{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T14:00:57Z","timestamp":1760623257471,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031197611"},{"type":"electronic","value":"9783031197628"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-19762-8_11","type":"book-chapter","created":{"date-parts":[[2022,10,19]],"date-time":"2022-10-19T08:03:09Z","timestamp":1666166589000},"page":"159-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Towards Secure Digital Twins"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8483-1252","authenticated-orcid":false,"given":"Tomas","family":"Kulik","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2692-9742","authenticated-orcid":false,"given":"Cl\u00e1udio","family":"Gomes","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8882-4500","authenticated-orcid":false,"given":"Hugo Daniel","family":"Macedo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9952-0214","authenticated-orcid":false,"given":"Stefan","family":"Hallerstede","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4589-1500","authenticated-orcid":false,"given":"Peter Gorm","family":"Larsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Atalay, M., Angin, P.: A digital twins approach to smart grid security testing and standardization. In: 2020 IEEE International Workshop on Metrology for Industry 4.0 IoT, pp. 435\u2013440 (2020). https:\/\/doi.org\/10.1109\/MetroInd4.0IoT48571.2020.9138264","key":"11_CR1","DOI":"10.1109\/MetroInd4.0IoT48571.2020.9138264"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-030-75354-2_32","volume-title":"The CISO\u2019s Next Frontier","author":"R Badhwar","year":"2021","unstructured":"Badhwar, R.: The case for code signing and dynamic white-listing. In: The CISO\u2019s Next Frontier, pp. 259\u2013264. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75354-2_32"},{"doi-asserted-by":"publisher","unstructured":"Baskar, M., Jayaraman, R., Karthikeyan, C., Anbarasu, V., Balaji, A., Arulananth, T.: Low rate DDoS mitigation using real-time multi threshold traffic monitoring system. J. Ambient Intell. Humanized Comput., 1\u20139 (2021). https:\/\/doi.org\/10.1007\/s12652-020-02744-y","key":"11_CR3","DOI":"10.1007\/s12652-020-02744-y"},{"doi-asserted-by":"crossref","unstructured":"Becue, A., et al.: Cyberfactory# 1-securing the industry 4.0 with cyber-ranges and digital twins. In: 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS), pp. 1\u20134. IEEE (2018)","key":"11_CR4","DOI":"10.1109\/WFCS.2018.8402377"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-319-98935-8_8","volume-title":"Cyber-Physical Systems Security","author":"G Bianchin","year":"2018","unstructured":"Bianchin, G., Pasqualetti, F.: Time-delay attacks in network systems. In: Ko\u00e7, \u00c7.K. (ed.) Cyber-Physical Systems Security, pp. 157\u2013174. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98935-8_8"},{"doi-asserted-by":"publisher","unstructured":"Bruynseels, K., Santoni de Sio, F., van den Hoven, J.: Digital twins in health care: ethical implications of an emerging engineering paradigm. Front. Genet. 9 (2018). www.frontiersin.org\/article\/10.3389\/fgene.2018.00031. https:\/\/doi.org\/10.3389\/fgene.2018.00031","key":"11_CR6","DOI":"10.3389\/fgene.2018.00031"},{"doi-asserted-by":"publisher","unstructured":"Eckhart, M., Ekelhart, A.: Towards security-aware virtual environments for digital twins. In: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, CPSS 2018, pp. 61\u201372. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3198458.3198464","key":"11_CR7","DOI":"10.1145\/3198458.3198464"},{"doi-asserted-by":"crossref","unstructured":"Feng, H., Gomes, C., Gil, S., Mikkelsen, P.H., Tola, D., Larsen, P.G.: Integration of the MAPE-K loop in digital twins. In: 2022 Annual Modeling and Simulation Conference (ANNSIM). IEEE, San Diego, July 2022","key":"11_CR8","DOI":"10.23919\/ANNSIM55834.2022.9859489"},{"doi-asserted-by":"publisher","unstructured":"Feng, H., Gomes, C., Thule, C., Lausdahl, K., Iosifidis, A., Larsen, P.G.: Introduction to digital twin engineering. In: 2021 Annual Modeling and Simulation Conference (ANNSIM), pp. 1\u201312. IEEE, Fairfax, July 2021. https:\/\/doi.org\/10.23919\/ANNSIM52504.2021.9552135","key":"11_CR9","DOI":"10.23919\/ANNSIM52504.2021.9552135"},{"doi-asserted-by":"crossref","unstructured":"Feng, H., Gomes, C., Thule, C., Lausdahl, K., Sandberg, M., Larsen, P.G.: The incubator case study for digital twin engineering. arXiv:2102.10390 [cs, eess], February 2021","key":"11_CR10","DOI":"10.23919\/ANNSIM52504.2021.9552135"},{"issue":"6","key":"11_CR11","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.14716\/ijtech.v11i6.4427","volume":"11","author":"T Golovina","year":"2020","unstructured":"Golovina, T., Polyanin, A., Adamenko, A., Khegay, E., Schepinin, V.: Digital twins as a new paradigm of an industrial enterprise. Int. J. Technol. 11(6), 1115 (2020). https:\/\/doi.org\/10.14716\/ijtech.v11i6.4427","journal-title":"Int. J. Technol."},{"doi-asserted-by":"publisher","unstructured":"Holmes, D., Papathanasaki, M., Maglaras, L., Ferrag, M.A., Nepal, S., Janicke, H.: Digital twins and cyber security - solution or challenge? In: 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM), pp. 1\u20138 (2021). https:\/\/doi.org\/10.1109\/SEEDA-CECNSM53056.2021.9566277","key":"11_CR12","DOI":"10.1109\/SEEDA-CECNSM53056.2021.9566277"},{"unstructured":"Jackson, M.: Software Requirements and Specification: A Lexicon of Practice, Principles and Prejudices. Addison-Wesley (1995)","key":"11_CR13"},{"unstructured":"Jackson, M.: Problem Frames. ACM Press (2001)","key":"11_CR14"},{"doi-asserted-by":"publisher","unstructured":"Kayan, H., Nunes, M., Rana, O., Burnap, P., Perera, C.: Cybersecurity of industrial cyber-physical systems: a review. ACM Comput. Surv. (2022). https:\/\/doi.org\/10.1145\/3510410","key":"11_CR15","DOI":"10.1145\/3510410"},{"issue":"12","key":"11_CR16","doi-asserted-by":"publisher","first-page":"7275","DOI":"10.1109\/TII.2020.2972809","volume":"16","author":"Z Kazemi","year":"2020","unstructured":"Kazemi, Z., Safavi, A.A., Naseri, F., Urbas, L., Setoodeh, P.: A secure hybrid dynamic-state estimation approach for power systems under false data injection attacks. IEEE Trans. Industr. Inf. 16(12), 7275\u20137286 (2020). https:\/\/doi.org\/10.1109\/TII.2020.2972809","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"J Kephart","year":"2003","unstructured":"Kephart, J., Chess, D.: The vision of autonomic computing. Computer 36(1), 41\u201350 (2003). https:\/\/doi.org\/10.1109\/MC.2003.1160055","journal-title":"Computer"},{"unstructured":"Krutz, R.L.: Securing SCADA Systems. John Wiley & Sons (2005)","key":"11_CR18"},{"doi-asserted-by":"publisher","unstructured":"Kulik, T., Boudjadar, J., Tran-J\u00f8rgensen, P.: Security verification of industrial control systems using partial model checking. In: Proceedings of the 8th International Conference on Formal Methods in Software Engineering, FormaliSE 2020, pp. 98\u2013108. Association for Computing Machinery, United States (2020). 8th International Conference on Formal Methods in Software Engineering; Conference date: 07 October 2020 Through 08 October 2020. https:\/\/doi.org\/10.1145\/3372020.3391558","key":"11_CR19","DOI":"10.1145\/3372020.3391558"},{"issue":"4","key":"11_CR20","doi-asserted-by":"crossref","first-page":"1396","DOI":"10.1109\/TCST.2013.2280899","volume":"22","author":"Y Mo","year":"2013","unstructured":"Mo, Y., Chabukswar, R., Sinopoli, B.: Detecting integrity attacks on SCADA systems. IEEE Trans. Control Syst. Technol. 22(4), 1396\u20131407 (2013)","journal-title":"IEEE Trans. Control Syst. Technol."},{"doi-asserted-by":"publisher","unstructured":"Pajic, M., et al.: Robustness of attack-resilient state estimators. In: 2014 ACM\/IEEE International Conference on Cyber-Physical Systems (ICCPS), pp. 163\u2013174. IEEE, Berlin, April 2014. https:\/\/doi.org\/10.1109\/ICCPS.2014.6843720","key":"11_CR21","DOI":"10.1109\/ICCPS.2014.6843720"},{"issue":"1","key":"11_CR22","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/JPROC.2017.2725482","volume":"106","author":"K Paridari","year":"2018","unstructured":"Paridari, K., O\u2019Mahony, N., El-Din Mady, A., Chabukswar, R., Boubekeur, M., Sandberg, H.: A framework for attack-resilient industrial control systems: attack detection and controller reconfiguration. Proc. IEEE 106(1), 113\u2013128 (2018). https:\/\/doi.org\/10.1109\/JPROC.2017.2725482","journal-title":"Proc. IEEE"},{"doi-asserted-by":"publisher","unstructured":"P\u00f6hls, H.C.: JSON sensor signatures (JSS): end-to-end integrity protection from constrained device to IoT application. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 306\u2013312 (2015). https:\/\/doi.org\/10.1109\/IMIS.2015.48","key":"11_CR23","DOI":"10.1109\/IMIS.2015.48"},{"doi-asserted-by":"crossref","unstructured":"Suhail, S., Hussain, R., Jurdak, R., Hong, C.S.: Trustworthy digital twins in the industrial internet of things with blockchain. IEEE Internet Comput. (2021)","key":"11_CR24","DOI":"10.1109\/MIC.2021.3059320"},{"unstructured":"Suhail, S., Zeadally, S., Jurdak, R., Hussain, R., Matulevi\u010dius, R., Svetinovic, D.: Security attacks and solutions for digital twins. arXiv preprint arXiv:2202.12501 (2022)","key":"11_CR25"},{"issue":"1","key":"11_CR26","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TSG.2019.2921245","volume":"11","author":"J Tian","year":"2020","unstructured":"Tian, J., Tan, R., Guan, X., Xu, Z., Liu, T.: Moving target defense approach to detecting Stuxnet-like attacks. IEEE Trans. Smart Grid 11(1), 291\u2013300 (2020). https:\/\/doi.org\/10.1109\/TSG.2019.2921245","journal-title":"IEEE Trans. Smart Grid"},{"doi-asserted-by":"publisher","unstructured":"Uhlemann, T.H.J., Lehmann, C., Steinhilper, R.: The digital twin: realizing the cyber-physical production system for industry 4.0. Procedia CIRP 61, 335\u2013340 (2017). https:\/\/doi.org\/10.1016\/j.procir.2016.11.152. www.sciencedirect.com\/science\/article\/pii\/S2212827116313129. The 24th CIRP Conference on Life Cycle Engineering","key":"11_CR27","DOI":"10.1016\/j.procir.2016.11.152"},{"doi-asserted-by":"publisher","unstructured":"Xiong, S., Sarwate, A.D., Mandayam, N.B.: Defending against packet-size side-channel attacks in IoT networks. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2027\u20132031 (2018). https:\/\/doi.org\/10.1109\/ICASSP.2018.8461330","key":"11_CR28","DOI":"10.1109\/ICASSP.2018.8461330"},{"unstructured":"Yan, W., Hou, E., Ansari, N.: Defending against traffic analysis attacks with link padding for bursty traffics. In: Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, pp. 46\u201351 (2004). IEEE (2004)","key":"11_CR29"},{"issue":"6","key":"11_CR30","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2014.113","volume":"12","author":"S Zonouz","year":"2014","unstructured":"Zonouz, S., Rrushi, J., McLaughlin, S.: Detecting industrial control malware using automated plc code analytics. IEEE Secur. Priv. 12(6), 40\u201347 (2014). https:\/\/doi.org\/10.1109\/MSP.2014.113","journal-title":"IEEE Secur. Priv."}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation. Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19762-8_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T02:42:45Z","timestamp":1728182565000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19762-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031197611","9783031197628"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19762-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isola-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}