{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T04:20:03Z","timestamp":1743740403063,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031823480","type":"print"},{"value":"9783031823497","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82349-7_30","type":"book-chapter","created":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T16:46:34Z","timestamp":1743698794000},"page":"474-493","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Framework for\u00a0Applying Digital Twins to\u00a0Support Incident Response"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2464-9790","authenticated-orcid":false,"given":"Sabah","family":"Suhail","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0543-613X","authenticated-orcid":false,"given":"Mubashar","family":"Iqbal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1299-2364","authenticated-orcid":false,"given":"Kieran","family":"McLaughlin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8475-4074","authenticated-orcid":false,"given":"Brian","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4775-9033","authenticated-orcid":false,"given":"Babar","family":"Imtiaz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"30_CR1","unstructured":"Saint-gobain press release (2017). https:\/\/www.saint-gobain.com\/sites\/saint-gobain.com\/files\/03-07-2017_cp_va.pdf"},{"key":"30_CR2","unstructured":"Cyber-attack on hydro (2019). https:\/\/www.hydro.com\/en\/media\/on-the-agenda\/cyber-attack\/"},{"key":"30_CR3","unstructured":"Alamri, A.H.: Dragos industrial ransomware analysis: Q1 2024 Dragos (2024). https:\/\/www.dragos.com\/blog\/dragos-industrial-ransomware-analysis-q1-2024\/. Accessed 05 May 2024"},{"key":"30_CR4","doi-asserted-by":"publisher","unstructured":"Alcaraz, C., Lopez, J.: Digital twin: a comprehensive survey of security threats. IEEE Commun. Surv. Tuts. 24(3), 1475\u20131503 (2022). https:\/\/doi.org\/10.1109\/COMST.2022.3171465","DOI":"10.1109\/COMST.2022.3171465"},{"key":"30_CR5","doi-asserted-by":"publisher","unstructured":"Allison, D., Smith, P., Mclaughlin, K.: Digital twin-enhanced incident response for cyber-physical systems. In: Proceedings of the 18th International Conference on Availability, Reliability and Security. ARES 2023, Association for Computing Machinery (2023). https:\/\/doi.org\/10.1145\/3600160.3600195","DOI":"10.1145\/3600160.3600195"},{"key":"30_CR6","doi-asserted-by":"publisher","unstructured":"Bitton, R., et\u00a0al.: Deriving a cost-effective digital twin of an ICS to facilitate security evaluation. In: Computer Security, pp. 533\u2013554. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99073-6_26","DOI":"10.1007\/978-3-319-99073-6_26"},{"key":"30_CR7","doi-asserted-by":"publisher","unstructured":"B\u00e9cue, A., Maia, E., Feeken, L., Borchers, P., Pra\u00e7a, I.: A new concept of digital twin supporting optimization and resilience of factories of the future. Appl. Sci. 10(13) (2020). https:\/\/doi.org\/10.3390\/app10134482","DOI":"10.3390\/app10134482"},{"key":"30_CR8","doi-asserted-by":"publisher","unstructured":"B\u00e9cue, A., et\u00a0al.: Cyberfactory#1 \u2014 securing the industry 4.0 with cyber-ranges and digital twins. In: 2018 14th IEEE International Workshop on Factory Communication Systems, pp.\u00a01\u20134 (2018). https:\/\/doi.org\/10.1109\/WFCS.2018.8402377","DOI":"10.1109\/WFCS.2018.8402377"},{"key":"30_CR9","doi-asserted-by":"publisher","unstructured":"Dietz, M., Vielberth, M., Pernul, G.: Integrating digital twin security simulations in the security operations center. In: Proceedings of the 15th International Conference ARES (2020). https:\/\/doi.org\/10.1145\/3407023.3407039","DOI":"10.1145\/3407023.3407039"},{"issue":"5\u20138","key":"30_CR10","doi-asserted-by":"publisher","first-page":"1279","DOI":"10.1007\/s00170-016-9164-5","volume":"89","author":"A Doshi","year":"2017","unstructured":"Doshi, A., Smith, R.T., Thomas, B.H., Bouras, C.: Use of projector based augmented reality to improve manual spot-welding precision and accuracy for automotive manufacturing. Int. J. Adv. Manuf. Technol. 89(5\u20138), 1279\u20131293 (2017). https:\/\/doi.org\/10.1007\/s00170-016-9164-5","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"30_CR11","doi-asserted-by":"publisher","unstructured":"Eckhart, M., Ekelhart, A.: A specification-based state replication approach for digital twins. In: Proceedings of the 2018 Workshop CPS-SPC, pp. 36\u201347 (2018). https:\/\/doi.org\/10.1145\/3264888.3264892","DOI":"10.1145\/3264888.3264892"},{"key":"30_CR12","doi-asserted-by":"publisher","unstructured":"Eckhart, M., Ekelhart, A.: Towards security-aware virtual environments for digital twins. In: Proceedings of the 4th ACM Workshop CPSS, pp. 61\u201372 (2018). https:\/\/doi.org\/10.1145\/3198458.3198464","DOI":"10.1145\/3198458.3198464"},{"key":"30_CR13","doi-asserted-by":"publisher","unstructured":"Eckhart, M., Ekelhart, A.: Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook, pp. 383\u2013412. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25312-7_14","DOI":"10.1007\/978-3-030-25312-7_14"},{"issue":"6","key":"30_CR14","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MSEC.2023.3271225","volume":"21","author":"M Eckhart","year":"2023","unstructured":"Eckhart, M., et al.: Security-enhancing digital twins: characteristics, indicators, and future perspectives. IEEE Secur. Priv. 21(6), 64\u201375 (2023). https:\/\/doi.org\/10.1109\/MSEC.2023.3271225","journal-title":"IEEE Secur. Priv."},{"key":"30_CR15","unstructured":"Eisenstein, P.A.: European car plants halted by wannacry ransomware attack (2017). https:\/\/www.nbcnews.com\/business\/autos\/european-car-plants-halted-wannacry-ransomware-attack-n759496"},{"issue":"1","key":"30_CR16","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1109\/TII.2019.2938885","volume":"16","author":"C Gehrmann","year":"2020","unstructured":"Gehrmann, C., Gunnarsson, M.: A digital twin-based industrial automation and control system security architecture. IEEE Trans. Ind. Inform. 16(1), 669\u2013680 (2020). https:\/\/doi.org\/10.1109\/TII.2019.2938885","journal-title":"IEEE Trans. Ind. Inform."},{"key":"30_CR17","unstructured":"Hanrahan, J.: Suspected conti ransomware activity in the auto manufacturing sector (2022). https:\/\/www.dragos.com\/blog\/industry-news\/suspected-conti-ransomware-activity-in-the-auto-manufacturing-sector\/"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Kinyua, J., Awuah, L.: AI\/ML in security orchestration, automation and response: future research directions. Intell. Autom. Soft Comput. 28(2) (2021)","DOI":"10.32604\/iasc.2021.016240"},{"key":"30_CR19","doi-asserted-by":"publisher","unstructured":"Konstantinidis, F.K., Mouroutsos, S.G., Gasteratos, A.: The role of machine vision in industry 4.0: an automotive manufacturing perspective. In: 2021 IEEE International Conference on Imaging Systems and Techniques, pp.\u00a01\u20136 (2021). https:\/\/doi.org\/10.1109\/IST50367.2021.9651453","DOI":"10.1109\/IST50367.2021.9651453"},{"key":"30_CR20","unstructured":"Lee, R.M., Assante, M., Conway, T.: CRASHOVERRIDE: Analysis of the Threat to Electric Grid Operations. Dragos Inc. (2017)"},{"issue":"3","key":"30_CR21","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/s10207-022-00657-9","volume":"22","author":"JM L\u00f3pez Vel\u00e1squez","year":"2023","unstructured":"L\u00f3pez Vel\u00e1squez, J.M., Mart\u00ednez Monterrubio, S.M., S\u00e1nchez Crespo, L.E., Garcia Rosado, D.: Systematic review of SIEM technology: SIEM-SC birth. Int. J. Inf. Secur. 22(3), 691\u2013711 (2023). https:\/\/doi.org\/10.1007\/s10207-022-00657-9","journal-title":"Int. J. Inf. Secur."},{"key":"30_CR22","unstructured":"Microsoft: What is azure digital twins? https:\/\/docs.microsoft.com\/en-us\/azure\/digital-twins\/overview. Accessed 05 Sept 2023"},{"issue":"1","key":"30_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MITP.2020.2982896","volume":"23","author":"R Minerva","year":"2021","unstructured":"Minerva, R., Crespi, N.: Digital twins: properties, software frameworks, and application scenarios. IT Professional 23(1), 51\u201355 (2021). https:\/\/doi.org\/10.1109\/MITP.2020.2982896","journal-title":"IT Professional"},{"key":"30_CR24","doi-asserted-by":"publisher","unstructured":"Mohsin, A., Janicke, H., Nepal, S., Holmes, D.: Digital twins and the future of their use enabling shift left and shift right cybersecurity operations. In: 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, pp. 277\u2013286. IEEE Computer Society (2023). https:\/\/doi.org\/10.1109\/TPS-ISA58951.2023.00042","DOI":"10.1109\/TPS-ISA58951.2023.00042"},{"key":"30_CR25","doi-asserted-by":"publisher","unstructured":"Oettl, F., Eckart, L., Schilp, J.: Cost estimation approach of a digital twin implementation in industry. Procedia CIRP 118, 318\u2013323 (2023). https:\/\/doi.org\/10.1016\/j.procir.2023.06.055, 16th CIRP Conference on Intelligent Computation in Manufacturing Engineering","DOI":"10.1016\/j.procir.2023.06.055"},{"issue":"6","key":"30_CR26","doi-asserted-by":"publisher","first-page":"1383","DOI":"10.1007\/s10845-019-01516-6","volume":"31","author":"A Redelinghuys","year":"2020","unstructured":"Redelinghuys, A., Basson, A.H., Kruger, K.: A six-layer architecture for the digital twin: a manufacturing case study implementation. J. Intell. Manuf. 31(6), 1383\u20131402 (2020). https:\/\/doi.org\/10.1007\/s10845-019-01516-6","journal-title":"J. Intell. Manuf."},{"key":"30_CR27","unstructured":"van Schalkwyk,P., Sean\u00a0Whiteley, M.G.: Digital twin capabilities periodic table (2024). https:\/\/www.digitaltwinconsortium.org\/wp-content\/uploads\/sites\/3\/2024\/04\/DTC_Capabilities-Periodic-Table-User-Guide-v1.1.pdf. Accessed April 2024"},{"key":"30_CR28","doi-asserted-by":"publisher","unstructured":"van Schalkwyk, P., Isaacs, D.: Achieving Scale Through Composable and Lean Digital Twins, pp. 153\u2013180. Springer International Publishing, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-21343-4_6","DOI":"10.1007\/978-3-031-21343-4_6"},{"key":"30_CR29","doi-asserted-by":"publisher","unstructured":"Shah, D.N.: Automatic welding and soldering machine using plc in automobile application. In: 2021 Asian Conference on Innovation in Technology, pp.\u00a01\u20136 (2021). https:\/\/doi.org\/10.1109\/ASIANCON51346.2021.9544774","DOI":"10.1109\/ASIANCON51346.2021.9544774"},{"issue":"1","key":"30_CR30","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(21)00009-9","volume":"2021","author":"N Shinde","year":"2021","unstructured":"Shinde, N., Kulkarni, P.: Cyber incident response and planning: a flexible approach. Comput. Fraud Secur. 2021(1), 14\u201319 (2021). https:\/\/doi.org\/10.1016\/S1361-3723(21)00009-9","journal-title":"Comput. Fraud Secur."},{"key":"30_CR31","doi-asserted-by":"publisher","unstructured":"Suhail, S., Iqbal, M., Jurdak, R.: The perils of leveraging evil digital twins as security-enhancing enablers. Commun. ACM 67(1), 39\u201342 (2023). https:\/\/doi.org\/10.1145\/3631539","DOI":"10.1145\/3631539"},{"key":"30_CR32","doi-asserted-by":"publisher","unstructured":"Suhail, S., Iqbal, M., McLaughlin, K.: Digital twin-driven deception platform: vision and way forward. IEEE Internet Comput. 1\u20139 (2024). https:\/\/doi.org\/10.1109\/MIC.2024.3406188","DOI":"10.1109\/MIC.2024.3406188"},{"key":"30_CR33","doi-asserted-by":"publisher","unstructured":"Suhail, S., et al.: Towards situational aware cyber-physical systems: a security-enhancing use case of blockchain-based digital twins. Comput. Ind. 141, 103699 (2022). https:\/\/doi.org\/10.1016\/j.compind.2022.103699","DOI":"10.1016\/j.compind.2022.103699"},{"key":"30_CR34","doi-asserted-by":"publisher","unstructured":"Suhail, S., et al.: ENIGMA: an explainable digital twin security solution for cyber-physical systems. Comput. Ind. 151, 103961 (2023). https:\/\/doi.org\/10.1016\/j.compind.2023.103961","DOI":"10.1016\/j.compind.2023.103961"},{"issue":"3","key":"30_CR35","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1038\/s43588-024-00603-w","volume":"4","author":"F Tao","year":"2024","unstructured":"Tao, F., Zhang, H., Zhang, C.: Advancements and challenges of digital twins in industry. Nat. Comput. Sci. 4(3), 169\u2013177 (2024). https:\/\/doi.org\/10.1038\/s43588-024-00603-w","journal-title":"Nat. Comput. Sci."},{"key":"30_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-030-83723-5_5","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Tools and Trends","author":"T Yue","year":"2021","unstructured":"Yue, T., Arcaini, P., Ali, S.: Understanding digital twins for cyber-physical systems: a conceptual model. In: Margaria, T., Steffen, B. (eds.) ISoLA 2020. LNCS, vol. 12479, pp. 54\u201371. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-83723-5_5"},{"key":"30_CR37","doi-asserted-by":"publisher","unstructured":"Zhou, H., Li, M., Sun, Y., Tian, Z., Yun, L.: Digital twin-based cyber range for industrial internet of things. IEEE Consum. Electron. Mag., 1\u201311 (2022). https:\/\/doi.org\/10.1109\/MCE.2022.3203202","DOI":"10.1109\/MCE.2022.3203202"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2024 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82349-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T16:46:48Z","timestamp":1743698808000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82349-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031823480","9783031823497"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82349-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}