcid":false,"given":"Joost","family":"Mertens","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4926-6737","authenticated-orcid":false,"given":"Joachim","family":"Denil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,25]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","unstructured":"Acker, B.V., Meulenaere, P.D., Denil, J., Durodie, Y., Bellinghen, A.V., Vanstechelman, K.: Valid (re-)use of models-of-the-physics in cyber-physical systems using validity frames. In: 2019 Spring Simulation Conference (SpringSim), pp. 1\u201312 (2019). https:\/\/doi.org\/10.23919\/SpringSim.2019.8732858","DOI":"10.23919\/SpringSim.2019.8732858"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Blochwitz, T., et al.: The functional mockup interface for tool independent exchange of simulation models. In: Proceedings of the 8th International Modelica Conference, pp. 105\u2013114. Link\u00f6ping University Press (2011)","DOI":"10.3384\/ecp11063105"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-030-39306-9_6","volume-title":"Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment","author":"B Combemale","year":"2020","unstructured":"Combemale, B., Wimmer, M.: Towards a model-based DevOps for cyber-physical systems. In: Bruel, J.-M., Mazzara, M., Meyer, B. (eds.) DEVOPS 2019. LNCS, vol. 12055, pp. 84\u201394. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39306-9_6"},{"key":"12_CR4","unstructured":"Denil, J., Klikovits, S., Mosterman, P., Vallecillo, A., Vangheluwe, H.: The experiment model and validity frame in m&s. In: SpringSim (2017)"},{"key":"12_CR5","unstructured":"Denil, J., Salay, R., Paredis, C., Vangheluwe, H.: Towards agile model-based systems engineering. In: MODELS (Satellite Events), vol. 2019, pp. 424\u2013429. CEUR Workshop Proceedings (2017). http:\/\/ceur-ws.org\/Vol-2019\/"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-642-39799-8_19","volume-title":"Computer Aided Verification","author":"A Donz\u00e9","year":"2013","unstructured":"Donz\u00e9, A., Ferr\u00e8re, T., Maler, O.: Efficient robust monitoring for STL. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 264\u2013279. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_19"},{"key":"12_CR7","unstructured":"Engblom, J.: Continuous integration for embedded systems using simulation. In: Embedded World 2015 Congress (2015)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-030-06019-0_2","volume-title":"Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment","author":"J Garcia","year":"2019","unstructured":"Garcia, J., Cabot, J.: Stepwise adoption of continuous delivery in model-driven engineering. In: Bruel, J.-M., Mazzara, M., Meyer, B. (eds.) DEVOPS 2018. LNCS, vol. 11350, pp. 19\u201332. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-06019-0_2"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-030-55583-2_14","volume-title":"Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops","author":"S Gautham","year":"2020","unstructured":"Gautham, S., Jayakumar, A.V., Elks, C.: Multilevel runtime security and safety monitoring for cyber physical systems using model-based engineering. In: Casimiro, A., Ortmeier, F., Schoitsch, E., Bitsch, F., Ferreira, P. (eds.) SAFECOMP 2020. LNCS, vol. 12235, pp. 193\u2013204. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55583-2_14"},{"key":"12_CR10","doi-asserted-by":"publisher","unstructured":"Grieves, M.: Origins of the digital twin concept. In: Working Paper, pp. 1\u20137. Florida Institute of Technology, August 2016. https:\/\/doi.org\/10.13140\/RG.2.2.26367.61609","DOI":"10.13140\/RG.2.2.26367.61609"},{"key":"12_CR11","doi-asserted-by":"publisher","unstructured":"Guissouma, H., Lauber, A., Mkadem, A., Sax, E.: Virtual test environment for efficient verification of software updates for variant-rich automotive systems. In: 2019 IEEE International Systems Conference (SysCon), pp. 1\u20138 (2019). https:\/\/doi.org\/10.1109\/SYSCON.2019.8836898","DOI":"10.1109\/SYSCON.2019.8836898"},{"key":"12_CR12","unstructured":"Kim, G., Humble, J., Debois, P., Willis, J.: The DevOps Handbook: How to Create World-Class Agility, Reliability, and Security in Technology Organizations. IT Revolution (2016)"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Kritzinger, W., Karner, M., Traar, G., Henjes, J., Sihn, W.: Digital twin in manufacturing: a categorical literature review and classification. IFAC-PapersOnLine 51(11), 1016\u20131022 (2018). https:\/\/doi.org\/10.1016\/j.ifacol.2018.08.474, 16th IFAC Symposium on Information Control Problems in Manufacturing INCOM 2018","DOI":"10.1016\/j.ifacol.2018.08.474"},{"issue":"1","key":"12_CR14","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/systems7010007","volume":"7","author":"AM Madni","year":"2019","unstructured":"Madni, A.M., Madni, C.C., Lucero, S.D.: Leveraging digital twin technology in model-based systems engineering. Systems 7(1), 7 (2019)","journal-title":"Systems"},{"key":"12_CR15","unstructured":"Mertens, J., Denil, J.: Digital twins for continuous deployment in model-based systems engineering of cyber-physical systems. CEUR Workshop Proceedings, vol. 2822, pp. 32\u201339 (2020). http:\/\/ceur-ws.org\/Vol-2822\/"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-030-55583-2_15","volume-title":"Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops","author":"M Ugarte Querejeta","year":"2020","unstructured":"Ugarte Querejeta, M., Etxeberria, L., Sagardui, G.: Towards a DevOps approach in cyber physical production systems using digital twins. In: Casimiro, A., Ortmeier, F., Schoitsch, E., Bitsch, F., Ferreira, P. (eds.) SAFECOMP 2020. LNCS, vol. 12235, pp. 205\u2013216. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-55583-2_15"},{"key":"12_CR17","doi-asserted-by":"publisher","unstructured":"Van Acker, B., Oakes, B.J., Moradi, M., Demeulenaere, P., Denil, J.: Validity frame concept as effort-cutting technique within the verification and validation of complex cyber-physical systems. In: Proceedings of the 23rd ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings. MODELS 2020, New York, NY, USA. Association for Computing Machinery (2020). https:\/\/doi.org\/10.1145\/3417990.3419226","DOI":"10.1145\/3417990.3419226"},{"key":"12_CR18","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-030-58167-1_10","volume-title":"Systems Modelling and Management","author":"S Van Mierlo","year":"2020","unstructured":"Van Mierlo, S., Oakes, B.J., Van Acker, B., Eslampanah, R., Denil, J., Vangheluwe, H.: Exploring validity frames in practice. In: Babur, \u00d6., Denil, J., Vogel-Heuser, B. (eds.) ICSMM 2020. CCIS, vol. 1262, pp. 131\u2013148. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58167-1_10"},{"key":"12_CR19","unstructured":"Vangheluwe, H., De Lara, J., Mosterman, P.J.: An introduction to multi-paradigm modelling and simulation. In: Proceedings of the AIS 2002 Conference (AI, Simulation and Planning in High Autonomy Systems), Lisboa, Portugal, pp. 9\u201320 (2002)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Warg, F., Blom, H., Borg, J., Johansson, R.: Continuous deployment for dependable systems with continuous assurance cases. In: 2019 IEEE International Symposium on Software Reliability Engineering, WoSoCer workshop. IEEE Computer Society (2019)","DOI":"10.1109\/ISSREW.2019.00091"},{"key":"12_CR21","unstructured":"Zeller, M., Ratiu, D., Rothfelder, M., Buschmann, F.: An industrial roadmap for continuous delivery of software for safety-critical systems. In: 39th International Conference on Computer Safety, Reliability and Security (SAFECOMP), Position Paper (2020)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-83906-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T17:40:59Z","timestamp":1710265259000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-83906-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030839055","9783030839062"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-83906-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"25 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFECOMP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Safety, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"York","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safecomp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safecomp2021.hosted.york.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the workshops 26 full and 4 short papers were accepted for publication.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}